ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 9

Question list
Search
Search

Related questions











Which of the following statements are true about single sign-on? (multiple choice)

A.
The device can identify the user who has passed the authentication of the identity authentication system
A.
The device can identify the user who has passed the authentication of the identity authentication system
Answers
B.
AD There is only one deployment mode for domain single sign-on
B.
AD There is only one deployment mode for domain single sign-on
Answers
C.
Although there is no need to enter the user password, the authentication server needs to interact with the user password and the device to ensure that the authentication is passed.
C.
Although there is no need to enter the user password, the authentication server needs to interact with the user password and the device to ensure that the authentication is passed.
Answers
D.
AD Domain single sign-on can be synchronized to the firewall by mirroring the login data stream
D.
AD Domain single sign-on can be synchronized to the firewall by mirroring the login data stream
Answers
Suggested answer: A, D

aboutVRRP/VGMP/HRPWhich of the following statements is correct? (multiple choice)

A.
VRRPResponsible for sending free messages during active/standby switchoverARPDirect traffic on the new master
A.
VRRPResponsible for sending free messages during active/standby switchoverARPDirect traffic on the new master
Answers
B.
VGMPResponsible for monitoring equipment failures and controlling rapid switching of equipment
B.
VGMPResponsible for monitoring equipment failures and controlling rapid switching of equipment
Answers
C.
HRPResponsible for data backup during dual-system hot standby operation
C.
HRPResponsible for data backup during dual-system hot standby operation
Answers
D.
inActivestateVGMPGroups may containstandbystateVRRPGroup
D.
inActivestateVGMPGroups may containstandbystateVRRPGroup
Answers
Suggested answer: A, B, C

administratorPCandUSGThe firewall management port is directly connected, usingwebWhich of the following statements is correct? (multiple choice)

A.
managePCbrowser accesshttp;//192.168.0.1
A.
managePCbrowser accesshttp;//192.168.0.1
Answers
B.
managePCofIPThe address is manually set to192.168.0.2-192.168.0.254
B.
managePCofIPThe address is manually set to192.168.0.2-192.168.0.254
Answers
C.
managePCbrowser accesshttp://192.168.1.1
C.
managePCbrowser accesshttp://192.168.1.1
Answers
D.
will managePCThe network card is set to obtain automaticallyIPaddress
D.
will managePCThe network card is set to obtain automaticallyIPaddress
Answers
Suggested answer: A, B

at HuaweiSDSecIn the solution, which layer of equipment does the firewall belong to?

A.
Analysis layer
A.
Analysis layer
Answers
B.
control layer
B.
control layer
Answers
C.
executive layer
C.
executive layer
Answers
D.
Monitoring layer
D.
Monitoring layer
Answers
Suggested answer: C

When dual-system hot backup is deployed on the firewall,VRRPWhich of the following protocols should be used to switch the overall status of a backup group?

A.
VRRP
A.
VRRP
Answers
B.
VGMP
B.
VGMP
Answers
C.
HRP
C.
HRP
Answers
D.
OSPF
D.
OSPF
Answers
Suggested answer: B

As shown in the figure below, the internal user online scene of the enterprise is as follows. The user online process includes:

A.
certified,USGallow connection
A.
certified,USGallow connection
Answers
B.
User accessinternetenterhttp://1.1.1.1 3. USGPush authentication interface4. User successfully accessedhttp://1.1.1.1 ,device creationsessionsurface5 User enters correctusername and passwordThe following correct sequence of processes should:
B.
User accessinternetenterhttp://1.1.1.1 3. USGPush authentication interface4. User successfully accessedhttp://1.1.1.1 ,device creationsessionsurface5 User enters correctusername and passwordThe following correct sequence of processes should:
Answers
C.
2->5->3->1->4
C.
2->5->3->1->4
Answers
D.
2->3->5->1->4
D.
2->3->5->1->4
Answers
E.
2->1->3->5->4
E.
2->1->3->5->4
Answers
F.
2->3->1->5->4
F.
2->3->1->5->4
Answers
Suggested answer: B

Which of the following options is correct regarding the description of firewall hot standby? (multiple choice)

A.
When the dual-system backup function needs to be provided in multiple areas on the firewall, it is necessary to configure multipleVRRPbackup group
A.
When the dual-system backup function needs to be provided in multiple areas on the firewall, it is necessary to configure multipleVRRPbackup group
Answers
B.
require the same firewall on the sameVGMPmanagement group ownedVRRPBackup group status remains consistent
B.
require the same firewall on the sameVGMPmanagement group ownedVRRPBackup group status remains consistent
Answers
C.
Firewall dual-system hot backup requires session table,MACInformation such as tables and routing tables are synchronized and backed up between the master device and the slave device
C.
Firewall dual-system hot backup requires session table,MACInformation such as tables and routing tables are synchronized and backed up between the master device and the slave device
Answers
D.
VGMPto guarantee allVRRPConsistency of backup group switching
D.
VGMPto guarantee allVRRPConsistency of backup group switching
Answers
Suggested answer: A, B, D

Which of the following is an encryption technique used in digital envelopes?

A.
Symmetric encryption algorithm
A.
Symmetric encryption algorithm
Answers
B.
Asymmetric encryption algorithm
B.
Asymmetric encryption algorithm
Answers
C.
hash algorithm
C.
hash algorithm
Answers
D.
stream-add algorithm
D.
stream-add algorithm
Answers
Suggested answer: B

Which of the following options is correct regarding the matching conditions of a security policy?

(multiple choice)

A.
matching condition"source security zone"is an optional parameter
A.
matching condition"source security zone"is an optional parameter
Answers
B.
matching condition"period"is an optional parameter
B.
matching condition"period"is an optional parameter
Answers
C.
matching condition"application"is an optional parameter
C.
matching condition"application"is an optional parameter
Answers
D.
matching condition"Serve"is an optional parameter
D.
matching condition"Serve"is an optional parameter
Answers
Suggested answer: A, B, C, D

The attacker sendsICMPAnswer the request and set the destination address of the request packet as the broadcast address of the victim network. What kind of attack is this behavior?

A.
IPspoofing attack
A.
IPspoofing attack
Answers
B.
Smurfattack
B.
Smurfattack
Answers
C.
ICMPredirect attack
C.
ICMPredirect attack
Answers
D.
SYN floodattack
D.
SYN floodattack
Answers
Suggested answer: B
Total 497 questions
Go to page: of 50