Huawei H12-711_V3.0 Exam Practice Questions - PowerPoint PPT Presentation

About This Presentation
Title:

Huawei H12-711_V3.0 Exam Practice Questions

Description:

Huawei H12-711_V3.0 exam practice questions are valuable for you to pass the test easily. – PowerPoint PPT presentation

Number of Views:1
Slides: 13
Provided by: edgardocoltman
Tags: huawei

less

Transcript and Presenter's Notes

Title: Huawei H12-711_V3.0 Exam Practice Questions


1
H12-711_V3.0
  • Updated Questions

2
H12-711_V3.0 Updated Questions
  • 1.Regarding the difference between HITP and
    HTTPS, which of the following statements is
    incorrect? (Multiple choice)
  • A. The HTTP protocol is stateful, and each
    request is associated.
  • B. HITPS requires an SSL certificate, while HIIP
    does not.
  • C. HITPS standard port is 80, HTTP standard port
    is 445.
  • D. HITP is plaintext transmission, HITPS is
    encrypted transmission.

3
H12-711_V3.0 Updated Questions
  • 2.Which of the following descriptions about
    antivirus software is correct? (Multiple choice)
  • A. Antivirus software can scan and kill all
    viruses.
  • B. Most anti-virus software lags behind computer
    viruses, so it is necessary to update and upgrade
    the software version in time and regularly scan.
  • C. Viruses that can be detected by anti-virus
    software must also be removed.
  • D. After the virus is deleted, it is transferred
    to the quarantine area. The user can retrieve the
    deleted files from the quarantine area, but the
    files in the quarantine area cannot be run.

4
H12-711_V3.0 Updated Questions
  • 3.Which of the following descriptions about the
    operating system is correct? (Multiple choice)
  • A. The operating system is the interface between
    the user and the computer.
  • B. The operating system can improve the
    human-machine interface.
  • C. The operating system is responsible for
    managing all the hardware resources of the
    computer system and controlling the execution of
    the software.
  • D. The operating system itself is also software.

5
H12-711_V3.0 Updated Questions
  • 4.Which of the following service types can AAA
    authentication support? (Multiple choice)
  • A. Ftp
  • B. SSH
  • C. Telnet
  • D. Web

6
H12-711_V3.0 Updated Questions
  • 5.Which of the following characteristics does a
    DoS include? (Multiple choice)
  • A. Unauthorized Access
  • B. Unauthorized Tampering
  • C. Unauthorized Activation
  • D. Unauthorized Destruction

7
H12-711_V3.0 Updated Questions
  • 6.When the configuration of the active and
    standby FWs is automatically synchronized after
    the device restarts, which of the following
    configurations will be synchronized? (Multiple
    choice)
  • A. OSPF
  • B. Security Policy
  • C. NAT Policy
  • D. BGP

8
H12-711_V3.0 Updated Questions
  • 7.Which of the following characteristics does a
    Malware include? (Multiple choice)
  • A. Unauthorized Registration
  • B. Unauthorized Tampering
  • C. Unauthorized Destruction
  • D. Unauthorized Access

9
H12-711_V3.0 Updated Questions
  • 8.Which of the following descriptions about
    establishing SA manually in IPSec is correct?
    (Multiple choice)
  • A. High security.
  • B. Key management costs are high.
  • C. SA exists in perpetuity.
  • D. The SPI value needs to be manually configured

10
H12-711_V3.0 Updated Questions
  • 9.Which of the following descriptions about the
    IKE security mechanism in IPSec is correct?
    (Multiple choice)
  • A. The IKE protocol is divided into two versions,
    IKEv1 and IKEv2.
  • B. IKE has a set of self-protection mechanisms
    that can securely authenticate identities,
    distribute keys and establish IPSec SAs on the
    network.
  • C. The authentication algorithms supported by IKE
    include MD5, SHA1, and SM3.
  • D. The identity data is encrypted and transmitted
    after the key is generated, which realizes the
    protection of the identity data.

11
H12-711_V3.0 Updated Questions
  • 10.Which of the following descriptions about the
    PKI life cycle is correct? (Multiple choice)
  • A. After the PKI entity downloads the
    certificate, it needs to install the certificate,
    that is, import the certificate into the memory
    of the device, otherwise the certificate will not
    take effect.
  • B. If the user's service is terminated, the user
    needs to revoke his digital certificate.
  • C. The core technology of PKI revolves around the
    entire life cycle of local certificate
    application, issuance, storage, download,
    installation, verification, update and
    revocation.
  • D. When the certificate expires, the PKI entity
    does not need to replace the certificate, it is
    still valid.

12
H12-711_V3.0 Updated Answers
  • 1.Answer AC
  • 2.Answer BD
  • 3.Answer ABCD
  • 4.Answer ABCD
  • 5.Answer AD
  • 6.Answer BC
  • 7.Answer BCD
  • 8.Answer BCD
  • 9.Answer ABCD
  • 10.Answer AB
Write a Comment
User Comments (0)
About PowerShow.com