ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 32

Question list
Search
Search

List of questions

Search

Related questions











If internal employees access the Internet through the firewall and find that they cannot connect to the Internet normally, what viewing commands can be used on the firewall to troubleshoot the interface, security zone, security policy and routing table? (Write any viewing command, requiring: the words on the command line must be complete and correct to score, and cannot be omitted or abbreviated)[fill in the blank]* (

A.
display zone display current-configuration|display ip routing-table|display security-polic rule all|display ip interface brief)
A.
display zone display current-configuration|display ip routing-table|display security-polic rule all|display ip interface brief)
Answers
Suggested answer: A

If users from the external network (where the security zone is Untrust) are allowed to access the intranet server (where the security zone is DMZ), the destination security zone selected when configuring the security policy is ______.[fill in the blank]*

A.
DMZ
A.
DMZ
Answers
Suggested answer: A

Use the Ping command on the firewall to test the reachability to the server (the security zone where the server is located is the DMZ). If a security policy is configured to allow the test traffic, the source security zone is _____.[fill in the blank]

*

A.
local
A.
local
Answers
Suggested answer: A

An employee of a company accesses the internal web server of the company through the firewall, and can open the web page of the website by using a browser, but the accessibility of the web server is tested by using the Pina command, and it shows that it is unreachable. What are the possible reasons? ( )[Multiple choice]

A.
The security policy deployed on the firewall allows the TCP protocol, but not the ICMP protocol
A.
The security policy deployed on the firewall allows the TCP protocol, but not the ICMP protocol
Answers
B.
The interface of the firewall connecting to the server is not added to the security zone
B.
The interface of the firewall connecting to the server is not added to the security zone
Answers
C.
The security policy deployed on the firewall allows the HTTP protocol, but not the ICMP protocol
C.
The security policy deployed on the firewall allows the HTTP protocol, but not the ICMP protocol
Answers
D.
WEB server is down
D.
WEB server is down
Answers
Suggested answer: A

As shown in the figure, two Server Map entries are generated after configuring NAT Server. Regarding the information presented in this figure, which of the following descriptions is wrong?[Multiple choice]* Type: Nat Server. ANY?1.1.1.1 [192.168.1.1] Type: Nat Server Reverse. 192.168.1.1[1.1.1.1] ?ANY

A.
The second Server Map function is that when 192.168.1.1 accesses any address, the source address will be converted to 1.1.1.1 after passing through the firewall
A.
The second Server Map function is that when 192.168.1.1 accesses any address, the source address will be converted to 1.1.1.1 after passing through the firewall
Answers
B.
The first Server Map function is that when any address accesses 192.168.1.1, the destination IP will be converted to 1.1.1.1 after passing through the firewall.
B.
The first Server Map function is that when any address accesses 192.168.1.1, the destination IP will be converted to 1.1.1.1 after passing through the firewall.
Answers
C.
The Server Map with the Reverse logo can use the command to remove it.
C.
The Server Map with the Reverse logo can use the command to remove it.
Answers
D.
The two Server Map entries are static, that is, after the NAT Server is configured, the two Server Maps will be automatically generated and exist permanently.
D.
The two Server Map entries are static, that is, after the NAT Server is configured, the two Server Maps will be automatically generated and exist permanently.
Answers
Suggested answer: B

After an engineer configures the NAT-Server, in order to check the Server-map generated after the configuration, should he use the _____ command to query the Server-map?[fill in the blank]*

A.
display firewall server-map
A.
display firewall server-map
Answers
Suggested answer: A

Which of the following options are suitable for business travelers to access the corporate intranet in the public network environment? ( )*

A.
L2 TP over IPSec VPN
A.
L2 TP over IPSec VPN
Answers
B.
GER VPN
B.
GER VPN
Answers
C.
MPLS VPN
C.
MPLS VPN
Answers
D.
SSL VPN
D.
SSL VPN
Answers
Suggested answer: A, D

When using the ______ function of SSL VPN, the virtual gateway will assign an intranet IP address to the access user, which is used for the access user to access the P resources of the intranet[fill in the blank]*

A.
network extension
A.
network extension
Answers
Suggested answer: A

Which of the following is not a common application scenario of digital certificates? ( )[Multiple choice]*

A.
FTP
A.
FTP
Answers
B.
HTTPS
B.
HTTPS
Answers
C.
IPSEC VPN
C.
IPSEC VPN
Answers
D.
SSL VPN
D.
SSL VPN
Answers
Suggested answer: A

In symmetric encryption algorithms, the ________ algorithm is used over a data communication channel, browser or network link.[fill in the blank]*

A.
Stream
A.
Stream
Answers
Suggested answer: A

Explanation:

Encryption

Total 497 questions
Go to page: of 50