The Regenerate Guide To H12-711 Free Exam Questions

Your success in HUAWEI H12-711 is our sole target and we develop all our H12-711 braindumps in a way that facilitates the attainment of this target. Not only is our H12-711 study material the best you can find, it is also the most detailed and the most updated. H12-711 Practice Exams for HUAWEI HUAWEI Other Exam H12-711 are written to the highest standards of technical accuracy.

Free H12-711 Demo Online For HUAWEI Certifitcation:

NEW QUESTION 1
HRP (Huawei Redundancy Protocol) Protocol to backup the connection state of data include: (Multiple Choice)

  • A. TCP/UDP sessions table
  • B. Ser/er Map table
  • C. the dynamic blacklist
  • D. the routing table

Answer: ABC

NEW QUESTION 2
Which of the following are the status information that can be backed up by the HRP (Huawei Redundancy Protocol)protocol? (Multiple choice)

  • A. Session table
  • B. ServerMap entry
  • C. Dynamic blacklist
  • D. Routing table

Answer: ABC

NEW QUESTION 3
The European TCSEC Code is dividedinto two modules, Function and Evaluation, which are mainly used in the miitary, government and commercial fields

  • A. True
  • B. False

Answer: A

NEW QUESTION 4
Which of the following descriptions about the patch is wrong?

  • A. Patch is a small program made by the original authorof the software for the discovered vulnerability.
  • B. No patching does not affect the operation of the system, so it is irrelevant whether to patch or not.
  • C. Patches are generally updated.
  • D. Computer users should download and install new patches to protect their systems in a timely manner

Answer: B

NEW QUESTION 5
In the digital signature process, which of the following is the HASH algorithm to verify the integrity of the data transmission?

  • A. User data
  • B. Symmetric key
  • C. Receiver public key
  • D. Receiver private key

Answer: A

NEW QUESTION 6
Which of the following description about the group management for VGMP is wrong?

  • A. Master/slave status change of VRRP backup group needs to notify its VGMP management group
  • B. Theinterface type and number of two firewalls heartbeat port may be different, as long as they can communicate with each other
  • C. Periodically sends Hello packets between VGMP of master/slave firewall
  • D. master/slave devices exchange packets to understand each other through the heartbeat line, and backup the related commands and status information

Answer: B

NEW QUESTION 7
Whenconfiguring a GRE tunnel interface, the destination address generally refers to which of the following parameters?

  • A. Local tunnel interface IP address
  • B. Local end network export IP address
  • C. Peer external network export IP address
  • D. IP address of the peertunnel interface

Answer: C

NEW QUESTION 8
NAT technology can securely transmit data by encrypting data.

  • A. True
  • B. False

Answer: B

NEW QUESTION 9
Digital certificate technology solves the problem that public key owners cannot determine in digital signature technology.

  • A. True
  • B. False

Answer: A

NEW QUESTION 10
After the firewall uses the hrp standby config enable command to enable :he standby device configuration function allthe information that can be backed up can be directly configured on the standby device, and the configuration on the standby device can be synchronized to the active device.

  • A. True
  • B. False

Answer: A

NEW QUESTION 11
Which of the following attacks is not a malformed packet attack?

  • A. Teardrop attack
  • B. Smurf attack
  • C. TCP fragmentation attack
  • D. ICMP unreachable packet attack

Answer: D

NEW QUESTION 12
During the configuration of NAT. which of the following will the devicegenerate a Server-map entry? (Multiple Choice)?

  • A. Automatically generate server-map entries when configuring source NAT.
  • B. After the NAT server is configured successfully, the device automatically generates a server map entry.
  • C. A server-map entry is generated when easy-ip is configured.
  • D. After configuring NAT No-PAT, the device will create a server-map table for the configured multi-channel protocol data stream.

Answer: BD

NEW QUESTION 13
Which of thefollowing are the default security zones of Huawei firewall? (Multiple Choice)

  • A. Zone area
  • B. Trust area
  • C. Untrust area
  • D. Security area

Answer: BC

NEW QUESTION 14
Which of the following descriptions of the firewall fragment cache function are correct? (Multiple choice)

  • A. By default, the firewall caches fragmented packets.
  • B. After the fragmented packet is directly forwarded, the firewall forwards the fragment according to the interzone security policy if it is not the fragmented packet of the first packet.
  • C. For fragmented packets, NAT ALG does not support the processing of SIP fragmen:ed packets.
  • D. By default, the number of largefragment caches of an IPV4 packet is 32, and the number of large fragmentation buffers of an IPV6 packet is 255

Answer: ACD

NEW QUESTION 15
After the firewall uses the hrp standby config enable command to enable the standby device configuration function, all the information that can be backed up can bedirectly configured on the standby device, and the configuration on the standby device can be synchronized to the active device.

  • A. True
  • B. False

Answer: A

NEW QUESTION 16
Which of the following descriptions is wrong ebout the source of electron c evidence?

  • A. Fax data, mobile phone recording is an electronic evidence related to communication technology.
  • B. Movies and TV shows belong to electronic evidence related to network technology.
  • C. Database opera’.ion records, operating system logs are computer-related electronic evidence
  • D. Operating system, e-mail, chat records car be used as asource of electronic evidence

Answer: B

NEW QUESTION 17
Fire Trust domain FTP client wants to access an Um.rust server FTP service has allowed the client: to access the server TCP 21 port, the client in the Windows command line window can log into the FTP server, but can not download the file, what are the following solutions? (Multiple choice)

  • A. Take the Trust between Un:rust domain to allow two-way default access strategy
  • B. The ^TP works with the port mode modify the Untru3t Trust domain to allow the inbound direction between the default access strategy
  • C. Trust Untrust domain configuration is enabled detect ftp
  • D. FTP works with Passive mode modify the domain inbound direction betv/een the Untrust Trust default access policy to allow

Answer: ABC

NEW QUESTION 18
Digital signatures are used to generate digital fingerprints by using a hashing algorithm to ensure the integrity of data transmission

  • A. True
  • B. False

Answer: A

NEW QUESTION 19
Which of the following are correct about configuring the firewall security zone?(Multiple Choice)

  • A. The firewall has four security zones by default, and the four security zone priorities do not support modification.
  • B. Firewall can have 12 security zones at most.
  • C. The firewall can create two security zones of the same priority
  • D. When data flows between different security zones, the device security check is triggered and the corresponding security policy is implemented

Answer: AD

NEW QUESTION 20
For the occurrence of network security incidents, the remote emergency response is generally adopted first. If the problem cannot be solved for the customer through remote access, after the customer confirms, it is transferred to the local emergency response process.

  • A. True
  • B. False

Answer: A

NEW QUESTION 21
Which of the following is the correct order for event response management?
* 1. detection
* 2. report
* 3. relief
* 4. summarizing experience
* 5. repair
* 6. recovery
* 7. response

  • A. 1-3-2-7-5-64
  • B. 1-3-2-7-5-54
  • C. 1-2-3-7-5-54
  • D. 1-7-3-2-5-54

Answer: D

NEW QUESTION 22
The VRRP advertisement packet of the Huawei USG firewall is a multicast packet. Therefore, each firewall in the backup group must be able to implement direct Layer 2 interworking

  • A. True
  • B. False

Answer: A

NEW QUESTION 23
Which of the following is non-symmetric encryption algorithm?

  • A. RC4
  • B. 3DES
  • C. AES
  • D. DH

Answer: D

NEW QUESTION 24
Which of the following is not part of the method used in the Detection section of the P2DR model?

  • A. Real-time monitoring
  • B. Testing
  • C. Alarm
  • D. Shut down the service

Answer: C

NEW QUESTION 25
In the USG series firewall system view, the device configuration will be restored to the default configuration after the reset saved-configuration command is executed. No other operations are required

  • A. True
  • B. False

Answer: B

NEW QUESTION 26
......

Recommend!! Get the Full H12-711 dumps in VCE and PDF From 2passeasy, Welcome to Download: https://www.2passeasy.com/dumps/H12-711/ (New 294 Q&As Version)