Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Huawei H12-711_V4.0 Practice Exam with Questions & Answers | Set: 2

Questions 11

_____ Authentication is to configure user information (including local user's user name, password and various attributes) on the network access server. The advantage is that it is fast.[fill in the blank]*

Options:
Huawei H12-711_V4.0 Premium Access
Questions 12

The following description of the intrusion fire protection system IPS, which is correct?

Options:
A.

The port IPS can be concatenated at the network boundary.

B.

The IPS cannot prevent intrusion from occurring in real time.

C.

The port IPS can be attached to the switch and port mirrored through the switch.

D.

Oral IPS has the ability to customize intrusion prevention rules.

Questions 13

What is correct about the following description of device management in the operating system?

Options:
A.

The main task of port device management is to complete the I/O requests made by users and classify I/O devices for users.

B.

Whenever a process makes an I/O request to the system, as long as it is secure, the device allocator will assign the device to the process according to a certain policy.

C.

Device management can virtualize a physical device into multiple logical devices through virtualization technology, providing multiple user processes to use.

D.

In order to alleviate the problem of speed mismatch between CPU and I/O devices and improve the parallelism of CPU and I/O devices, in modern operating systems, almost all I/O devices are exchanging numbers with processors

Buffers are used at all times.

Questions 14

Which of the following descriptions of server authentication is correct?

Options:
A.

The visitor sends the username and password that identifies his identity to FW through the portal authentication page, there is no password stored on F7, FT sends the username and password to a third-party authentication server, and the verification process is carried out on the authentication server.

B.

Visitors obtain the SMS verification code through the Portal authentication page, and then enter the SMS verification code to pass the authentication.

C.

The visitor sends the username and password that identifies his identity to the third-party authentication server, and after the authentication is passed, the third-party authentication server sends the visitor's identity information to FW.

D.

The visitor sends the username and password that identifies them to the FW through the portal authentication page, on which the password is stored and the verification process takes place on the FW.

Questions 15

The shard cache technology will wait for the arrival of the first shard packet, and then reassemble and decrypt all the packets, and then do subsequent processing by the device to ensure that the session can proceed normally in some application scenarios.

Options:
A.

TRUE

B.

FALSE

Questions 16

The keys used by the IPSec encryption and authentication algorithms can be configured manually or dynamically negotiated via the ____ protocol. (abbreviation, all uppercase).

Options:
Questions 17

An engineer needs to back up the firewall configuration. Now he wants to use a command to view all the current configurations of the firewall. May I ask the command he uses is ____[fill in the blank]*

Options:
Questions 18

In cases where some configurations alter existing session table entries and want them to take effect immediately, you can regenerate the session table by clearing the session table information. All session table information can be cleared by executing the _____firewall session table command.

Options:
Questions 19

Which of the following NAT technologies can implement a public network address to provide source address translation for multiple private network addresses ( )*

Options:
A.

NAPT

B.

NAT Server

C.

Easy-ip

CT Jinglu

D.

NAT No-PAT

Questions 20

What is correct in the following description of Security Alliance in IPSec?

There are two ways to set up an IPSec SA

Options:
A.

manual and IKE.

IPSec SA is uniquely identified by a triple.

B.

IPSec SA is a one-way logical connection, usually established in pairs (Inbound and Outbound).

C.

Security Alliance SA is a communication peer agreement for certain elements that describes how peers can communicate securely using secure services such as encryption.