Download HCNA-Security-CBSN (Huawei Certified Network Associate -Constructing Basic Security Network).CertDumps.H12-711.2022-02-10.1e.184q.vcex

Download Exam

File Info

Exam HCNA-Security-CBSN (Huawei Certified Network Associate - Constructing Basic Security Network)
Number H12-711
File Name HCNA-Security-CBSN (Huawei Certified Network Associate -Constructing Basic Security Network).CertDumps.H12-711.2022-02-10.1e.184q.vcex
Size 124 Kb
Posted February 10, 2022
Downloads 7

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Coupon: EXAM_HUB

Discount: 20%


Demo Questions

Question 1
Which of the following state information can be backed up by Huawei Redundancy Protocol (HRP)? (Multiple choices)

  • A: Session table
  • B: ServerMap entry
  • C: Dynamic blacklist
  • D: Routing table

Question 2
Evidence identification needs to address the verification of the completeness of the evidence and determine whether it meets the applicable standards. 
Regarding the standards of evidence identification, which of the following descriptions is correct?

  • A: Relevance criterion refers to the fact that if the evidence is able to have a substantial impact on the facts of the case to a certain extent, the court should rule that it is relevant. Sex.
  • B: Objectivity standards mean that the acquisition, storage, and submission of electronic evidence should be legal, and should be based on national interests, social welfare, and personal privacy.  
    This right does not constitute a strict violation.
  • C: The standard of legality is to ensure that the content of electronic evidence has not changed from the initial collection to the submission as evidence of litigation.  
  • D: The fairness standard refers to the evidence materials obtained by legal entities through legal means to have evidence capacity.

Question 3
Data analysis technology is to find and match keywords or key phrases in the acquired data stream or information stream, and analyze the relevance of time. the following  
Which is not an evidence analysis technique?

  • A: Cryptographic decoding, data decryption technology
  • B: Document Digital Digest Analysis Techniques
  • C: Techniques to uncover the links between different pieces of evidence
  • D: Spam tracking technology

Question 4
Regarding SSL VPN technology, which of the following options is wrong?

  • A: SSL VPN technology is perfect for NAT traversal scenarios
  • B: The encryption of SSL VPN technology is only effective at the application layer
  • C: SSL VPN requires a dial-up client
  • D: SSL VPN technology extends the reach of an enterprise's network

Question 5
Which of the following options can be operated in the advanced settings of windows firewall? (Multiple choices)

  • A: Restore default values
  • B: Change notification rules
  • C: Setting connection security rules
  • D: Set up inbound and outbound rules

Question 6
When a NAT server is configured on a USG series firewall, a server-map table is generated. Which of the following is not included in the performance?

  • A: Destination IP
  • B: Destination port number
  • C: Agreement number
  • D: Source IP 

Question 7
Which of the following attacks is not a malformed packet attack?

  • A: Teardrop attack
  • B: Smurf attack
  • C: TCP Fragmentation Attack
  • D: ICMP Unreachable Packet Attack

Question 8
The "Caesar cipher" is mainly used to encrypt data by using a stick of a specific specification.

  • A: Yes
  • B: wrong

Question 9
When the firewall hard disk is in place, which of the following is a correct description of the firewall log?

  • A: Administrators can publish content logs to view network threat detection and defense records
  • B: Administrators can use the threat log to understand the user's security risk behavior and the reasons for being alerted or blocked
  • C: The administrator learns the user's behavior, groped keywords, and the effectiveness of the audit policy configuration through the user activity log
  • D: The administrator can learn the security policy of traffic hit through the policy hit log, which can be used for fault location when a problem occurs.

Question 10
Which of the following is the encryption technology used in digital envelopes?

  • A: Symmetric encryption algorithm
  • B: Asymmetric encryption algorithm
  • C: Hashing algorithm
  • D: Stream encryption algorithm



You can buy ProfExam with a 20% discount..

Get Now!


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen


Use VCE Exam Simulator to open VCE files