This page was exported from Top Exam Collection [ http://blog.topexamcollection.com ] Export date:Mon Jan 20 23:18:24 2025 / +0000 GMT ___________________________________________________ Title: H12-711_V3.0 Dumps Special Discount for limited time Try FOR FREE [Q18-Q33] --------------------------------------------------- H12-711_V3.0 Dumps Special Discount for limited time Try FOR FREE H12-711_V3.0 Dumps for success in Actual Exam Sep-2022] Q18. The administrator wishes to clear the current session table. Which of the following commands is correct? ( )[Multiple choice]*  display session table  display firewall session table  reset firewall session table  clear firewall session table Q19. The main reason why NAPT can achieve one-to-many address translation is that ______ is also converted while addressing, so multiple private addresses can share the same public address.  Port Q20. Which of the following options are harmful to traffic-based attacks? (Multiple choices)  The network is down  Server down  Data is stolen  The webpage has been tampered with Q21. About the description of the Windows firewall, which of the following statements are correct? (Multiple Choice)  Windows firewalls can only allow or prohibit preset programs or features and programs installed on the system, and cannot customize the release rules in accordance with protocols or port numbers.  Windows firewall not only allows or prohibits preset programs or features and programs installed on the system, but also support to customize the release rules in accordance with protocols or port numbers.  If in the process of setting up the Windows firewall, the Internet cannot be accessed, you can quickly restore the firewall to the initial state using the restored default value function.  Windows firewall can change the notification rule in the closed state Q22. What item is not included in the design principle of questionnaire surveys?  Integrity  Openness  Specificity  Consistency Q23. HRP(Huawei Redundancy Protocol) protocol, which is used to synchronize data such as key configuration and connection status of the firewall to the standby firewall, which of the following options does not belong to the scope of synchronization?  security strategy  NATStrategy  blacklist  IPSSignature set Q24. Regarding the firewall security policy, the following items are correct?  By default, the security policy can control unicast packets and broadcast packets.  By default, the security policy can control multicast  By default, the security policy only controls unicast packets..  By default, the security policy can control unicast packets, broadcast packets, and multicast packets. Q25. In anti-virus software, ( ) technology can analyze compressed files, added flowers, and packaged files. (fill in the blank) ShellingQ26. If internal employees access the Internet through the firewall and find that they cannot connect to the Internet normally, what viewing commands can be used on the firewall to troubleshoot the interface, security zone, security policy and routing table? (Write any viewing command, requiring: the words on the command line must be complete and correct to score, and cannot be omitted or abbreviated)[fill in the blank]* display zone display current-configurationdisplay ip routing-tabledisplay security-policy rule alldisplay ip interface briefQ27. Regarding NAT technology, which of the following descriptions is correct?  The internal network server of the NAT network cannot be accessed by external network users.Therefore, if a server that needs to provide external services is deployed, be sure to assign an independent public network address to the server.  NAT reduces the difficulty of network monitoring  NAT technology can only achieve one-to-one address conversion, but cannot achieve address multiplexing  NAT can hide more intranet IP addresses Q28. Clients in the Trust zone of the firewall can log in to the FTP server in the Untrust zone, but cannot download files. Which of the following methods can solve the problem? (Multiple Choice)  Release 21 port number between Trust and Untrust  When the FTP working mode is port mode, modify the security policy action from Trust to Untrust zone to allow  Enable detect ftp  When FTP working mode is Passive mode, modify the security policy action from Trust to Untrust zone to allow Q29. Which of the following statement is wrong about the L2TP VPN of Client-Initialized?  After the remote user access the Internet, the L2TP tunnel connection request can be initiated directly from the remote LNS through the client software.  The LNS device receives the user’s L2TP connection request, and the user can be verified according to the username and password.  LNS assign private IP addresses for remote users.  The remote users do not need to install VPN client software Q30. existUSGIn the system firewall, you can use—-The function provides well-known application services for non-well-known ports.  Port Mapping  MACandIPaddress binding  packet filtering  Long connection Q31. Security technology has different methods in different technical levels and fields. Which of the following devices can be used for network layer security protection? (Multiple choice)  Vulnerability scanning equipment  Firewall  Anti-DDoS equipment  IPS/IDS equipment Q32. Which of the following options are at risk from traffic-based attacks? (multiple choice)  network down  Server down  data stolen  The web page has been tampered with Q33. Normally, the port used by the FTP active mode server for data transmission is the TCP ( ) port.  20  Loading … Accurate H12-711_V3.0 Answers 365 Days Free Updates: https://www.topexamcollection.com/H12-711_V3.0-vce-collection.html --------------------------------------------------- Images: https://blog.topexamcollection.com/wp-content/plugins/watu/loading.gif https://blog.topexamcollection.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2022-09-08 14:33:25 Post date GMT: 2022-09-08 14:33:25 Post modified date: 2022-09-08 14:33:25 Post modified date GMT: 2022-09-08 14:33:25