ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 19

Question list
Search
Search

List of questions

Search

Related questions











The steps of the security assessment method do not include which of the following?

A.
Manual audit
A.
Manual audit
Answers
B.
Penetration testing
B.
Penetration testing
Answers
C.
Questionnaire
C.
Questionnaire
Answers
D.
data analysis
D.
data analysis
Answers
Suggested answer: D

waiting for insurance2.0Which one of the stipulations"Spam should be detected and protected at key network nodes, and spam protection mechanisms should be upgraded and updated?

A.
Malicious code prevention
A.
Malicious code prevention
Answers
B.
communication transmission
B.
communication transmission
Answers
C.
Centralized control
C.
Centralized control
Answers
D.
Border Protection
D.
Border Protection
Answers
Suggested answer: A

Which of the following options is not part of the quintuple range?

A.
sourceIP
A.
sourceIP
Answers
B.
sourceMAC
B.
sourceMAC
Answers
C.
PurposeIP
C.
PurposeIP
Answers
D.
destination port
D.
destination port
Answers
Suggested answer: B

In a stateful inspection firewall, when the stateful inspection mechanism is enabled, the second packet of the three-way handshake (SYN+ACK) when reaching the firewall, which of the following descriptions is correct if there is no corresponding session table on the firewall?

A.
The firewall does not create a session table, but allows packets to pass through
A.
The firewall does not create a session table, but allows packets to pass through
Answers
B.
If the firewall security policy allows packets to pass, create a session table
B.
If the firewall security policy allows packets to pass, create a session table
Answers
C.
Packets must not pass through the firewall
C.
Packets must not pass through the firewall
Answers
D.
Packets must pass through the firewall and establish a session
D.
Packets must pass through the firewall and establish a session
Answers
Suggested answer: C

existVRRP(Virtual Router Redundancy Protocol) group, the primary firewall regularly sends notification messages to the backup firewall, and the backup firewall is only responsible for monitoring notification messages and will not respond

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

HuaweiUSGfirewallVRRPThe advertisement packets are multicast packets, so each firewall in the backup group must be able to communicate directly at Layer 2.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Because the server is a kind of computer, we can use our personal computer as a server in the enterprise.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

As shown in the figure, aNAT serverapplication scenarios, when usingwebWhen this configuration is performed in the configuration mode. Which of the following statements are correct? (multiple choice)

A.
When configuring the interzone security policy, you need to set the source security zone toUntrust, the target security area isDMZ
A.
When configuring the interzone security policy, you need to set the source security zone toUntrust, the target security area isDMZ
Answers
B.
configureNATServer, the internal address is10.1.1.2, the external address is200.10.10.1
B.
configureNATServer, the internal address is10.1.1.2, the external address is200.10.10.1
Answers
C.
When configuring the interzone security policy, set the source security zone toDMZ, the target security area isUntrust
C.
When configuring the interzone security policy, set the source security zone toDMZ, the target security area isUntrust
Answers
D.
configureNATServer, the internal address is200.10.10.1, the external address is10.1.1.2
D.
configureNATServer, the internal address is200.10.10.1, the external address is10.1.1.2
Answers
Suggested answer: A, B

existL2TPconfiguration, for the commandTunnel Name, which of the following statements is true?

(multiple choice)

A.
Used to specify the tunnel name of the local end
A.
Used to specify the tunnel name of the local end
Answers
B.
Used to specify the tunnel name of the peer
B.
Used to specify the tunnel name of the peer
Answers
C.
both endsTunnel Nnamemust be consistent
C.
both endsTunnel Nnamemust be consistent
Answers
D.
If not configuredTunnel Name, the tunnel name is the local system name
D.
If not configuredTunnel Name, the tunnel name is the local system name
Answers
Suggested answer: A, D

DDosWhich of the following attack types is an attack?

A.
snooping scan attack
A.
snooping scan attack
Answers
B.
Malformed Packet Attack
B.
Malformed Packet Attack
Answers
C.
special packet attack
C.
special packet attack
Answers
D.
traffic attack
D.
traffic attack
Answers
Suggested answer: D
Total 497 questions
Go to page: of 50