ExamGecko
Home / Huawei / H12-711 / List of questions
Ask Question

Huawei H12-711 Practice Test - Questions Answers, Page 19

Add to Whishlist

List of questions

Question 181

Report Export Collapse

The steps of the security assessment method do not include which of the following?

Manual audit
Manual audit
Penetration testing
Penetration testing
Questionnaire
Questionnaire
data analysis
data analysis
Suggested answer: D
asked 18/09/2024
Bob Xiong
50 questions

Question 182

Report Export Collapse

waiting for insurance2.0Which one of the stipulations"Spam should be detected and protected at key network nodes, and spam protection mechanisms should be upgraded and updated?

Malicious code prevention
Malicious code prevention
communication transmission
communication transmission
Centralized control
Centralized control
Border Protection
Border Protection
Suggested answer: A
asked 18/09/2024
Flamur Kapaj
49 questions

Question 183

Report Export Collapse

Which of the following options is not part of the quintuple range?

sourceIP
sourceIP
sourceMAC
sourceMAC
PurposeIP
PurposeIP
destination port
destination port
Suggested answer: B
asked 18/09/2024
ISRAEL PEREZ GARCIA
40 questions

Question 184

Report Export Collapse

In a stateful inspection firewall, when the stateful inspection mechanism is enabled, the second packet of the three-way handshake (SYN+ACK) when reaching the firewall, which of the following descriptions is correct if there is no corresponding session table on the firewall?

The firewall does not create a session table, but allows packets to pass through
The firewall does not create a session table, but allows packets to pass through
If the firewall security policy allows packets to pass, create a session table
If the firewall security policy allows packets to pass, create a session table
Packets must not pass through the firewall
Packets must not pass through the firewall
Packets must pass through the firewall and establish a session
Packets must pass through the firewall and establish a session
Suggested answer: C
asked 18/09/2024
Alex Rector
35 questions

Question 185

Report Export Collapse

existVRRP(Virtual Router Redundancy Protocol) group, the primary firewall regularly sends notification messages to the backup firewall, and the backup firewall is only responsible for monitoring notification messages and will not respond

True
True
False
False
Suggested answer: A
asked 18/09/2024
Padraig Walsh
39 questions

Question 186

Report Export Collapse

HuaweiUSGfirewallVRRPThe advertisement packets are multicast packets, so each firewall in the backup group must be able to communicate directly at Layer 2.

True
True
False
False
Suggested answer: A
asked 18/09/2024
Tamas Szekely
39 questions

Question 187

Report Export Collapse

Because the server is a kind of computer, we can use our personal computer as a server in the enterprise.

True
True
False
False
Suggested answer: B
asked 18/09/2024
Muddasir Solkar
45 questions

Question 188

Report Export Collapse

As shown in the figure, aNAT serverapplication scenarios, when usingwebWhen this configuration is performed in the configuration mode. Which of the following statements are correct? (multiple choice)

Huawei H12-711 image Question 188 32623 09182024192717000000

When configuring the interzone security policy, you need to set the source security zone toUntrust, the target security area isDMZ
When configuring the interzone security policy, you need to set the source security zone toUntrust, the target security area isDMZ
configureNATServer, the internal address is10.1.1.2, the external address is200.10.10.1
configureNATServer, the internal address is10.1.1.2, the external address is200.10.10.1
When configuring the interzone security policy, set the source security zone toDMZ, the target security area isUntrust
When configuring the interzone security policy, set the source security zone toDMZ, the target security area isUntrust
configureNATServer, the internal address is200.10.10.1, the external address is10.1.1.2
configureNATServer, the internal address is200.10.10.1, the external address is10.1.1.2
Suggested answer: A, B
asked 18/09/2024
Mehdi BELGAS
54 questions

Question 189

Report Export Collapse

existL2TPconfiguration, for the commandTunnel Name, which of the following statements is true?

(multiple choice)

Used to specify the tunnel name of the local end
Used to specify the tunnel name of the local end
Used to specify the tunnel name of the peer
Used to specify the tunnel name of the peer
both endsTunnel Nnamemust be consistent
both endsTunnel Nnamemust be consistent
If not configuredTunnel Name, the tunnel name is the local system name
If not configuredTunnel Name, the tunnel name is the local system name
Suggested answer: A, D
asked 18/09/2024
Pranoy Bej
39 questions

Question 190

Report Export Collapse

DDosWhich of the following attack types is an attack?

snooping scan attack
snooping scan attack
Malformed Packet Attack
Malformed Packet Attack
special packet attack
special packet attack
traffic attack
traffic attack
Suggested answer: D
asked 18/09/2024
Jacquezz Shorter
29 questions
Total 497 questions
Go to page: of 50
Search