This page was exported from IT Certification Exam Braindumps [ http://blog.braindumpsit.com ] Export date:Sat Apr 5 11:01:16 2025 / +0000 GMT ___________________________________________________ Title: Aug-2022 Huawei H12-711 Certification Real 2022 Mock Exam [Q152-Q172] --------------------------------------------------- Aug-2022 Huawei H12-711 Certification Real 2022 Mock Exam H12-711 Exam Questions and Valid PMP Dumps PDF Q152. Manual auditing is a supplement to tool evaluation. It does not require any software to be installed on the target system being evaluated, and has no effect on the operation and status of the target system.Which of the following options does not include manual auditing?  Manual detection of the host operating system  Manual inspection of the database  Manual inspection of network equipment  Manual inspection of the administrator’s operation of the equipment process Q153. Which of the following description about the group management for VGMP is wrong?  Master/slave status change of VRRP backup group needs to notify its VGMP management group  Theinterface type and number of two firewalls heartbeat port may be different, as long as they can communicate with each other  Periodically sends Hello packets between VGMP of master/slave firewall  master/slave devices exchange packets to understand each other through the heartbeat line, and backup the related commands and status information Q154. When the firewall hard disk is in place, which of the following is correct description for the firewall log?  The administrator can advertise the content log to view the detection and defense records of network threats.  The administrator can use the threat logto understand the user’s security risk behavior and the reason for being alarmed or blocked.  The administrator knows the user’s behavior, the keywords explored, and the effectiveness of the audit policy configuration through the user activity log.  The administrator can learn the security policy of the traffic hit through the policy hit log. And use it for fault location when the problem occurs. Q155. On Huawei USG series devices, the administrator wants to erase the configuration file. Which of thefollowing commands is correct?  clear saved-configuration  reset saved-configuration  reset current-configuration  reset running-configuration Q156. What are the following values can be set as in USG series firewall security level definition from the security zone? (Choose two.)  150  100  80  40 Q157. Which of the following are included in the operating system patch violations level of Terminal security system?(Choose two.)  Low  Important  Serious  General Q158. According to the management specifications, the network security system and equipment are regularly checked, the patches are upgraded, and the network security emergency response drill is organized. Which of the following belongs to the MPDRR network security modes of the above actions?  Protection link  Testing link  Response link  Management link Q159. Which of the following are the ways in which a PKI entity applies for a local certificate from CA? (Multiple Choice)  Online application  Local application  Network application  Offline application Q160. Which of the following are multi-user operating systems? (Multiple choice)  MSDOS  UNIX  LINUX  Windows Q161. Which of the following is the correct description of windows log event type? (Multiple Choice)  A warning event is a successful operation event of an application, driver, or service.  Error events usually refer to the loss of function and data. For example, if a service cannot be loaded as a system boot, an error event will be generated.  When the disk space is insufficient, it will be recorded as an “information event”  Failure audit event refers to a failed audit security login attempt, such as a failure when the user view accesses the network drive is logged as a failed audit event. Q162. Which of the following attacks can DHCP Snooping prevent? (Multiple Choice)  DHCP Server counterfeiter attack  Intermediaries and IP/MAC spoofing attacks  IP spoofing attack  Counterfeit DHCP lease renewal packet attack using option82 field Q163. Which of the following encryption algorithm, encryption and decryption keys are the same?  DES  RSA(1024)  MD5  SHA-1 Q164. ASPF (Application Specific Packet Filter) is apacket filtering technology based on the application layer, and implements a special security mechanism through the server-map table. Which of the following statements about the ASPF and server-map tables are correct? (Multiple Choice)  ASPF monitors messages during communication  ASPF can dynamically create a server-map  ASPF dynamically allows multi-channel protocol data to pass through the server-map table.  The quintuple server-map entry implements a similar function to the session table. Q165. Which of the following statements are correct about Huawei routers and switches? (Multiple Choice)  The router can implement some security functions, and some routers can implement more security functions by adding security boards.  The main function of the router is to forward data. Sometimes the firewall may bea more suitable choice when the enterprise has security requirements.  The switch has some security features, and some switches can implement more security functions by adding security boards.  The switch does not have security features Q166. Which of the following are the status information that can be backed up by the HRP (Huawei Redundancy Protocol)protocol? (Multiple choice)  Session table  ServerMap entry  Dynamic blacklist  Routing table Q167. Which of the following description of firewall hot standby is correct? (Multiple choice)  When multiple areas of the firewall need to provide dual-system backup, you need to configure multiple VRRP backup groups on the firewall.  The status of all VRRP backup groups in the same VGMP management group on the same firewall is the same.  The hot standby of the firewall needs to synchronize the backup between the master device and the slave device by using the session table, MAC table, and routing table.  VGMP is to ensure the consistency of all VRRP backup group switching. Q168. Classify servers based on the shape, what types of the following can be divided into? (Multiple choice)  Blade server  Tower server  Rack server  X86 server Q169. Which of the following information will be encrypted during the use of digital envelopes? (Multiple Choice)  Symmetric key  User data  Receiver public key  Receiver private key Q170. Which of the following statements about IPSec SA is true?  IPSec SA is one-way  IPSec SA is two-way  used to generate anencryption key  Used to generate a secret algorithm Q171. Which of the following descriptions about the action and security profile of the security policy are correct?(Multiple choice)  If the action of the security policy is “prohibited”, the device willdiscard this traffic, and then no content security check will be performed.  The security profile may know: be applied to the security policy tfat the action is allowed and take effect.  The security profile must be applied to the security policy thats allowed to take effect.  If the security policy action is “Allow”, the traffic will not match the security profile. Q172. Both A and B communicate data. If an asymmetric encryption algorithm is used for encryption, when A sends data to B, which of the following keys will be used for data encryption?  A public key  A private key  B public key  B private key  Loading … H12-711 Question Bank: Free PDF Download Recently Updated Questions: https://www.braindumpsit.com/H12-711_real-exam.html --------------------------------------------------- Images: https://blog.braindumpsit.com/wp-content/plugins/watu/loading.gif https://blog.braindumpsit.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2022-08-03 09:32:55 Post date GMT: 2022-08-03 09:32:55 Post modified date: 2022-08-03 09:32:55 Post modified date GMT: 2022-08-03 09:32:55