Question 79

- (Exam Topic 1)
"observant"and"remain skeptical"Can help us better identify security threats in the online world

Correct Answer:A

Question 80

- (Exam Topic 1)
Which of the following options are correct regarding the description of Windows log event types? (multiple choice)

Correct Answer:BD

Question 81

- (Exam Topic 3)
Database operation records can be used as ______ evidence to backtrack security events.[fill in the blank]*
Solution:
electronic

Does this meet the goal?

Correct Answer:A

Question 82

- (Exam Topic 1)
Regarding the description of vulnerability scanning, which of the following is false?

Correct Answer:C

Question 83

- (Exam Topic 2)
IPSec VPNAn asymmetric encryption algorithm is used to encrypt the transmitted data

Correct Answer:B

Question 84

- (Exam Topic 2)
Social engineering is a means of harm such as deception, harm, etc., through psychological traps such as psychological weaknesses, instinctive reactions, curiosity, trust, and greed of victims.

Correct Answer:A

START H12-711_V3.0 EXAM