DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Huawei H12-711 Exam Questions and Answers PDF | SPOTO

SPOTO's latest exam dumps on the homepage, with a 100% pass rate! SPOTO delivers authentic Cisco CCNA, CCNP study materials, CCIE Lab solutions, PMP, CISA, CISM, AWS, and Palo Alto exam dumps. Our comprehensive study materials are meticulously aligned with the latest exam objectives. With a proven track record, we have enabled thousands of candidates worldwide to pass their IT certifications on their first attempt. Over the past 20+ years, SPOTO has successfully placed numerous IT professionals in Fortune 500 companies.
Take other online exams

Question #1
Which protocols below can guarantee the confidentiality of data transmission? (Multiple Choice)
A. Telnetcorrect
B. SSHcorrect
C. FTP
D. HTTPScorrect
View answer
Correct Answer: ABD
Question #2
Regarding the AH and ESP security protocols, which of the following options is correct? (Multiple Choice)
A. AH can provide encryption and verification functions
B. ESP can provide encryption and verification functionscorrect
C. The agreement number of AH is 51
D. The agreement number of ESP is 51
View answer
Correct Answer: BC
Question #3
Which of the following descriptions of single sign-on is correct?
A. The visitor recited the Portal authentication page and sent the username and password to FT to identify his/her identity, and the password was not stored on the FT, and the FI sent the username and password to the third-party authentication server, and the authentication process was carried out on the authentication server
B. The visitor sends the username and password that identifies his identity to the third-party authentication server, and after the authentication is passed, the third-party authentication server sends the visitor's identity information to Fcorrect
C. F7 only records the identity information of the visitor and does not participate in the authentication process
D. Visitors obtain the SMS verification code through the Portal authentication page, and then enter the SMS verification code to pass the authentication
E. The visitor sends the username and password that identifies them to the FW through the portal authentication page, on which the password is stored and the verification process takes place on the F
View answer
Correct Answer: B
Question #4
Execute the command on the Firewall and display the above information. Which of the following description is correct? (Choose two.)
A. his Firewall VGMP group status is Active
B. he virtual IP address of the firewall G1/0/1 interface is 202
C. he priority of the VRRP backup group of the firewall VRID 1 is 100
D. f the master device fails, it will not switch
View answer
Correct Answer: AC
Question #5
Which of the following attacks is not a malformed message attack?
A. Teardrop attack
B. Smurf attack
C. TCP fragment attack
D. ICMP unreachable packet attackcorrect
View answer
Correct Answer: D
Question #6
Which of the following attacks does not belong to special packet attack?
A. ICMP redirect packet attack
B. ICMP unreachable packet attack
C. IP address scanning attackcorrect
D. Large ICMP packet attack
View answer
Correct Answer: C
Question #7
In some scenarios, it is necessary to convert the source IP address, but also convert the destination IP address, which technology of the following is used by these scenarios?
A. Two-way NATcorrect
B. Source Nat
C. NAT-Server
D. Nat Alg
View answer
Correct Answer: A
Question #8
Which of the following are HRP(Huawei Redundancy Protocol) protocol can back up state information? (multiple choice)
A. session table
B. ServerMapentry
C. Dynamic blacklist
D. routing table
View answer
Correct Answer: ABC
Question #9
NAPT technology can implement a public network IP address for multiple private network hosts.
A. Truecorrect
B. False
View answer
Correct Answer: A
Question #10
"Implementing security monitoring management for information and information systems, preventing illegal use of information and information systems", is to achieve which feature in information security?
A. Confidentiality
B. Controllabilitycorrect
C. Non-repudiation
D. Integrity
View answer
Correct Answer: B
Question #11
Which of the following is an action to be taken during the summary phase of the cybersecurity emergency response? (Multiple Choice)
A. Evaluation of members of the emergency response organization
B. Establish a defense system and specify control measures
C. Evaluate the implementation of the contingency plan and propose a follow-up improvement plan
D. Determine the effectiveness of the isolation measures
View answer
Correct Answer: AC
Question #12
Which of the following isP2DRThe core part of the model?
A. PolicyStrategy
B. Protectionprotection
C. Detectiondetect
D. Responseresponse
View answer
Correct Answer: A
Question #13
When IPSec VPN uses tunnel mode to encapsulate packets, which of the following is not within the encryption scope of the ESP security protocol? ( )[Multiple choice]*
A. AESP Header
B. BTCP Header
C. CRaw IP Header
D. DESP Tail
View answer
Correct Answer: A
Question #14
In USG series firewall, use non-well-known port provides well-known application service, can adopt the following techniques:
A. port mappingcorrect
B. the MAC and IP address binding
C. packet filter
D. long connection
View answer
Correct Answer: A
Question #15
Which options can be operated in the advanced settings of the Windows Firewall? (Multiple Choice)
A. Restore defaultcorrect
B. Change Notification Rules
C. Set connection safety rulescorrect
D. Set inbound and outbound rulescorrect
View answer
Correct Answer: ACD
Question #16
The following description of the intrusion fire protection system IPS, which is correct?
A. The port IPS can be concatenated at the network boundary
B. The IPS cannot prevent intrusion from occurring in real time
C. The port IPS can be attached to the switch and port mirrored through the switch
D. Oral IPS has the ability to customize intrusion prevention rules
View answer
Correct Answer: ACD
Question #17
Which of the Policy Center functional areas is wrong?
A. re-authentication domain refers to the client through the identity authentication before access to the area
B. ost-authentication domain refers to the client can access through the security certification area
C. solation domain refers to the client after authenticated must have access to the area
D. solation domain refers to the client security authentication failed the required access area
View answer
Correct Answer: C
Question #18
Which of the following is non-symmetric encryption algorithm?
A. RC4correct
B. 3DES
C. AES
D. DHcorrect
View answer
Correct Answer: AD
Question #19
About SSL VPN technology, which of the following statement is wrong?
A. SSL VPN technology is perfect for NAT traversal scenarios
B. Encryption of SSL VPN technology only takes effect on the application layer
C. SSL VPN requires dial clientcorrect
D. SSL VPN technology expands the network range of enterprises
View answer
Correct Answer: C
Question #20
NAPT technology can implement a public IP address for multiple private network hosts.
A. Truecorrect
B. False
View answer
Correct Answer: A
Question #21
What protection levels are included in TCSEC standard? (Multiple Choice)
A. Verification Protectioncorrect
B. Forced Protectioncorrect
C. Self-protectioncorrect
D. Passive Protection
View answer
Correct Answer: ABC
Question #22
Which of the following types of encryption technology can be divided into? (multiple choice)
A. Symmetric encryption
B. Symmetric encryption
C. fingerprint encryption
D. data encryption
View answer
Correct Answer: AB
Question #23
A Web server is deployed in an enterprise intranet to provide Web access services to Internet users, and in order to protect the access security of the server, it should be divided into the _____ area of the firewall.
A. DMZ
B. DMY
View answer
Correct Answer: A
Question #24
Which types of encryption technology can be divided into? (Multiple Choice)
A. Symmetric encryptioncorrect
B. Asymmetric encryptioncorrect
C. Fingerprint encryption
D. Data encryption
View answer
Correct Answer: AB
Question #25
Which of the following is the encryption technology used by digital envelopes?
A. Symmetric encryption algorithm
B. Asymmetric encryption algorithmcorrect
C. Hash algorithm
D. Stream encryption algorithm
View answer
Correct Answer: B
Question #26
Regarding the characteristics of the routing table, which of the following items is described correctly
A. APort When a packet matches multiple entries in the routing table, it is forwarded based on the route entry with the largest metric
B. BPort In the global routing table, there is at most one next hop to the same destination CIDR block
C. CThere may be multiple next hops in the global routing table to the same destination
D. DPort When a packet matches multiple entries in the routing table, it is forwarded according to the longest mask
View answer
Correct Answer: CD
Question #27
Huawei Firewall only supports the inter-domain persistent connection function for TCP packets.
A. TRUE
B. FALSEcorrect
View answer
Correct Answer: B
Question #28
Firewall Gateway Anti-Virus Response includes alerting and blocking, the way in which the alarm device only generates a log, sent out without processing on HTTP protocol to transmit the document: blocking the way equipment is disconnected from the HTTP server and block files, push Web pages to the client and generates logs.
A. TRUEcorrect
B. FALSE
View answer
Correct Answer: A
Question #29
UDPA port scan is when an attacker sends a zero byte lengthUDPmessage to a specific port of the target host, if the port is open, it will return aICMPPort reachable data packets.
A. Update virus database in real time
B. Shelling technology
C. format the disk
D. self protection
View answer
Correct Answer: A
Question #30
What are common hash algorithms? (Choose two.)
A. ES
B. ES
C. D5
D. HA-1
View answer
Correct Answer: CD

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: