ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 3

Question list
Search
Search

Related questions











IPSec VPNtechnology adoptionESPSecurity protocol encapsulation is not supportedNATcross becauseESPThe header of the message is encrypted

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

aboutSSL VPNdescription, which of the following is correct?

A.
Can be used without a client
A.
Can be used without a client
Answers
B.
yesIPlayer to encrypt
B.
yesIPlayer to encrypt
Answers
C.
existNATcrossing problem
C.
existNATcrossing problem
Answers
D.
No authentication required
D.
No authentication required
Answers
Suggested answer: A

some applications such asOracleFor database applications, the firewall session connection is interrupted due to no data flow transmission for a long time, resulting in service interruption. Which of the following is the optimal solution?

A.
Configure a long-term connection for a service
A.
Configure a long-term connection for a service
Answers
B.
turn onASPFFeatures
B.
turn onASPFFeatures
Answers
C.
Optimize security policies
C.
Optimize security policies
Answers
D.
Enable shard cache
D.
Enable shard cache
Answers
Suggested answer: A

"Implement security monitoring and management of information and information systems to prevent illegal use of information and information systems", in order to achieve which feature in information security?

A.
confidentiality
A.
confidentiality
Answers
B.
controllability
B.
controllability
Answers
C.
non-repudiation
C.
non-repudiation
Answers
D.
integrity
D.
integrity
Answers
Suggested answer: B

When configuring a security policy, a security policy can refer to an address set or configure multiple purposesIPaddress.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which of the following options is not part of the quintuple range?

A.
sourceIP
A.
sourceIP
Answers
B.
sourceMAC
B.
sourceMAC
Answers
C.
PurposeIP
C.
PurposeIP
Answers
D.
destination port
D.
destination port
Answers
Suggested answer: B

aboutClient-InitializedofL2TP VPN, which of the following statements is false?

A.
remote user accessinternetAfter that, it can be directly sent to the remoteLNSinitiateL2TPtunnel connection request
A.
remote user accessinternetAfter that, it can be directly sent to the remoteLNSinitiateL2TPtunnel connection request
Answers
B.
LNSThe device receives the userL2TPConnection request, the user can be authenticated according to the user name and password
B.
LNSThe device receives the userL2TPConnection request, the user can be authenticated according to the user name and password
Answers
C.
LNSAssign private keys to remote usersIPaddress
C.
LNSAssign private keys to remote usersIPaddress
Answers
D.
Remote users do not need to installVPNclient software
D.
Remote users do not need to installVPNclient software
Answers
Suggested answer: D

Regarding the description of vulnerability scanning, which of the following is false?

A.
Vulnerability scanning is a network-based technology for remotely monitoring the security performance vulnerabilities of target networks or hosts, and can be used to conduct simulated attack experiments and security audits.
A.
Vulnerability scanning is a network-based technology for remotely monitoring the security performance vulnerabilities of target networks or hosts, and can be used to conduct simulated attack experiments and security audits.
Answers
B.
Vulnerability scanning is used to detect whether there are vulnerabilities in the target host system, generally scanning the target host for specific vulnerabilities
B.
Vulnerability scanning is used to detect whether there are vulnerabilities in the target host system, generally scanning the target host for specific vulnerabilities
Answers
C.
Vulnerability scanning is a passive preventive measure that can effectively avoid hacker attacks
C.
Vulnerability scanning is a passive preventive measure that can effectively avoid hacker attacks
Answers
D.
can be based onpingScan and port scan results for vulnerability scanning
D.
can be based onpingScan and port scan results for vulnerability scanning
Answers
Suggested answer: C

Regarding the statement of firewall security policy, which of the following options is false?

A.
If the security policy ispermit, the discarded packets will not be accumulated"Hits"
A.
If the security policy ispermit, the discarded packets will not be accumulated"Hits"
Answers
B.
When configuring a security policy name, the same name cannot be reused
B.
When configuring a security policy name, the same name cannot be reused
Answers
C.
Adjust the order of security policies without saving configuration files and take effect immediately
C.
Adjust the order of security policies without saving configuration files and take effect immediately
Answers
D.
HuaweiUSGThe security policy entries of the series firewall cannot exceed128strip
D.
HuaweiUSGThe security policy entries of the series firewall cannot exceed128strip
Answers
Suggested answer: A

TCSECWhich of the following protection levels are included in the standard? (multiple choice)

A.
Verify protection level
A.
Verify protection level
Answers
B.
Mandatory protection level
B.
Mandatory protection level
Answers
C.
autonomous protection level
C.
autonomous protection level
Answers
D.
Passive protection level
D.
Passive protection level
Answers
Suggested answer: A, B, C
Total 497 questions
Go to page: of 50