ExamGecko
Home / Huawei / H12-711 / List of questions
Ask Question

Huawei H12-711 Practice Test - Questions Answers, Page 7

Add to Whishlist

List of questions

Question 61

Report Export Collapse

Which of the following are the basic functions of antivirus software? (multiple choice)

virus protection
virus protection
Find viruses
Find viruses
remove virus
remove virus
replication virus
replication virus
Suggested answer: A, B, C
asked 18/09/2024
Jarlesi Bolivar
39 questions

Question 62

Report Export Collapse

EuropeTCSECThe guidelines are divided into two modules, functional and evaluation, and are mainly used in the military, government and commercial fields

True
True
False
False
Suggested answer: A
asked 18/09/2024
Ubeydullah Kara
41 questions

Question 63

Report Export Collapse

In the future development trend of information security, terminal detection is an important part.

Which of the following methods fall under the category of endpoint detection? (multiple choice)

Install host antivirus software
Install host antivirus software
Monitor and remember external devices
Monitor and remember external devices
Block users from accessing public search engines
Block users from accessing public search engines
Monitor host registry modification records
Monitor host registry modification records
Suggested answer: A, D
asked 18/09/2024
Tr Skumar
59 questions

Question 64

Report Export Collapse

useiptablesWrite a rule that doesn't allow172.16.0.0/16Which of the following rules is correct?

iptables -t fielter -A INPUT -s 172.16.0.0/16 -p all -j DROP
iptables -t fielter -A INPUT -s 172.16.0.0/16 -p all -j DROP
iptables -t fielter -P INPUT -s 172.16.0.0/16 -p all -j DROP
iptables -t fielter -P INPUT -s 172.16.0.0/16 -p all -j DROP
iptables -t fielter -P INPUT -s 172.16.0.0/16 -p all -j ACCEPT
iptables -t fielter -P INPUT -s 172.16.0.0/16 -p all -j ACCEPT
iptables -t fielter -P INPUT -d 172.16.0.0/16 -p all -j ACCEPT
iptables -t fielter -P INPUT -d 172.16.0.0/16 -p all -j ACCEPT
Suggested answer: A
asked 18/09/2024
Paul Hackett
39 questions

Question 65

Report Export Collapse

aboutHRPWhich of the following options is not included in the content of the master/slave configuration consistency check?

NATStrategy
NATStrategy
Whether the heartbeat interface with the same sequence number is configured
Whether the heartbeat interface with the same sequence number is configured
The next hop and outgoing interface of the static route
The next hop and outgoing interface of the static route
Authentication Policy
Authentication Policy
Suggested answer: C
asked 18/09/2024
Ibrahim Ramku
52 questions

Question 66

Report Export Collapse

existUSGseries firewall, you can use. The function provides well-known application services for nonwell- known ports.

Port Mapping
Port Mapping
MACandIPaddress binding
MACandIPaddress binding
packet filtering
packet filtering
Long connection
Long connection
Suggested answer: A
asked 18/09/2024
Rumen Zazyov
43 questions

Question 67

Report Export Collapse

Questionnaire design principles do not include which of the following?

integrity
integrity
openness
openness
specificity
specificity
consistency
consistency
Suggested answer: D
asked 18/09/2024
Faviola Gomez Carbajal
30 questions

Question 68

Report Export Collapse

want to implement security policy "Anti-virus function", must be License activation.

True
True
False
False
Suggested answer: A
asked 18/09/2024
Biagio Masulo
36 questions

Question 69

Report Export Collapse

About NAT The configuration commands for the address pool are as follows: no-pat The meaning of the parameters is:

Huawei H12-711 image Question 69 32504 09182024192717000000

no address translation
no address translation
port multiplexing
port multiplexing
Do not translate source ports
Do not translate source ports
Do not convert destination port
Do not convert destination port
Suggested answer: C
asked 18/09/2024
Albaladejo Joffrey
41 questions

Question 70

Report Export Collapse

On the surface, threats such as viruses, loopholes, and Trojan horses are the causes of information security incidents, but at the root, information security incidents are also closely related to people and the information system itself.

True
True
False
False
Suggested answer: A
asked 18/09/2024
Patrick Thiel
41 questions
Total 497 questions
Go to page: of 50