How Many Questions Of H12-711 Free Draindumps

Testking H12-711 Questions are updated and all H12-711 answers are verified by experts. Once you have completely prepared with our H12-711 exam prep kits you will be ready for the real H12-711 exam without a problem. We have Down to date HUAWEI H12-711 dumps study guide. PASSED H12-711 First attempt! Here What I Did.

HUAWEI H12-711 Free Dumps Questions Online, Read and Test Now.

NEW QUESTION 1
Which of the following io true about the description of the firewall?

  • A. The firewall cannot transparently access the network.
  • B. Adding a firewall to the network will inevitably change the :opology of the network.
  • C. In order to avoid single point of faiur
  • D. the firewall only supports side-by-side deplcyment.
  • E. Depending on the usage scenario, the firewall can be deployed in transparent moce or deployed in a three bedroom mode.

Answer: D

NEW QUESTION 2
If the administrator uses ’he default authentication domain to authenticate a user, you onlyneed to enter a user name when the user logs, if administrators use the newly created authentication domain to authenticate the user, the user will need to enter login "username @ Certified domain name"

  • A. True
  • B. False

Answer: A

NEW QUESTION 3
In stateful inspection firewall, when openingstate detection mechanism, three-way handshake's second packet (SYN + ACK) arrives the firewall. If there is still no corresponding session table on the firewall, then which of the following statement is correct?

  • A. If the firewall security policy allows packets through, then the packets can pass through the firewall
  • B. If the firewall security policy allows packets through, then creating the session table
  • C. Packets must not pass through the firewall
  • D. Packets must pass through the firewall, and establishes a session table

Answer: C

NEW QUESTION 4
The repair of anti-virus software only needs to be able to repair some system files that were accidentally deleted when killing the virus to prevent the system from crashing

  • A. True
  • B. False

Answer: A

NEW QUESTION 5
Which of the following is true about firewall security policies?

  • A. By default, the security policy can control unicast packets andbroadcast packets.
  • B. By default, the security policy can control multicast.
  • C. By default, the security policy only controls unicast packets.
  • D. By default, the security policy can control unicast packets, broadcast packets, and multicast packets.

Answer: C

NEW QUESTION 6
Whenconfiguring a GRE tunnel interface, the destination address generally refers to which of the following parameters?

  • A. Local tunnel interface IP address
  • B. Local end network export IP address
  • C. Peer external network export IP address
  • D. IP address of the peertunnel interface

Answer: C

NEW QUESTION 7
The vulnerability that has not been discovered is the 0 day vulnerability

  • A. True
  • B. False

Answer: B

NEW QUESTION 8
The administrator PC and the USG firewall management interface directly connected using the web the way initialization. Which nether following statements are true? (Multiple choice)

  • A. Manage PC browser accesshttp://192.168.0.1
  • B. IP address ofthe management PC is manually set to 192.168.0.2-'92.168.0.254
  • C. Manage PC browser access http://192.168.1.1
  • D. Set the NIC ofthe management PC to automatically obtain the IP address.

Answer: AB

NEW QUESTION 9
The network administrator can collect data to be analyzed on the network device by means of packet capture, port mirroring, or log, etc.

  • A. True
  • B. False

Answer: A

NEW QUESTION 10
Which of the following descriptions is wrong about the root CA certificate?

  • A. The issuer is CA
  • B. The certificate subject name isCA.
  • C. Public key information is the public key ofthe CA
  • D. Signature is generated by CA public key encryption

Answer: D

NEW QUESTION 11
When establishing their own information systems, companies check each operation according to internationally established authoritative standards and can check whether their information systems are safe

  • A. True
  • B. False

Answer: A

NEW QUESTION 12
Winch of the following is the encryption technology used in digital envelopes?

  • A. Symmetric encryption algorithm
  • B. Asymmetric encryption algorithm

Answer: B

NEW QUESTION 13
The attacker by sending ICMP response request, and will request packet destination address set to suffer Internet radio address. Which kind of attack does this behavior belong to9

  • A. IP spoofing attack
  • B. Smurf attack
  • C. ICMP redirect attack
  • D. SYN flood attack

Answer: B

NEW QUESTION 14
About the description of firewall active-standby, which of the following is correct?(Multiple Choice)

  • A. When a plurality of regions on the firewall needs to provide dual-machine backup function, you need to configure multiple VRRP backup groups on the firewall.
  • B. It requires the state of all the VRRP backup groups in the same VGMP management group on the same firewall should be consistent.
  • C. The firewall active-standby requires the information such as the session tabl
  • D. MAC table, routing table and so on synchronous backup between primary devices and slave devices.
  • E. VGMP is to ensureall VRRP backup groups' consistency of switching

Answer: ABD

NEW QUESTION 15
ASPF (Application Specific Packet Filter) is a kind of packet filtering basedon the application layer, it checks the application layer protocol information and monitor the connection state of the application layer protocol. ASPF by Server Map table achieves a special security mechanism. Which statement about ASPF and Server map table are correct? (Multiple choice)

  • A. ASPF monitors the packets in the process of communication
  • B. ASPF dynamically create and delete filtering rules
  • C. ASPF through server map table realize dynamic to allow multi-channel protocol data to pass
  • D. Quintupleserver-map entries achieve a similar functionality with session table

Answer: ABC

NEW QUESTION 16
Encryption technology can transform readable information into unreadable information in a certain way

  • A. True
  • B. False

Answer: A

NEW QUESTION 17
Which ofthe following are the standard port numbers for the FTP protocol? (Multiple choice)

  • A. 20
  • B. 21
  • C. 23
  • D. 80

Answer: AB

NEW QUESTION 18
Which of the following is the default backup method for double hot standby?

  • A. Automatic backup
  • B. Manual batch backup
  • C. Session fast backup
  • D. Configuration of the active and standby FWs after the device is restarted

Answer: A

NEW QUESTION 19
Which of the following statements about IPSec SA is true?

  • A. IPSec SA is one-way
  • B. IPSec SA is two-way
  • C. used to generate anencryption key
  • D. Used to generate a secret algorithm

Answer: A

NEW QUESTION 20
Which of the following is null a itjquiiemeiil fui (bewail duuble hul standby?

  • A. The firewall hardware model is consistent
  • B. The firewall software version is consistent
  • C. The type and number of the interface used are the same
  • D. The firewall interface has the same IP address.

Answer: D

NEW QUESTION 21
Apply for emergency response special funds, which stage work content does procurement emergency responsesoftware and hardware equipment belong to in the network full emergency response?

  • A. Preparation stage
  • B. Inhibition phase
  • C. Response phase
  • D. Recovery phase

Answer: A

NEW QUESTION 22
In the USG series firewall, you can use the function to provide well-known application services for non-known ports.

  • A. Port mapping
  • B. MAC and IP address binding
  • C. Packet filtering
  • D. Long connection

Answer: A

NEW QUESTION 23
Information security levelprotection is the basic system of national information security work

  • A. True
  • B. False

Answer: A

NEW QUESTION 24
Digital signature technology obtains a digital signature by encrypting which of the following data?

  • A. User data
  • B. Receiver public key
  • C. sender public key
  • D. Digital fingerprint

Answer: D

NEW QUESTION 25
Which of the following are correct regarding the matching conditions of the security policy? (Multiple choice)

  • A. 'The source security zone' is an optional parameter in the matehing condition.
  • B. "Time period"in the matching condition is an optional parameter
  • C. "Apply" in the matching condition is an optional parameter
  • D. "Service" is an optional parameter in the matching condition

Answer: ABCD

NEW QUESTION 26
Which of the following descriptions about windows logs is wrong?

  • A. The system log is used to record the events generated by the operating system components, including the crash of the driver, system components and application software, and data
  • B. Windows server 2008 system logs stored in the Application.evtx
  • C. The application log contains events logged by the application or system program, mainly recording events in the running of the program.
  • D. Windows seiver 2008 security lug is sluied in security.evtx

Answer: B

NEW QUESTION 27
......

P.S. Easily pass H12-711 Exam with 294 Q&As Allfreedumps.com Dumps & pdf Version, Welcome to Download the Newest Allfreedumps.com H12-711 Dumps: https://www.allfreedumps.com/H12-711-dumps.html (294 New Questions)