Huawei h12-711-v3-0 online test

HCIA-Security V3.0 Exam

What students need to know about the h12-711-v3-0 exam

  • Total 492 Questions & Answers

Question 1

Which of the following options are correct regarding the description of Windows log event types?
(multiple choice)

  • A. Warning events are events that refer to the successful operation of an application, driver, or service.
  • B. False events generally refer to loss of functionality and data. For example, a service that cannot be loaded as a system boot will generate an error event.
  • C. When the disk space is insufficient, it will be recorded as an "information event"
  • D. Failed audit events refer to failed audit security logon attempts, such as failure to access a network drive from a user's view, will be logged as a failed audit event.
Answer:

B, D

Discussions

Question 2

Which of the following types of encryption technology can be divided into? (multiple choice)

  • B. Symmetric encryption
  • C. fingerprint encryption
  • D. data encryption
Answer:

A, B

Discussions

Question 3

Which of the following are HRP(Huawei Redundancy Protocol) protocol can back up state
information? (multiple choice)

  • A. session table
  • B. ServerMapentry
  • C. Dynamic blacklist
  • D. routing table
Answer:

A, B, C

Discussions

Question 4

Which of the following isP2DRThe core part of the model?

  • A. PolicyStrategy
  • B. Protectionprotection
  • C. Detectiondetect
  • D. Responseresponse
Answer:

A

Discussions

Question 5

Evidence identification needs to address the verification of the integrity of the evidence and
determine whether it meets the applicable standards. Which of the following statements is correct
about the criteria for identification of evidence?

  • A. The relevance standard means that if the telephony evidence can have a substantial impact on the facts of the case to a certain extent, the court should rule that it is relevant.
  • B. The standard of objectivity means that the acquisition, storage, and submission of electronic evidence should be legal, and not constitute a serious violation of basic rights such as national interests, social welfare, and personal privacy.
  • C. The standard of legality is to ensure that the content of electronic evidence remains unchanged from the initial acquisition and collection to the submission and use as litigation evidence.
  • D. The standard of fairness refers to the evidentiary material obtained by the legal subject through legal means, which has evidential capacity.
Answer:

A

Discussions

Question 6

Data analysis technology is to find and match keywords or key phrases in the acquired data stream or
information stream, and analyze the correlation of time. Which of the following is not an evidence
analysis technique?

  • A. Cryptography, data decryption technology
  • B. Digital Abstract Analysis Technology of Documents
  • C. Techniques for discovering connections between different pieces of evidence
  • D. Spam Tracking Technology
Answer:

D

Discussions

Question 7

aboutAHandESPSecurity protocol, which of the following options is true? (multiple choice)

  • A. AHCan provide encryption and authentication functions
  • B. ESPCan provide encryption and authentication functions
  • C. AH The protocol number is51
  • D. ESPThe protocol number is51
Answer:

B, C

Discussions

Question 8

Which of the following DDoS attack types is an attack?

  • A. snooping scan attack
  • B. Malformed Packet Attack
  • C. special packet attack
  • D. traffic attack
Answer:

D

Discussions

Question 9

aboutSSL VPNTechnology, which of the following statements is false?

  • A. SSL VPNtechnology can be perfectly adapted toNATthrough the scene
  • B. SSL VPNThe encryption of the technology only takes effect at the application layer
  • C. SSL VPNRequires a dial-up client
  • D. SSL VPNTechnology expands the reach of the enterprise's network
Answer:

C

Discussions

Question 10

Which of the following options can bewindowsDo you do it in the advanced settings of the firewall?
(multiple choice)

  • A. Restore defaults
  • B. Change notification rules
  • C. Set up connection security rules
  • D. Set up inbound and outbound rules
Answer:

C, D

Discussions
To page 2