ExamGecko
Home / Huawei / H12-711 / List of questions
Ask Question

Huawei H12-711 Practice Test - Questions Answers, Page 3

Add to Whishlist

List of questions

Question 21

Report Export Collapse

IPSec VPNtechnology adoptionESPSecurity protocol encapsulation is not supportedNATcross becauseESPThe header of the message is encrypted

True
True
False
False
Suggested answer: B
asked 18/09/2024
PRABHAT VAIBHAV
34 questions

Question 22

Report Export Collapse

aboutSSL VPNdescription, which of the following is correct?

Can be used without a client
Can be used without a client
yesIPlayer to encrypt
yesIPlayer to encrypt
existNATcrossing problem
existNATcrossing problem
No authentication required
No authentication required
Suggested answer: A
asked 18/09/2024
Maurice Nicholson
34 questions

Question 23

Report Export Collapse

some applications such asOracleFor database applications, the firewall session connection is interrupted due to no data flow transmission for a long time, resulting in service interruption. Which of the following is the optimal solution?

Configure a long-term connection for a service
Configure a long-term connection for a service
turn onASPFFeatures
turn onASPFFeatures
Optimize security policies
Optimize security policies
Enable shard cache
Enable shard cache
Suggested answer: A
asked 18/09/2024
Michael Grisonichi
44 questions

Question 24

Report Export Collapse

"Implement security monitoring and management of information and information systems to prevent illegal use of information and information systems", in order to achieve which feature in information security?

confidentiality
confidentiality
controllability
controllability
non-repudiation
non-repudiation
integrity
integrity
Suggested answer: B
asked 18/09/2024
Joseph Lewis
49 questions

Question 25

Report Export Collapse

When configuring a security policy, a security policy can refer to an address set or configure multiple purposesIPaddress.

True
True
False
False
Suggested answer: A
asked 18/09/2024
pheangphadhu pravitpinyo
47 questions

Question 26

Report Export Collapse

Which of the following options is not part of the quintuple range?

sourceIP
sourceIP
sourceMAC
sourceMAC
PurposeIP
PurposeIP
destination port
destination port
Suggested answer: B
asked 18/09/2024
Yun-Ting Lo
44 questions

Question 27

Report Export Collapse

aboutClient-InitializedofL2TP VPN, which of the following statements is false?

remote user accessinternetAfter that, it can be directly sent to the remoteLNSinitiateL2TPtunnel connection request
remote user accessinternetAfter that, it can be directly sent to the remoteLNSinitiateL2TPtunnel connection request
LNSThe device receives the userL2TPConnection request, the user can be authenticated according to the user name and password
LNSThe device receives the userL2TPConnection request, the user can be authenticated according to the user name and password
LNSAssign private keys to remote usersIPaddress
LNSAssign private keys to remote usersIPaddress
Remote users do not need to installVPNclient software
Remote users do not need to installVPNclient software
Suggested answer: D
asked 18/09/2024
FOTIS FOURLIAS
48 questions

Question 28

Report Export Collapse

Regarding the description of vulnerability scanning, which of the following is false?

Vulnerability scanning is a network-based technology for remotely monitoring the security performance vulnerabilities of target networks or hosts, and can be used to conduct simulated attack experiments and security audits.
Vulnerability scanning is a network-based technology for remotely monitoring the security performance vulnerabilities of target networks or hosts, and can be used to conduct simulated attack experiments and security audits.
Vulnerability scanning is used to detect whether there are vulnerabilities in the target host system, generally scanning the target host for specific vulnerabilities
Vulnerability scanning is used to detect whether there are vulnerabilities in the target host system, generally scanning the target host for specific vulnerabilities
Vulnerability scanning is a passive preventive measure that can effectively avoid hacker attacks
Vulnerability scanning is a passive preventive measure that can effectively avoid hacker attacks
can be based onpingScan and port scan results for vulnerability scanning
can be based onpingScan and port scan results for vulnerability scanning
Suggested answer: C
asked 18/09/2024
Fabio Todeschin
44 questions

Question 29

Report Export Collapse

Regarding the statement of firewall security policy, which of the following options is false?

If the security policy ispermit, the discarded packets will not be accumulated"Hits"
If the security policy ispermit, the discarded packets will not be accumulated"Hits"
When configuring a security policy name, the same name cannot be reused
When configuring a security policy name, the same name cannot be reused
Adjust the order of security policies without saving configuration files and take effect immediately
Adjust the order of security policies without saving configuration files and take effect immediately
HuaweiUSGThe security policy entries of the series firewall cannot exceed128strip
HuaweiUSGThe security policy entries of the series firewall cannot exceed128strip
Suggested answer: A
asked 18/09/2024
Hendrik Woldhuis
55 questions

Question 30

Report Export Collapse

TCSECWhich of the following protection levels are included in the standard? (multiple choice)

Verify protection level
Verify protection level
Mandatory protection level
Mandatory protection level
autonomous protection level
autonomous protection level
Passive protection level
Passive protection level
Suggested answer: A, B, C
asked 18/09/2024
Paul Sanchez
41 questions
Total 497 questions
Go to page: of 50