Huawei H12-711 Exam Questions

Questions for the H12-711 were updated on : Jun 07 ,2024

Page 1 out of 34. Viewing questions 1-15 out of 503

Question 1

Which of the following options are correct regarding the description of Windows log event types?
(multiple choice)

  • A. Warning events are events that refer to the successful operation of an application, driver, or service.
  • B. False events generally refer to loss of functionality and data. For example, a service that cannot be loaded as a system boot will generate an error event.
  • C. When the disk space is insufficient, it will be recorded as an "information event"
  • D. Failed audit events refer to failed audit security logon attempts, such as failure to access a network drive from a user's view, will be logged as a failed audit event.
Answer:

B, D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Which of the following types of encryption technology can be divided into? (multiple choice)

  • B. Symmetric encryption
  • C. fingerprint encryption
  • D. data encryption
Answer:

A, B

User Votes:
B
50%
C
50%
D
50%

Discussions
vote your answer:
B
C
D
0 / 1000

Question 3

Which of the following are HRP(Huawei Redundancy Protocol) protocol can back up state
information? (multiple choice)

  • A. session table
  • B. ServerMapentry
  • C. Dynamic blacklist
  • D. routing table
Answer:

A, B, C

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Which of the following isP2DRThe core part of the model?

  • A. PolicyStrategy
  • B. Protectionprotection
  • C. Detectiondetect
  • D. Responseresponse
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Evidence identification needs to address the verification of the integrity of the evidence and
determine whether it meets the applicable standards. Which of the following statements is correct
about the criteria for identification of evidence?

  • A. The relevance standard means that if the telephony evidence can have a substantial impact on the facts of the case to a certain extent, the court should rule that it is relevant.
  • B. The standard of objectivity means that the acquisition, storage, and submission of electronic evidence should be legal, and not constitute a serious violation of basic rights such as national interests, social welfare, and personal privacy.
  • C. The standard of legality is to ensure that the content of electronic evidence remains unchanged from the initial acquisition and collection to the submission and use as litigation evidence.
  • D. The standard of fairness refers to the evidentiary material obtained by the legal subject through legal means, which has evidential capacity.
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Data analysis technology is to find and match keywords or key phrases in the acquired data stream or
information stream, and analyze the correlation of time. Which of the following is not an evidence
analysis technique?

  • A. Cryptography, data decryption technology
  • B. Digital Abstract Analysis Technology of Documents
  • C. Techniques for discovering connections between different pieces of evidence
  • D. Spam Tracking Technology
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

aboutAHandESPSecurity protocol, which of the following options is true? (multiple choice)

  • A. AHCan provide encryption and authentication functions
  • B. ESPCan provide encryption and authentication functions
  • C. AH The protocol number is51
  • D. ESPThe protocol number is51
Answer:

B, C

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Which of the following DDoS attack types is an attack?

  • A. snooping scan attack
  • B. Malformed Packet Attack
  • C. special packet attack
  • D. traffic attack
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

aboutSSL VPNTechnology, which of the following statements is false?

  • A. SSL VPNtechnology can be perfectly adapted toNATthrough the scene
  • B. SSL VPNThe encryption of the technology only takes effect at the application layer
  • C. SSL VPNRequires a dial-up client
  • D. SSL VPNTechnology expands the reach of the enterprise's network
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Which of the following options can bewindowsDo you do it in the advanced settings of the firewall?
(multiple choice)

  • A. Restore defaults
  • B. Change notification rules
  • C. Set up connection security rules
  • D. Set up inbound and outbound rules
Answer:

C, D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

existUSGConfiguration on the series firewallNAT Server, will produceserver-mapTable, which of the
following is not part of this representation?

  • A. PurposeIP
  • B. destination port number
  • C. agreement number
  • D. sourceIP
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

Which of the following attacks is not a special packet attack?

  • A. ICMPredirected packet attack
  • B. ICMPUnreachable Packet Attack
  • C. IPaddress scanning attack
  • D. oversizedICMPPacket attack
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

Which of the following attacks is not a malformed packet attack?

  • A. Teardropattack
  • B. Smurfattack
  • C. TCPFragmentation attack
  • D. ICMPUnreachable Packet Attack
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

"Caesar Cipher"Data is mainly encrypted by using a specific specification of stick.

  • A. True
  • B. False
Answer:

B

User Votes:
A
50%
B
50%

Discussions
vote your answer:
A
B
0 / 1000

Question 15

Which of the following are remote authentication methods? (multiple choice)

  • A. RADIUS
  • B. Local
  • C. HWTACACS
  • D. LLDP
Answer:

A, C

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2