ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 16

Question list
Search
Search

Related questions











Usually we divide servers into two categories: general-purpose servers and functional servers. Which of the following options meets this classification standard?

A.
By application level
A.
By application level
Answers
B.
By use
B.
By use
Answers
C.
By shape
C.
By shape
Answers
D.
By Architecture
D.
By Architecture
Answers
Suggested answer: B

NAPTtechnology can realize a public networkIPThe address is used by multiple private network hosts

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Firewall usagehrp standby config enableAfter the command to enable the configuration function of the standby device, all the information that can be backed up can be configured directly on the standby device, and the configuration on the standby device can be synchronized to the active device.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which of the following options are characteristic of symmetric encryption algorithms? (multiple choice)

A.
Fast encryption
A.
Fast encryption
Answers
B.
Confidential is slow
B.
Confidential is slow
Answers
C.
Insecure key distribution
C.
Insecure key distribution
Answers
D.
High security of key distribution
D.
High security of key distribution
Answers
Suggested answer: A, C

Which of the following options are at risk from traffic-based attacks? (multiple choice)

A.
network down
A.
network down
Answers
B.
Server down
B.
Server down
Answers
C.
data stolen
C.
data stolen
Answers
D.
The web page has been tampered with
D.
The web page has been tampered with
Answers
Suggested answer: A, B

Intrusion Prevention System (IPS) is a defense system that can block in real time when an intrusion is detected

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which of the following options is not included aboutHRP in the content of the master/slave configuration consistency check?

A.
NATStrategy
A.
NATStrategy
Answers
B.
Whether the heartbeat interface with the same sequence number is configured
B.
Whether the heartbeat interface with the same sequence number is configured
Answers
C.
The next hop and outgoing interface of the static route
C.
The next hop and outgoing interface of the static route
Answers
D.
Authentication Policy
D.
Authentication Policy
Answers
Suggested answer: C

aboutNATConfiguration statement, which of the following is false?

A.
Configure sources in transparent modeNAT, the firewall does not supporteasy-ipWay
A.
Configure sources in transparent modeNAT, the firewall does not supporteasy-ipWay
Answers
B.
in the address poolIPaddress can beNATserverpublic networkIPaddress overlap
B.
in the address poolIPaddress can beNATserverpublic networkIPaddress overlap
Answers
C.
in the networkVoIPWhen doing business, no configuration is requiredNATALG
C.
in the networkVoIPWhen doing business, no configuration is requiredNATALG
Answers
D.
Firewall does not supportESPandAHmessageNAPTconvert
D.
Firewall does not supportESPandAHmessageNAPTconvert
Answers
Suggested answer: D

Which of the following options is correct regarding the actions of the security policy and the description of the security profile? (multiple choice)

A.
If the action of the security policy is"prohibit", the device will discard this traffic, and will not perform content security checks in the future.
A.
If the action of the security policy is"prohibit", the device will discard this traffic, and will not perform content security checks in the future.
Answers
B.
The security profile can take effect even if the action is allowed under the security policy
B.
The security profile can take effect even if the action is allowed under the security policy
Answers
C.
The security profile must be applied under the security policy whose action is allowed to take effect
C.
The security profile must be applied under the security policy whose action is allowed to take effect
Answers
D.
If the security policy action is"allow", the traffic will not match the security profile
D.
If the security policy action is"allow", the traffic will not match the security profile
Answers
Suggested answer: A, C

Which of the following options are included in the protection of data by encryption technology during data transmission? (multiple choice)

A.
confidentiality
A.
confidentiality
Answers
B.
controllability
B.
controllability
Answers
C.
integrity
C.
integrity
Answers
D.
source check
D.
source check
Answers
Suggested answer: A, C, D
Total 497 questions
Go to page: of 50