ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 6

Question list
Search
Search

Related questions











Which of the following options are correct regarding configuring firewall security zones? (multiple choice)

A.
The firewall has four security zones by default, and the priority of the four security zones cannot be modified
A.
The firewall has four security zones by default, and the priority of the four security zones cannot be modified
Answers
B.
A firewall can have up to12safe area
B.
A firewall can have up to12safe area
Answers
C.
Firewall can create two security zones of the same priority
C.
Firewall can create two security zones of the same priority
Answers
D.
When data flows between different security zones, the security check of the device will be triggered and the corresponding security policy will be implemented
D.
When data flows between different security zones, the security check of the device will be triggered and the corresponding security policy will be implemented
Answers
Suggested answer: A, D

certificates, self-signed certificates, etc.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which of the following attacks is not a cyber attack?

A.
IP spoofing attack
A.
IP spoofing attack
Answers
B.
SmurfI attack
B.
SmurfI attack
Answers
C.
MAC address spoofing attack
C.
MAC address spoofing attack
Answers
D.
ICMP attack
D.
ICMP attack
Answers
Suggested answer: C

About the rootCACertificate, which of the following descriptions is incorrect?

A.
Issuer isCA
A.
Issuer isCA
Answers
B.
The certificate subject name isCA
B.
The certificate subject name isCA
Answers
C.
public key information isCA's public key
C.
public key information isCA's public key
Answers
D.
signature isCAgenerated by public key encryption
D.
signature isCAgenerated by public key encryption
Answers
Suggested answer: D

Which of the following configurations can achieveNAT ALGFeatures?

A.
nat alg protocol
A.
nat alg protocol
Answers
B.
alg protocol
B.
alg protocol
Answers
C.
nat protocol
C.
nat protocol
Answers
D.
detect protocol
D.
detect protocol
Answers
Suggested answer: D

About firewall gateways forHTTPWhich of the following statements is false about the protocol'santivirus response?

A.
When the gateway device blocksHTTPAfter connecting, push to the clientwebpage and generatelog
A.
When the gateway device blocksHTTPAfter connecting, push to the clientwebpage and generatelog
Answers
B.
Response methods include announcement and blocking
B.
Response methods include announcement and blocking
Answers
C.
In alarm mode, the device only generates logs, which is not correct.HTTPThe files transmitted bythe protocol are processed and sent out
C.
In alarm mode, the device only generates logs, which is not correct.HTTPThe files transmitted bythe protocol are processed and sent out
Answers
D.
Blocking means that the device is disconnected from theHTTPserver connection and block filetransfer
D.
Blocking means that the device is disconnected from theHTTPserver connection and block filetransfer
Answers
Suggested answer: B

Which of the following does not belong toUSGUser authentication method in firewall?

A.
Certification-free
A.
Certification-free
Answers
B.
Password authentication
B.
Password authentication
Answers
C.
sign in
C.
sign in
Answers
D.
Fingerprint authentication
D.
Fingerprint authentication
Answers
Suggested answer: D

firewallGE1/0/1andGE1/0/2mouth belongs toDMZarea, if you want to implementGE1/0/1The connected area is accessibleGE1/0/2Connected area, which of the following is correct?

A.
needs to be configuredLocalarriveDMZsecurity policy
A.
needs to be configuredLocalarriveDMZsecurity policy
Answers
B.
No configuration required
B.
No configuration required
Answers
C.
Interzone security policy needs to be configured
C.
Interzone security policy needs to be configured
Answers
D.
needs to be configuredDMZarrivelocalsecurity policy
D.
needs to be configuredDMZarrivelocalsecurity policy
Answers
Suggested answer: B

For the process of forwarding session header packets between firewall domains, there are the following steps:

1, look up the routing table

2, find the inter-domain packet filtering rules

3, lookup session table

4, find the blacklist

Which of the following is in the correct order?

A.
1->3->2->4
A.
1->3->2->4
Answers
B.
3->2->1->4
B.
3->2->1->4
Answers
C.
3->4->1->2
C.
3->4->1->2
Answers
D.
4->3->1->2
D.
4->3->1->2
Answers
Suggested answer: C

The administrator wants to be clear about the current session table. Which of the following commands is correct?

A.
clear firewall session table
A.
clear firewall session table
Answers
B.
reset firewall session table
B.
reset firewall session table
Answers
C.
display firewall session table
C.
display firewall session table
Answers
D.
display session table
D.
display session table
Answers
Suggested answer: B
Total 497 questions
Go to page: of 50