ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 44

Question list
Search
Search

Related questions











When a network security incident occurs, investigate the intrusion behavior, virus or Trojan horse, and repair and strengthen the host. Which of the above actions belong to the work content of the network security emergency response?

A.
Recovery phase
A.
Recovery phase
Answers
B.
Detection stage
B.
Detection stage
Answers
C.
Eradication stage
C.
Eradication stage
Answers
D.
Inhibition stage
D.
Inhibition stage
Answers
Suggested answer: D

As shown, the USG firewall NAT configuration is as follows:

A.
When FTP Server1 responds to Client A, it is converted to the address 1.1.1.5 in Address Ground 1
A.
When FTP Server1 responds to Client A, it is converted to the address 1.1.1.5 in Address Ground 1
Answers
B.
Source NAT configuration, only for intranet users (10.1.1.0/24) to access the external network for translation
B.
Source NAT configuration, only for intranet users (10.1.1.0/24) to access the external network for translation
Answers
C.
When the IP address of the FTP Server host is changed to 1.11.3. Client A host can still access the FTP Server more
C.
When the IP address of the FTP Server host is changed to 1.11.3. Client A host can still access the FTP Server more
Answers
D.
Client A accesses FTP Server 1.1.1.1, and the destination address is converted to 10.1.1.2. The source address remains unchanged
D.
Client A accesses FTP Server 1.1.1.1, and the destination address is converted to 10.1.1.2. The source address remains unchanged
Answers
Suggested answer: C

The scalability of servers is higher than that of personal computers.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

Which of the following is not a Layer 2 VPN technology?

A.
PPTP
A.
PPTP
Answers
B.
IPsec
B.
IPsec
Answers
C.
L2TP
C.
L2TP
Answers
D.
L2F
D.
L2F
Answers
Suggested answer: B

Which of the following descriptions of the firewall log is wrong?

A.
The log level Emergency is the most severe level
A.
The log level Emergency is the most severe level
Answers
B.
Alert log level indicates a major abnormality of the device, requiring immediate action
B.
Alert log level indicates a major abnormality of the device, requiring immediate action
Answers
C.
According to the severity level or urgency of the information. The log can be divided into 8 levels.The more serious the information, the greater the log level value.
C.
According to the severity level or urgency of the information. The log can be divided into 8 levels.The more serious the information, the greater the log level value.
Answers
D.
The ebug log level indicates that it is general information about the normal operation of the device, and the user does not need to pay attention
D.
The ebug log level indicates that it is general information about the normal operation of the device, and the user does not need to pay attention
Answers
Suggested answer: D

Evidence preservation is directly related to the legal effect of evidence. Which of the following is not an evidence preservation technique?

A.
Digital certificate technology
A.
Digital certificate technology
Answers
B.
Encryption Technology
B.
Encryption Technology
Answers
C.
Data mining technology
C.
Data mining technology
Answers
D.
Digital Signature Technology
D.
Digital Signature Technology
Answers
Suggested answer: C

Which of the following stages has the development of information security gone through? (multiple choice)

A.
communication assurance stage
A.
communication assurance stage
Answers
B.
Information Assurance Stage
B.
Information Assurance Stage
Answers
C.
Information security stage
C.
Information security stage
Answers
D.
Communication confidentiality stage
D.
Communication confidentiality stage
Answers
Suggested answer: B, C, D

The TCP/IP protocol stack packet encapsulation includes: Which of the following describes the encapsulation order (sort order: ABDC)

A.
Data
A.
Data
Answers
B.
TCP/UDP
B.
TCP/UDP
Answers
C.
MAC
C.
MAC
Answers
D.
IP
D.
IP
Answers
Suggested answer: A, B, C, D

Regarding the description of the firewall security zone and interface relationship, which of the following options is correct? (multiple choice)

A.
The firewall allows the same physical interface to belong to two different security zones (subinterfaces are not considered)
A.
The firewall allows the same physical interface to belong to two different security zones (subinterfaces are not considered)
Answers
B.
There are two security zones with exactly the same security level in the firewall
B.
There are two security zones with exactly the same security level in the firewall
Answers
C.
Different interfaces of the firewall can belong to different security zones
C.
Different interfaces of the firewall can belong to different security zones
Answers
D.
Different interfaces of the firewall can belong to the same security zone
D.
Different interfaces of the firewall can belong to the same security zone
Answers
Suggested answer: C, D

In which of the following scenarios does the firewall generate the Server-map table?

A.
When the firewall generates a session table, it will generate a Server-map table
A.
When the firewall generates a session table, it will generate a Server-map table
Answers
B.
ASPF is deployed on the firewall and forwards the traffic of the multi-channel protocol
B.
ASPF is deployed on the firewall and forwards the traffic of the multi-channel protocol
Answers
C.
Security policies are deployed on the firewall and traffic is released
C.
Security policies are deployed on the firewall and traffic is released
Answers
D.
NAT Server is deployed on the firewall
D.
NAT Server is deployed on the firewall
Answers
Suggested answer: B, C, D
Total 497 questions
Go to page: of 50