This page was exported from Exam for engine [ http://blog.test4engine.com ] Export date:Mon Nov 18 5:34:01 2024 / +0000 GMT ___________________________________________________ Title: [Feb-2023] Check your preparation for Huawei H12-711_V4.0 On-Demand Exam [Q28-Q49] --------------------------------------------------- [Feb-2023] Check your preparation for Huawei H12-711_V4.0 On-Demand Exam Practice Exam H12-711_V4.0 Realistic Dumps Verified Questions NO.28 The following description of digital certificates, which one is wrong  The simplest certificate consists of a public key, a name, and a digital signature from a certificate authority.  Digital certificates contain the owner’s public key and related identity information.  In general, the key of a digital certificate has an expiration date.  Digital certificates do not solve the problem of digital signature technology where the public key cannot be determined to be the designated owner. NO.29 When using passive mode to establish an FTP connection, the control channel uses port 20 and the data channel uses port 21. ( )[Multiple choice]*  True  False NO.30 As shown in the figure, nat server global202.106.1.1 inside10.10.1.1 is configured on the firewall. Which of the following is the correct configuration for interzone rules? ( )[Multiple choice]*  rule name c. source-zone untrust. destination-zone trust. destination-address 202.106.1.132, action permit  rule name d, source- zone untrust. destination- zone trust. destination- address10.l0.1.1 32, action permit  rule name b, source- zone untrust, destination- zone trust, source- address10.10.1.1 32, action permit  rule name b, source-zone untrust, destination-zone trust, source-address202.106.l.1 32, action permit NO.31 Using the ___ method of the Web proxy, the virtual gateway will encrypt the real URL that the user wants to access, and can adapt to different terminal types.[fill in the blank]*  web rewrite  reb rewrite NO.32 Which of the following NAT technologies can implement a public network address to provide source address translation for multiple private network addresses ( )*  NAPT  NAT Server  Easy-ipCT Jinglu  NAT No-PAT NO.33 Compared with the software architecture of C/S, B/S does not need to install a browser, and users are more flexible and convenient to use.  TRUE  FALSE NO.34 As shown in the figure, what is the range of the AH protocol authentication range in transmission mode?  The4  The3  The2  The1 NO.35 Which layer of the protocol stack does SSL provide end-to-end encrypted transmission services?  Application layer  Data link layer  Network layer  Transport layer NO.36 What is the protocol number of the GRE protocol?  47  48  46  The 50th NO.37 Which of the following is not the default security zone of the firewall ( )[Multiple choice]*  untrust trust  trust zone  dmz zone  isp zone) NO.38 Which of the following operating modes does NTP support?  Mouth peer mode  Mouth client/server mode  Mouth broadcast mode  Mouth multicast mode NO.39 Huawei Firewall only supports the inter-domain persistent connection function for TCP packets.  TRUE  FALSE NO.40 Which of the following is not an encryption algorithm in a VPN?  The RIP  AES  3DES  DES NO.41 The trigger authentication method for firewall access user authentication does not include which of the following? ( )[Multiple choice]*  MPLS VPN  SSL VPN  IPSec VPN  L2TP VPN NO.42 We should choose the encryption algorithm according to our own use characteristics. When we need to encrypt a large amount of data, it is recommended to use the ____ encryption algorithm to improve the encryption and decryption speed.[fill in the blank]*  symmetry  packets NO.43 What is correct about the following description of device management in the operating system?  The main task of port device management is to complete the I/O requests made by users and classify I/O devices for users.  Whenever a process makes an I/O request to the system, as long as it is secure, the device allocator will assign the device to the process according to a certain policy.  Device management can virtualize a physical device into multiple logical devices through virtualization technology, providing multiple user processes to use.  In order to alleviate the problem of speed mismatch between CPU and I/O devices and improve the parallelism of CPU and I/O devices, in modern operating systems, almost all I/O devices are exchanging numbers with processors Buffers are used at all times.NO.44 An enterprise wants to build a server system and requires the following functions: 1. The enterprise needs to have its own dedicated mailbox, and the sending and receiving of emails needs to go through the enterprise’s server; 2. The server must provide file transfer and access services. Users in different departments of the enterprise provide accounts with different permissions: 3. When the enterprise accesses the internal webpage of the enterprise, the enterprise can directly enter the domain name in the browser to access. To meet the above requirements, which of the following servers do enterprises need to deploy? ( )*  Time synchronization server  FTP server (I)  DNS server  Mail server NO.45 Among the various aspects of the risk assessment of IS027001, which of the following does not belong to the system design and release process?  Hold a summary meeting of the project in the information security management stage  Determine risk disposal measures and implement rectification plans  Determine risk tolerance and risk appetite  System integration and information security management system document preparation NO.46 As shown in the figure, the administrator needs to test the network quality of the 20.0.0/24 CIDR block to the 40.0.0/24 CIDR block on Device B, and the device needs to send large packets for a long time to test the network connectivity and stability.  tracert -a 20.0.0.1 -f 500 -q 9600 40.0.0.2  ping -a 20.0.0.1 -c 500 -s 9600 40.0.0.2  ping -s 20.0.0.1 -h 500-f 9600 40.0.0.2  tracert -a 20.0.0.1 -c 500 -w 9600 40.0.0.2 NO.47 Regarding the characteristics of the routing table, which of the following items is described correctly  Port When a packet matches multiple entries in the routing table, it is forwarded based on the route entry with the largest metric.  Port In the global routing table, there is at most one next hop to the same destination CIDR block.  There may be multiple next hops in the global routing table to the same destination.  Port When a packet matches multiple entries in the routing table, it is forwarded according to the longest mask. NO.48 Both digital envelopes and digital signatures guarantee data security and verify the origin of data.  TRUE  FALSE NO.49 For which of the following parameters can the packet filtering firewall filter?  Port packet payload  IP address of the port source destination  The MAC address of the source destination  Port number and protocol number of the port source  Loading … Valid H12-711_V4.0 Dumps for Helping Passing Huawei Exam: https://www.test4engine.com/H12-711_V4.0_exam-latest-braindumps.html --------------------------------------------------- Images: https://blog.test4engine.com/wp-content/plugins/watu/loading.gif https://blog.test4engine.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2023-02-05 12:36:08 Post date GMT: 2023-02-05 12:36:08 Post modified date: 2023-02-05 12:36:08 Post modified date GMT: 2023-02-05 12:36:08