ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 2

Question list
Search
Search

Related questions











existUSGConfiguration on the series firewallNAT Server, will produceserver-mapTable, which of the following is not part of this representation?

A.
PurposeIP
A.
PurposeIP
Answers
B.
destination port number
B.
destination port number
Answers
C.
agreement number
C.
agreement number
Answers
D.
sourceIP
D.
sourceIP
Answers
Suggested answer: D

Which of the following attacks is not a special packet attack?

A.
ICMPredirected packet attack
A.
ICMPredirected packet attack
Answers
B.
ICMPUnreachable Packet Attack
B.
ICMPUnreachable Packet Attack
Answers
C.
IPaddress scanning attack
C.
IPaddress scanning attack
Answers
D.
oversizedICMPPacket attack
D.
oversizedICMPPacket attack
Answers
Suggested answer: C

Which of the following attacks is not a malformed packet attack?

A.
Teardropattack
A.
Teardropattack
Answers
B.
Smurfattack
B.
Smurfattack
Answers
C.
TCPFragmentation attack
C.
TCPFragmentation attack
Answers
D.
ICMPUnreachable Packet Attack
D.
ICMPUnreachable Packet Attack
Answers
Suggested answer: D

"Caesar Cipher"Data is mainly encrypted by using a specific specification of stick.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

Which of the following are remote authentication methods? (multiple choice)

A.
RADIUS
A.
RADIUS
Answers
B.
Local
B.
Local
Answers
C.
HWTACACS
C.
HWTACACS
Answers
D.
LLDP
D.
LLDP
Answers
Suggested answer: A, C

Which of the following is true about the firewall log when the firewall hard drive is in place?

A.
Administrators can post content logs to view network threat detection and defense records
A.
Administrators can post content logs to view network threat detection and defense records
Answers
B.
Administrators can learn about user security risk behaviors and the reasons for being alerted or blocked through threat logs
B.
Administrators can learn about user security risk behaviors and the reasons for being alerted or blocked through threat logs
Answers
C.
Through the user activity log, administrators can obtain information such as user behaviors, searched keywords, and the effectiveness of audit policy configurations.
C.
Through the user activity log, administrators can obtain information such as user behaviors, searched keywords, and the effectiveness of audit policy configurations.
Answers
D.
The administrator can learn the security policy of the traffic hit through the policy hit log, which can be used for fault location when a problem occurs.
D.
The administrator can learn the security policy of the traffic hit through the policy hit log, which can be used for fault location when a problem occurs.
Answers
Suggested answer: D

existClient-Initiated VPNDuring the configuration, it is generally recommended to plan the address pool and the headquarters network address as different network segments. Otherwise, the proxy forwarding function needs to be enabled on the gateway device.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

Which of the following is an encryption technique used in digital envelopes?

A.
Symmetric encryption algorithm
A.
Symmetric encryption algorithm
Answers
B.
Asymmetric encryption algorithm
B.
Asymmetric encryption algorithm
Answers
C.
hash algorithm
C.
hash algorithm
Answers
D.
Stream Encryption Algorithm
D.
Stream Encryption Algorithm
Answers
Suggested answer: A, B

Firewall in addition to supporting built-inPortalIn addition to authentication, it also supports customizationPortalauthentication, when using customPortalDuring authentication, there is no need to deploy externalPortalserver.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

NAPTtechnology can realize a public networkIPThe address is used by multiple private network hosts.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A
Total 497 questions
Go to page: of 50