ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 42

Question list
Search
Search

Related questions











Which of the following descriptions about the characteristics of the HWTACACS protocol is wrong?

A.
Use UDP protocol
A.
Use UDP protocol
Answers
B.
Separation of Authentication and Authorization
B.
Separation of Authentication and Authorization
Answers
C.
In addition to the standard HWTACACS header. Encrypt all the message body
C.
In addition to the standard HWTACACS header. Encrypt all the message body
Answers
D.
Suitable for conducting security controls.
D.
Suitable for conducting security controls.
Answers
Suggested answer: A

The company administrator uses the ping command to test the connectivity of the network. If he needs to specify the source address of the ehco-request message, what are the additional parameters he needs?

A.
-i
A.
-i
Answers
B.
-a
B.
-a
Answers
C.
-C
C.
-C
Answers
D.
-f
D.
-f
Answers
Suggested answer: C

Which of the following is not a type of digital certificate?

A.
Local certificate
A.
Local certificate
Answers
B.
Terminal certificate
B.
Terminal certificate
Answers
C.
Self-signed certificate
C.
Self-signed certificate
Answers
D.
Device local certificate
D.
Device local certificate
Answers
Suggested answer: D

If foreign criminals use the Internet to steal my country's state secrets, what kind of early warning will the state initiate?

A.
Orange Alert
A.
Orange Alert
Answers
B.
Yellow Alert
B.
Yellow Alert
Answers
C.
Blue Alert
C.
Blue Alert
Answers
D.
Red Alert
D.
Red Alert
Answers
Suggested answer: A

Information security precautions include both management and technical measures. Which of the following measures is not a precautionary method for information security technology?

A.
Information security training for employees
A.
Information security training for employees
Answers
B.
Scan the server for vulnerabilities
B.
Scan the server for vulnerabilities
Answers
C.
Authenticate employees
C.
Authenticate employees
Answers
D.
Turn on the anti-virus function on the firewall
D.
Turn on the anti-virus function on the firewall
Answers
Suggested answer: C

Regarding the ServerMap table generated by NAT No-PAT, which of the following descriptions is correct

A.
The function of the Server Map generated by NAT No-PAT is equivalent to the security policy. That is, the packets matching the Server Map table can pass through the firewall directly without matching the security policy.
A.
The function of the Server Map generated by NAT No-PAT is equivalent to the security policy. That is, the packets matching the Server Map table can pass through the firewall directly without matching the security policy.
Answers
B.
There are two Server Maps generated by NAT No-PAT by default. One is a reverse Server Map table, which is mainly used for address translation without additional configuration of NAT and security policies when external network users actively access the private network users. to access.
B.
There are two Server Maps generated by NAT No-PAT by default. One is a reverse Server Map table, which is mainly used for address translation without additional configuration of NAT and security policies when external network users actively access the private network users. to access.
Answers
C.
The Server Map generated by NAT No-PAT is static, that is, after NAT No-PAT is configured, the Server Map table is automatically generated and exists permanently.
C.
The Server Map generated by NAT No-PAT is static, that is, after NAT No-PAT is configured, the Server Map table is automatically generated and exists permanently.
Answers
D.
There are two Server Maps generated by NAT No-PAT by default, one is a forward Server Map table
D.
There are two Server Maps generated by NAT No-PAT by default, one is a forward Server Map table
Answers
Suggested answer: C

Which of the following options is not included in the processing method adopted by the firewall for the matched authentication data flow?

A.
Portali certification
A.
Portali certification
Answers
B.
Certification-free
B.
Certification-free
Answers
C.
WeChat authentication
C.
WeChat authentication
Answers
D.
not certified
D.
not certified
Answers
Suggested answer: D

Which of the following security measures does the monitor correspond to?

A.
Intrusion Detection System
A.
Intrusion Detection System
Answers
B.
Encrypted VPN
B.
Encrypted VPN
Answers
C.
Access control system
C.
Access control system
Answers
D.
Firewall
D.
Firewall
Answers
Suggested answer: A

Information security prevention technologies include: data encryption, identity authentication, intrusion prevention and anti-virus, etc.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

The key used by DES encryption is bits, while the key used by 3DES encryption is bits.

A.
56168
A.
56168
Answers
B.
64168
B.
64168
Answers
C.
64128
C.
64128
Answers
D.
56128
D.
56128
Answers
Suggested answer: D
Total 497 questions
Go to page: of 50