ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 39

Question list
Search
Search

List of questions

Search

Related questions











Please match the following information security risks to information security incidents one by one.[fill in the blank]* physical security risk Enterprise server permissions are loosely set Information Security Management Risk Infected Panda Burning Incense Information Access Risk Fire destroyed equipment in computer room application risk Talk to people about leaking company secrets

A.
2413
A.
2413
Answers
Suggested answer: A

Under normal circumstances, the Emai1 protocols we often talk about include ____, POP3, and SMTP.[fill in the blank]*

A.
IMAP
A.
IMAP
Answers
Suggested answer: A

An enterprise wants to build a server system and requires the following functions: 1. The enterprise needs to have its own dedicated mailbox, and the sending and receiving of emails needs to go through the enterprise's server; 2. The server must provide file transfer and access services. Users in different departments of the enterprise provide accounts with different permissions: 3. When the enterprise accesses the internal webpage of the enterprise, the enterprise can directly enter the domain name in the browser to access. To meet the above requirements, which of the following servers do enterprises need to deploy? ( )*

A.
Time synchronization server
A.
Time synchronization server
Answers
B.
FTP server (I)
B.
FTP server (I)
Answers
C.
DNS server
C.
DNS server
Answers
D.
Mail server
D.
Mail server
Answers
Suggested answer: B, C, D

The trigger modes of the built-in Portal authentication in the firewall include pre-authentication and ____ authentication[fill in the blank]*

A.
session
A.
session
Answers
Suggested answer: A

In the authentication policy of the firewall, _____ allows the user to not need to enter the user name and password, but can obtain the corresponding relationship between the user and the IP, so as to carry out policy management based on the user[fill in the blank]*

A.
Certification- free
A.
Certification- free
Answers
Suggested answer: A

Which of the following is not the default security zone of the firewall ( )[Multiple choice]*

A.
untrust trust
A.
untrust trust
Answers
B.
trust zone
B.
trust zone
Answers
C.
dmz zone
C.
dmz zone
Answers
D.
isp zone)
D.
isp zone)
Answers
Suggested answer: D

Which of the following descriptions about the heartbeat interface is wrong ( )?[Multiple choice]*

A.
It is recommended to configure at least two heartbeat interfaces. - One heartbeat interface is used as the master, and the other heartbeat interface is used as the backup.
A.
It is recommended to configure at least two heartbeat interfaces. - One heartbeat interface is used as the master, and the other heartbeat interface is used as the backup.
Answers
B.
The interface MTU value is greater than 1500 and cannot be used as a heartbeat interface
B.
The interface MTU value is greater than 1500 and cannot be used as a heartbeat interface
Answers
C.
The connection method of the heartbeat interface can be directly connected, or it can be connected through a switch or router
C.
The connection method of the heartbeat interface can be directly connected, or it can be connected through a switch or router
Answers
D.
MGMT interface (Gigabi tEtherneto/0/0) cannot be used as heartbeat interface
D.
MGMT interface (Gigabi tEtherneto/0/0) cannot be used as heartbeat interface
Answers
Suggested answer: B

The initial priority of the USG9500VGMP group is related to which of the following factors ( )? *

A.
interface bandwidth
A.
interface bandwidth
Answers
B.
VRRP priority
B.
VRRP priority
Answers
C.
Number of daughter cards on the interface board
C.
Number of daughter cards on the interface board
Answers
D.
The number of CPUs on the D service board
D.
The number of CPUs on the D service board
Answers
Suggested answer: C, D

Company network administrator allocation. After the dual-system hot backup is set, run the command to check VRRP and other information, and get the following information HRP_M<FWA> Gigabi tEtherneto/0/3 Virtual Router 1 State:

Master Virtual IP: 10.3.0.3 Master IP: 10.3.0.1 PriorityRun: 120 PriorityConfig:100 MasterPriority: 120 Preempt: YESDelay Time: 0 s TimerRun: 60s TimerConfig: 60s Auth type: NONE Virtual MAC: 0000-5e00-0101 Check TIL: YES Config type:vgmp Vrrp Backup-torward: disabled Create time:2020-03-17 17:35:54 UTC+08:02 Last change time: 2020-03-22 16:01:56 UTC+08:02 Ask him to type the view command in the blank space is ____ [fill in the blank]*

A.
display vrrp
A.
display vrrp
Answers
Suggested answer: A

The administrator is connected to the firewall through the G1/0/0 interface (the interface has been added to the Trust Zone). If the administrator is allowed to perform configuration management through the G1/0/0 login image firewall, how to configure the security policy to release flow direction? ( )[Multiple choice]*

A.
allows traffic from Trust Zone to Trust Zone
A.
allows traffic from Trust Zone to Trust Zone
Answers
B.
allows traffic from the Trust Zone to the Untrust Zone
B.
allows traffic from the Trust Zone to the Untrust Zone
Answers
C.
allows traffic from Local Zone to Local Zone
C.
allows traffic from Local Zone to Local Zone
Answers
D.
allows traffic from the Trust Zone to the Local Zone (I)
D.
allows traffic from the Trust Zone to the Local Zone (I)
Answers
Suggested answer: D
Total 497 questions
Go to page: of 50