Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

H12-711_V3.0 Questions and Answers

Note! Following H12-711_V3.0 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is H12-711_V4.0

H12-711_V3.0 Questions and Answers

Question # 6

Which of the following options isL2TPThe port number used by the packet?

A.

17

B.

500

C.

1701

D.

4500

Full Access
Question # 7

about Internet users andVPNIn the description of access user authentication, which of the following is false?

A.

Internet users andVPNAccess to user shared data, user attribute check (user status, account expiration time, etc.)

VPNAccess takes effect

B.

The process of online users using local authentication or server authentication is basically the same. Both users are authenticated through the authentication domain, and the user triggering method is also the same.

C.

VPNAfter users access the network, they can access the network resources of the enterprise headquarters, and the firewall can control the network resources that can be accessed based on the user name

D.

VPNAfter the access user is authenticated, it will go online in the user online list at the same time

Full Access
Question # 8
Full Access
Question # 9

Use the Ping command on the firewall to test the reachability to the server (the security zone where the server is located is the DMZ). If a security policy is configured to allow the test traffic, the source security zone is _____.[fill in the blank]*

Full Access
Question # 10

NATThe technology can realize the secure transmission of data by encrypting the data.

A.

True

B.

False

Full Access
Question # 11

Please order the following steps according to the graded protection process.[fill in the blank]

Full Access
Question # 12

Common information security standards and specifications mainly include the national level protection system (GB), _______, the American standard TCSEC and the European Union standard ITSEC.[fill in the blank]

Full Access
Question # 13

After an engineer configures the NAT-Server, in order to check the Server-map generated after the configuration, should he use the _____ command to query the Server-map?[fill in the blank]*

Full Access
Question # 14

aboutL2TP VPNstatement, which of the following is false?

A.

It is suitable for employees on business to dial up to access the intranet

B.

Data will not be encrypted

C.

WithIPsec VPNIn conjunction with

D.

belonging to the third floorVPNTechnology

Full Access
Question # 15

As shown in the figure, two Server Map entries are generated after configuring NAT Server. Regarding the information presented in this figure, which of the following descriptions is wrong?[Multiple choice]*

Type: Nat Server. ANY→1.1.1.1[192.168.1.1]

Type: Nat Server Reverse. 192.168.1.1[1.1.1.1] →ANY

A.

The second Server Map function is that when 192.168.1.1 accesses any address, the source address will be converted to 1.1.1.1 after passing through the firewall

B.

The first Server Map function is that when any address accesses 192.168.1.1, the destination IP will be converted to 1.1.1.1 after passing through the firewall.

C.

The Server Map with the Reverse logo can use the command to remove it.

D.

The two Server Map entries are static, that is, after the NAT Server is configured, the two Server Maps will be automatically generated and exist permanently.

Full Access
Question # 16

The process of electronic forensics includes: protecting the scene, obtaining evidence, preserving evidence, identifying evidence, analyzing evidence, tracking and presenting evidence.

A.

True

B.

False

Full Access
Question # 17

Encryption technology can convert readable information into unreadable information through certain methods.

A.

True

B.

False

Full Access
Question # 18

If internal employees access the Internet through the firewall and find that they cannot connect to the Internet normally, what viewing commands can be used on the firewall to troubleshoot the interface, security zone, security policy and routing table? (Write any viewing command, requiring: the words on the command line must be complete and correct to score, and cannot be omitted or abbreviated)[fill in the blank]*

Full Access
Question # 19

IPThe protocol in the header (protocol) field identifies the protocol used by its upper layer. Which of the following field values indicates that the upper layer protocol isUDPprotocol?

A.

6

B.

17

C.

11

D.

18

Full Access
Question # 20

at HuaweiSDSecIn the solution, which of the following is an analysis layer device?

A.

CIS

B.

Agile Controller

C.

switch

D.

Firehunter

Full Access
Question # 21

Please sort from large to small according to the table processing priority of iptables.[fill in the blank]*

Full Access
Question # 22

Which of the following is false for a description of an intrusion detection system?.

A.

Intrusion detection system can collect a large amount of key information dynamically through network and computer.And can analyze and judge the current state of the entire system environment in time

B.

Once the intrusion detection system finds that there is a behavior that violates the security policy or the system has traces of being attacked, it can implement blocking operations.

C.

Intrusion detection system includes all hardware and software systems used for intrusion detection

D.

The immersion detection system can be linked with firewalls and switches, making it a powerful tool for firewalls"assistant", better and more precise control of traffic access between domains

Full Access
Question # 23

IPv6 supports configuring router authorization function on the device, verifying peer identity through digital certificate, and selecting legal device. ( )[Multiple choice]*

A.

True

B.

False

Full Access
Question # 24

About the packet iniptablesDescription of the transfer process, which of the following options is incorrect?

A.

When a packet enters the network card, it first goes to matchPREROUTINGchain

B.

If the destination address of the data packet is the local machine, the system will send the data packet toINPUTchain.

C.

If the destination address of the data packet is not the local machine, the system sends the data packet toOUTPUTchain

D.

If the destination address of the data packet is not the local machine, the system sends the data packet toFORWARDchain.

Full Access
Question # 25

Antivirus software and host firewalls work the same way.

A.

True

B.

False

Full Access
Question # 26

existUSGIn the series firewalls, which of the following commands can be used to queryNATconversion result?

A.

display nat translation

B.

display firewall session table

C.

display current nat

D.

display firewall nat translation

Full Access
Question # 27

Which of the following are functions of address translation technology?(multiple choice)

A.

Address translation enables internal network users (privateIPaddress) accessInternet

B.

Address translation allows many hosts on an internal LAN to share oneIPInternet address

C.

Address translation can handle encryptedIPheader

D.

Address translation can shield users on the internal network and improve the security of the internal network

Full Access
Question # 28

Network administrators can collect data to be analyzed on network devices through packet capture, port mirroring, or logs

A.

True

B.

False

Full Access
Question # 29

aboutIKE SA, which of the following descriptions is false?

A.

IKE SAis bidirectional

B.

IKEis based onUDPapplication layer protocol

C.

IKE SAit's forIPSec SAServices

D.

The encryption algorithm used by user data packets isIKE SADecide

Full Access
Question # 30

The repair of anti-virus software only needs to repair some system files that were accidentally deleted when scanning and killing viruses to prevent the system from crashing

A.

True

B.

False

Full Access
Question # 31

aboutClient-InitializedofL2TP VPN, which of the following statements is false?

A.

remote user accessinternetAfter that, it can be directly sent to the remoteLNSinitiateL2TPtunnel connection request

B.

LNSThe device receives the userL2TPConnection request, the user can be authenticated according to the user name and password

C.

LNSAssign private keys to remote usersIPaddress

D.

Remote users do not need to installVPNclient software

Full Access
Question # 32

deployIPSec VPNIn tunnel mode, useAHprotocol for packet encapsulation. NewIPIn the header field of the packet, which of the following parameters does not need to be checked for data integrity?

A.

sourceIPaddress

B.

PurposeIPaddress

C.

TTL

D.

Identification

Full Access
Question # 33

The preservation of electronic evidence is directly related to the legal validity of the evidence, and the authenticity and reliability of the preservation in compliance with legal procedures can be guaranteed. Which of the following is not an evidence preservation technique?

A.

Encryption Technology

B.

digital certificate technology

C.

digital signature technology

D.

Packet Tag Tracking Technology

Full Access
Question # 34

In the security assessment method, the purpose of security scanning is to scan the target system with scanning analysis and assessment tools in order to find relevant vulnerabilities and prepare for attacks.

A.

True

B.

False

Full Access
Question # 35

Digital certificates can be divided into local certificates,CACertificates, root certificates, self-signed certificates, etc.

A.

True

B.

False

Full Access
Question # 36

Which of the following options is correct regarding the description of firewall hot standby? (multiple choice)

A.

When the dual-system backup function needs to be provided in multiple areas on the firewall, it is necessary to configure multipleVRRPbackup group

B.

require the same firewall on the sameVGMPmanagement group ownedVRRPBackup group status remains consistent

C.

Firewall dual-system hot backup requires session table,MACInformation such as tables and routing tables are synchronized and backed up between the master device and the slave device

D.

VGMPto guarantee allVRRPConsistency of backup group switching

Full Access
Question # 37

Under normal circumstances, the Emai1 protocols we often talk about include ____, POP3, and SMTP.[fill in the blank]*

Full Access
Question # 38

IPSec VPNs use pre-shared keys, ( ) and digital envelopes to authenticate peers. (fill in the blank)

Full Access
Question # 39

A digital envelope refers to the data obtained by the sender using the receiver's _____ to encrypt the symmetric key[fill in the blank]*

Full Access
Question # 40

Which of the following protocols cannot be encrypted by SSL VPN?

A.

HTTP

B.

UDP

C.

IP

D.

PPP

Full Access
Question # 41

The method of collecting information by port scanning using scanning tools belongs to the means of ( ) analysis. (fill in the blank)

Full Access
Question # 42

Which of the following options is not a private network IP address?

A.

192.168.254.254/16

B.

172.32.1.1/24

C.

10.32.254.254/24

D.

10.10.10.10/8

Full Access
Question # 43

Regarding NAT technology. Which of the following descriptions is false?

A.

In Huawei firewalls, source NAT technology refers to the translation of the source address in the IP header of the connection that initiates the connection.

B.

In the Huawei firewall, Easy IP directly uses the public network address of the interface as the translated address, and does not need to configure a NAT address pool.

C.

In Huawei firewalls, the NAT No-PAT technology needs to be implemented by configuring a NAT address pool.

D.

In Huawei firewalls, the only NAT technology with port translation is NAPT.

Full Access
Question # 44

IPSec VPNAn asymmetric encryption algorithm is used to encrypt the transmitted data

A.

True

B.

False

Full Access
Question # 45

pass throughdisplay ike sa The results you see are as follows. Which of the following statements is false?

A.

IKE SAhas been established

B.

IPSec SAhas been established

C.

neighbor address is2.2.2.1

D.

IKEused isV1Version

Full Access
Question # 46

Digital signature is to generate digital fingerprint by using hash algorithm, so as to ensure the integrity of data transmission

A.

True

B.

False

Full Access
Question # 47

TCSECWhich of the following protection levels are included in the standard? (multiple choice)

A.

Verify protection level

B.

Mandatory protection level

C.

autonomous protection level

D.

Passive protection level

Full Access
Question # 48

Which of the following options is not part of the quintuple range?

A.

sourceIP

B.

sourceMAC

C.

PurposeIP

D.

destination port

Full Access
Question # 49

The firewall is divided according to the protection object,windowsfirewall belongs to— ?

A.

Software Firewall

B.

hardware firewall

C.

Stand-alone firewall

D.

Internet Firewall

Full Access
Question # 50

IPSec VPNAn asymmetric encryption algorithm is used to encrypt the transmitted data

A.

True

B.

False

Full Access
Question # 51

Which of the following is true about the security policy configuration command?

A.

prohibited fromtrustRegional accessuntrustarea and the destination address is10.1.10.10hostICMPmessage

B.

prohibited fromtrustRegional accessuntrustarea and the destination address is10.1.0.0/16All hosts on the segmentICMPmessage

C.

prohibited fromtrustRegional accessuntrustregion and the source address is10.1.0.0/16All hosts from the network segmentICMPmessage

D.

prohibited fromtrustRegional accessuntrustregion and the source address is10.2.10.10All hosts from hostICMPmessage

Full Access
Question # 52

aboutVRRP/VGMP/HRPWhich of the following statements is correct? (multiple choice)

A.

VRRPResponsible for sending free messages during active/standby switchoverARPDirect traffic on the new master

B.

VGMPResponsible for monitoring equipment failures and controlling rapid switching of equipment

C.

HRPResponsible for data backup during dual-system hot standby operation

D.

inActivestateVGMPGroups may containstandbystateVRRPGroup

Full Access
Question # 53

Firewall in addition to supporting built-inPortalIn addition to authentication, it also supports customizationPortalauthentication, when using customPortalDuring authentication, there is no need to deploy externalPortalserver.

A.

True

B.

False

Full Access
Question # 54

On the surface, threats such as viruses, loopholes, and Trojan horses are the causes of information security incidents, but at the root, information security incidents are also closely related to people and the information system itself.

A.

True

B.

False

Full Access
Question # 55

Regarding the description of vulnerability scanning, which of the following is false?

A.

Vulnerability scanning is a network-based technology for remotely monitoring the security performance vulnerabilities of target networks or hosts, and can be used to conduct simulated attack experiments and security audits.

B.

Vulnerability scanning is used to detect whether there are vulnerabilities in the target host system, generally scanning the target host for specific vulnerabilities

C.

Vulnerability scanning is a passive preventive measure that can effectively avoid hacker attacks

D.

can be based onpingScan and port scan results for vulnerability scanning

Full Access
Question # 56

existUSGConfigure on the system firewallNAT Server, will produceserver-mapTable, which of the following is not part of this representation?

A.

PurposeIP

B.

destination port number

C.

agreement number

D.

sourceIP

Full Access
Question # 57

the following aboutVGMPWhich protocol description is wrong?

A.

VGMPmultiple on the same firewallVRRPAll backup groups are added to one management group, and all backup groups are managed by the management group.VRRPbackup group

B.

VGMPthrough the unified control ofVRRPSwitching the status of the backup group to ensure that allVRRPBackup group status is consistent

C.

Status isActiveofVGMPThe group device will periodically sendhellomessage,stdandbyThe end is only responsible for monitoringhellomessage, will not respond

D.

By default whenstandbyend threehelloThe message period does not receive the message sent by the peerhellomessage, it will think that the peer end is faulty, so it will switch itself toActivestate.

Full Access
Question # 58

Which of the following are remote authentication methods? (multiple choice)

A.

RADIUS

B.

Local

C.

HWTACACS

D.

LLDP

Full Access
Question # 59

Please sort the following digital envelope encryption and decryption process correctly.

A.

uses B's public key to encrypt the symmetric key to generate a digital envelope

B.

After receiving the encrypted information from A, B uses its own private key to open the digital envelope to obtain the symmetric key.

C.

uses a symmetric key to encrypt the plaintext to generate ciphertext information.

D.

B uses the symmetric key to decrypt the ciphertext information to obtain the original plaintext.

E.

A sends the digital envelope and cipher text information to B

Full Access
Question # 60

existUSGIn the series firewall system view, execute the commandreset saved-configurationAfter that, the device configuration will be restored to the default configuration, and it will take effect without any other operations.

A.

True

B.

False

Full Access
Question # 61

Digital envelope technology means that the sender uses the receiver's public key to encrypt the data and then sends the ciphertext to the receiver.

A.

True

B.

False

Full Access
Question # 62

Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution.[fill in the blank]*

Full Access
Question # 63

The trigger modes of the built-in Portal authentication in the firewall include pre-authentication and ____ authentication[fill in the blank]*

Full Access
Question # 64

After the company network administrator configures the dual-system hot backup, he wants to check the status of the current VGMP group, so he typed the command and displayed the following information

HRP_M_

Role: active, peer: active

Running priority:45000, peer:45000

Backup channel1 usage: 30x

Stab1 e time: 1days, 13 hours, 35 minutes

Last state change information: 2020-03-22 16:01:56 HRP core state changed, old_state=normal (active), new_state=normal

(active).local priority F 4

peer_priority 45000.

Configuration:

hello interval: 1000ms

preempt: 60s

mirror configuration:off

mirror session:on

track trunk member:on

auto-sync configuration:on

auto-sync connection- status:on

adjust ospf cost:on

adjust ospfv3-cost:on

adjust bgp-cost:on

nat resource: off

Detail information on:

Gigabi tEthernet0/0/1:up

Gigabi tEthernet0/0/3:up

ospf-cost: +0

then the command he typed in the blank is[fill in the blank]*

Full Access
Question # 65

Which of the following options are available for IPSec VPN peer authentication?

A.

Digital signature

B.

Digital certificate

C.

Digital envelope

D.

asymmetric key

Full Access
Question # 66

Heartbeat message (He11o message): The two FWs send heartbeat messages to each other periodically (the default period is ( ) seconds) to check whether the peer device is alive. (fill in the blank)

Full Access
Question # 67

After the firewall detects an intrusion, the administrator can view the intrusion log information in the firewall business log or ( ) log. (fill in the blank

Full Access
Question # 68

When configuring the security policy on the firewall, the optional content security options are ( ). (fill in the blank)

Full Access
Question # 69

How many IPSec SAs need to be established to encapsulate P packets using the AH+ESP protocol?

A.

2

B.

1

C.

4

D.

3

Full Access
Question # 70

To configure a NAT policy in command line mode, you need to use the .command ( ) in the system view to enter the NAT policy configuration view. (all lowercase) (fill in the blank)

Full Access
Question # 71

Regarding NAT technology, which of the following descriptions is correct?

A.

The internal network server of the NAT network cannot be accessed by external network users. Therefore, if a server that needs to provide external services is deployed, be sure to assign an independent public network address to the server.

B.

NAT reduces the difficulty of network monitoring

C.

NAT technology can only achieve one-to-one address conversion, but cannot achieve address multiplexing

D.

NAT can hide more intranet IP addresses

Full Access
Question # 72

If foreign criminals use the Internet to steal my country's state secrets, what kind of early warning will the state initiate?

A.

Orange Alert

B.

Yellow Alert

C.

Blue Alert

D.

Red Alert

Full Access
Question # 73

When configuring user single sign-on, use the receivePCIn message mode, the authentication process has the following steps:

1. visitorPCExecute the login script and send the user login information toADmonitor

2. Firewall extracts user andIPAdd the correspondence to the online user table

3. ADmonitor connected toADThe server queries the login user information and forwards the queried user information to the firewall

4. visitor loginADarea,ADThe server returns a login success message to the user and issues the login script. Which of the following is the correct order?

A.

1-2-3-4

B.

4-1-3-2

C.

3-2-1-4

D.

1-4-3-2

Full Access