ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 45

Question list
Search
Search

Related questions











What are the correct options for the following description of the basic concepts of LDAP?

A.
Directory Information Tree DIT: A collection of attributes constitutes a Directory Information Tree.
A.
Directory Information Tree DIT: A collection of attributes constitutes a Directory Information Tree.
Answers
B.
Unique identifier DN, the name that uniquely identifies an entry in a directory information tree
B.
Unique identifier DN, the name that uniquely identifies an entry in a directory information tree
Answers
C.
Relative Distinguished Name RDN, the name of the entry, uniquely identifies child entries of the same parent entry
C.
Relative Distinguished Name RDN, the name of the entry, uniquely identifies child entries of the same parent entry
Answers
D.
Attribute: The attribute describes the characteristics of the object. An attribute consists of an attribute type and one or more attribute values.
D.
Attribute: The attribute describes the characteristics of the object. An attribute consists of an attribute type and one or more attribute values.
Answers
Suggested answer: B, D

Which of the following statements about OSPF is correct?

A.
Distance Vector Protocol
A.
Distance Vector Protocol
Answers
B.
Good scalability
B.
Good scalability
Answers
C.
No loops
C.
No loops
Answers
D.
Support authentication
D.
Support authentication
Answers
Suggested answer: B, C, D

Which of the following statements about the PKI life cycle is correct?

A.
Certificate renewal: When the certificate expires and the key is leaked, the PKI entity must replace the certificate. The purpose of renewal can be achieved by re-applying, or it can be automatically renewed using SCEP or CPv2 protocol.
A.
Certificate renewal: When the certificate expires and the key is leaked, the PKI entity must replace the certificate. The purpose of renewal can be achieved by re-applying, or it can be automatically renewed using SCEP or CPv2 protocol.
Answers
B.
Certificate download: The PKI entity downloads the issued certificate to the RA server through SCEP or CIPvz protocol, or through DAP.HIITP or out-of-band mode, download the issued certificate.
B.
Certificate download: The PKI entity downloads the issued certificate to the RA server through SCEP or CIPvz protocol, or through DAP.HIITP or out-of-band mode, download the issued certificate.
Answers
C.
Certificate issuance: When a PKI entity applies for a local certificate from a CA, if there is an RA, the RA will first review the identity information of the PKI entity. After the verification is passed, the RA will send the application information to the CA.
C.
Certificate issuance: When a PKI entity applies for a local certificate from a CA, if there is an RA, the RA will first review the identity information of the PKI entity. After the verification is passed, the RA will send the application information to the CA.
Answers
D.
Certificate application: certificate application, namely certificate registration, is a PKI entity introducing itself to the CA and obtaining a certificate
D.
Certificate application: certificate application, namely certificate registration, is a PKI entity introducing itself to the CA and obtaining a certificate
Answers
Suggested answer: A, B, C, D

Regarding the description of the GRE VPN tunnel configuration, which of the following options are correct?

A.
The tunnel interface numbers of the devices at both ends must be the same
A.
The tunnel interface numbers of the devices at both ends must be the same
Answers
B.
The tunnel address must ensure that the network layer is reachable
B.
The tunnel address must ensure that the network layer is reachable
Answers
C.
The tunnel interface must be configured with an IP address
C.
The tunnel interface must be configured with an IP address
Answers
D.
The tunnel interface must be added to the security zone
D.
The tunnel interface must be added to the security zone
Answers
Suggested answer: A, B, C, D

Which of the following NAT technologies can implement a public network address to provide source address translation for multiple private network addresses?

A.
NAT Server
A.
NAT Server
Answers
B.
Easy-ip
B.
Easy-ip
Answers
C.
NAT No-PAT
C.
NAT No-PAT
Answers
D.
NAPT
D.
NAPT
Answers
Suggested answer: A, B, C, D

Which of the following security threats are terminal security threats? (multiple choice)

A.
man-in-the-middle attack
A.
man-in-the-middle attack
Answers
B.
There is a vulnerability in the server
B.
There is a vulnerability in the server
Answers
C.
User identity is not verified
C.
User identity is not verified
Answers
D.
Users use weak passwords
D.
Users use weak passwords
Answers
Suggested answer: B, C, D

Which of the following options are available for IPSec VPN peer authentication?

A.
Digital signature
A.
Digital signature
Answers
B.
Digital certificate
B.
Digital certificate
Answers
C.
Digital envelope
C.
Digital envelope
Answers
D.
asymmetric key
D.
asymmetric key
Answers
Suggested answer: A, B, C

Which of the following options is correct for the description of the rating of the level protection system in the 2.0 class protection system?

A.
Level 1: After the information system is damaged, it will cause serious damage to the legitimate rights and interests of citizens, legal persons and other organizations, but will not damage national security, social order and public interests.
A.
Level 1: After the information system is damaged, it will cause serious damage to the legitimate rights and interests of citizens, legal persons and other organizations, but will not damage national security, social order and public interests.
Answers
B.
Level 5: When the information system is damaged, it will cause particularly serious damage to national security.
B.
Level 5: When the information system is damaged, it will cause particularly serious damage to national security.
Answers
C.
Level 4: When the information system is damaged, it will cause particularly serious damage to social order and public interests, or cause serious damage to national security.
C.
Level 4: When the information system is damaged, it will cause particularly serious damage to social order and public interests, or cause serious damage to national security.
Answers
D.
Level 3: After the information system is damaged, it will cause serious damage to the legitimate rights and interests of citizens, legal persons and other organizations, or cause damage to social order and public interests and also cause damage to national security.
D.
Level 3: After the information system is damaged, it will cause serious damage to the legitimate rights and interests of citizens, legal persons and other organizations, or cause damage to social order and public interests and also cause damage to national security.
Answers
Suggested answer: A, B, C

Which of the following descriptions about the DNS protocol is correct?

A.
There are four types of servers in the DNS domain name resolution system: root server, top-level domain name server, recursive server and cache server.
A.
There are four types of servers in the DNS domain name resolution system: root server, top-level domain name server, recursive server and cache server.
Answers
B.
The DNS protocol port number is 53
B.
The DNS protocol port number is 53
Answers
C.
DNS protocol transport layer can use either TCP or UDP
C.
DNS protocol transport layer can use either TCP or UDP
Answers
D.
If the DNS cache server does not have the domain name resolution cache to be queried, it will directly query the top-level domain name server
D.
If the DNS cache server does not have the domain name resolution cache to be queried, it will directly query the top-level domain name server
Answers
Suggested answer: A, B, D

Which of the following items belong to the information security prevention method in the dimension of operation and maintenance management?

A.
Disaster recovery
A.
Disaster recovery
Answers
B.
Safe operation
B.
Safe operation
Answers
C.
The training of enterprise employees' safety awareness
C.
The training of enterprise employees' safety awareness
Answers
D.
Emergency Response
D.
Emergency Response
Answers
Suggested answer: A, B, C, D
Total 497 questions
Go to page: of 50