ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 24

Question list
Search
Search

List of questions

Search

Related questions











Network administrators can collect data to be analyzed on network devices through packet capture, port mirroring, or logs

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

The world's first worm-"Morris Worm"Make people realize that with the deepening of people's dependence on computers, the possibility of computer network being attacked is also increasing, and it is necessary to establish a sound emergency response system

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

which of the followingIPSec VPNnecessary configuration? (multiple choice)

A.
configureIKEneighbour
A.
configureIKEneighbour
Answers
B.
configureIKE SARelated parameters
B.
configureIKE SARelated parameters
Answers
C.
configureIPSec SARelated parameters
C.
configureIPSec SARelated parameters
Answers
D.
Configure streams of interest
D.
Configure streams of interest
Answers
Suggested answer: A, B, C, D

Which of the following categories are included in Huawei Firewall User Management? (multiple choice)

A.
Internet user management
A.
Internet user management
Answers
B.
Access user management
B.
Access user management
Answers
C.
Admin user management
C.
Admin user management
Answers
D.
Device user management
D.
Device user management
Answers
Suggested answer: A, B, C

In order to obtain criminal evidence, it is necessary to master the technology of intrusion tracking.

Which of the following options are correct for the description of tracking technology? (multiple choice)

A.
Packet logging technology through the tracedIPInsert trace data into packets to mark packets on each router mentioned
A.
Packet logging technology through the tracedIPInsert trace data into packets to mark packets on each router mentioned
Answers
B.
Link detection technology determines the information of the attack source by testing the network connection between routers
B.
Link detection technology determines the information of the attack source by testing the network connection between routers
Answers
C.
Packet marking technology extracts attack source information by logging packets on routers and then using data drilling techniques
C.
Packet marking technology extracts attack source information by logging packets on routers and then using data drilling techniques
Answers
D.
Shallow mail behavior analysis can achieveIPlandAnalysis of information such as address, sending time, sending frequency, number of recipients, shallow email headers, etc.
D.
Shallow mail behavior analysis can achieveIPlandAnalysis of information such as address, sending time, sending frequency, number of recipients, shallow email headers, etc.
Answers
Suggested answer: A, B, D

When the user uses the session authentication method to trigger the firewall built-inPortalDuring authentication, users do not actively perform identity authentication, advanced service access, and device push"redirect"to the certification page

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which of the following is false for a description of an intrusion detection system?.

A.
Intrusion detection system can collect a large amount of key information dynamically through network and computer.And can analyze and judge the current state of the entire system environment in time
A.
Intrusion detection system can collect a large amount of key information dynamically through network and computer.And can analyze and judge the current state of the entire system environment in time
Answers
B.
Once the intrusion detection system finds that there is a behavior that violates the security policy or the system has traces of being attacked, it can implement blocking operations.
B.
Once the intrusion detection system finds that there is a behavior that violates the security policy or the system has traces of being attacked, it can implement blocking operations.
Answers
C.
Intrusion detection system includes all hardware and software systems used for intrusion detection
C.
Intrusion detection system includes all hardware and software systems used for intrusion detection
Answers
D.
The immersion detection system can be linked with firewalls and switches, making it a powerful tool for firewalls"assistant", better and more precise control of traffic access between domains
D.
The immersion detection system can be linked with firewalls and switches, making it a powerful tool for firewalls"assistant", better and more precise control of traffic access between domains
Answers
Suggested answer: C

Which of the following options areIPSec VPNSupported encapsulation modes? (multiple choice)

A.
AHmodel
A.
AHmodel
Answers
B.
tunnel mode
B.
tunnel mode
Answers
C.
transfer mode
C.
transfer mode
Answers
D.
ESPmodel
D.
ESPmodel
Answers
Suggested answer: B, C

GREThe tunnel addresses at both ends of the tunnel can be configured as addresses on different network segments

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

About the packet iniptablesDescription of the transfer process, which of the following options is incorrect?

A.
When a packet enters the network card, it first goes to matchPREROUTINGchain
A.
When a packet enters the network card, it first goes to matchPREROUTINGchain
Answers
B.
If the destination address of the data packet is the local machine, the system will send the data packet toINPUTchain.
B.
If the destination address of the data packet is the local machine, the system will send the data packet toINPUTchain.
Answers
C.
If the destination address of the data packet is not the local machine, the system sends the data packet toOUTPUTchain
C.
If the destination address of the data packet is not the local machine, the system sends the data packet toOUTPUTchain
Answers
D.
If the destination address of the data packet is not the local machine, the system sends the data packet toFORWARDchain.
D.
If the destination address of the data packet is not the local machine, the system sends the data packet toFORWARDchain.
Answers
Suggested answer: C
Total 497 questions
Go to page: of 50