Huawei h12-711 practice test

HCIA Security V3.0 Exam

Last exam update: Jul 18 ,2024
Page 1 out of 33. Viewing questions 1-15 out of 503

Question 1

To configure a NAT policy in command line mode, you need to use the .command ( ) in the system
view to enter the NAT policy configuration view. (all lowercase) (fill in the blank)

Answer:

nat-policy

User Votes:

Discussions
vote your answer:
0 / 1000

Question 2

( ) means that the computer system has defects and deficiencies in the specific matters of hardware,
software, protocols or system security policies. (Chinese Standard Terminology) (fill in the blank)

Answer:

Vulnerability

User Votes:

Discussions
vote your answer:
0 / 1000

Question 3

Multiple different ( ) cannot be added to the same interface on the firewall at the same time (fill in
the blank)

Answer:

Safe area

User Votes:

Discussions
vote your answer:
0 / 1000

Question 4

In USG6000E, the initial priority of VGMP is ( ) (fill in the blank)

Answer:

45000

User Votes:

Discussions
vote your answer:
0 / 1000

Question 5

( ) is an "indirect intrusion attack. This attack mode is to virtually place a computer controlled by an
intruder between two communicating computers in a network connection through various technical
means. (fill in the blank)

Answer:

Man-in-the-
middle attack

Discussions
0 / 1000

Question 6

The backup methods of dual-system hot backup include automatic backup ( ), manual batch backup,
and automatic synchronization of the configuration of the active and standby FW after the device
restarts. (fill in the blank)

Answer:

Session fast
backup

Discussions
0 / 1000

Question 7

After an engineer completes the source NAT configuration, the internal network still cannot access
the external network. The engineer wants to query the detailed information of the address
translation by using the command to query the session table, so the engineer directly uses the ( )
command in the user view to query the address translation. information. (fill in the blank)

Answer:

display
firewall session table

Discussions
0 / 1000

Question 8

After the firewall detects an intrusion, the administrator can view the intrusion log information in the
firewall business log or ( ) log. (fill in the blank

Answer:

System

User Votes:

Discussions
vote your answer:
0 / 1000

Question 9

Configure authentication options If you use web push page authentication, you also need to
configure a corresponding security policy to allow the data flow with the default port number ( ) to
reach the firewall itself. (fill in the blank)

Answer:

80

User Votes:

Discussions
vote your answer:
0 / 1000

Question 10

In the VGMP group state, if the device's own VGMP group priority is equal to the peer device's VGMP
group priority, the device's VGMP group state is ( ). (answer in letters) (fill in the blank)

Answer:

load-balance

User Votes:

Discussions
vote your answer:
0 / 1000

Question 11

If the company network administrator needs to check the status of the heartbeat interface after
configuring the companys dual-system hot backup, the command he needs to type is ( ) The system
view has been entered by default) (fill in the blank)

Answer:

display hrp
interface

Discussions
0 / 1000

Question 12

The default policy on the firewall defaults to ( ) all traffic. (fill in the blank)

Answer:

Denied

User Votes:

Discussions
vote your answer:
0 / 1000

Question 13

The trigger modes of the Portali authentication built in the firewall include pre-authentication and ( )
authentication. (fill in the blank)

Answer:

Conversation

User Votes:

Discussions
vote your answer:
0 / 1000

Question 14

The goal of ( ) is to provide a rapid, composed and effective response in emergency situations.
Thereby enhancing the ability of a business to recover immediately from a disruptive event. (fill in
the blank)

Answer:

Business
Continuity Plan

Discussions
0 / 1000

Question 15

Compared with IPSec VPN, ( ) has the advantage of good compatibility and can encapsulate IPX,
multicast packets, etc., and is widely used. (fill in the blank)

Answer:

GRE VPN

User Votes:

Discussions
vote your answer:
0 / 1000
To page 2