ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 43

Question list
Search
Search

Related questions











When an access user uses Client-InitiatedVPN to establish a tunnel with the LNS, how many PPP connections can a tunnel carry?

A.
3
A.
3
Answers
B.
1
B.
1
Answers
C.
2
C.
2
Answers
D.
4
D.
4
Answers
Suggested answer: B

Regarding the single sign-on supported by the firewall, which one of the following is not included?

A.
RADIUS.Single sign-on
A.
RADIUS.Single sign-on
Answers
B.
ISM single sign-on
B.
ISM single sign-on
Answers
C.
AD single sign-on
C.
AD single sign-on
Answers
D.
HWTACACS single sign-on
D.
HWTACACS single sign-on
Answers
Suggested answer: D

The IDS is usually installed on the switch to detect intrusion, and at the same time, it can avoid the single point of failure affecting the normal operation of the network.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which of the following options is not a private network IP address?

A.
192.168.254.254/16
A.
192.168.254.254/16
Answers
B.
172.32.1.1/24
B.
172.32.1.1/24
Answers
C.
10.32.254.254/24
C.
10.32.254.254/24
Answers
D.
10.10.10.10/8
D.
10.10.10.10/8
Answers
Suggested answer: B

Which of the following options is not a communication electronic evidence?

A.
Telephone recording
A.
Telephone recording
Answers
B.
Chat history
B.
Chat history
Answers
C.
Email
C.
Email
Answers
D.
System log
D.
System log
Answers
Suggested answer: A

Which of the following protocols cannot be encrypted by SSL VPN?

A.
HTTP
A.
HTTP
Answers
B.
UDP
B.
UDP
Answers
C.
IP
C.
IP
Answers
D.
PPP
D.
PPP
Answers
Suggested answer: D

Which of the following descriptions about symmetric encryption technology is wrong?

A.
The system overhead is small.
A.
The system overhead is small.
Answers
B.
Good scalability.
B.
Good scalability.
Answers
C.
High efficiency and simple algorithm.
C.
High efficiency and simple algorithm.
Answers
D.
Suitable for encrypting large amounts of data.
D.
Suitable for encrypting large amounts of data.
Answers
Suggested answer: B

Which of the following security threats is an application security threat?

A.
Man-in-the-middle attack
A.
Man-in-the-middle attack
Answers
B.
User identity is not authenticated
B.
User identity is not authenticated
Answers
C.
Viruses, Trojans
C.
Viruses, Trojans
Answers
D.
network intrusion
D.
network intrusion
Answers
Suggested answer: C

Which of the following descriptions about the VGMP group is correct?

A.
The priority of VRRP in the VGMP group will change with the change of VGAMP
A.
The priority of VRRP in the VGMP group will change with the change of VGAMP
Answers
B.
VGMP is a protocol used to control the state of small VRRP groups
B.
VGMP is a protocol used to control the state of small VRRP groups
Answers
C.
The default priority of USG6000 is 65000
C.
The default priority of USG6000 is 65000
Answers
D.
The default priority of USG9000 is 45000
D.
The default priority of USG9000 is 45000
Answers
Suggested answer: B

Which of the following NAT technologies is a destination NAT technology?

A.
Easy-ip
A.
Easy-ip
Answers
B.
NAT No-PAT
B.
NAT No-PAT
Answers
C.
NAPT
C.
NAPT
Answers
D.
NAT Server
D.
NAT Server
Answers
Suggested answer: D
Total 497 questions
Go to page: of 50