ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 7

Question list
Search
Search

Related questions











Which of the following are the basic functions of antivirus software? (multiple choice)

A.
virus protection
A.
virus protection
Answers
B.
Find viruses
B.
Find viruses
Answers
C.
remove virus
C.
remove virus
Answers
D.
replication virus
D.
replication virus
Answers
Suggested answer: A, B, C

EuropeTCSECThe guidelines are divided into two modules, functional and evaluation, and are mainly used in the military, government and commercial fields

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

In the future development trend of information security, terminal detection is an important part.

Which of the following methods fall under the category of endpoint detection? (multiple choice)

A.
Install host antivirus software
A.
Install host antivirus software
Answers
B.
Monitor and remember external devices
B.
Monitor and remember external devices
Answers
C.
Block users from accessing public search engines
C.
Block users from accessing public search engines
Answers
D.
Monitor host registry modification records
D.
Monitor host registry modification records
Answers
Suggested answer: A, D

useiptablesWrite a rule that doesn't allow172.16.0.0/16Which of the following rules is correct?

A.
iptables -t fielter -A INPUT -s 172.16.0.0/16 -p all -j DROP
A.
iptables -t fielter -A INPUT -s 172.16.0.0/16 -p all -j DROP
Answers
B.
iptables -t fielter -P INPUT -s 172.16.0.0/16 -p all -j DROP
B.
iptables -t fielter -P INPUT -s 172.16.0.0/16 -p all -j DROP
Answers
C.
iptables -t fielter -P INPUT -s 172.16.0.0/16 -p all -j ACCEPT
C.
iptables -t fielter -P INPUT -s 172.16.0.0/16 -p all -j ACCEPT
Answers
D.
iptables -t fielter -P INPUT -d 172.16.0.0/16 -p all -j ACCEPT
D.
iptables -t fielter -P INPUT -d 172.16.0.0/16 -p all -j ACCEPT
Answers
Suggested answer: A

aboutHRPWhich of the following options is not included in the content of the master/slave configuration consistency check?

A.
NATStrategy
A.
NATStrategy
Answers
B.
Whether the heartbeat interface with the same sequence number is configured
B.
Whether the heartbeat interface with the same sequence number is configured
Answers
C.
The next hop and outgoing interface of the static route
C.
The next hop and outgoing interface of the static route
Answers
D.
Authentication Policy
D.
Authentication Policy
Answers
Suggested answer: C

existUSGseries firewall, you can use. The function provides well-known application services for nonwell- known ports.

A.
Port Mapping
A.
Port Mapping
Answers
B.
MACandIPaddress binding
B.
MACandIPaddress binding
Answers
C.
packet filtering
C.
packet filtering
Answers
D.
Long connection
D.
Long connection
Answers
Suggested answer: A

Questionnaire design principles do not include which of the following?

A.
integrity
A.
integrity
Answers
B.
openness
B.
openness
Answers
C.
specificity
C.
specificity
Answers
D.
consistency
D.
consistency
Answers
Suggested answer: D

want to implement security policy "Anti-virus function", must be License activation.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

About NAT The configuration commands for the address pool are as follows: no-pat The meaning of the parameters is:

A.
no address translation
A.
no address translation
Answers
B.
port multiplexing
B.
port multiplexing
Answers
C.
Do not translate source ports
C.
Do not translate source ports
Answers
D.
Do not convert destination port
D.
Do not convert destination port
Answers
Suggested answer: C

On the surface, threats such as viruses, loopholes, and Trojan horses are the causes of information security incidents, but at the root, information security incidents are also closely related to people and the information system itself.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A
Total 497 questions
Go to page: of 50