Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Huawei H12-711_V4.0 Practice Exam with Questions & Answers

Questions 1

IPSec VPN uses an asymmetric algorithm to calculate the ___ key to encrypt data packets.[fill in the blank]

Options:
Huawei H12-711_V4.0 Premium Access
Questions 2

Which of the following is not an advantage of symmetric encryption algorithms?

Options:
A.

Suitable for encrypting large amounts of data

B.

Low overhead

C.

Good scalability

D.

High efficiency

Questions 3

Which layer of the protocol stack does SSL provide end-to-end encrypted transmission services?

Options:
A.

Application layer

B.

Data link layer

C.

Network layer

D.

Transport layer

Questions 4

We should choose the encryption algorithm according to our own use characteristics. When we need to encrypt a large amount of data, it is recommended to use the ____ encryption algorithm to improve the encryption and decryption speed.[fill in the blank]*

Options:
Questions 5

Which of the following is not an encryption algorithm in a VPN?

Options:
A.

The RIP

B.

AES

C.

3DES

D.

DES

Questions 6

A Web server is deployed in an enterprise intranet to provide Web access services to Internet users, and in order to protect the access security of the server, it should be divided into the _____ area of the firewall.

Options:
Questions 7

Which of the following zones is not the firewall default security zone?

Options:
A.

Trust

B.

The Local

C.

DMZ

D.

Management

Questions 8

Compared with the software architecture of C/S, B/S does not need to install a browser, and users are more flexible and convenient to use.

Options:
A.

TRUE

B.

FALSE

Questions 9

The trigger modes of the built-in Portal authentication in the firewall include pre-authentication and ____ authentication[fill in the blank]*

Options:
Questions 10

Which of the following characteristics does a denial-of-service attack include?

Options:
A.

Unauthorized tampering of the mouth

B.

Unauthorized access to the mouth

C.

Unauthorized activation of the mouth

D.

Unauthorized destruction of the mouth