ExamGecko
Home / Huawei / H12-711 / List of questions
Ask Question

Huawei H12-711 Practice Test - Questions Answers, Page 15

Add to Whishlist

List of questions

Question 141

Report Export Collapse

Which of the following options areSSL VPNfunction? (multiple choice)

User Authentication
User Authentication
port scan
port scan
File Sharing
File Sharing
WEBrewrite
WEBrewrite
Suggested answer: A, C
asked 18/09/2024
Oeurn Chan
31 questions

Question 142

Report Export Collapse

In the process of digital signature, which of the following is mainly carried outHASHAlgorithms thereby verifying the integrity of data transmissions?

User data
User data
Symmetric key
Symmetric key
Receiver's public key
Receiver's public key
Receiver's private key
Receiver's private key
Suggested answer: A
asked 18/09/2024
Mitesh Solanki
50 questions

Question 143

Report Export Collapse

Which of the following traffic matches the authentication policy will trigger authentication?

Access device or device-initiated traffic
Access device or device-initiated traffic
DHCP,BGP,OSPF,LDPmessage
DHCP,BGP,OSPF,LDPmessage
visitor accessHTTPbusiness traffic
visitor accessHTTPbusiness traffic
Article 1HTTPCorresponding to the business data flowDNSmessage
Article 1HTTPCorresponding to the business data flowDNSmessage
Suggested answer: C
asked 18/09/2024
marwan albahar
40 questions

Question 144

Report Export Collapse

firewallGE1/0/1andGE1/0/2mouth belongs toDMZarea, if you want to implementGE1/0/1The connected area is accessibleGE1/0/2Connected area, which of the following is correct?

needs to be configuredlocalarriveDMZsecurity policy
needs to be configuredlocalarriveDMZsecurity policy
No configuration required
No configuration required
Interzone security policy needs to be configured
Interzone security policy needs to be configured
needs to be configuredDMZarrivelocalsecurity policy
needs to be configuredDMZarrivelocalsecurity policy
Suggested answer: B
asked 18/09/2024
ANTONIO M SILVA
48 questions

Question 145

Report Export Collapse

Ways to use a computer to store information about criminal activity that is not a computer crime

True
True
False
False
Suggested answer: B
asked 18/09/2024
Liam Derwin
51 questions

Question 146

Report Export Collapse

aboutIKE SA, which of the following descriptions is false?

IKE SAis bidirectional
IKE SAis bidirectional
IKEis based onUDPapplication layer protocol
IKEis based onUDPapplication layer protocol
IKE SAit's forIPSec SAServices
IKE SAit's forIPSec SAServices
The encryption algorithm used by user data packets isIKE SADecide
The encryption algorithm used by user data packets isIKE SADecide
Suggested answer: D
asked 18/09/2024
Anil Dagar
43 questions

Question 147

Report Export Collapse

aboutVPN, which of the following statements is false?

Virtual private network is cheaper than private line
Virtual private network is cheaper than private line
VPNTechnology necessarily involves encryption
VPNTechnology necessarily involves encryption
VPNTechnology is a technology that multiplexes logical channels on actual physical lines
VPNTechnology is a technology that multiplexes logical channels on actual physical lines
VPNThe emergence of technology allows traveling employees to remotely access internal corporate servers
VPNThe emergence of technology allows traveling employees to remotely access internal corporate servers
Suggested answer: B
asked 18/09/2024
Beena Bamania
38 questions

Question 148

Report Export Collapse

Which of the following areFTPThe standard port number of the protocol? (multiple choice)

20
20
twenty one
twenty one
twenty three
twenty three
80
80
Suggested answer: A, B
asked 18/09/2024
Donald VIRMOND
37 questions

Question 149

Report Export Collapse

The information security level protection is to improve the overall security level of the country, and at the same time reasonably optimize the allocation of security resources, so that it can send back the greatest security and economic benefits.

True
True
False
False
Suggested answer: A
asked 18/09/2024
Nagarajapandian T
35 questions

Question 150

Report Export Collapse

For network security incidents that occur, remote emergency response is generally adopted first. If the problem cannot be solved for the customer through remote access, after confirmation by the customer, go to the local emergency response process

True
True
False
False
Suggested answer: A
asked 18/09/2024
Vilfride Lutumba
45 questions
Total 497 questions
Go to page: of 50