ExamGecko
Home / Huawei / H12-731_V2.0 / List of questions
Ask Question

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 3

Add to Whishlist

List of questions

Question 21

Report Export Collapse

By default, the firewall authenticates traffic that passes through itself.

TRUE
TRUE
FALSE
FALSE
Suggested answer: B
asked 18/09/2024
eddie alvarez
45 questions

Question 22

Report Export Collapse

There are many firewall security policies in the data center network, and the administrator enables the policy backup acceleration function, and the source address matching conditions of the security policy are modified It can be effective immediately.

TRUE
TRUE
FALSE
FALSE
Suggested answer: B
asked 18/09/2024
Instel SL
35 questions

Question 23

Report Export Collapse

If a user queries the security log of the AD server using single sign-on through the firewall, the firewall can immediately take the user offline after the user logs out.

TRUE
TRUE
FALSE
FALSE
Suggested answer: B
asked 18/09/2024
Cyrom Meryll Santos
42 questions

Question 24

Report Export Collapse

If the database O&M workload is much greater than the host O&M workload, you can choose to have an independent department outside the original O&M bastion host The database bastion host.

TRUE
TRUE
FALSE
FALSE
Suggested answer: A
asked 18/09/2024
Artem Masin
30 questions

Question 25

Report Export Collapse

With the following description of the load balancing feature of USG Firewall Server, what are the correct items?

The IP address specified in the security policy should be the IP address of the real server
The IP address specified in the security policy should be the IP address of the real server
The IP address specified in the security policy should be the IP address of the virtual server
The IP address specified in the security policy should be the IP address of the virtual server
Modifying the destination IP address and destination port number of a packet occurs after querying the inter-domain security policy
Modifying the destination IP address and destination port number of a packet occurs after querying the inter-domain security policy
Modifying the destination IP address and destination port number occurs before querying the inter-domain security policy
Modifying the destination IP address and destination port number occurs before querying the inter-domain security policy
Suggested answer: A, D
asked 18/09/2024
Ibrahim SACCA
37 questions

Question 26

Report Export Collapse

Control of ping packets to the USG firewall itself The access control management function of the interface takes precedence over the security policy.

TRUE
TRUE
FALSE
FALSE
Suggested answer: A
asked 18/09/2024
Mauro Daniele
40 questions

Question 27

Report Export Collapse

Which is the more correct number of DNS servers that can be bound to each outbound interface in the USC Firewall DNS Transparent Proxy function?

2
2
3
3
4
4
1
1
Suggested answer: A
asked 18/09/2024
BERNDT HAMBOECK
33 questions

Question 28

Report Export Collapse

A description of the following IPv6 Secure Neighbor Discovery feature information for one of the interfaces Which one is wrong?

Huawei H12-731_V2.0 image Question 28 33327 09182024192841000000

The minimum key length that the interface can accept is 512
The minimum key length that the interface can accept is 512
The maximum key length that the interface can accept is 2048
The maximum key length that the interface can accept is 2048
The interface does not have strict security mode enabled
The interface does not have strict security mode enabled
The security level of the CGA address is 1
The security level of the CGA address is 1
Suggested answer: C
asked 18/09/2024
Martin Schouten
44 questions

Question 29

Report Export Collapse

In the following description of the USG firewall security policy, which one is wrong?

When the firewall is equipped with the undo firewall packet-filter basic-protocol enable command, unicast packets are not controlled by security policies
When the firewall is equipped with the undo firewall packet-filter basic-protocol enable command, unicast packets are not controlled by security policies
By default... Broadcast packets are not controlled by security policies
By default... Broadcast packets are not controlled by security policies
In the case of the province, multicast packets are not controlled by security policies
In the case of the province, multicast packets are not controlled by security policies
By default... Unicast packets are controlled by security policies
By default... Unicast packets are controlled by security policies
Suggested answer: A
asked 18/09/2024
irwandi irwandi
36 questions

Question 30

Report Export Collapse

The USG firewall is connected to the corporate intranet through a router After the firewall is configured with the cross-Layer 3 MAC identification feature, then the security policy of the firewall can configure the MAC address as a match condition o

TRUE
TRUE
FALSE
FALSE
Suggested answer: A
asked 18/09/2024
Sebastian Romero
49 questions
Total 276 questions
Go to page: of 28
Search

Related questions