ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 41

Question list
Search
Search

Related questions











When an access user uses Client-InitiatedVPN to establish a tunnel with the LNS, how many PPP connections can one tunnel carry?

A.
4
A.
4
Answers
B.
1
B.
1
Answers
C.
2
C.
2
Answers
D.
3
D.
3
Answers
Suggested answer: B

Man-in-the-middle attacks are data security threats.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which of the following descriptions about the function of the iptables table is wrong?

A.
NAT table: The function of address translation.
A.
NAT table: The function of address translation.
Answers
B.
Raw table: Determines whether the packet is processed by the state tracking mechanism.
B.
Raw table: Determines whether the packet is processed by the state tracking mechanism.
Answers
C.
Mangle table: modify security policy
C.
Mangle table: modify security policy
Answers
D.
Filter table: Policy allowed or not allowed in the packet.
D.
Filter table: Policy allowed or not allowed in the packet.
Answers
Suggested answer: C

The most common three-level standard for equal protection includes three aspects: physical security, data security and network security.

A.
is correct
A.
is correct
Answers
B.
False
B.
False
Answers
Suggested answer: B

Because NAT technology can realize one-to-many address translation. So with NAT technology, there is no need to worry about insufficient IPv4 addresses.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which of the following is an "information sabotage incident" in the classification of network security incidents?

A.
Software and hardware failure
A.
Software and hardware failure
Answers
B.
Information counterfeiting
B.
Information counterfeiting
Answers
C.
Internet Scanning for plagiarism
C.
Internet Scanning for plagiarism
Answers
D.
Listen to Trojan attack
D.
Listen to Trojan attack
Answers
Suggested answer: B

Which of the following angles should be considered in the information security stage to consider the security of information?

A.
Management
A.
Management
Answers
B.
Security system
B.
Security system
Answers
C.
business
C.
business
Answers
D.
Technology
D.
Technology
Answers
Suggested answer: B

Regarding NAT technology. Which of the following descriptions is false?

A.
In Huawei firewalls, source NAT technology refers to the translation of the source address in the IP header of the connection that initiates the connection.
A.
In Huawei firewalls, source NAT technology refers to the translation of the source address in the IP header of the connection that initiates the connection.
Answers
B.
In the Huawei firewall, Easy IP directly uses the public network address of the interface as the translated address, and does not need to configure a NAT address pool.
B.
In the Huawei firewall, Easy IP directly uses the public network address of the interface as the translated address, and does not need to configure a NAT address pool.
Answers
C.
In Huawei firewalls, the NAT No-PAT technology needs to be implemented by configuring a NAT address pool.
C.
In Huawei firewalls, the NAT No-PAT technology needs to be implemented by configuring a NAT address pool.
Answers
D.
In Huawei firewalls, the only NAT technology with port translation is NAPT.
D.
In Huawei firewalls, the only NAT technology with port translation is NAPT.
Answers
Suggested answer: D

The CA certificate is the certificate of the CA itself. If there is no multi-level CA in the PKI system, the original certificate of the CA is a self-signed certificate; if there are multiple levels of CA, it will form a CA hierarchy. The top CA is the root CA, which has A CA' self-signed certificate.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Regarding NAT technology, which of the following descriptions is correct?

A.
The internal network server of the NAT network cannot be accessed by external network users.Therefore, if a server that needs to provide external services is deployed, be sure to assign an independent public network address to the server.
A.
The internal network server of the NAT network cannot be accessed by external network users.Therefore, if a server that needs to provide external services is deployed, be sure to assign an independent public network address to the server.
Answers
B.
NAT reduces the difficulty of network monitoring
B.
NAT reduces the difficulty of network monitoring
Answers
C.
NAT technology can only achieve one-to-one address conversion, but cannot achieve address multiplexing
C.
NAT technology can only achieve one-to-one address conversion, but cannot achieve address multiplexing
Answers
D.
NAT can hide more intranet IP addresses
D.
NAT can hide more intranet IP addresses
Answers
Suggested answer: D
Total 497 questions
Go to page: of 50