ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 40

Question list
Search
Search

Related questions











Which of the following protocols is not a protocol type that ASPF can detect ( )[Multiple choice]*

A.
MSTP
A.
MSTP
Answers
B.
FTP
B.
FTP
Answers
C.
DNS
C.
DNS
Answers
D.
PPTP
D.
PPTP
Answers
Suggested answer: C

After the company network administrator configures the dual-system hot backup, he wants to check the status of the current VGMP group, so he typed the command and displayed the following information HRP_M<FW_A>_ Role: active, peer: active Running priority:45000, peer:45000 Backup channel1 usage: 30x Stab1 e time: 1days, 13 hours, 35 minutes Last state change information: 2020-03-22 16:01:56 HRP core state changed, old_state=normal (active), new_state=normal (active).local priority F 4 peer_priority 45000.

Configuration: hello interval: 1000ms preempt: 60s mirror configuration:off mirror session:on track trunk member:on auto-sync configuration:on auto-sync connection- status:on adjust ospf cost:on adjust ospfv3-cost:on adjust bgp-cost:on nat resource: off Detail information on:

Gigabi tEthernet0/0/1:up

Gigabi tEthernet0/0/3:up ospf-cost: +0 then the command he typed in the blank is[fill in the blank]*

A.
display hrp state verbose
A.
display hrp state verbose
Answers
Suggested answer: A

When IPSec VPN uses transmission mode to encapsulate packets, which of the following is not within the scope of authentication of the ESP security protocol? ( )[Multiple choice]*

A.
ESP Header
A.
ESP Header
Answers
B.
IP Header
B.
IP Header
Answers
C.
ESP Iail
C.
ESP Iail
Answers
D.
ICP Header
D.
ICP Header
Answers
Suggested answer: B

As shown in the figure, when using C1ient-Initiated VPN to establish L2 TP VPN, which of the following is the end point of the PPP message? ( )[Multiple choice]*

L2TPVPN tunnel

A.
access user
A.
access user
Answers
B.
LNS
B.
LNS
Answers
C.
LAC
C.
LAC
Answers
D.
server
D.
server
Answers
Suggested answer: C

Please sort the following digital envelope encryption and decryption process correctly.

A.
uses B's public key to encrypt the symmetric key to generate a digital envelope
A.
uses B's public key to encrypt the symmetric key to generate a digital envelope
Answers
B.
After receiving the encrypted information from A, B uses its own private key to open the digital envelope to obtain the symmetric key.
B.
After receiving the encrypted information from A, B uses its own private key to open the digital envelope to obtain the symmetric key.
Answers
C.
uses a symmetric key to encrypt the plaintext to generate ciphertext information.
C.
uses a symmetric key to encrypt the plaintext to generate ciphertext information.
Answers
D.
B uses the symmetric key to decrypt the ciphertext information to obtain the original plaintext.
D.
B uses the symmetric key to decrypt the ciphertext information to obtain the original plaintext.
Answers
E.
A sends the digital envelope and cipher text information to B
E.
A sends the digital envelope and cipher text information to B
Answers
Suggested answer: A, B, C, D, E

A digital envelope refers to the data obtained by the sender using the receiver's _____ to encrypt the symmetric key[fill in the blank]*

A.
public key
A.
public key
Answers
Suggested answer: A

Which of the following VPNs cannot be used in a Site to-Site scenario? ( )[Multiple choice]*

A.
GRE VPN
A.
GRE VPN
Answers
B.
L2TP VPN
B.
L2TP VPN
Answers
C.
SSL VPN
C.
SSL VPN
Answers
D.
IPSEC VPN
D.
IPSEC VPN
Answers
Suggested answer: C

Which of the following options is not a passive means of obtaining information? ( )[Multiple choice]*

A.
port scan
A.
port scan
Answers
B.
port mirroring
B.
port mirroring
Answers
C.
capture packets
C.
capture packets
Answers
D.
collect log education
D.
collect log education
Answers
Suggested answer: C

Which of the following does not belong to the log format of the firewall? ( )[Multiple choice]

A.
binary format
A.
binary format
Answers
B.
netflow format
B.
netflow format
Answers
C.
ASCII encoding format
C.
ASCII encoding format
Answers
D.
Syslog format
D.
Syslog format
Answers
Suggested answer: C

Which of the following does not belong to the block encryption algorithm in the symmetric encryption algorithm?

A.
RC5
A.
RC5
Answers
B.
RC4
B.
RC4
Answers
C.
RC6
C.
RC6
Answers
D.
RC2
D.
RC2
Answers
Suggested answer: B
Total 497 questions
Go to page: of 50