ExamGecko
Home / Huawei / H12-711 / List of questions
Ask Question

Huawei H12-711 Practice Test - Questions Answers, Page 36

List of questions

Question 351

Report Export Collapse

In which of the following scenarios does the firewall generate the Server map table? ( )

Become a Premium Member for full access
  Unlock Premium Member

Question 352

Report Export Collapse

The direction of the traffic can be seen in the ___ of the firewall.[fill in the blank]*

Become a Premium Member for full access
  Unlock Premium Member

Question 353

Report Export Collapse

The firewall imports users locally, and supports importing user information from _____ format files and database dbm files to the local device.[fill in the blank]*

Become a Premium Member for full access
  Unlock Premium Member

Question 354

Report Export Collapse

Which of the following protocols is not a protocol type that ASPF can detect? ( )[Multiple choice]*

Become a Premium Member for full access
  Unlock Premium Member

Question 355

Report Export Collapse

After the firewall detects a virus, which of the following will release the virus? ( )[Multiple choice]*

Become a Premium Member for full access
  Unlock Premium Member

Question 356

Report Export Collapse

As shown in the figure, nat server global202.106.1.1 inside10.10.1.1 is configured on the firewall.

Which of the following is the correct configuration for interzone rules? ( )[Multiple choice]*

Huawei H12-711 image Question 356 32791 09182024192718000000

Become a Premium Member for full access
  Unlock Premium Member

Question 357

Report Export Collapse

Which of the following NAT technologies can implement a public network address to provide source address translation for multiple private network addresses ( )*

Become a Premium Member for full access
  Unlock Premium Member

Question 358

Report Export Collapse

During the process of establishing IPSec VPN between peers FW_A and FW_B, two types of security associations need to be established in two stages. In the first stage, _____ is established to verify the identity of the peers.[fill in the blank]*

Become a Premium Member for full access
  Unlock Premium Member

Question 359

Report Export Collapse

Using the ___ method of the Web proxy, the virtual gateway will encrypt the real URL that the user wants to access, and can adapt to different terminal types.[fill in the blank]*

Become a Premium Member for full access
  Unlock Premium Member

Question 360

Report Export Collapse

Digital envelope technology means that the sender uses the receiver's public key to encrypt the data, and then sends the ciphertext to the receiver ( )[Multiple choice]*

Become a Premium Member for full access
  Unlock Premium Member
Total 497 questions
Go to page: of 50
Search