Huawei H12-711_V3.0-ENU HCIA-Security V3.0 Online Training
Huawei H12-711_V3.0-ENU Online Training
The questions for H12-711_V3.0-ENU were last updated at Nov 19,2024.
- Exam Code: H12-711_V3.0-ENU
- Exam Name: HCIA-Security V3.0
- Certification Provider: Huawei
- Latest update: Nov 19,2024
Regarding the description of the Windows log event type, which of the following is correct? (Multiple Choice)
- A . Warning event refers to an event that the application, driver or service is successful.
- B . Error events usually refer to the loss of functionality and data. For example, a service cannot be loaded as a system boot, an error event is generated.
- C . When the disk space is insufficient, it will be recorded as a "information event".
- D . Failure audit event refers to a failure of security login attempts, such as failure when a user view accesses a network drive, is recorded as a failure audit event.
Which types of the following can the encryption technology be divided into? (Multiple Choice)
- A . Symmetrical encryption
- B . Fractional symmetric encryption
- C . Fingerprint encryption
- D . Data encryption
Which of the following is the status information that can be backed up by the HRP (Huawei Redundancy Protocol) protocol? (Multiple Choice)
- A . Conference table
- B . ServerMap entry
- C . Dynamic blacklist
- D . Routing table
Which of the following is the core part of the P2DR model?
- A . Policy
- B . Protection
- C . Detection
- D . Response
Evidence identification needs to solve the integrity verification of evidence and determine if it meets the standards that can be used. Regarding the standards of evidence identification, which of the following statement is correct?
- A . Relevance standard refers to that if the electronic evidence can have a material impact on the facts of the case to a certain extent, the court should rule that it is relevant.
- B . Objective standard refers to the acquisition, storage, and submission of electronic evidences shall be legal, and the basic rights such as national interests, social welfare and personal privacy do not constitute strict violations.
- C . Legality standard is to ensure that electronic evidence is collected from the initial acquisition, and the content is not changed in the process of submission as litigation evidence.
- D . Fair standard refers to that only the legal subject obtains the evidentiary material by legal means has evidentiary ability.
Data Analysis Technology is to find, match keywords or key phrases, and analyze the correlation of time in data streams or information streams that have been obtained.
Which of the following does not belong to evidence analysis technology?
- A . Password decipherment, data decryption technology
- B . File Digital Summary Analysis Technology
- C . Exploring the technology of the connection between different evidence
- D . Spam tracking technology
About AH and ESP security protocols, which of the following statements are correct? (Multiple Choice)
- A . AH can provide the functions of encryption and verification
- B . ESP can provide the functions of encryption and verification
- C . AH’s protocol number is 51
- D . ESP’s protocol number is 51
DDoS attack belongs to which attack type?
- A . Snoop scan attack
- B . Malformed packet attack
- C . Special packet attack
- D . Flow type attack
About SSL VPN technology, which of the following statement is wrong?
- A . SSL VPN technology is perfect for NAT traversal scenarios
- B . Encryption of SSL VPN technology only takes effect on the application layer
- C . SSL VPN requires dial client
- D . SSL VPN technology expands the network range of enterprises
Which options can be operated in the advanced settings of the Windows Firewall? (Multiple Choice)
- A . Restore default
- B . Change Notification Rules
- C . Set connection safety rules
- D . Set inbound and outbound rules