ExamGecko
Home / Huawei / H12-711 / List of questions
Ask Question

Huawei H12-711 Practice Test - Questions Answers, Page 16

Add to Whishlist

List of questions

Question 151

Report Export Collapse

Usually we divide servers into two categories: general-purpose servers and functional servers. Which of the following options meets this classification standard?

By application level
By application level
By use
By use
By shape
By shape
By Architecture
By Architecture
Suggested answer: B
asked 18/09/2024
Arno Rodenhuis
50 questions

Question 152

Report Export Collapse

NAPTtechnology can realize a public networkIPThe address is used by multiple private network hosts

True
True
False
False
Suggested answer: A
asked 18/09/2024
Mohamed Mohamed
53 questions

Question 153

Report Export Collapse

Firewall usagehrp standby config enableAfter the command to enable the configuration function of the standby device, all the information that can be backed up can be configured directly on the standby device, and the configuration on the standby device can be synchronized to the active device.

True
True
False
False
Suggested answer: A
asked 18/09/2024
EDUARDO VIDAL
46 questions

Question 154

Report Export Collapse

Which of the following options are characteristic of symmetric encryption algorithms? (multiple choice)

Fast encryption
Fast encryption
Confidential is slow
Confidential is slow
Insecure key distribution
Insecure key distribution
High security of key distribution
High security of key distribution
Suggested answer: A, C
asked 18/09/2024
Ali Reza Farahnak
55 questions

Question 155

Report Export Collapse

Which of the following options are at risk from traffic-based attacks? (multiple choice)

network down
network down
Server down
Server down
data stolen
data stolen
The web page has been tampered with
The web page has been tampered with
Suggested answer: A, B
asked 18/09/2024
Muhammad Imran
44 questions

Question 156

Report Export Collapse

Intrusion Prevention System (IPS) is a defense system that can block in real time when an intrusion is detected

True
True
False
False
Suggested answer: A
asked 18/09/2024
Yassin Benjajji
44 questions

Question 157

Report Export Collapse

Which of the following options is not included aboutHRP in the content of the master/slave configuration consistency check?

NATStrategy
NATStrategy
Whether the heartbeat interface with the same sequence number is configured
Whether the heartbeat interface with the same sequence number is configured
The next hop and outgoing interface of the static route
The next hop and outgoing interface of the static route
Authentication Policy
Authentication Policy
Suggested answer: C
asked 18/09/2024
55 Cantera Ct. Johnson
44 questions

Question 158

Report Export Collapse

aboutNATConfiguration statement, which of the following is false?

Configure sources in transparent modeNAT, the firewall does not supporteasy-ipWay
Configure sources in transparent modeNAT, the firewall does not supporteasy-ipWay
in the address poolIPaddress can beNATserverpublic networkIPaddress overlap
in the address poolIPaddress can beNATserverpublic networkIPaddress overlap
in the networkVoIPWhen doing business, no configuration is requiredNATALG
in the networkVoIPWhen doing business, no configuration is requiredNATALG
Firewall does not supportESPandAHmessageNAPTconvert
Firewall does not supportESPandAHmessageNAPTconvert
Suggested answer: D
asked 18/09/2024
Sze Yenn Tan
40 questions

Question 159

Report Export Collapse

Which of the following options is correct regarding the actions of the security policy and the description of the security profile? (multiple choice)

If the action of the security policy is"prohibit", the device will discard this traffic, and will not perform content security checks in the future.
If the action of the security policy is"prohibit", the device will discard this traffic, and will not perform content security checks in the future.
The security profile can take effect even if the action is allowed under the security policy
The security profile can take effect even if the action is allowed under the security policy
The security profile must be applied under the security policy whose action is allowed to take effect
The security profile must be applied under the security policy whose action is allowed to take effect
If the security policy action is"allow", the traffic will not match the security profile
If the security policy action is"allow", the traffic will not match the security profile
Suggested answer: A, C
asked 18/09/2024
Rafal Piasecki
46 questions

Question 160

Report Export Collapse

Which of the following options are included in the protection of data by encryption technology during data transmission? (multiple choice)

confidentiality
confidentiality
controllability
controllability
integrity
integrity
source check
source check
Suggested answer: A, C, D
asked 18/09/2024
Filippo Bertuzzi
37 questions
Total 497 questions
Go to page: of 50