What Simulation H12-711 Exam Topics Is

It is more faster and easier to pass the HUAWEI H12-711 exam by using Refined HUAWEI HCNA-Security - CBSN (Constructing Basic Security Network) questuins and answers. Immediate access to the Update H12-711 Exam and find the same core area H12-711 questions with professionally verified answers, then PASS your exam with a high score now.

Online HUAWEI H12-711 free dumps demo Below:

NEW QUESTION 1
Which of the following statements are correct about the differences between pre-accident prevention strategies and post-accident recovery strategies? (H/multiple Choice)

  • A. The prevention strategy focuses or minimizing the likelihood of an accident before the story occur
  • B. The recovery strategy focuses on minimizing the impact and loss on the company after the accident
  • C. The role of pre-disaster prevention strategies does not include minimizing economic, reputational, and other losses caused by accidents.
  • D. Recovery strategy is used to imprcve business high availability
  • E. Recovery strategy is part of the business continuity plan

Answer: ACD

NEW QUESTION 2
Which of the following statements is wrong about the firewall gateway's anti-virus response to the HTTP protocol?

  • A. When the gateway device blocks the HTTP connection, push the web page to the client andgenerate a log.
  • B. Response methods include announcement and blocking
  • C. Alarm mode device only generates logs and sends them out without processing the files transmitted by the HTTP protocol.
  • D. Blocking means that the device disconnects from the HTTP server and blocks file transfer.

Answer: B

NEW QUESTION 3
Which of the following behaviors is relatively safer when connecting to Wi-Fi in public places?

  • A. Connect Wi-Fi hotspots that are not encrypted
  • B. Connect to the paid Wi-Fi hotspot provided by the operator and only browse the web
  • C. Connect unencrypted free Wi-Fi for online shopping
  • D. Connect encrypted freeWi-Fi for online transfer operations

Answer: B

NEW QUESTION 4
Classify servers based on the shape, what types of the following can be divided into? (Multiple choice)

  • A. Blade sen/er
  • B. Tower server
  • C. Rack server
  • D. X86 server

Answer: ABC

NEW QUESTION 5
What is the nature cf information security in "Implementation of security monitoring and management of information and information systems to prevent the illegal use of information and information systems"?

  • A. Confidentiality
  • B. Controllability
  • C. Non-repudiation
  • D. Integrity

Answer: B

NEW QUESTION 6
Which of the following information will be encrypted during the use of digital envelopes? (Multiple choice)

  • A. Symmetric key
  • B. User data
  • C. Receiver public key
  • D. Receiver private key

Answer: AB

NEW QUESTION 7
Which of the following is the GRE protocol number?

  • A. 46
  • B. 47
  • C. 89
  • D. 50

Answer: B

NEW QUESTION 8
The repair of anti-virus software only needs to be able to repair some system files that were accidentally deleted when killing the virus to prevent the system from crashing

  • A. True
  • B. False

Answer: A

NEW QUESTION 9
Which of the following options does not belong to the log type of the Windows operating system?

  • A. Business log
  • B. Application log
  • C. Security log
  • D. System log

Answer: A

NEW QUESTION 10
Which of the following is not the certificate save file format supported by the USG6000 series?

  • A. PKCS#12
  • B. DER
  • C. PEM
  • D. PKCS#

Answer: D

NEW QUESTION 11
Which of the following belongs to the devices at the execution layer in the Huawei SDSec solution? 'Multiple Choice)

  • A. cis
  • B. Fierhunter
  • C. Router
  • D. AntiDDoS

Answer: BCD

NEW QUESTION 12
Intrusion prevention system technical characteristics include (Multiple choice)

  • A. Online mode
  • B. Real-time blocking
  • C. Self-learning and adaptive
  • D. Straight road deployment

Answer: ABC

NEW QUESTION 13
If the administrator uses ’he default authentication domain to authenticate a user, you onlyneed to enter a user name when the user logs, if administrators use the newly created authentication domain to authenticate the user, the user will need to enter login "username @ Certified domain name"

  • A. True
  • B. False

Answer: A

NEW QUESTION 14
When Firewall does dual-system hot backup networking, in order to achieve the overall status of the backup group switching, which of the following protocol technology need to be used?

  • A. VRRP
  • B. VGMP
  • C. HRP
  • D. OSPF

Answer: B

NEW QUESTION 15
ASPF (Application Specific Packet Filter) is a kind of packet filtering basedon the application layer, it checks the application layer protocol information and monitor the connection state of the application layer protocol. ASPF by Server Map table achieves a special security mechanism. Which statement about ASPF and Server map table are correct? (Multiple choice)

  • A. ASPF monitors the packets in the process of communication
  • B. ASPF dynamically create and delete filtering rules
  • C. ASPF through server map table realize dynamic to allow multi-channel protocol data to pass
  • D. Quintupleserver-map entries achieve a similar functionality with session table

Answer: ABC

NEW QUESTION 16
Which of the following descriptions about windows logs is wrong?

  • A. The system log is used to record the events generated by the operating system components, including the crash of the driver, system components and application software, and data
  • B. Windows server 2008 system logs stored in the Application.evtx
  • C. The application log contains events logged by the application or system program, mainly recording events in the running of the program.
  • D. Windows seiver 2008 security lug is sluied in security.evtx

Answer: B

NEW QUESTION 17
The single-point login function of the online user, the user authenticates directly to the AD server, and the device does not interfere with the user authentication process. The AD monitoring service needs to be deployed on the USG device to mcnitorthe authentication information of the AD server.

  • A. True
  • B. False

Answer: B

NEW QUESTION 18
Which of the following options are correct about the control actions permit and deny of the firewall interzone forwarding security policy? (Multiple Choice)

  • A. The action of the firewall default security policy is deny.
  • B. The packet is matched immediately after the inter-domain security policy deny action, and the other interzone security policy will not be executed.
  • C. Even if the packet matches the permit action of the security policy, it will not necessarily be forwarded by the firewall.
  • D. Whether the message matches the permit action of the security policy or the deny action, the message will be processed by the UTM module.

Answer: ABC

NEW QUESTION 19
Use ip tables to write a rule that does not allow the network segment of 172.16.0.0/16 to access the devise. Which of the following rules is correct?

  • A. Iptables -t filter -A INPUT -s 172.16.0.0/16 -p all -j DROP
  • B. Iptables -t filter -P INPUT -s 172.16.0.0/16 -p all -j DROP
  • C. Iptables -t filter -P INPUT -s 172.1G.0.0/1G -p all -j ACCEPT
  • D. iptables -t filter -P INPUT -d 172.16.0.0/16 -p all -j ACCEPT

Answer: A

NEW QUESTION 20
In the USG system firewall, the _____ function can be used to provide well-known applica’.ionservices for non-known ports.

  • A. Port mapping
  • B. MAC and IP address binding
  • C. Packet filtering
  • D. Long connection

Answer: A

NEW QUESTION 21
When establishing their own information systems, companies check each operation according to internationally established authoritative standards and can check whether their information systems are safe

  • A. True
  • B. False

Answer: A

NEW QUESTION 22
Which of the following is true about the description of the TCP/IP protocol stack packet encapsulation? (Multiple choice)

  • A. The data packet is firsttransmitted to the data link laye
  • B. After parsing, the data link layer information is stripped, and the network layer information is known according to the parsing information, such as IP.
  • C. After the transport layer (TCP) receives the data packet, the transport layer information is stripped after parsing, and the upper layer processing protocol, such as UDP, is known according to the parsing information
  • D. After receiving the data packet, the network layer is stripped after parsing, and the upper layer processing protocol is known according to the parsing information, such as HTTP
  • E. After the application layer receives the data packet, the application layer information is stripped after parsing, and the user data displayed at the end is exactly the same as the data sent by the sender host.

Answer: AD

NEW QUESTION 23
Which of the following are remote authentication methods? (Multiple choice)

  • A. RADIUS
  • B. Local
  • C. HWTACACS
  • D. LLDP

Answer: AC

NEW QUESTION 24
Security policy conditions can be divided into multiple fields, such as source address, destination address, source port, destination port, etc. These fields are "and", that is, only information in the packet match all fields, and then hit this policy.

  • A. True
  • B. False

Answer: B

NEW QUESTION 25
Which of the following guarantees "should detect and protect spam at critical network nodes and maintain upgrades and updates of the spam protection mechanism" in security 2.0?

  • A. Malicious code prevention
  • B. Communication transmission
  • C. Centralized control
  • D. Border protection

Answer: A

NEW QUESTION 26
Device destruction attacks are generally not easy to cause information leakage, but usually cause network communication services to be interrupted.

  • A. True
  • B. False

Answer: A

NEW QUESTION 27
The preservation of electronicevidence is directly related to the legal effect of evidence, and it is in conformity with the preservation of legal procedures, and its authenticity and reliability are guaranteed. Which of the following is not an evidence preservation technique?

  • A. Encryption technology
  • B. Digital certificate technology
  • C. Digital signature technology
  • D. Packet tag tracking technology

Answer: D

NEW QUESTION 28
Which ofthe following are the standard port numbers for the FTP protocol? (Multiple choice)

  • A. 20
  • B. 21
  • C. 23
  • D. 80

Answer: AB

NEW QUESTION 29
Which of the following are the response actions after the gateway antivirus detects the mail virus? (Multiple choice)

  • A. Alarm
  • B. Blocking
  • C. Announcement
  • D. Delete attachments

Answer: ABCD

NEW QUESTION 30
......

Recommend!! Get the Full H12-711 dumps in VCE and PDF From Surepassexam, Welcome to Download: https://www.surepassexam.com/H12-711-exam-dumps.html (New 294 Q&As Version)