Download Huawei.H12-711.CertDumps.2022-04-18.296q.vcex

Download Exam

File Info

Exam HCNA-Security-CBSN (Huawei Certified Network Associate - Constructing Basic Security Network)
Number H12-711
File Name Huawei.H12-711.CertDumps.2022-04-18.296q.vcex
Size 199 KB
Posted Apr 18, 2022
Download Huawei.H12-711.CertDumps.2022-04-18.296q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Regarding the description of windows log event types, which options are correct? (Multiple choices)


  1. Warning events are events for the successful operation of an application, driver, or service.
  2. Error events usually refer to loss of functionality and data. For example, if a service cannot be loaded as a system boot, an error event is generated.
  3. When disk space is low, it will be recorded as an "information event"
  4. Failure audit event refers to a failed audit of a secure login attempt, such as a failure when the user view accesses a network drive, and it is recorded as a failure Audit events.
Correct answer: BCD



Question 2

Which of the following types of encryption technology can be classified? (Multiple choices)


  1. Symmetric encryption
  2. Symmetric encryption
  3. Fingerprint encryption
  4. Data encryption
Correct answer: AB



Question 3

Which of the following state information can be backed up by Huawei Redundancy Protocol (HRP)? (Multiple choices)


  1. Session table
  2. ServerMap entry
  3. Dynamic blacklist
  4. Routing table
Correct answer: ABC



Question 4

Which of the following is a core part of the P2DR model?


  1. Policy
  2. Protection
  3. Detection
  4. Response 
Correct answer: A



Question 5

Evidence identification needs to address the verification of the completeness of the evidence and determine whether it meets the applicable standards. 
Regarding the standards of evidence identification, which of the following descriptions is correct?


  1. Relevance criterion refers to the fact that if the evidence is able to have a substantial impact on the facts of the case to a certain extent, the court should rule that it is relevant. Sex.
  2. Objectivity standards mean that the acquisition, storage, and submission of electronic evidence should be legal, and should be based on national interests, social welfare, and personal privacy.  
    This right does not constitute a strict violation.
  3. The standard of legality is to ensure that the content of electronic evidence has not changed from the initial collection to the submission as evidence of litigation.  
    Into.
  4. The fairness standard refers to the evidence materials obtained by legal entities through legal means to have evidence capacity.
Correct answer: A



Question 6

Data analysis technology is to find and match keywords or key phrases in the acquired data stream or information stream, and analyze the relevance of time. the following  
Which is not an evidence analysis technique?


  1. Cryptographic decoding, data decryption technology
  2. Document Digital Digest Analysis Techniques
  3. Techniques to uncover the links between different pieces of evidence
  4. Spam tracking technology
Correct answer: D



Question 7

Regarding AH and ESP security protocols, which of the following options is correct? (Multiple choices)


  1. AH can provide encryption and authentication functions
  2. ESP can provide encryption and authentication functions
  3. The agreement number of AH is 51
  4. The agreement number of ESP is 51
Correct answer: BC



Question 8

DDoS attacks belong to which of the following attack types?


  1. Spying Scan Attack
  2. Malformed message attack
  3. Special message attacks
  4. Traffic attacks
Correct answer: D



Question 9

Regarding SSL VPN technology, which of the following options is wrong?


  1. SSL VPN technology is perfect for NAT traversal scenarios
  2. The encryption of SSL VPN technology is only effective at the application layer
  3. SSL VPN requires a dial-up client
  4. SSL VPN technology extends the reach of an enterprise's network
Correct answer: C



Question 10

Which of the following options can be operated in the advanced settings of windows firewall? (Multiple choices)


  1. Restore default values
  2. Change notification rules
  3. Setting connection security rules
  4. Set up inbound and outbound rules
Correct answer: ABCD









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files