ExamGecko
Home / Huawei / H12-711 / List of questions
Ask Question

Huawei H12-711 Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

existUSGConfiguration on the series firewallNAT Server, will produceserver-mapTable, which of the following is not part of this representation?

PurposeIP
PurposeIP
destination port number
destination port number
agreement number
agreement number
sourceIP
sourceIP
Suggested answer: D
asked 18/09/2024
mark linde
37 questions

Question 12

Report Export Collapse

Which of the following attacks is not a special packet attack?

ICMPredirected packet attack
ICMPredirected packet attack
ICMPUnreachable Packet Attack
ICMPUnreachable Packet Attack
IPaddress scanning attack
IPaddress scanning attack
oversizedICMPPacket attack
oversizedICMPPacket attack
Suggested answer: C
asked 18/09/2024
Bradley Flay
42 questions

Question 13

Report Export Collapse

Which of the following attacks is not a malformed packet attack?

Teardropattack
Teardropattack
Smurfattack
Smurfattack
TCPFragmentation attack
TCPFragmentation attack
ICMPUnreachable Packet Attack
ICMPUnreachable Packet Attack
Suggested answer: D
asked 18/09/2024
Arvind Prasad S
49 questions

Question 14

Report Export Collapse

"Caesar Cipher"Data is mainly encrypted by using a specific specification of stick.

True
True
False
False
Suggested answer: B
asked 18/09/2024
Vasco Ricardo Ribeiro
32 questions

Question 15

Report Export Collapse

Which of the following are remote authentication methods? (multiple choice)

RADIUS
RADIUS
Local
Local
HWTACACS
HWTACACS
LLDP
LLDP
Suggested answer: A, C
asked 18/09/2024
Richard Banks
53 questions

Question 16

Report Export Collapse

Which of the following is true about the firewall log when the firewall hard drive is in place?

Administrators can post content logs to view network threat detection and defense records
Administrators can post content logs to view network threat detection and defense records
Administrators can learn about user security risk behaviors and the reasons for being alerted or blocked through threat logs
Administrators can learn about user security risk behaviors and the reasons for being alerted or blocked through threat logs
Through the user activity log, administrators can obtain information such as user behaviors, searched keywords, and the effectiveness of audit policy configurations.
Through the user activity log, administrators can obtain information such as user behaviors, searched keywords, and the effectiveness of audit policy configurations.
The administrator can learn the security policy of the traffic hit through the policy hit log, which can be used for fault location when a problem occurs.
The administrator can learn the security policy of the traffic hit through the policy hit log, which can be used for fault location when a problem occurs.
Suggested answer: D
asked 18/09/2024
Lyboth Ntsana
47 questions

Question 17

Report Export Collapse

existClient-Initiated VPNDuring the configuration, it is generally recommended to plan the address pool and the headquarters network address as different network segments. Otherwise, the proxy forwarding function needs to be enabled on the gateway device.

True
True
False
False
Suggested answer: B
asked 18/09/2024
João Faria
40 questions

Question 18

Report Export Collapse

Which of the following is an encryption technique used in digital envelopes?

Symmetric encryption algorithm
Symmetric encryption algorithm
Asymmetric encryption algorithm
Asymmetric encryption algorithm
hash algorithm
hash algorithm
Stream Encryption Algorithm
Stream Encryption Algorithm
Suggested answer: A, B
asked 18/09/2024
Mahmoud Ziada
39 questions

Question 19

Report Export Collapse

Firewall in addition to supporting built-inPortalIn addition to authentication, it also supports customizationPortalauthentication, when using customPortalDuring authentication, there is no need to deploy externalPortalserver.

True
True
False
False
Suggested answer: B
asked 18/09/2024
Anthony Bradley
49 questions

Question 20

Report Export Collapse

NAPTtechnology can realize a public networkIPThe address is used by multiple private network hosts.

True
True
False
False
Suggested answer: A
asked 18/09/2024
Artur Sierszen
55 questions
Total 497 questions
Go to page: of 50