ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 34

Question list
Search
Search

List of questions

Search

Related questions











When the company's network administrator is performing dual-system hot backup, due to the possibility of inconsistent round-trip paths, if he wants to enable the session fast backup function, the command that needs to be entered is ______[fill in the blank]*

A.
confidential
A.
confidential
Answers
Suggested answer: A

Which of the following information is not the backup content included in the status information backup in the dual-system hot backup? ( )[Multiple choice]*

A.
IPSEC tunnel
A.
IPSEC tunnel
Answers
B.
NAPT related table items
B.
NAPT related table items
Answers
C.
IPv4 session table
C.
IPv4 session table
Answers
D.
Routing table
D.
Routing table
Answers
Suggested answer: D

When configuring user single sign-on, if you use the mode of querying the AD server security log, please check the followingcertifiedProcedureEnterRow ordering:[fill in the blank]* The AD monitor forwards the user login message to F7, and the user goes online at F7.

AD monitor through the WMI interface provided by AD server. Connect to the AD server to query the security log. Get the user login message. accessboardrecord AD domain, AD servicedevicerecorduseHouseholdsuperiorStringinformation into the security log.

The AD monitor starts from the time when the AD single sign-on service starts, and regularly queries the security logs generated on the AD server.

A.
4213
A.
4213
Answers
Suggested answer: A

When configuring security policies, you can control traffic based on the user's______.[fill in the blank]*

A.
Services and Apps
A.
Services and Apps
Answers
Suggested answer: A

Explanation:

Apps

Explanation:

Which of the following descriptions about dual-system hot backup is wrong? ( )[Multiple choice]*

A.
By default the preemption delay is 60s
A.
By default the preemption delay is 60s
Answers
B.
Whether it is a Layer 2 or Layer 3 interface, whether it is a service interface or a heartbeat interface, it needs to be added to a security zone
B.
Whether it is a Layer 2 or Layer 3 interface, whether it is a service interface or a heartbeat interface, it needs to be added to a security zone
Answers
C.
By default, the active preemption function is enabled
C.
By default, the active preemption function is enabled
Answers
D.
Dual-system hot backup function requires license support
D.
Dual-system hot backup function requires license support
Answers
Suggested answer: D

IPv6 supports configuring router authorization function on the device, verifying peer identity through digital certificate, and selecting legal device. ( )[Multiple choice]*

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which of the following SSL VPN functions can and can only access all TCP resources? ( )[Multiple choice]*

A.
Network expansion
A.
Network expansion
Answers
B.
File Sharing
B.
File Sharing
Answers
C.
WEB proxy
C.
WEB proxy
Answers
D.
port forwarding
D.
port forwarding
Answers
Suggested answer: D

Which of the following descriptions about digital fingerprints in digital signatures is wrong? ( )[Multiple choice]*

A.
It is the data obtained by the sender after calculating the plaintext information through the HASH algorithm.
A.
It is the data obtained by the sender after calculating the plaintext information through the HASH algorithm.
Answers
B.
The receiver will use the sender's public key to calculate the generated data fingerprint and compare it with the received digital fingerprint.
B.
The receiver will use the sender's public key to calculate the generated data fingerprint and compare it with the received digital fingerprint.
Answers
C.
Digital fingerprints are also known as information digests.
C.
Digital fingerprints are also known as information digests.
Answers
D.
The receiver needs to use the sender's public key to unlock the digital signature to obtain the digital fingerprint.
D.
The receiver needs to use the sender's public key to unlock the digital signature to obtain the digital fingerprint.
Answers
Suggested answer: C

In the architecture of PKI, ______ is the window for CA to face users, and is an extension of CA's certificate issuance and management functions. He is responsible for accepting user's certificate registration and revocation applications, reviewing employee identity information, and deciding Whether to submit an application to the CA to issue or revoke a digital certificate.[fill in the blank]*

A.
RA
A.
RA
Answers
Suggested answer: A

The SSL VPN routing mode determines the routing of the packets sent by the client. In the ______ mode, no matter what resource is accessed, the data will be intercepted by the virtual network card and forwarded to the virtual gateway for processing.[fill in the blank]*

A.
network extension
A.
network extension
Answers
Suggested answer: A
Total 497 questions
Go to page: of 50