ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 13

Question list
Search
Search

Related questions











pass throughdisplay ike sa The results you see are as follows. Which of the following statements is false?

A.
IKE SAhas been established
A.
IKE SAhas been established
Answers
B.
IPSec SAhas been established
B.
IPSec SAhas been established
Answers
C.
neighbor address is2.2.2.1
C.
neighbor address is2.2.2.1
Answers
D.
IKEused isV1Version
D.
IKEused isV1Version
Answers
Suggested answer: B

aboutwindowsandlinuxWhich of the following statements is false?

A.
linuxIt is difficult for beginners to get started and needs some learning and guidance
A.
linuxIt is difficult for beginners to get started and needs some learning and guidance
Answers
B.
windowsCompatible with most software and play most games
B.
windowsCompatible with most software and play most games
Answers
C.
linuxis open source, do what you want
C.
linuxis open source, do what you want
Answers
D.
windowsIt's open source, do what you want
D.
windowsIt's open source, do what you want
Answers
Suggested answer: D

Which of the following options areIATF(Information Assurance Technology Framework) core elements of the model? (multiple choice)

A.
surroundings
A.
surroundings
Answers
B.
people
B.
people
Answers
C.
Technology
C.
Technology
Answers
D.
operate
D.
operate
Answers
Suggested answer: B, C, D

Which of the following are multi-user operating systems? (multiple choice)

A.
MSDOS
A.
MSDOS
Answers
B.
UNIX
B.
UNIX
Answers
C.
LINUX
C.
LINUX
Answers
D.
Windows
D.
Windows
Answers
Suggested answer: B, C, D

The preservation of electronic evidence is directly related to the legal validity of the evidence. Only when the preservation conforms to legal procedures, can its authenticity and reliability be guaranteed. Which of the following is not an evidence preservation technology?

A.
Encryption Technology
A.
Encryption Technology
Answers
B.
digital certificate technology
B.
digital certificate technology
Answers
C.
digital signature technology
C.
digital signature technology
Answers
D.
Packet Tag Tracking Technology
D.
Packet Tag Tracking Technology
Answers
Suggested answer: D

VGMPIn which of the following situations occurs in the group, the group will not actively send the message to the peerVGMPmessage/

A.
Dual-system hot backup function enabled
A.
Dual-system hot backup function enabled
Answers
B.
Manually switch the active and standby status of the firewall
B.
Manually switch the active and standby status of the firewall
Answers
C.
Firewall service interface failure
C.
Firewall service interface failure
Answers
D.
Session table entry changes
D.
Session table entry changes
Answers
Suggested answer: D

Which of the following options are available inwindowsDo you do it in the advanced settings of the firewall? (multiple choice)

A.
Restore defaults
A.
Restore defaults
Answers
B.
Change notification rules
B.
Change notification rules
Answers
C.
Set up connection security rules
C.
Set up connection security rules
Answers
D.
Set up inbound and outbound rules
D.
Set up inbound and outbound rules
Answers
Suggested answer: A, B, C, D

Which of the following is true about the security policy configuration command?

A.
prohibited fromtrustRegional accessuntrustarea and the destination address is10.1.10.10hostICMPmessage
A.
prohibited fromtrustRegional accessuntrustarea and the destination address is10.1.10.10hostICMPmessage
Answers
B.
prohibited fromtrustRegional accessuntrustarea and the destination address is10.1.0.0/16All hosts on the segmentICMPmessage
B.
prohibited fromtrustRegional accessuntrustarea and the destination address is10.1.0.0/16All hosts on the segmentICMPmessage
Answers
C.
prohibited fromtrustRegional accessuntrustregion and the source address is10.1.0.0/16All hosts from the network segmentICMPmessage
C.
prohibited fromtrustRegional accessuntrustregion and the source address is10.1.0.0/16All hosts from the network segmentICMPmessage
Answers
D.
prohibited fromtrustRegional accessuntrustregion and the source address is10.2.10.10All hosts from hostICMPmessage
D.
prohibited fromtrustRegional accessuntrustregion and the source address is10.2.10.10All hosts from hostICMPmessage
Answers
Suggested answer: C

In information security prevention, commonly used security products are firewalls,Anti- DDosequipment andIPS/IDSequipment

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

If the administrator uses the defaultdefaultThe authentication domain verifies the user, and the user only needs to enter the user name when logging in; if the administrator uses the newly created authentication domain to authenticate the user, the user needs to enter the user name when logging in."username@Certified domain name"

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A
Total 497 questions
Go to page: of 50