Huawei H12-711 Practice Test - Questions Answers, Page 32
List of questions
Related questions
If internal employees access the Internet through the firewall and find that they cannot connect to the Internet normally, what viewing commands can be used on the firewall to troubleshoot the interface, security zone, security policy and routing table? (Write any viewing command, requiring: the words on the command line must be complete and correct to score, and cannot be omitted or abbreviated)[fill in the blank]* (
If users from the external network (where the security zone is Untrust) are allowed to access the intranet server (where the security zone is DMZ), the destination security zone selected when configuring the security policy is ______.[fill in the blank]*
Use the Ping command on the firewall to test the reachability to the server (the security zone where the server is located is the DMZ). If a security policy is configured to allow the test traffic, the source security zone is _____.[fill in the blank]
*
An employee of a company accesses the internal web server of the company through the firewall, and can open the web page of the website by using a browser, but the accessibility of the web server is tested by using the Pina command, and it shows that it is unreachable. What are the possible reasons? ( )[Multiple choice]
As shown in the figure, two Server Map entries are generated after configuring NAT Server. Regarding the information presented in this figure, which of the following descriptions is wrong?[Multiple choice]* Type: Nat Server. ANY?1.1.1.1 [192.168.1.1] Type: Nat Server Reverse. 192.168.1.1[1.1.1.1] ?ANY
After an engineer configures the NAT-Server, in order to check the Server-map generated after the configuration, should he use the _____ command to query the Server-map?[fill in the blank]*
Which of the following options are suitable for business travelers to access the corporate intranet in the public network environment? ( )*
When using the ______ function of SSL VPN, the virtual gateway will assign an intranet IP address to the access user, which is used for the access user to access the P resources of the intranet[fill in the blank]*
Which of the following is not a common application scenario of digital certificates? ( )[Multiple choice]*
In symmetric encryption algorithms, the ________ algorithm is used over a data communication channel, browser or network link.[fill in the blank]*
Question