Accurate HUAWEI H12-711 Question Online

It is impossible to pass HUAWEI H12-711 exam without any help in the short term. Come to Certleader soon and find the most advanced, correct and guaranteed HUAWEI H12-711 practice questions. You will get a surprising result by our Avant-garde HCNA-Security - CBSN (Constructing Basic Security Network) practice guides.

Online HUAWEI H12-711 free dumps demo Below:

NEW QUESTION 1
Which of the following behaviors is relatively safer when connecting to Wi-Fi in public places?

  • A. Connect Wi-Fi hotspots that are not encrypted
  • B. Connect to the paid Wi-Fi hotspot provided by the operator and only browse the web
  • C. Connect unencrypted free Wi-Fi for online shopping
  • D. Connect encrypted freeWi-Fi for online transfer operations

Answer: B

NEW QUESTION 2
Which of the following are the same features of Windows and LINUX systems? (MultipleChoice)

  • A. Support multitasking
  • B. Support graphical interface operations
  • C. Open source system
  • D. Support multiple terminal platforms

Answer: ABD

NEW QUESTION 3
Antivirus software and host firewall have the same effect

  • A. True
  • B. False

Answer: B

NEW QUESTION 4
Which of the following are the ways in which a PKI entity applies for a local certificate from CA? (Multiple Choice)

  • A. Online application
  • B. Local application
  • C. Network application
  • D. Offline application

Answer: AD

NEW QUESTION 5
Which of the following is null a itjquiiemeiil fui (bewail duuble hul standby?

  • A. The firewall hardware model is consistent
  • B. The firewall software version is consistent
  • C. The type and number of the interface used are the same
  • D. The firewall interface has the same IP address.

Answer: D

NEW QUESTION 6
Which ofjhe following is the encryption technology used in digital envelopes?

  • A. Symmetric encryption algorithm
  • B. Asymmetric encryption algorithm
  • C. Hash algorithm
  • D. Streaming algorithm

Answer: B

NEW QUESTION 7
Which of the following descriptions about the patch is wrong?

  • A. Patch is a small program made by the original authorof the software for the discovered vulnerability.
  • B. No patching does not affect the operation of the system, so it is irrelevant whether to patch or not.
  • C. Patches are generally updated.
  • D. Computer users should download and install new patches to protect their systems in a timely manner

Answer: B

NEW QUESTION 8
Which of the following attacks can DHCP Snooping prevent? (Multiple Choice)

  • A. DHCP Server counterfeiter attack
  • B. Intermediaries and IP/MAC spoofing attacks
  • C. IP spoofing attack
  • D. Counterfeit DHCP lease renewal packet attack using option82 field

Answer: ABCD

NEW QUESTION 9
Which of thefollowing 3re the versions of the SNMP protocol? (Multiple choice)

  • A. SNMPvl
  • B. SNMPv2b
  • C. SNMPv2c
  • D. SNMPv3

Answer: ACD

NEW QUESTION 10
Which of the following is wrong about the scanning of vulnerabilities?

  • A. The vulnerability was discovered beforehand and discovered afterwards
  • B. Vulnerabilities are generally repairable
  • C. Vulnerabilities are security risks that can expose computers to hackers
  • D. Vulnerabilities can be avoided

Answer: D

NEW QUESTION 11
Which of the following are in the certification area of IS027001? (Multiple choice)

  • A. Access control
  • B. Personnel safety
  • C. Vulnerability management
  • D. Business continuity management

Answer: ABCD

NEW QUESTION 12
Under the tunnel encapsulation mode. IPSec configuration does not need to have a route to thedestination private network segment, because the data will be re-encapsulated using the new IP header to find the routing table.

  • A. True
  • B. False

Answer: B

NEW QUESTION 13
NAPT technology can implement a public network IP address for multiple private network hosts

  • A. True
  • B. False

Answer: A

NEW QUESTION 14
When the sesson authentication mode is used to trigger the firewall's built-in Portal aithentication. the user does not actively perform identity authentication, advanced service access, and device push "redirect" to the authentication page? .. ' • ’

  • A. True
  • B. False

Answer: A

NEW QUESTION 15
OSPF is more commonly used than RIP because OSPF has deviceauthenticatior and is more secure

  • A. True
  • B. False (Right Answers )

Answer: B

NEW QUESTION 16
Which of the following options can be used in the advanced settings of windows firewall? (Multiple Choices)

  • A. Restore defaults
  • B. Change notification rules
  • C. Set connection security rules
  • D. Set out inbound rules

Answer: ABCD

NEW QUESTION 17
UDP port scanning means that the attacker sends a zero-byte UDP packet to a specific port of the target host. If the port is open, it will return an ICMP port reachable data packet

  • A. True
  • B. False

Answer: B

NEW QUESTION 18
Digital certificates are fair to public keys through third-party agencies, thereby ensuring the non-repudiation of data transmission. Therefore, to confirm the correctness of the public key, only the certificate of the communicating party is needed.

  • A. True
  • B. False

Answer: B

NEW QUESTION 19
Which of the following statement about :he NAT is wrong?

  • A. NAT technology can effectively hide the hosts of the LA
  • B. it is an effective network security protection technology
  • C. Address Translation can follow the needs of users, providing FT
  • D. WWW, Telnet and other services outside the LAN
  • E. Some application layer protocols earn/ IP address information in the data, but also modify the P address information in the data of the upper layer when they are as NAT
  • F. For some non-TC
  • G. UDP protocols (such as ICM
  • H. PPTP), unable to do the NAT translation

Answer: D

NEW QUESTION 20
When configuring NAT Server on the LSG series firewall, the server-map table will be generated. Which of the following does not belong in the table?

  • A. Destination IP
  • B. Destination port
  • C. Agreement number
  • D. Source IP

Answer: D

NEW QUESTION 21
According to the protection object, the firewall is divided. Windows Firewall belongs to

  • A. Software firewall
  • B. Hardware firewall
  • C. Stand-alone firewall
  • D. Network firewall

Answer: C

NEW QUESTION 22
When the firewall hard disk is in place, which of the following is correct description for the firewall log?

  • A. The administrator can advertise the content log to view the detection and defense records of network threats.
  • B. The administrator can use the threat logto understand the user's security risk behavior and the reason for being alarmed or blocked.
  • C. The administrator knows the user's behavior, the keywords explored, and the effectiveness of the audit policy configuration through the user activity log.
  • D. The administrator can learn the security policy of the traffic hit through the policy hit lo
  • E. And use it for fault location when the problem occurs.

Answer: D

NEW QUESTION 23
Which of the followingare malicious programs? (Multiple choice)

  • A. Trojan horse
  • B. Vulnerabilities
  • C. Worm
  • D. Virus

Answer: ACD

NEW QUESTION 24
In L2TP configuration for command Tunnel Name, which statements are correct? (Multiple choice)

  • A. Used to specify the name of the end of the tunnel
  • B. Usedto specify the name of the peer tunnel
  • C. Must be consistent with Tunnel Name peer configuration
  • D. If do not configure the Tunnel Name, the tunnel name is the name of the local system

Answer: AD

NEW QUESTION 25
Regarding the description of the vulnerability scanning, which of the following is wrong?

  • A. Vulnerability scanning is a technology based on network remote monitoring of target network or host security performance vulnerability, which can be used for simulated attack experiments and security audits.
  • B. Vulnerability scanning is used to detect whether there is a vulnerability in the target host system.Generally, the target host is scanned for specific vulnerabilities.
  • C. Vulnerability scanning is a passive preventive measure that can effectively avoid hacker attacks.
  • D. Vulnerability scanning can be done based onthe results of ping scan results and port scan

Answer: C

NEW QUESTION 26
......

P.S. Easily pass H12-711 Exam with 294 Q&As Certleader Dumps & pdf Version, Welcome to Download the Newest Certleader H12-711 Dumps: https://www.certleader.com/H12-711-dumps.html (294 New Questions)