ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 28

Question list
Search
Search

Related questions











Which of the following is false about scanning for vulnerabilities?

A.
Vulnerabilities are known in advance and discovered after the fact.
A.
Vulnerabilities are known in advance and discovered after the fact.
Answers
B.
Vulnerabilities are generally patchable
B.
Vulnerabilities are generally patchable
Answers
C.
Vulnerabilities are security risks that expose computers to hacking
C.
Vulnerabilities are security risks that expose computers to hacking
Answers
D.
Vulnerabilities are avoidable
D.
Vulnerabilities are avoidable
Answers
Suggested answer: D

When configuring user single sign-on, use the receivePCIn message mode, the authentication process has the following steps:

A.
visitorPCExecute the login script and send the user login information toADmonitor 2. Firewall extracts user andIPAdd the correspondence to the online user table 3. ADmonitor connected toADThe server queries the login user information and forwards the queried user information to the firewall 4. visitor loginADarea,ADThe server returns a login success message to the user and issues the login script. Which of the following is the correct order?
A.
visitorPCExecute the login script and send the user login information toADmonitor 2. Firewall extracts user andIPAdd the correspondence to the online user table 3. ADmonitor connected toADThe server queries the login user information and forwards the queried user information to the firewall 4. visitor loginADarea,ADThe server returns a login success message to the user and issues the login script. Which of the following is the correct order?
Answers
B.
1-2-3-4
B.
1-2-3-4
Answers
C.
4-1-3-2
C.
4-1-3-2
Answers
D.
3-2-1-4
D.
3-2-1-4
Answers
E.
1-4-3-2
E.
1-4-3-2
Answers
Suggested answer: B

Admin wants to createwebconfiguration administrator, devicewebaccess port number20000, and the administrator is at the administrator level, which of the following commands is correct?

A.
A.
Answers
B.
B.
Answers
C.
C.
Answers
D.
D.
Answers
Suggested answer: A

Which of the following options is correct regarding the actions of the security policy and the description of the security profile? (multiple choice)

A.
Prohibited if the action of the security policy is"prohibit", the device will discard this traffic, and will not perform content security checks in the future.
A.
Prohibited if the action of the security policy is"prohibit", the device will discard this traffic, and will not perform content security checks in the future.
Answers
B.
The security profile can take effect even if the action is allowed under the security policy
B.
The security profile can take effect even if the action is allowed under the security policy
Answers
C.
The security profile must be applied under the security policy whose action is Allowed to take effect.
C.
The security profile must be applied under the security policy whose action is Allowed to take effect.
Answers
D.
If the security policy action is"allow", the traffic will not match the security profile
D.
If the security policy action is"allow", the traffic will not match the security profile
Answers
Suggested answer: A, C

Which of the following options arewindowssystem andLINUXThe same features of the system?

(multiple choice)

A.
Support multitasking
A.
Support multitasking
Answers
B.
Support graphical interface operation
B.
Support graphical interface operation
Answers
C.
open source system
C.
open source system
Answers
D.
Support a variety of terminal platforms
D.
Support a variety of terminal platforms
Answers
Suggested answer: A, B, D

in configurationNATDuring the process, in which of the following situations, the device will generateServer-maptable entry? (multiple choice)

A.
configuration sourceNATautomatically generated whenserver-mapentry
A.
configuration sourceNATautomatically generated whenserver-mapentry
Answers
B.
configureNATserverAfter success, the device will automatically generateServer-mapentry
B.
configureNATserverAfter success, the device will automatically generateServer-mapentry
Answers
C.
configureeasy-ipwill be generated whenserver-mapentry
C.
configureeasy-ipwill be generated whenserver-mapentry
Answers
D.
configureNAT No-PATAfter that, the device will establish a data stream for the configured multichannel protocolserver-mapsurface
D.
configureNAT No-PATAfter that, the device will establish a data stream for the configured multichannel protocolserver-mapsurface
Answers
Suggested answer: B, D

NATThe technology can realize the secure transmission of data by encrypting the data.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

Which of the following is the correct order for incident response management?

A.
detect
A.
detect
Answers
B.
Report
B.
Report
Answers
C.
ease
C.
ease
Answers
D.
Lessons Learned
D.
Lessons Learned
Answers
E.
repair
E.
repair
Answers
F.
recover
F.
recover
Answers
G.
response
G.
response
Answers
H.
1-3-2-7-5-6-4
H.
1-3-2-7-5-6-4
Answers
I.
1-3-2-7-6-5-4
I.
1-3-2-7-6-5-4
Answers
J.
1-2-3-7-6-5-4
J.
1-2-3-7-6-5-4
Answers
K.
1-7-3-2-6-5-4
K.
1-7-3-2-6-5-4
Answers
Suggested answer: D

aboutL2TP VPNstatement, which of the following is false?

A.
It is suitable for employees on business to dial up to access the intranet
A.
It is suitable for employees on business to dial up to access the intranet
Answers
B.
Data will not be encrypted
B.
Data will not be encrypted
Answers
C.
WithIPsec VPNIn conjunction with
C.
WithIPsec VPNIn conjunction with
Answers
D.
belonging to the third floorVPNTechnology
D.
belonging to the third floorVPNTechnology
Answers
Suggested answer: D

Encryption technology can convert readable information into unreadable information through certain methods.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A
Total 497 questions
Go to page: of 50