Huawei H12-711 Practice Test - Questions Answers, Page 39
List of questions
Related questions
Please match the following information security risks to information security incidents one by one.[fill in the blank]* physical security risk Enterprise server permissions are loosely set Information Security Management Risk Infected Panda Burning Incense Information Access Risk Fire destroyed equipment in computer room application risk Talk to people about leaking company secrets
Under normal circumstances, the Emai1 protocols we often talk about include ____, POP3, and SMTP.[fill in the blank]*
An enterprise wants to build a server system and requires the following functions: 1. The enterprise needs to have its own dedicated mailbox, and the sending and receiving of emails needs to go through the enterprise's server; 2. The server must provide file transfer and access services. Users in different departments of the enterprise provide accounts with different permissions: 3. When the enterprise accesses the internal webpage of the enterprise, the enterprise can directly enter the domain name in the browser to access. To meet the above requirements, which of the following servers do enterprises need to deploy? ( )*
The trigger modes of the built-in Portal authentication in the firewall include pre-authentication and ____ authentication[fill in the blank]*
In the authentication policy of the firewall, _____ allows the user to not need to enter the user name and password, but can obtain the corresponding relationship between the user and the IP, so as to carry out policy management based on the user[fill in the blank]*
Which of the following is not the default security zone of the firewall ( )[Multiple choice]*
Which of the following descriptions about the heartbeat interface is wrong ( )?[Multiple choice]*
The initial priority of the USG9500VGMP group is related to which of the following factors ( )? *
Company network administrator allocation. After the dual-system hot backup is set, run the command to check VRRP and other information, and get the following information HRP_M<FWA> Gigabi tEtherneto/0/3 Virtual Router 1 State:
Master Virtual IP: 10.3.0.3 Master IP: 10.3.0.1 PriorityRun: 120 PriorityConfig:100 MasterPriority: 120 Preempt: YESDelay Time: 0 s TimerRun: 60s TimerConfig: 60s Auth type: NONE Virtual MAC: 0000-5e00-0101 Check TIL: YES Config type:vgmp Vrrp Backup-torward: disabled Create time:2020-03-17 17:35:54 UTC+08:02 Last change time: 2020-03-22 16:01:56 UTC+08:02 Ask him to type the view command in the blank space is ____ [fill in the blank]*
The administrator is connected to the firewall through the G1/0/0 interface (the interface has been added to the Trust Zone). If the administrator is allowed to perform configuration management through the G1/0/0 login image firewall, how to configure the security policy to release flow direction? ( )[Multiple choice]*
Question