ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 15

Question list
Search
Search

Related questions











Which of the following options areSSL VPNfunction? (multiple choice)

A.
User Authentication
A.
User Authentication
Answers
B.
port scan
B.
port scan
Answers
C.
File Sharing
C.
File Sharing
Answers
D.
WEBrewrite
D.
WEBrewrite
Answers
Suggested answer: A, C

In the process of digital signature, which of the following is mainly carried outHASHAlgorithms thereby verifying the integrity of data transmissions?

A.
User data
A.
User data
Answers
B.
Symmetric key
B.
Symmetric key
Answers
C.
Receiver's public key
C.
Receiver's public key
Answers
D.
Receiver's private key
D.
Receiver's private key
Answers
Suggested answer: A

Which of the following traffic matches the authentication policy will trigger authentication?

A.
Access device or device-initiated traffic
A.
Access device or device-initiated traffic
Answers
B.
DHCP,BGP,OSPF,LDPmessage
B.
DHCP,BGP,OSPF,LDPmessage
Answers
C.
visitor accessHTTPbusiness traffic
C.
visitor accessHTTPbusiness traffic
Answers
D.
Article 1HTTPCorresponding to the business data flowDNSmessage
D.
Article 1HTTPCorresponding to the business data flowDNSmessage
Answers
Suggested answer: C

firewallGE1/0/1andGE1/0/2mouth belongs toDMZarea, if you want to implementGE1/0/1The connected area is accessibleGE1/0/2Connected area, which of the following is correct?

A.
needs to be configuredlocalarriveDMZsecurity policy
A.
needs to be configuredlocalarriveDMZsecurity policy
Answers
B.
No configuration required
B.
No configuration required
Answers
C.
Interzone security policy needs to be configured
C.
Interzone security policy needs to be configured
Answers
D.
needs to be configuredDMZarrivelocalsecurity policy
D.
needs to be configuredDMZarrivelocalsecurity policy
Answers
Suggested answer: B

Ways to use a computer to store information about criminal activity that is not a computer crime

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

aboutIKE SA, which of the following descriptions is false?

A.
IKE SAis bidirectional
A.
IKE SAis bidirectional
Answers
B.
IKEis based onUDPapplication layer protocol
B.
IKEis based onUDPapplication layer protocol
Answers
C.
IKE SAit's forIPSec SAServices
C.
IKE SAit's forIPSec SAServices
Answers
D.
The encryption algorithm used by user data packets isIKE SADecide
D.
The encryption algorithm used by user data packets isIKE SADecide
Answers
Suggested answer: D

aboutVPN, which of the following statements is false?

A.
Virtual private network is cheaper than private line
A.
Virtual private network is cheaper than private line
Answers
B.
VPNTechnology necessarily involves encryption
B.
VPNTechnology necessarily involves encryption
Answers
C.
VPNTechnology is a technology that multiplexes logical channels on actual physical lines
C.
VPNTechnology is a technology that multiplexes logical channels on actual physical lines
Answers
D.
VPNThe emergence of technology allows traveling employees to remotely access internal corporate servers
D.
VPNThe emergence of technology allows traveling employees to remotely access internal corporate servers
Answers
Suggested answer: B

Which of the following areFTPThe standard port number of the protocol? (multiple choice)

A.
20
A.
20
Answers
B.
twenty one
B.
twenty one
Answers
C.
twenty three
C.
twenty three
Answers
D.
80
D.
80
Answers
Suggested answer: A, B

The information security level protection is to improve the overall security level of the country, and at the same time reasonably optimize the allocation of security resources, so that it can send back the greatest security and economic benefits.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

For network security incidents that occur, remote emergency response is generally adopted first. If the problem cannot be solved for the customer through remote access, after confirmation by the customer, go to the local emergency response process

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A
Total 497 questions
Go to page: of 50