ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 49

Question list
Search
Search

List of questions

Search

Related questions











After an engineer completes the source NAT configuration, the internal network still cannot access the external network. The engineer wants to query the detailed information of the address translation by using the command to query the session table, so the engineer directly uses the ( ) command in the user view to query the address translation. information. (fill in the blank)

A.
display firewall session table
A.
display firewall session table
Answers
Suggested answer: A

The backup methods of dual-system hot backup include automatic backup ( ), manual batch backup, and automatic synchronization of the configuration of the active and standby FW after the device restarts. (fill in the blank)

A.
Session fast backup
A.
Session fast backup
Answers
Suggested answer: A

( ) is an "indirect intrusion attack. This attack mode is to virtually place a computer controlled by an intruder between two communicating computers in a network connection through various technical means. (fill in the blank)

A.
Man-in-themiddle attack
A.
Man-in-themiddle attack
Answers
Suggested answer: A

In USG6000E, the initial priority of VGMP is ( ) (fill in the blank)

A.
45000
A.
45000
Answers
Suggested answer: A

Multiple different ( ) cannot be added to the same interface on the firewall at the same time (fill in the blank)

A.
Safe area
A.
Safe area
Answers
Suggested answer: A

( ) means that the computer system has defects and deficiencies in the specific matters of hardware, software, protocols or system security policies. (Chinese Standard Terminology) (fill in the blank)

A.
Vulnerability
A.
Vulnerability
Answers
Suggested answer: A

To configure a NAT policy in command line mode, you need to use the .command ( ) in the system view to enter the NAT policy configuration view. (all lowercase) (fill in the blank)

A.
Vulnerability
A.
Vulnerability
Answers
Suggested answer: A

When the company network administrator configures dual-system hot backup, (fill in the blank) configure the status of VRRP backup group l as Active, and configure the virtual IP address as 10.1.1.1/24 <sysname>system-view [sysname] interface GigabitEthernet 0/0/1 [sysname-GigabitEthernet0/0/l] ( ), the command to be typed in the blank is (please fill in the complete command in all lowercase)

A.
vrrp d 1 virtual-ip 10.1.1.1 active
A.
vrrp d 1 virtual-ip 10.1.1.1 active
Answers
Suggested answer: A

Which of the following SSLVPN functions can and can only access all TCP resources?

A.
Network expansion
A.
Network expansion
Answers
B.
Port Forwarding
B.
Port Forwarding
Answers
C.
web proxy
C.
web proxy
Answers
D.
file sharing
D.
file sharing
Answers
Suggested answer: C

Which of the following descriptions about digital fingerprints in digital signatures is wrong?

A.
The receiver needs to use the sender's public key to unlock the digital signature to obtain the digital fingerprint.
A.
The receiver needs to use the sender's public key to unlock the digital signature to obtain the digital fingerprint.
Answers
B.
It is the data obtained by the sender after calculating the plaintext information through the HASH algorithm.
B.
It is the data obtained by the sender after calculating the plaintext information through the HASH algorithm.
Answers
C.
The receiver will use the sender's public key to calculate the generated data fingerprint and compare it with the received digital fingerprint.
C.
The receiver will use the sender's public key to calculate the generated data fingerprint and compare it with the received digital fingerprint.
Answers
D.
Digital fingerprints are also known as information digests.
D.
Digital fingerprints are also known as information digests.
Answers
Suggested answer: C
Total 497 questions
Go to page: of 50