Huawei H12-711 Practice Test - Questions Answers, Page 40
List of questions
Related questions
Which of the following protocols is not a protocol type that ASPF can detect ( )[Multiple choice]*
After the company network administrator configures the dual-system hot backup, he wants to check the status of the current VGMP group, so he typed the command and displayed the following information HRP_M<FW_A>_ Role: active, peer: active Running priority:45000, peer:45000 Backup channel1 usage: 30x Stab1 e time: 1days, 13 hours, 35 minutes Last state change information: 2020-03-22 16:01:56 HRP core state changed, old_state=normal (active), new_state=normal (active).local priority F 4 peer_priority 45000.
Configuration: hello interval: 1000ms preempt: 60s mirror configuration:off mirror session:on track trunk member:on auto-sync configuration:on auto-sync connection- status:on adjust ospf cost:on adjust ospfv3-cost:on adjust bgp-cost:on nat resource: off Detail information on:
Gigabi tEthernet0/0/1:up
Gigabi tEthernet0/0/3:up ospf-cost: +0 then the command he typed in the blank is[fill in the blank]*
When IPSec VPN uses transmission mode to encapsulate packets, which of the following is not within the scope of authentication of the ESP security protocol? ( )[Multiple choice]*
As shown in the figure, when using C1ient-Initiated VPN to establish L2 TP VPN, which of the following is the end point of the PPP message? ( )[Multiple choice]*
L2TPVPN tunnel
Please sort the following digital envelope encryption and decryption process correctly.
A digital envelope refers to the data obtained by the sender using the receiver's _____ to encrypt the symmetric key[fill in the blank]*
Which of the following VPNs cannot be used in a Site to-Site scenario? ( )[Multiple choice]*
Which of the following options is not a passive means of obtaining information? ( )[Multiple choice]*
Which of the following does not belong to the log format of the firewall? ( )[Multiple choice]
Which of the following does not belong to the block encryption algorithm in the symmetric encryption algorithm?
Question