ExamGecko
Home / Huawei / H12-711 / List of questions
Ask Question

Huawei H12-711 Practice Test - Questions Answers, Page 39

Add to Whishlist

List of questions

Question 381

Report Export Collapse

Please match the following information security risks to information security incidents one by one.[fill in the blank]* physical security risk Enterprise server permissions are loosely set Information Security Management Risk Infected Panda Burning Incense Information Access Risk Fire destroyed equipment in computer room application risk Talk to people about leaking company secrets

Become a Premium Member for full access
  Unlock Premium Member

Question 382

Report Export Collapse

Under normal circumstances, the Emai1 protocols we often talk about include ____, POP3, and SMTP.[fill in the blank]*

Become a Premium Member for full access
  Unlock Premium Member

Question 383

Report Export Collapse

An enterprise wants to build a server system and requires the following functions: 1. The enterprise needs to have its own dedicated mailbox, and the sending and receiving of emails needs to go through the enterprise's server; 2. The server must provide file transfer and access services. Users in different departments of the enterprise provide accounts with different permissions: 3. When the enterprise accesses the internal webpage of the enterprise, the enterprise can directly enter the domain name in the browser to access. To meet the above requirements, which of the following servers do enterprises need to deploy? ( )*

Become a Premium Member for full access
  Unlock Premium Member

Question 384

Report Export Collapse

The trigger modes of the built-in Portal authentication in the firewall include pre-authentication and ____ authentication[fill in the blank]*

Become a Premium Member for full access
  Unlock Premium Member

Question 385

Report Export Collapse

In the authentication policy of the firewall, _____ allows the user to not need to enter the user name and password, but can obtain the corresponding relationship between the user and the IP, so as to carry out policy management based on the user[fill in the blank]*

Become a Premium Member for full access
  Unlock Premium Member

Question 386

Report Export Collapse

Which of the following is not the default security zone of the firewall ( )[Multiple choice]*

Become a Premium Member for full access
  Unlock Premium Member

Question 387

Report Export Collapse

Which of the following descriptions about the heartbeat interface is wrong ( )?[Multiple choice]*

Become a Premium Member for full access
  Unlock Premium Member

Question 388

Report Export Collapse

The initial priority of the USG9500VGMP group is related to which of the following factors ( )? *

Become a Premium Member for full access
  Unlock Premium Member

Question 389

Report Export Collapse

Company network administrator allocation. After the dual-system hot backup is set, run the command to check VRRP and other information, and get the following information HRP_M<FWA> Gigabi tEtherneto/0/3 Virtual Router 1 State:

Master Virtual IP: 10.3.0.3 Master IP: 10.3.0.1 PriorityRun: 120 PriorityConfig:100 MasterPriority: 120 Preempt: YESDelay Time: 0 s TimerRun: 60s TimerConfig: 60s Auth type: NONE Virtual MAC: 0000-5e00-0101 Check TIL: YES Config type:vgmp Vrrp Backup-torward: disabled Create time:2020-03-17 17:35:54 UTC+08:02 Last change time: 2020-03-22 16:01:56 UTC+08:02 Ask him to type the view command in the blank space is ____ [fill in the blank]*

Become a Premium Member for full access
  Unlock Premium Member

Question 390

Report Export Collapse

The administrator is connected to the firewall through the G1/0/0 interface (the interface has been added to the Trust Zone). If the administrator is allowed to perform configuration management through the G1/0/0 login image firewall, how to configure the security policy to release flow direction? ( )[Multiple choice]*

Become a Premium Member for full access
  Unlock Premium Member
Total 497 questions
Go to page: of 50
Search