Free H12-711_V3.0 Exam Braindumps (page: 5)

Page 4 of 124

Which of the following attacks is not a malformed packet attack?

  1. Teardropattack
  2. Smurfattack
  3. TCPFragmentation attack
  4. ICMPUnreachable Packet Attack

Answer(s): D



"Caesar Cipher"Data is mainly encrypted by using a specific specification of stick.

  1. True
  2. False

Answer(s): B



Which of the following are remote authentication methods? (multiple choice)

  1. RADIUS
  2. Local
  3. HWTACACS
  4. LLDP

Answer(s): A,C



Which of the following is true about the firewall log when the firewall hard drive is in place?

  1. Administrators can post content logs to view network threat detection and defense records
  2. Administrators can learn about user security risk behaviors and the reasons for being alerted or blocked through threat logs
  3. Through the user activity log, administrators can obtain information such as user behaviors, searched keywords, and the effectiveness of audit policy configurations.
  4. The administrator can learn the security policy of the traffic hit through the policy hit log, which can be used for fault location when a problem occurs.

Answer(s): D






Post your Comments and Discuss Huawei H12-711_V3.0 exam with other Community members:

H12-711_V3.0 Exam Discussions & Posts