This page was exported from Valid Premium Exam [ http://premium.validexam.com ] Export date:Thu Sep 19 22:25:21 2024 / +0000 GMT ___________________________________________________ Title: H12-711_V4.0 Actual Questions Answers PDF 100% Cover Real Exam Questions [Q19-Q37] --------------------------------------------------- H12-711_V4.0 Actual Questions Answers PDF 100% Cover Real Exam Questions H12-711_V4.0 Exam questions and answers QUESTION 19Drag the warning level of the network security emergency response on the left into the box on the right, and arrange it from top to bottom in order of severity.[fill in the blank]*  3124  3125 QUESTION 20As shown in the figure, the process of AD single sign-on (querying the security log mode of AD server), please match the corresponding operation process. QUESTION 21The RADIUS protocol specifies how to pass user information, billing information, authentication and billing results between the NAS and the RADIUS server, and the RADIUS server is responsible for receiving the user’s connection request, completing the authentication, and returning the result to the NAS.  TRUE  FALSE QUESTION 22Which of the following characteristics does a denial-of-service attack include?  Unauthorized tampering of the mouth  Unauthorized access to the mouth  Unauthorized activation of the mouth  Unauthorized destruction of the mouth QUESTION 23IKE SA is a one-way logical connection, and only one IKE SA needs to be established between two peers.  TRUE  FALSE QUESTION 24Which of the following zones is not the firewall default security zone?  Trust  The Local  DMZ  Management QUESTION 25Regarding the characteristics of the routing table, which of the following items is described correctly  Port When a packet matches multiple entries in the routing table, it is forwarded based on the route entry with the largest metric.  Port In the global routing table, there is at most one next hop to the same destination CIDR block.  There may be multiple next hops in the global routing table to the same destination.  Port When a packet matches multiple entries in the routing table, it is forwarded according to the longest mask. QUESTION 26The following description of asymmetric encryption algorithms, which item is wrong?  Compared with symmetric encryption algorithms, the security factor is higher.  Encryption is faster than symmetric encryption algorithms.  Public keys are generally disclosed to users.  Asymmetric encryption algorithms are a pair of keys, divided into public and private keys. QUESTION 27Which of the following protocols is a file transfer protocol?  Mouth POP3  Mouth NFS  Mouth HITP  Mouth DFTP QUESTION 28Compared with the software architecture of C/S, B/S does not need to install a browser, and users are more flexible and convenient to use.  TRUE  FALSE QUESTION 29Which of the following protocols is a multichannel protocol?  The Telnet  THE HITP  FTP  The SSH QUESTION 30Which of the following is not a type of Windows log event?  Information  Debugging  Error  Warning QUESTION 31The following description of digital certificates, which one is wrong  The simplest certificate consists of a public key, a name, and a digital signature from a certificate authority.  Digital certificates contain the owner’s public key and related identity information.  In general, the key of a digital certificate has an expiration date.  Digital certificates do not solve the problem of digital signature technology where the public key cannot be determined to be the designated owner. QUESTION 32As shown in the figure, what is the range of the AH protocol authentication range in transmission mode?  The4  The3  The2  The1 QUESTION 33The initial priority of the USG9500VGMP group is related to which of the following factors ( )? *  interface bandwidth  VRRP priority  Number of daughter cards on the interface board  The number of CPUs on the D service board QUESTION 34Which of the following attack methods is to construct special SQL statements and submit sensitive information to exploit program vulnerabilities  Buffer overflow attack  SQL injection attacks  Worm attack  Phishing attacks QUESTION 35An enterprise wants to build a server system and requires the following functions: 1. The enterprise needs to have its own dedicated mailbox, and the sending and receiving of emails needs to go through the enterprise’s server; 2. The server must provide file transfer and access services. Users in different departments of the enterprise provide accounts with different permissions: 3. When the enterprise accesses the internal webpage of the enterprise, the enterprise can directly enter the domain name in the browser to access. To meet the above requirements, which of the following servers do enterprises need to deploy? ( )*  Time synchronization server  FTP server (I)  DNS server  Mail server QUESTION 36As shown, in transmission mode, which of the following locations should the AH header be inserted in?  3  2  1  4 QUESTION 37Which of the following is the correct sequence for incident response management1. Detection 2 Report 3 Mitigation 4 Lessons learned 5 Fix 6 Recovery 7 Response  1->3->2->7->6->5->4  1->7->3->2->6->5->4  1->3->2->7->5->6->4  1->2->3->7->6->5->4  Loading … ValidExam H12-711_V4.0 Exam Practice Test Questions: https://www.validexam.com/H12-711_V4.0-latest-dumps.html --------------------------------------------------- Images: https://premium.validexam.com/wp-content/plugins/watu/loading.gif https://premium.validexam.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2023-04-13 16:19:30 Post date GMT: 2023-04-13 16:19:30 Post modified date: 2023-04-13 16:19:30 Post modified date GMT: 2023-04-13 16:19:30