ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 29

Question list
Search
Search

List of questions

Search

Related questions











ASPF (Application specific Packet Filter)It is a packet filtering technology based on the application layer, andserver-mapTables implement special security mechanisms. aboutASPFandservermapWhich of the following statements is correct? (multiple choice)

A.
ASPFMonitor messages during communication
A.
ASPFMonitor messages during communication
Answers
B.
ASPFcan be created dynamicallyserver-map
B.
ASPFcan be created dynamicallyserver-map
Answers
C.
ASPFpass throughserver-mapTable implementation dynamically allows multi-channel protocol data to pass through
C.
ASPFpass throughserver-mapTable implementation dynamically allows multi-channel protocol data to pass through
Answers
D.
Quintupleserver-mapThe table entry implements a similar function to the session table
D.
Quintupleserver-mapThe table entry implements a similar function to the session table
Answers
Suggested answer: A, B, C

Antivirus software and host firewalls work the same way.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

The process of electronic forensics includes: protecting the scene, obtaining evidence, preserving evidence, identifying evidence, analyzing evidence, tracking and presenting evidence.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Execute the command on the firewall and display the above information. Which of the following descriptions is correct? (multiple choice)

A.
this firewallVGMPgroup status isActive
A.
this firewallVGMPgroup status isActive
Answers
B.
this firewallG1/0/1virtual interfaceIPaddress is202.38.10.2
B.
this firewallG1/0/1virtual interfaceIPaddress is202.38.10.2
Answers
C.
this firewallVRIDfor1ofVRRPThe priority of the backup group is100
C.
this firewallVRIDfor1ofVRRPThe priority of the backup group is100
Answers
D.
When the main deviceUSG_AWill not switch in the event of a failure
D.
When the main deviceUSG_AWill not switch in the event of a failure
Answers
Suggested answer: A, B, C

existUSGIn the series firewall system view, execute the commandreset saved-configurationAfter that, the device configuration will be restored to the default configuration, and it will take effect without any other operations.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

Which of the following is network address port translation (NAPT) and only translate network addresses (No-PAT) difference?

A.
go throughNo-PATAfter conversion, for external network users, all packets come from the sameIPaddress
A.
go throughNo-PATAfter conversion, for external network users, all packets come from the sameIPaddress
Answers
B.
No-PATOnly supports protocol port translation at the transport layer
B.
No-PATOnly supports protocol port translation at the transport layer
Answers
C.
NAPTOnly supports protocol address translation at the network layer
C.
NAPTOnly supports protocol address translation at the network layer
Answers
D.
No-PATSupports protocol address translation at the network layer
D.
No-PATSupports protocol address translation at the network layer
Answers
Suggested answer: D

Which of the following options is correct for the description of a buffer overflow attack?

(multiple choice)

A.
Buffer overflow attacks exploit the flaws of software systems in memory operations to run attack code with high operating privileges
A.
Buffer overflow attacks exploit the flaws of software systems in memory operations to run attack code with high operating privileges
Answers
B.
Buffer overflow attacks have nothing to do with the vulnerabilities and architecture of the operating system
B.
Buffer overflow attacks have nothing to do with the vulnerabilities and architecture of the operating system
Answers
C.
Buffer overflow attacks are one of the most common ways to attack the behavior of software systems
C.
Buffer overflow attacks are one of the most common ways to attack the behavior of software systems
Answers
D.
Buffer overflow attacks are application-layer attacks
D.
Buffer overflow attacks are application-layer attacks
Answers
Suggested answer: A, C, D

Which of the following is not the business scope of the National Internet Emergency Response Center?

A.
Emergency handling of security incidents
A.
Emergency handling of security incidents
Answers
B.
Warning and notification of security incidents
B.
Warning and notification of security incidents
Answers
C.
Provide security evaluation services for government departments, enterprises and institutions
C.
Provide security evaluation services for government departments, enterprises and institutions
Answers
D.
Cooperate with other institutions to provide training services
D.
Cooperate with other institutions to provide training services
Answers
Suggested answer: D

Host firewalls are mainly used to protect hosts from attacks and intrusions from the network.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which of the following options belong to international organizations related to the standardization of information security? (multiple choice)

A.
International Organization for Standardization(ISO)International Organization for Standardization
A.
International Organization for Standardization(ISO)International Organization for Standardization
Answers
B.
International Electrotechnical Commission(IEC) International Electrotechnical Commission
B.
International Electrotechnical Commission(IEC) International Electrotechnical Commission
Answers
C.
International Telecommunication Union(ITU)ITU
C.
International Telecommunication Union(ITU)ITU
Answers
D.
Wi-Fi Alliance Wi-Fialliance organization
D.
Wi-Fi Alliance Wi-Fialliance organization
Answers
Suggested answer: A, B, C
Total 497 questions
Go to page: of 50