H12-711 exam questions for practice in 2021 Updated 290 Questions [Q135-Q154]

Share

H12-711 exam questions for practice in 2021 Updated 290 Questions

Updated Dec-2021 Premium H12-711 Exam Engine pdf - Download Free Updated 290 Questions

NEW QUESTION 135
Winch of the following is the encryption technology used in digital envelopes?

  • A. Symmetric encryption algorithm
  • B. Asymmetric encryption algorithm

Answer: B

 

NEW QUESTION 136
During the configuration of NAT. which of the following will the devicegenerate a Server-map entry?
(Multiple Choice)?

  • A. After configuring NAT No-PAT, the device will create a server-map table for the configured multi-channel protocol data stream.
  • B. A server-map entry is generated when easy-ip is configured.
  • C. After the NAT server is configured successfully, the device automatically generates a server map entry.
  • D. Automatically generate server-map entries when configuring source NAT.

Answer: A,C

 

NEW QUESTION 137
There are various security threats in the use of the server. Which of the following options is not a server security threat?

  • A. DDos attack
  • B. Hacking
  • C. Natural disasters
  • D. Malicious programs

Answer: C

 

NEW QUESTION 138
When the USG series firewall hard disk is in place, which of the following logs can be viewed? (Multiple Choice)

  • A. Operation log
  • B. Alarm information
  • C. Business log
  • D. Threat log

Answer: A,B,C,D

 

NEW QUESTION 139
In the VRRP (Virtual Router Redundancy Protocol) group, the primary firewall periodically sends advertisement packets to the backup firewall. The backup firewall is only responsible for monitoring advertisement packets and will not respond.

  • A. True
  • B. False

Answer: A

 

NEW QUESTION 140
During the configuration of NAT, which of the following will the device generate a Server-map entry? (Multiple Choice)?

  • A. After configuring NAT No-PAT, the device will create a server-map table for the configured multi-channel protocol data stream.
  • B. A server-map entry is generated when easy-ip is configured.
  • C. After the NAT server is configured successfully, the device automatically generates a server map entry.
  • D. Automatically generate server-map entries when configuring source NAT.

Answer: A,C

 

NEW QUESTION 141
Which of the following is the encryption technology used by digital envelopes?

  • A. Symmetric encryption algorithm
  • B. Asymmetric encryption algorithm

Answer: B

 

NEW QUESTION 142
Policy Center system can implement two dimensions' management functions: organizational management and regional management

  • A. True
  • B. False

Answer: A

 

NEW QUESTION 143
In SSL handshake protocol, what is the role of Server Key Exchange message?

  • A. in the server key exchange message, it contains set of parameters required for completing key exchange
  • B. server key exchange message indicates that the server has finished sending all the information
  • C. it contains an X.509 certificate in server key exchange message, the public key is contained in the certificate, which is issued to the client to verify signatures or to encrypt messages when key exchange
  • D. in the server key exchange message, it contains the negotiated CipherSuite which is copied to the state of the current connection

Answer: A

 

NEW QUESTION 144
The European TCSEC Code is dividedinto two modules, Function and Evaluation, which are mainly used in the miitary, government and commercial fields

  • A. True
  • B. False

Answer: A

 

NEW QUESTION 145
Which of the following is used to encrypt digital fingerprints in digital signature technology?

  • A. sender public key
  • B. sender private key
  • C. Receiver public key
  • D. Receiver private key

Answer: B

 

NEW QUESTION 146
Which of the following statement about the NAT is wrong?

  • A. NAT technology can effectively hide the hosts of the LAN, it is an effective network security protection technology
  • B. Address Translation can follow the needs of users, providing FTP, WWW, Telnet and other services outside the LAN
  • C. For some non-TCP, UDP protocols (such as ICMP, PPTP), unable to do the NAT translation
  • D. Some application layer protocols carry IP address information in the data, but also modify the IP address information in the data of the upper layer when they are as NAT

Answer: C

 

NEW QUESTION 147
Device destruction attacks are generally not easy to cause information leakage, but usually cause network communication services to be interrupted.

  • A. True
  • B. False

Answer: A

 

NEW QUESTION 148
Which of the following is true about the description of the TCP/IP protocol stack packet encapsulation?
(Multiple choice)

  • A. After the transport layer (TCP) receives the data packet, the transport layer information is stripped after parsing, and the upper layer processing protocol, such as UDP, is known according to the parsing information
  • B. After receiving the data packet, the network layer is stripped after parsing, and the upper layer processing protocol is known according to the parsing information, such as HTTP
  • C. After the application layer receives the data packet, the application layer information is stripped after parsing, and the user data displayed at the end is exactly the same as the data sent by the sender host.
  • D. The data packet is firsttransmitted to the data link layer. After parsing, the data link layer information is stripped, and the network layer information is known according to the parsing information, such as IP.

Answer: C,D

 

NEW QUESTION 149
Which of the following io true about the description of the firewall?

  • A. Depending on the usage scenario, the firewall can be deployed in transparent moce or deployed in a three bedroom mode.
  • B. Adding a firewall to the network will inevitably change the :opology of the network.
  • C. The firewall cannot transparently access the network.
  • D. In order to avoid single point of faiure. the firewall only supports side-by-side deplcyment.

Answer: A

 

NEW QUESTION 150
In the environment of GRE configuration, which of the following statements are true? (Choose three.)

  • A. If both ends enable the configuration of keyword verification, the keyword must be the same
  • B. When the local device send data packets, by identifying the protocol field value of IP header for GRE to determine whether send the data packet to GRE module for processing
  • C. In order to make the ends of the tunnel forward data packets normally, the devices of both ends are configured routing which through the Tunnel interface
  • D. When the opposite end receives data packets, by identifying the protocol field value of IP header for GRE to determine whether send the data packet to GRE module for processing

Answer: A,C,D

 

NEW QUESTION 151
'Being good at observation' and 'keeping suspicion' can help us better identify security threats in the online world

  • A. True
  • B. False

Answer: A

 

NEW QUESTION 152
In the USG series firewall, which of the following commands can be used to query the NAT translation result?

  • A. display firewall session table
  • B. display current nat
  • C. display nat translation
  • D. display firewall nat translation

Answer: A

 

NEW QUESTION 153
Which of the following description about the group management for VGMP is wrong?

  • A. master/slave devices exchange packets to understand each other through the heartbeat line, and backup the related commands and status information
  • B. Periodically sends Hello packets between VGMP of master/slave firewall
  • C. Theinterface type and number of two firewalls heartbeat port may be different, as long as they can communicate with each other
  • D. Master/slave status change of VRRP backup group needs to notify its VGMP management group

Answer: C

 

NEW QUESTION 154
......

Authentic H12-711 Dumps With 100% Passing Rate Practice Tests Dumps: https://www.actual4exams.com/H12-711-valid-dump.html

Huawei H12-711 Real Exam Questions Guaranteed Updated Dump from Actual4Exams : https://drive.google.com/open?id=16nZb4foTsppZreRqqaH2O1tzyFva6M0T