ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 20

Question list
Search
Search

Related questions











existUSGIn the system firewall, you can useóóóóThe function provides well-known application services for non-well-known ports.

A.
Port Mapping
A.
Port Mapping
Answers
B.
MACandIPaddress binding
B.
MACandIPaddress binding
Answers
C.
packet filtering
C.
packet filtering
Answers
D.
Long connection
D.
Long connection
Answers
Suggested answer: A

Which of the following is true about the command to view the number of times security policy matches?

A.
display firewall session table
A.
display firewall session table
Answers
B.
display security-policy all
B.
display security-policy all
Answers
C.
display security-policy count
C.
display security-policy count
Answers
D.
count security-policy hit
D.
count security-policy hit
Answers
Suggested answer: B

Which of the following options belongs to Tier 2VPNTechnology?

A.
SSL VPN
A.
SSL VPN
Answers
B.
L2TP VPN
B.
L2TP VPN
Answers
C.
GRE VPN
C.
GRE VPN
Answers
D.
IPSec VPN
D.
IPSec VPN
Answers
Suggested answer: B

aboutwindowsDescription of the firewall advanced settings, which of the following options is wrong?

(multiple choice)

A.
When setting the stacking rules, only the local port can be restricted, and the remote port cannot be restricted
A.
When setting the stacking rules, only the local port can be restricted, and the remote port cannot be restricted
Answers
B.
When setting the stacking rules, you can restrict both the local port and the remote port.
B.
When setting the stacking rules, you can restrict both the local port and the remote port.
Answers
C.
When setting the stacking rule, only the local port can be restricted, and the remote port cannot be restricted
C.
When setting the stacking rule, only the local port can be restricted, and the remote port cannot be restricted
Answers
D.
When setting the stacking rules, you can restrict both the local port and the remote port.
D.
When setting the stacking rules, you can restrict both the local port and the remote port.
Answers
Suggested answer: B, D

aboutVGMPIn a description of group management, which of the following is false?

A.
VRRPbackup group master/All standby status changes need to be notified to theVGMPmanagement group
A.
VRRPbackup group master/All standby status changes need to be notified to theVGMPmanagement group
Answers
B.
The interface types and numbers of the heartbeat ports of the two firewalls can be different, as long as the Layer 2 interoperability can be guaranteed.
B.
The interface types and numbers of the heartbeat ports of the two firewalls can be different, as long as the Layer 2 interoperability can be guaranteed.
Answers
C.
Active and standby firewallsVGMPtimed starthellomessage
C.
Active and standby firewallsVGMPtimed starthellomessage
Answers
D.
The active and standby devices learn about the status of each other through the exchange of heartbeat messages, and back up related commands and status information.
D.
The active and standby devices learn about the status of each other through the exchange of heartbeat messages, and back up related commands and status information.
Answers
Suggested answer: B

In the security assessment method, the purpose of security scanning is to scan the target system with scanning analysis and assessment tools in order to find relevant vulnerabilities and prepare for attacks.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

Which of the following attacks is not a malformed packet attack?

A.
Teardropattack
A.
Teardropattack
Answers
B.
Smurfattack
B.
Smurfattack
Answers
C.
TCPFragmentation attack
C.
TCPFragmentation attack
Answers
D.
ICMPUnreachable Packet Attack
D.
ICMPUnreachable Packet Attack
Answers
Suggested answer: D

aboutIKE SA, which of the following descriptions is false?

A.
IKE SAis bidirectional
A.
IKE SAis bidirectional
Answers
B.
IKEis based onUDPapplication layer protocol
B.
IKEis based onUDPapplication layer protocol
Answers
C.
IKE SAit's forIPSec SAServices
C.
IKE SAit's forIPSec SAServices
Answers
D.
The encryption algorithm used by user data packets isIKE SADecide
D.
The encryption algorithm used by user data packets isIKE SADecide
Answers
Suggested answer: D

In the construction of information security system, it is necessary to accurately describe the relationship between important aspects of security and system behavior through security models.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

Security policy conditions can be divided into multiple fields, such as source address, destination address, source port, destination port, etc.

"and"That is to say, this policy is hit only if the information in the packet matches all fields.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B
Total 497 questions
Go to page: of 50