Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 48

Huawei Exam H12-711 HCNA-Security-CBSN (Huawei Certified Network Associate Constructing

Basic Security Network)

Total Questions: 363 Q&A's Web URL: http://www.becertify.com/h12-711-exam-training-


49223.htm

BeCertify H12-711 Saving Pack Instant Download Printable PDF Document Test Software
& Online Engine Included Download and study offline Written in plain English Highest
success rate! Verified answers for all questions 100% Pass and Money Back Guarantee

BeCertify guarantees your success at your first attempt with only understanding and
mastering well our studying material, if somehow you fail the exam at the first time, we will
arrange FULL REFUND for you.

Get Complete Collection of H12-711 Exam's Questions and Answers.


http://www.becertify.com/

Huawei H12-711 Exam QUESTION NO: 1 After using the vpn client user Wang l2tp vpn
dial from outside the network normally get the address and found able to access all the
resources within the network, but it cannot open the page on the internet, possible reasons
for the? A. vpn device software version is incorrect B. vpn client software version is
incorrect C. Misconfigured firewall l2tp D. After the dial-in l2tp vpn, default route points to
the local computer dial-up access to the address Answer: D

QUESTION NO: 2 In tunnel mode, AH security protocol, which of the following new IP
packet header fields without data integrity check? A. TTL B. Source IP address C.
Destination IP address D. The source IP address and destination IP address Answer: A

QUESTION NO: 3 SSL VPN file sharing applications in use need to enter a user name,
password, and domain information, in order not to enter a user name and password, you can
set the permissions on the file sharing server. A. True B. False Answer: A

"Pass Any Exam. Any Time." - 100% Guarantee

Huawei H12-711 Exam

QUESTION NO: 4 Which of the following is an IETF industry standard VPN protocols? A.
PPTP B. L2F C. L2TP D. PP2F Answer: C

QUESTION NO: 5 Difference IPSEC security protocol that AH AH and ESP can achieve
data encryption, data validation to support a wider range of ESP? A. True B. False Answer:
B

QUESTION NO: 6 ASPF makes firewall to support multiple data channels of a control on
the channel protocol, but also to facilitate the formulation of policies in various security
applications are very complex situation. A. True B. False Answer: A

"Pass Any Exam. Any Time." - 100% Guarantee

Huawei H12-711 Exam QUESTION NO: 7 SVN3000 network expansion in the


application, the client obtains an IP address in two ways: the virtual gateway address pool
and DHCP server within the network. A. True B. False Answer: A

QUESTION NO: 8 Network Address Port Translation (NAPT) and Network Address
Translation (NAT) what is the difference? (Choose two) A. After NAPT conversion for
users outside the network,all packets from the same IP address or IP address of a few B.
NAT only supports application layer protocol address translation C. NAPT only supports
network layer protocol address translation D. NAT support network layer protocol address
translation Answer: A,D

QUESTION NO: 9 In the GRE configuration environment, under the Tunnel interface
mode, destination address generally refers to? A. The end of the Tunnel interface IP address
B. The end of the IP address outside the network outlet C. Peer IP address outside the
network entry D. Remote Tunnel Interface IP address Answer: C

"Pass Any Exam. Any Time." - 100% Guarantee

Huawei H12-711 Exam QUESTION NO: 10 Which of the following are IPSec security
protocol? (Choose two) A. AH B. ESP C. 3DES D. AES Answer: A,B

QUESTION NO: 11 SVN3000 file sharing interactive process, the correct order is: 1, file
server accepts the request packet, the format of the response SMB packet to SVN; 2, the
client user initiates a request inwards network file server HTTPS format, sent to SVN; 3,
SVN SMB response packet will be converted to HTTPS format and forwarded to the client;
4, SVN HTTPS requests will be converted to the format of packets SMB packet format and
forwarded to the file server. A. 1-2-3-4 B. 2-4-1-3 C. 3-1-4-2 D. 3-1-2-4 Answer: B

QUESTION NO: 12 Access control lists which mainly consists of the following scenarios?
(Choose three)

A. Network Address Translation (NAT) B. QOS C. Policy Routing D. GRE "Pass Any
Exam. Any Time." - 100% Guarantee

Huawei H12-711 Exam Answer: A,B,C

QUESTION NO: 13 Which of the following protocols are GRE VPN technology in the
world's most used Internet transport protocol? A. GRE B. IPX C. IP D. TCP Answer: C

QUESTION NO: 14 Use one or many- way NAT translation (non- PAT), when all are
using the external IP address (using NAT technology to access the Internet application
scenarios), the subsequent network users Internet For what will happen? A. Squeezing out
the previous user,forcing the NAT Internet B. Subsequent users will not access the network
C. NAT PAT automatically switch to the Internet D. The packets are synchronized to other
devices for NAT NAT translation Answer: B

QUESTION NO: 15 Which of the following is a multi -channel protocol? A. FTP B. Telnet
C. HTTP D. SMTP "Pass Any Exam. Any Time." - 100% Guarantee

Huawei H12-711 Exam Answer: A

QUESTION NO: 16 About stateful inspection firewall and packet filtering firewall
description is correct. A. Packet filtering firewall is not required for each packet entering
the firewall rule matching; B. Because the UDP protocol is connectionless -oriented
protocol,so stateful inspection firewall UDP packetscannotmatch state table; C. When
stateful inspection firewall to inspect packets,packets of the same before and after the
connection is not relevant. D. Stateful inspection firewall only needs to connect to the first
packet to match the access rule,which is connected directly to the subsequent packets
matching(to TCP applications,for example) in the state table Answer: D

QUESTION NO: 17 Firewalls can protect the internal network security in the Internet, but
cannot protect the host security in an internal network. A. True B. False Answer: B

QUESTION NO: 18 Applied on the interface of the firewall packet filtering, cited acl2000,
the source IP address of the IP address 192.168.0.55 to reach the interface, the following
statements is correct? (Choose two) acl 2000 match-order auto rule permit source
192.168.0.1 0.0.0.255 "Pass Any Exam. Any Time." - 100% Guarantee

Huawei H12-711 Exam rule deny source 192.168.0.32 0.0.0.31 A. The IP packet matching
allows policy to be forwarded by the firewall B. The IP packet matching refused strategy
will be discarded by the firewall C. configured to match the order of priority of use acl2000
D. acl2000 using a depth-first match order Answer: B,D

QUESTION NO: 19 SVN file sharing technology is to convert the file sharing protocol to
SSL-based Hypertext Transfer Protocol (Https), for end-users feel is a Web-based file
server application. A. True B. False Answer: A

QUESTION NO: 20 LNS through what information (protocol field) to determine the packet
as L2TP packet and sent L2TP protocol processing module for processing? A. LAC client
source IP address B. The LNS destination IP address C. Source UDP port 1701 D. UDP
port 1701 Answer: D

QUESTION NO: 21 When TSM system supports strong linkage anti-virus software, anti-
virus software will be able to drive anti-virus and other operations. "Pass Any Exam. Any
Time." - 100% Guarantee

Huawei H12-711 Exam A. True B. False Answer: A

QUESTION NO: 22 In these types of scenarios, mobile users need to install additional
features (L2TP) for VPDN software? A. Based on user-initiated L2TP VPN B. Based NAS
-initiated L2TP VPN C. Initiated based on LNS L2TP VPN D. All other options are
Answer: B

QUESTION NO: 23 The following are the main features stateful inspection firewall is
which? A. Processing speed B. Excellent follow-up packet processing performance C. Only
detect the network layer D. Packet filtering detection for each package Answer: B

QUESTION NO: 24 When configuring l2tp, for commands allow l2tp virtual-template,
statements is correct? A. LNS is used to specify the trigger condition to initiate a call B.
LAC is used to specify the trigger condition to initiate a call C. LAC is used to specify the
call to accept Virtual-Template used "Pass Any Exam. Any Time." - 100% Guarantee

Huawei H12-711 Exam D. LNS to accept the call to specify the use of Virtual-Template
Answer: D

QUESTION NO: 25 AH which can provide the following security features? (Choose three)
A. Data origin authentication B. Data Confidentiality C. Data integrity check D. Anti-replay
Answer: A,C,D

QUESTION NO: 26 Which of the following agreement is a multi- channel protocol? A.


WWW B. FTP C. PING D. TELNET Answer: B

QUESTION NO: 27 PPPoE is mainly used for which scene? A. Provide remote access
users access to Ethernet B. Provide access to remote Ethernet services for dial-up users C.
Enables users to access the Internet data packets are encrypted D. To the user can access the
Internet faster

"Pass Any Exam. Any Time." - 100% Guarantee

10

Huawei H12-711 Exam Answer: A


QUESTION NO: 28 Following on E1 and CE1, saying right there? (Choose three) A. Can
operate in clear channel mode B. E1 work in the non -channel mode are unframed mode C.
E1 work in framing mode,only once timeslot bundling D. CE1 work in unframed mode, you
can bundle multiple slots Answer: A,C,D

QUESTION NO: 29 Packet filtering firewall at the application layer for each packet
inspection, forwarding or discarding packets according to the configured security policy: A.
True B. False Answer: B

QUESTION NO: 30 Interzone packet filtering matching principle is: first find inter-domain
Policy, if there is no matching policy, the domain will not find among other strategies, but
directly to discard the packet, refused to pass. A. True B. False Answer: B

"Pass Any Exam. Any Time." - 100% Guarantee

11

Huawei H12-711 Exam

QUESTION NO: 31 Meaning Trunk Access Port PVID value and significance of the port
PVID bit different, in Access represents the value of the default VLAN, but said the port
belongs to the VLAN Trunk actually. A. True B. False Answer: B

QUESTION NO: 32 Compare similar symmetric encryption algorithms and asymmetric


encryption algorithm key distribution method, encryption and decryption are performed by
the information sent to the receiver key, the method can be used to send E-mail and other
means. A. True B. False Answer: B

QUESTION NO: 33 Packet filtering firewall does not check the session state data content
analysis, safety cannot be adequately protected. A. True B. False Answer: A

QUESTION NO: 34 Asymmetric encryption algorithm strength stronger than symmetric


algorithms, asymmetric "Pass Any Exam. Any Time." - 100% Guarantee

12

Huawei H12-711 Exam algorithms because the longer the key length. A. True B. False
Answer: B

QUESTION NO: 35 SVN3000 virtual gateway, which can be accessed using the IP
address, and can be accessed using the domain name which of the following types? A.
Exclusive type B. Share -based C. Fixed D. Manual type Answer: A

QUESTION NO: 36 Stateful inspection firewall intercepts packets at the network layer and
application layer extracted from each state information security policies need, and save the
session table, through the analysis of these sessions tables and data packets associated with
the connection request to make a follow-up appropriate decision. A. True B. False Answer:
A

QUESTION NO: 37 Which of the following ways L2TP VPN, the tunnel is established
between the client and the LNS Client -side? "Pass Any Exam. Any Time." - 100%
Guarantee

13

Huawei H12-711 Exam A. Client-Initialized L2TP way B. NAS-Initialized L2TP way C.


Unsolicited L2TP D. VPDN Answer: A

QUESTION NO: 38 VPN for mobile users have access? (Choose two) A. GRE B. L2TP C.
MPLS D. L2TP + IPSec Answer: B,D

QUESTION NO: 39 USG (Eudemon) firewall nat configuration is as follows: # nat


address-group 1 10.1.1.5 10.1.1.10 nat server 1 protocol tcp global 1.1.1.1 ftp inside
10.1.1.2 ftp # nat-policy interzone dmz untrust inbound policy 0 action source-nat policy
destination 1.1.1.1 0 address-group 1 #

"Pass Any Exam. Any Time." - 100% Guarantee

14

Huawei H12-711 Exam The following statement is correct that: A. NAT outbound
configuration,network users to access the external network into an address in the address
pool 10.1.1.5 10.1.1.10 B. untrust host access nat server 1.1.1.1, destination address into
10.1.1.2, the original address unchanged C. Built- domain nat,DMZ host access nat server
1.1.1.1, destination address into 10.1.1.2, the source address into the address pool 1 D. NAT
inbound configuration,untrust host access nat server 1.1.1.1, destination address into
10.1.1.2, the source address into the address pool 1 Answer: D

QUESTION NO: 40 Common symmetric encryption algorithms are there? (Choose three)
A. DES B. 3DES C. AES D. MD5 Answer: A,B,C

QUESTION NO: 41 Address range rule permit ip source 192.168.11.32 0.0.0.31 represents
the? A. 192.168.11.0-192.168.11.255 B. 192.168.11.32-192.168.11.63 C. 192.168.11.31-
192.168.11.64 D. 192.168.11.32-192.168.11.64 Answer: B

"Pass Any Exam. Any Time." - 100% Guarantee

15

Huawei H12-711 Exam QUESTION NO: 42 The following statement about the NAT
address translation Which is correct: (Choose three) A. NAT technology can effectively
hide the hosts on the LAN,is an effective network security technology. B. NAT can follow
the user’s needs, providing FTP, WWW, Telnet and other services outside the LAN. C.
Some application layer protocols carry IP address information in the data,but also to modify
the data in the upper IP address information when they make NAT. D. For some non- TCP,
UDP protocol(such as ICMP, PPTP), NATcannotdo the conversion. Answer: A,B,C

QUESTION NO: 43 When you configure ipsec, ike local-name for the command statement
is correct? (Choose two) A. When using aggressive mode,when the name of the
authentication,you need to configure the local name B. Use main mode when you need to
configure the local name C. The local name must be on the side of the remote-name
consistent configuration D. Local name must configure remote-name local consistency
Answer: A,C

QUESTION NO: 44 SVN3000 following ways in which you can access the user control?
(Choose three) A. IP B. MAC C. PORT D. URL Answer: A,C,D

"Pass Any Exam. Any Time." - 100% Guarantee

16

Huawei H12-711 Exam

QUESTION NO: 45 When the device at both ends of the tunnel is using IPSec non-
template approach, ACL need to completely mirror configuration? A. True B. False
Answer: A

QUESTION NO: 46 The following description of the error on the standard ACL is: A.
Standard access control list,also known as basic access control lists. B. Standard access
control list including rule number,perform an action and the source IP address. C.
Application of standard access control lists typically need only the source address of the
packet defined scenes. D. Standard access control list can be controlled protocol type
Answer: D

QUESTION NO: 47 The following protocol, the data link layer to work with? (Choose
three) A. IP B. PPP C. HDLC D. FR Answer: B,C,D

"Pass Any Exam. Any Time." - 100% Guarantee

17

Huawei H12-711 Exam

QUESTION NO: 48 Which of the following hardware components SACG primarily for
data exchange? A. SM management server B. SC control server C. Agent D. The database
server Answer: B

QUESTION NO: 49 Which of the following types of Ethernet switch ports, after the data
flow out of the port may also carry VLAN identification? (Choose two) A. Access Port B.
Trunk port C. Hybrid port D. Switch port Answer: B,C
QUESTION NO: 50 SVN3000 network expansion capabilities, the need to implement a
remote user can only access the corporate network, you cannot access the local LAN and
Internet, the client needs to use routing as follows: A. Full- channel mode (Full Tunnel) B.
Separation channel mode (Split Tunnel) C. Routing (route Tunnel) D. Manually (Manual
Tunnel) Answer: A

"Pass Any Exam. Any Time." - 100% Guarantee

18

Huawei H12-711 Exam

QUESTION NO: 51 Source socket means: source IP address + port + source and
destination IP address A. True B. False Answer: B

QUESTION NO: 52 For inter-domain packet filtering, the following statements is correct?
(Choose three) A. policy 1 disable command to disable policy 1 B. By default,Policy to
create higher the priority,the more the first match C. By policy move command to adjust the
position of the policy,policy id will change accordingly D. Once matched to a Policy, in
accordance with the Policy on the definition of processing packets no longer continue to
match directly down Answer: A,B,D

QUESTION NO: 53 When a router receives a packet, if no match is found, the specific
route entry, the default routing table can be forwarded. A. True B. False Answer: A

"Pass Any Exam. Any Time." - 100% Guarantee

19

Huawei H12-711 Exam QUESTION NO: 54 Source address, destination address, protocol
type, IP bearer senior ACL2000 ~ 2999 can use the packet (such as TCP source port,
destination port, ICMP protocol type, message code, etc.) defined rules. A. True B. False
Answer: B

QUESTION NO: 55 In the inter- domain packet filtering firewall, the following is not a
direction (Outbound)? A. Data from the DMZ zone to the Untrust zone flow B. Data from
the Trust zone to the DMZ zone flow C. Data from the Trust zone to the Untrust zone flow
D. Data from the Trust zone to the Local area streams Answer: D

QUESTION NO: 56 View l2tp command -line user information? A. display l2tp session B.
display l2tp tunnel C. display access-user D. display right-manager online-users Answer: C

QUESTION NO: 57

"Pass Any Exam. Any Time." - 100% Guarantee

20
Huawei H12-711 Exam Here on Client-Initialized the L2TP VPN, right there saying?
(Choose three) A. L2TP tunnel connection request initiated remote users via PSTN / ISDN
access to NAS, to get permission to access the Internet directly to the remote LNS. B. L2TP
LNS device receives user connection requests,based on the user name and password to
authenticate the user C. LNS assigns a private IP address for the remote user. D. VPN
remote dial-up users do not need to install software Answer: A,B,C

QUESTION NO: 58 Which of the following products can be achieved on NAT audit log
management? A. TSM B. DSM C. eLog D. VSM Answer: C

QUESTION NO: 59 Note that when the Clear to clear ISAKMP SA SA Stage 1, and then
remove IPSEC SA Phase 2. A. True B. False Answer: B

QUESTION NO: 60 Which of the following components are optional TSM system?

"Pass Any Exam. Any Time." - 100% Guarantee

21

Huawei H12-711 Exam A. TMC (TSM Management Center) B. SM Security Manager C.


SC safety controller D. SA Security Agent Answer: A

QUESTION NO: 61 Under the same conditions for an encryption algorithm, key lengths
longer need to crack the higher the cost. A. True B. False Answer: A

QUESTION NO: 62 IPSec if want to do a new IP packet header validation, you need to use
what IPSec security protocol? A. AH B. ESP C. MD5 D. SHA1 Answer: A

QUESTION NO: 63 Digital certificates do not include which of the following section? A.
Name of the certificate holder B. The certificate is valid "Pass Any Exam. Any Time." -
100% Guarantee

22

Huawei H12-711 Exam C. Public key certificate D. Certificate private key Answer: D

QUESTION NO: 64 Network extensions that do not support the following access modes:
A. Separation mode (Split Tunnel) B. Full routing mode (Full Tunnel) C. Fixed Mode
(Fixed Tunnel) D. Manual mode (Manual Tunnel) Answer: C

QUESTION NO: 65 Which of the following three types of VPN more assurance in terms of
security? A. GRE B. PPTP C. IPSec D. L2F Answer: C

QUESTION NO: 66 IP-link which is mainly used in the following scenarios? (Choose two)
A. Link Aggregation B. Static Routing C. Hot Standby D. Long connection "Pass Any
Exam. Any Time." - 100% Guarantee
23

Huawei H12-711 Exam Answer: B,C

QUESTION NO: 67 About ASPF the following statements is correct? (Choose two) A.
ASPF checking application layer protocol application layer protocol information and
monitor the connection status B. ASPF by dynamically generating ACL to determine
whether the packet through the firewall C. Servermap table is a temporary table entry D.
Servermap table with the five-tuple to represent a conversation Answer: A,C

QUESTION NO: 68 No matter under what circumstances? 2 packets between interfaces


must flow through the firewall interzone packet filtering? A. True B. False Answer: B

QUESTION NO: 69 For E1/CE1 configuration (1, 2 configure virtual serial port IP address,
configure virtual serial link layer protocol 3, 4 E1 configuration mode, configure timeslot
bundling), correct configuration sequence is: A. 1-2-3-4 B. 2-1-3-4 C. 3-4-2-1 D. 4-3-2-1

"Pass Any Exam. Any Time." - 100% Guarantee

24

Huawei H12-711 Exam Answer: C

QUESTION NO: 70 In network security, interruption means an attacker to compromise a


network system resources, making it become invalid or useless. This is () attack? A.
Availability B. Confidentiality C. Integrity D. Truth Answer: A

QUESTION NO: 71 Which of the following types of VPN adapt to mission personnel? A.
Access VPN B. Intranet VPN C. Internet VPN D. Extranet VPN Answer: A

QUESTION NO: 72 About NAT argument error are: (Choose two) A. NAT Outbound
refers to the source IP address conversion,NAT Inbound refers to the destination IP address
conversion B. NAT Inbound NAT Server commands and command consistent feature
configuration can be selected according to personal preference C. Outbound direction NAT
supports the following applications: one -many,many-toD. NAT technology to support
multi-channel protocols, such as FTP and other standard multi"Pass Any Exam. Any Time."
- 100% Guarantee

25

Huawei H12-711 Exam channel protocol Answer: A,B

QUESTION NO: 73 In the system view, execute the command reset saved-configuration,
the configuration file will be erased. A. True B. False Answer: B

QUESTION NO: 74 In IPSEC VPN, the tunnel mode is mainly used in which of the
following scenarios? A. Between the host and the host B. Between the host and the security
gateway C. Between security gateways D. Between tunnel mode and transport mode
Answer: C

QUESTION NO: 75 ACL 2009 belonging to () A. Standard access control list B. Extended
access control lists C. MAC address -based access control lists D. Time -based access
control lists Answer: A "Pass Any Exam. Any Time." - 100% Guarantee

26

Huawei H12-711 Exam

QUESTION NO: 76 TSM system which consists of the following regions? (Choose three)
A. Pre-authentication domain B. After authentication domain C. Isolated domain D. TSM
domain Answer: A,B,C

QUESTION NO: 77 Between the Client and the LAC protocol by which to communicate?
(Choose two) A. PPP B. PPPOE C. IP D. UDP Answer: A,B

QUESTION NO: 78 In some scenarios, it is necessary to convert the source IP address,


destination IP address but also for the conversion, is called bidirectional NAT. A. True B.
False Answer: A

"Pass Any Exam. Any Time." - 100% Guarantee

27

Huawei H12-711 Exam QUESTION NO: 79 Which of the following devices will not be
affected "Monitoring USB storage device " policy control? A. USB mouse B. U disk C.
USB drive D. USB hard drives Answer: A

QUESTION NO: 80 Execution acl 3000 match-order auto configured, the data flow will
match what way the ACL? A. Matching automatically sorted according tothe "depth-first"
principle to match. B. Match the order configured.That is according to the order the user to
configure the ACL match. C. Press the automatic sorting match,then match the order
configured. D. The firewall is not configured Answer: A

QUESTION NO: 81 GRE Tunnel ends of the device if configured to identify keyword,
keyword identification must be consistent in order to pass validation. A. True B. False
Answer: A

QUESTION NO: 82

"Pass Any Exam. Any Time." - 100% Guarantee

28
Huawei H12-711 Exam In the firewall, detect ftp command configuration in which mode?
A. System Mode B. Interface Mode C. Domain mode D. Inter-domain model Answer: D

QUESTION NO: 83 Tunnel interface (Tunnel Interface) is a virtual interface to achieve


multipoint type of packet encapsulation provided. A. True B. False Answer: B

QUESTION NO: 84 SVN3000 product extensions supported by the network access


methods, including what? (Choose three) A. Full- channel mode (Full Tunnel) B.
Separation channel mode (Split Tunnel) C. Routing (route Tunnel) D. Manually (Manual
Tunnel) Answer: A,B,D

QUESTION NO: 85 About L2TP message, saying the error is:

"Pass Any Exam. Any Time." - 100% Guarantee

29

Huawei H12-711 Exam A. L2TP supports two types of messages : control messages and
data messages B. Control messages for tunnel and session connection establishment,
maintenance,and transmission control. C. Data messages are used to encapsulate PPP
frames and transmitted over the tunnel. D. Control messages and data messages are
transmitted reliably provide flow control and congestion control. Answer: D

QUESTION NO: 86 When a data frame into the switch port VLAN Access will check
whether the data frame with VLAN tag tag tag tag if carry, then discarded; If no tag tag, be
marked PVID of the port. A. True B. False Answer: A

QUESTION NO: 87 About GRE checksum verification techniques, when the end of the
configuration checksum while the client does not check and when configured correctly
described below have () (Choose two) A. The end of paper checks and verification of a
received message B. Peer checks the received packet checksum C. The end of the checksum
is calculated and sent packets D. For end-to- send packets to calculate the checksum
Answer: B,C

QUESTION NO: 88 Private business network address cannot be on the road in the internet,
if the user needs to access the private network address internet, need to go through the
NAT.

"Pass Any Exam. Any Time." - 100% Guarantee

30

Huawei H12-711 Exam A. True B. False Answer: A

QUESTION NO: 89 Security Alliance (SA) is composed of tuples which uniquely identify?
(Choose three) A. SPI B. Source IP address C. Destination IP address D. Security Protocol
No. Answer: A,C,D
QUESTION NO: 90 Matching advanced ACL, you can dimension source IP address,
destination IP address, source MAC address, destination MAC address, protocol traffic to
match. A. True B. False Answer: B

QUESTION NO: 91 Following on TSM deployments statement is correct? (Choose three)


A. Centralized deployment of SM and SCcannotbe installed on the same server B. SC
centralized deployment can be madeinto a cluster approach to achieve system redundancy
C. The size of the terminal is quite large, consider using a distributed network,to avoid a
large number of terminal access TSM server,take up a lot of network bandwidth D. When
distributed deployment,TSM security agents to select the nearest control server,access "Pass
Any Exam. Any Time." - 100% Guarantee

31

Huawei H12-711 Exam authentication and access control,and other business. Answer:
B,C,D

QUESTION NO: 92 LAC is a device with PPP and L2TP protocol processing capabilities.
A. True B. False Answer: A

QUESTION NO: 93 Which of the following IKE exchange mode IP address can be used to
identify or by Name manner peer? A. Master Mode B. Aggressive Mode C. Fast mode D.
Passive mode Answer: B

QUESTION NO: 94 When configuring l2tp, the command start l2tp {ip ip-address,
statement is correct? (Choose three) A. LNS is used to specify the trigger condition to
initiate a call B. LAC is used to specify the trigger condition to initiate a call C. You can
specify the domain name as a trigger condition D. You can specify the full name as a trigger
condition Answer: B,C,D "Pass Any Exam. Any Time." - 100% Guarantee

32

Huawei H12-711 Exam

QUESTION NO: 95 Firewall access control lists default settings steps A. 1 B. 3 C. 5 D. 10


Answer: C

QUESTION NO: 96 Which of the following techniques can be implemented to refuse


illegal host or illegal data packets? (Choose three) A. MAC and IP address binding B. ACL
C. Blacklist D. Static Routing Answer: A,B,C

QUESTION NO: 97 For VPN Client users, you can use the following way to the LAC
device which initiated the request? (Choose two) A. PPP B. PPPOE C. IP D. TCP Answer:
A,B "Pass Any Exam. Any Time." - 100% Guarantee

33
Huawei H12-711 Exam

QUESTION NO: 98 GRE is a technology by which of the following protected data stream
that is selected packets are encapsulated into GRE packets? A. ACL B. Static Routing C.
Routing Policy D. User Account Answer: B

QUESTION NO: 99 IKE main mode and aggressive mode are the main differences?
(Choose two) A. Exchange messages using the three main mode packet mode uses six
brutal message B. Finally, there are two main mode message encryption, identity protection
C. Finally, there are two messages savage mode encryption, identity protection D. Master
mode only way to identify the IP address of the peer,and barbarous mode can be used to
identify the IP address or name of the peer manner. Answer: B,D

QUESTION NO: 100 In tunnel mode IPSec applications in which data packets following
areas protected by encryption? (Choose two) A. The entire data packet B. Original IP
header C. The new IP header D. Transport layer and upper layer packets

"Pass Any Exam. Any Time." - 100% Guarantee

34

Huawei H12-711 Exam Answer: B,D

QUESTION NO: 101 The following types of interfaces can handle PPP protocol packets?
A. interface Virtual-Template 1 B. interface Ethernet 0/0(within the network) C. interface
Ethernet 0/0(external network) D. interface loopback 1 Answer: A

QUESTION NO: 102 For stateful inspection firewall, if not the first TCP packet package
will not be interzone packet filtering checks. A. True B. False Answer: A

QUESTION NO: 103 Single TSM server system supports a maximum concurrent users. A.
5000 B. 10000 C. 20000 D. 40000 Answer: C

"Pass Any Exam. Any Time." - 100% Guarantee

35

Huawei H12-711 Exam

QUESTION NO: 104 Which of the following IKE exchange mode can only use IP
addresses to identify peer manner? A. Master Mode B. Aggressive Mode C. Fast mode D.
Passive mode Answer: A

QUESTION NO: 105 The following agreements, in the application layer have? (Choose
two) A. ARP B. IGMP C. TELNET D. TFTP Answer: C,D
QUESTION NO: 106 After the LAC configure the Ethernet interface to bind the virtual
template interface, Ethernet interface may configure the IP address. A. True B. False
Answer: A

"Pass Any Exam. Any Time." - 100% Guarantee

36

Huawei H12-711 Exam QUESTION NO: 107 For the firewall that comes trust and untrust
security zone statement right there? (Choose two) A. Untrust zone access area from the trust
direction outboud direction B. Untrust zone access area from the trust direction inboud
direction C. Follow the direction of inter-domain access does not matter which area initiated
only associated with priority D. When entering the inter-domain view,the trust must be
placed in front of the area Answer: A,C

QUESTION NO: 108 Following the agreement, the work at the network layer have?
(Choose two) A. ICMP B. IGMP C. FTP D. TELNET Answer: A,B

QUESTION NO: 109 Packet forwarding based routing table information, which of the
following information will then be routed to match forwards? A. Mask length of the longest
route entry B. Cost routing C. Route priority D. Routing Protocol Answer: A

"Pass Any Exam. Any Time." - 100% Guarantee

37

Huawei H12-711 Exam QUESTION NO: 110 After a successful L2TP user authentication,
IP address obtained is wrong to say : A. User address allocation has been assigned an IP
address bound and dynamically assigned IP addresses from the address pool in two ways B.
L2TP user-assigned IP address can be any address C. L2TP user-assigned IP address and
the address of the network to be accessed in the same network segment D. Address
assignment plan well in advance to avoid address conflicts exist Answer: B

QUESTION NO: 111 Which of the following statements is correct? A. Ability to


International Organization for Standardization definition of " security" is a way to identify
and mitigate insecurity B. Security is to find a balance between confidentiality and integrity
C. A high level of security technologies and policies can make the device or network
without any risk D. Information security is a subset of network security is a comprehensive
and continuous technology Answer: A

QUESTION NO: 112 About L2TP VPN configuration statement is correct: (Choose three)
A. The LNS L2TP client must configure the IP address of the virtual interface template,and
the virtual interface template need to join the security domain B. Firewall policies in order
to ensure the normal dial-up users log on,you must configure the firewall to receive L2TP
tunnel packets security zone where the physical interface between the regions and the Local
C. Dial-up users need access to internal network resources, you must configure the firewall
policy template region corresponding virtual interface and internal security network located
between areas where security "Pass Any Exam. Any Time." - 100% Guarantee

38

Huawei H12-711 Exam D. If a virtual template interface is added to a safe area,you can
directly delete the security zone. Answer: A,B,C

QUESTION NO: 113 Users log in via TELNET device, because many times forgotten
password login authentication fails, resulting in the account is frozen for several minutes,
what is the role of technology? A. ACL B. Attack prevention C. Blacklist D. Account
frozen Answer: C

QUESTION NO: 114 GRE’s features include: (Choose three) A. Simple mechanism B.
CPU load on both ends of the small tunnel C. Encrypt data D. Does not provide traffic
control and QoS. Answer: A,B,D

QUESTION NO: 115 When configuring L2TP group, which of the following commands
can be described l2tp-group 1 is the default L2TP group? A. allow l2tp virtual-template 1
remote Client01 B. allow l2tp virtual-template 1 remote default C. allow l2tp virtual-
template 1 "Pass Any Exam. Any Time." - 100% Guarantee

39

Huawei H12-711 Exam D. allow l2tp virtual-template 1 default Answer: C

QUESTION NO: 116 TSM system support and Duba Online version 5.0, KV2010 Jiangmin
and Rising Online antivirus software, such as the strong linkage. A. True B. False Answer:
B

QUESTION NO: 117 The following area is not correct about TSM is? A. Pre-
authentication domain is the area by the client before authentication can be accessed B.
After authentication domain is the area the client can access through the security
certification C. Isolated domain refers to the area by the client access authentication must D.
Isolated domain is required for access to the area when the client security authentication
failure Answer: C

QUESTION NO: 118 TSM supports access control which of the following? (Choose three)
A. Hardware SACG(Hardware Security Access Control Gateway) B. 802.1X C. Software
SACG(host firewall) D. ARP control Answer: A,B,C "Pass Any Exam. Any Time." - 100%
Guarantee

40

Huawei H12-711 Exam

QUESTION NO: 119 eLog log management system products using the B / S architecture
supports centralized, distributed deployment, diverse log acquisition mode, provides the
industry's most extensive device support. A. True B. False Answer: A

QUESTION NO: 120 Proxy Firewall role in the transport layer of the network, its essence
is the business directly between the internal network and external network users by the
proxy firewall takes over. A. True B. False Answer: B

QUESTION NO: 121 The following information about the different types of firewalls
correct to say there? (Choose three) A. Packet filtering firewall for each packet through the
firewall,should be carried out to check ACL match B. Stateful inspection firewall does not
hit only the first session packets matching ACL checks C. Stateful inspection firewall needs
to be configured packet " go " and "back" in both directions ACL D. Proxy Firewall is the
essence of the business directly between the internal network and external network users to
take over Answer: A,B,D "Pass Any Exam. Any Time." - 100% Guarantee

41

Huawei H12-711 Exam

QUESTION NO: 122 Priority DMZ area is how much? A. 5 B. 50 C. 85 D. 100 Answer: B

QUESTION NO: 123 The following are symmetric encryption algorithm is: (Choose two)
A. DES B. 3DES C. SHA-1 D. MD5 Answer: A,B

QUESTION NO: 124 SVN can be achieved only allows users to access remote enterprise
network cannot access the Internet and local area networks. A. True B. False Answer: A

"Pass Any Exam. Any Time." - 100% Guarantee

42

Huawei H12-711 Exam QUESTION NO: 125 Encryption technology which of the
following elements? (Choose three) A. Tunneling algorithm B. Key C. Ciphertext D.
Encryption Algorithm Answer: B,C,D

QUESTION NO: 126 About the VLAN tag processing, the following description of the
error is? A. When Trunk port receives a frame,if the frame does not contain 802.1Q tag
header, will be marked with PVID port; If the frame contains the 802.1Q tag header, no
change. B. When Trunk port to send the frame,when the port’s PVID VLAN ID of the
frame is not the same,discarded; When PVID VLAN ID and port with the same time
frame,the pass-through C. When Access port receives a frame,if the frame does not contain
802.1Q tag header, will be marked with PVID port; If the frame contains the 802.1Q tag
header, the switch does not deal with them directly discarded. D. When Access port to send
frames,stripping 802.1Q tag header, frame issued ordinary Ethernet frames Answer: B

QUESTION NO: 127 About domain NAT statement is correct (Note: the internal network
IP address is a private address, the IP address of the network boundary public address)
(Choose two) A. First NAT within the user's source IP address of the request packet into the
network server IP address B. Will request packets based on source and destination IP
address conversion C. The request packet destination IP address into the IP address of the
network server D. After the data within the network server will receive a packet processing,
packet destination IP address back to convert that into a public IP address(the IP address of
the network boundary)

"Pass Any Exam. Any Time." - 100% Guarantee

43

Huawei H12-711 Exam Answer: B,C

QUESTION NO: 128 Hardware packet filtering ACL number ranges? A. 2000-2999 B.
3000-3999 C. 4000-4999 D. 9000-9499 Answer: D

QUESTION NO: 129 Proxy firewall to check request from the user, the user checks the
security policy through the firewall on behalf of external users to establish a connection to
the real server, forwarding an external user request, and returns a response back to the real
server to the external user. A. True B. False Answer: A

QUESTION NO: 130 GRE VPN itself does not have to provide data integrity verification
and confidentiality of transmission capacity. A. True B. False Answer: A

"Pass Any Exam. Any Time." - 100% Guarantee

44

Huawei H12-711 Exam

QUESTION NO: 131 If the main mode IKE negotiation mode, you can only configure the
IP address in the form of ID type. If aggressive mode negotiation mode, you can only
configure the ID type the name of the form. A. True B. False Answer: B

QUESTION NO: 132 Outbound NAT configuration based on the direction, in the case of
no-pat configuration commands, the following description of what is wrong? (Choose three)
A. Conducted only source IP address translation B. Conducted only destination IP address
translation C. The source IP address and source port translation D. Be the destination IP
address and destination port translation Answer: B,C,D

QUESTION NO: 133 VPN tunneling technology is to achieve data encryption algorithm
(such as DES, 3DES) transmission in the network will not be intercepted. A. True B. False
Answer: B

"Pass Any Exam. Any Time." - 100% Guarantee

45
Huawei H12-711 Exam QUESTION NO: 134 The following does not belong to the IP
packet quintuple is () A. Source IP address B. Destination MAC address C. Agreement No.
D. Source port Answer: B

QUESTION NO: 135 Firewall supports three main VPDN VPN, namely, L2TP, PPTP,
IPSec: A. True B. False Answer: B

QUESTION NO: 136 SVN3000 port proxy function is mainly used for C / S and other
techniques cannot be used to access web applications. A. True B. False Answer: A

QUESTION NO: 137 In order to ensure the normal remote L2TP dial-up users to access the
corporate network, the user is required to assign an IP address within the enterprise network
services and resources to be "Pass Any Exam. Any Time." - 100% Guarantee

46

Huawei H12-711 Exam accessed not on the same network segment (without considering the
ARP Proxy technology). A. True B. False Answer: A

QUESTION NO: 138 When the port is configured to allow certain vlan trunk through,
trunk belongs to these vlan. A. True B. False Answer: A

QUESTION NO: 139 In some scenarios, it is necessary to convert the source IP address,
destination IP address but also for the conversion, is called bidirectional NAT. A. True B.
False Answer: A

QUESTION NO: 140 Under IPSec in tunnel mode, ESP on which field do validation? A.
Original IP packet header B. The new IP packet header C. TCP packet header D.
Application layer data

"Pass Any Exam. Any Time." - 100% Guarantee

47

Huawei H12-711 Exam Answer: A

QUESTION NO: 141 SVN3000 network expansion feature is the use of technology for
which the following business resource access control? A. Static Routing B. Dynamic
Routing C. ACL D. Policy Routing Answer: A

QUESTION NO: 142 SVN3000 virtual gateway, domain names can only be accessed using
a virtual gateway is which of the following types? A. Exclusive type B. Share -based C.
Fixed D. Manual type Answer: B

QUESTION NO: 143 LAC is to achieve the established L2TP VPN tunnel by what means?
(Choose two) A. User Account B. Domain name C. ACL D. Routing Table
"Pass Any Exam. Any Time." - 100% Guarantee

48

Huawei H12-711 Exam Answer: A,B

QUESTION NO: 144 In the configuration time for ACL, they can specify the name of the
binding period, while in the same time period name, you can configure multiple time
periods, these time periods are () relationship. A. "Or" B. "And" C. "XOR" D. " With or"
Answer: A

QUESTION NO: 145 Servermap used in the table which follows? A. Quintuple B. Quad C.
Triples D. Tuple Answer: C

QUESTION NO: 146 To make the trip within the enterprise mobile users can access the file
server, which can use the following functions to achieve optimal SSL VPN? A. Web Proxy
B. File Sharing C. Port Forwarding D. Network expansion "Pass Any Exam. Any Time." -
100% Guarantee

49

Huawei H12-711 Exam Answer: B

QUESTION NO: 147 L2TP supports the following protocols that load data. A. IP B. IPX C.
NetBEUI D. More support Answer: D

QUESTION NO: 148 Firewall trust untrust domain client wants to access the ftp server
services, has allowed clients to access the server tcp 21 port, but only log in to the server,
but cannot download the file, the following solutions are possible: (Choose three) A.
Untrust domain repair the trust between the two-way access policy to allow default B. FTP
works when port mode,modify untrust trust between domains inbound direction to permit
the default access policy C. Enable detect ftp between trust untrust domain configuration D.
FTP works when passive mode,modify untrust trust between domains inbound direction to
permit the default access policy Answer: A,B,C

QUESTION NO: 149 To support dynamic routing protocols, IP addresses Tunnel interfaces
at both ends must be configured in the same segment. A. True B. False "Pass Any Exam.
Any Time." - 100% Guarantee

50

Huawei H12-711 Exam Answer: A

QUESTION NO: 150 What are the main features Secospace DSM product? (Choose three)
A. Encrypt the document management B. Document Actions behavior records of
employees, providing audit logs C. Control employee access to documents D. The
document archive management,in order to prevent loss of documents Answer: A,B,C
QUESTION NO: 151 USG (Eudemon) supports NAT firewall features include: (Choose
three) A. NAT outbound B. NAT server C. NAT Traversal D. NAT Inbound Answer:
A,B,D

QUESTION NO: 152 Stateful inspection firewall subsequent packets (non- first packet)
forwarding mainly based on which of the following? A. route table B. MAC address C.
session table D. FIB table Answer: C "Pass Any Exam. Any Time." - 100% Guarantee

51

Huawei H12-711 Exam

QUESTION NO: 153 FTP protocol port numbers may be used there? (Choose two) A. 23
B. 21 C. 20 D. 25 Answer: B,C

QUESTION NO: 154 SVN3000 network expansion capabilities, the need to implement
remote users can access the corporate network and local area network, you cannot access
the Internet, the client needs to use routing as follows: A. Full- channel mode (Full Tunnel)
B. Separation channel mode (Split Tunnel) C. Routing (route Tunnel) D. Manually (Manual
Tunnel) Answer: B

QUESTION NO: 155 Which of the following does not support GRE technology? (Choose
two) A. Tunneling B. Encryption and decryption technology C. Key management
technology D. End checksum Answer: B,C "Pass Any Exam. Any Time." - 100%
Guarantee

52

Huawei H12-711 Exam

QUESTION NO: 156 For command tunnel name, statement is correct? (Choose two) A. Is
used to specify the name of the end of the tunnel B. Is used to specify the name of the end
of the tunnel C. Must be consistent on the side of the tunnel name configured D. If you do
not configure the tunnel name, the tunnel name is the name of the local system Answer:
A,D

QUESTION NO: 157 Check the NAT session command? A. display nat translation B.
display firewall session table C. display current nat D. display firewall nat translation
Answer: B

QUESTION NO: 158 When you configure the security level of firewall security zone, the
principles to be followed arE. (Choose three) A. New security zone,the security level is not
set before it,the system requirements of its security level to 100 B. Can set the security level
for the custom security zones C. Once you set the security level is not allowed to change D.
The same system,two security zones do not allow the same level of security configuration
Answer: B,C,D "Pass Any Exam. Any Time." - 100% Guarantee
53

Huawei H12-711 Exam

QUESTION NO: 159 As a general L2TP Layer 2 VPN technology to support packet
encryption. A. True B. False Answer: B

QUESTION NO: 160 Bidirectional NAT usage scenarios include: (Choose two) A.
Common use of NAT outbound and NAT inbound B. NAT outbound and common use of
NAT server C. NAT Inbound and NAT Server used together D. Domain used in
conjunction with NAT and NAT Server Answer: C,D

QUESTION NO: 161 SSL protocol by which elements to accomplish? (Choose three) A.
Handshake protocol B. Record Protocol C. Warning agreement D. Heartbeat Protocol
Answer: A,B,C

"Pass Any Exam. Any Time." - 100% Guarantee

54

Huawei H12-711 Exam QUESTION NO: 162 GRE VPN technology itself can provide
which of the following techniques? A. Tunneling B. Encryption and decryption technology
C. Flow control and QoS D. Key Management Answer: A

QUESTION NO: 163 L2TP technology, LAC client uses port number _____ _____
protocol encapsulated packets. A. TCP 51 B. UDP 51 C. UDP 1701 D. TCP 1701 Answer:
C

QUESTION NO: 164 You can connect to a specific length of TCP, UDP data streams to set
long aging time, ensure that the session information for a long time not to be aging. A. True
B. False Answer: B

QUESTION NO: 165 When you configure ipsec vpn, for the sa duration command
statement is correct? (Choose two) "Pass Any Exam. Any Time." - 100% Guarantee

55

Huawei H12-711 Exam A. Is used to configure sa lifetime B. Can be configured based on


the flow and cycle time based on survival C. After configuring the life cycle,and for the use
of ike sa created manually take effect D. For IKE sa way to build both ends,the
configuration must be consistent sa lifetime Answer: A,B

QUESTION NO: 166 You cannot add any interface to the firewall Local security zone, the
firewall interface itself belongs to the Local security zone. A. True B. False Answer: A

QUESTION NO: 167 When configuring ACL need to use anti- mask, elected the following
statements are true about the anti-mask option. A. Take anti- mask bit 0,which means that
the network needs to match the corresponding bit comparison B. Take anti- mask bit
1,which means that the network needs to match the corresponding bit comparison C. Not all
anti- mask value of 0 D. Not all anti- mask value of 1 Answer: A

QUESTION NO: 168 There is VPN Client -side, LAC, LNS and other three components of
the application scenario, which of the following components used between the L2TP
TUNNEL? (Choose two)

"Pass Any Exam. Any Time." - 100% Guarantee

56

Huawei H12-711 Exam A. Between the VPN Client and LAC B. Between the VPN Client
and LNS C. Between LAC and LNS D. All other options are correct Answer: B,C

QUESTION NO: 169 MAC address -based ACL application, which of the following
description is correct? A. Can only be a source MAC address filtering B. Can only be a
source MAC address and destination MAC address filtering C. Only data link layer protocol
type, source MAC address and destination MAC address filtering D. Only network layer
protocol type, source MAC address and destination MAC address filtering Answer: C

QUESTION NO: 170 VPDN tunneling protocols include: (Choose three) A. L2TP B. GRE
C. PPTP D. L2F Answer: A,C,D

QUESTION NO: 171 Which of the following configuration command parameter is not
consistent with the actual scenario or technology implementations? A. ah authentication-
algorithm md5 "Pass Any Exam. Any Time." - 100% Guarantee

57

Huawei H12-711 Exam B. ah encryption-algorithm des C. esp authentication-algorithm


md5 D. esp encryption-algorithm des Answer: B

QUESTION NO: 172 In the transmission mode IPSec applications, the following data
packets which area may be subject to encryption security? A. The network layer and the
upper layer packets B. Original IP packet header C. The new IP packet header D. Transport
layer and upper layer packets Answer: D

QUESTION NO: 173 In tunnel mode and ESP, which of the following regional information
is expressly transfusion? A. The new IP packet header B. Original IP packet header C.
Transport layer header D. Application layer packet header Answer: A

QUESTION NO: 174 In the inter-domain packet filtering, and firewall into the direction of
data flow (Inbound) refers to the direction of data from high to low security zones security
zone transfer. A. True "Pass Any Exam. Any Time." - 100% Guarantee
58

Huawei H12-711 Exam B. False Answer: B

QUESTION NO: 175 IPSEC WEB configuration wizard which does not support the
following scenarios? A. Gateway to Gateway B. Gateway Center C. Branch Gateway D.
Host and Host Answer: D

QUESTION NO: 176 Which of the following addresses can be used to manage the SVN
web address? (Choose three) A. Interface address B. Sub- interface address C. Sub- IP
address of the interface D. loopback address Answer: A,B,C

QUESTION NO: 177 After the firewall interface is added to a security zone, the interface
will no longer belong to the Local area A. True B. False Answer: B "Pass Any Exam. Any
Time." - 100% Guarantee

59

Huawei H12-711 Exam

QUESTION NO: 178 For firewall security zone statement is correct? A. Different firewall
security zones,priority can be the same B. Firewall with an interface can belong to different
security zones C. Different interfaces of the firewall may belong to the same security zone
D. Built-in firewall security zones can be deleted Answer: C

QUESTION NO: 179 Which of the following IPSec security protocol provides encryption?
A. AH B. ESP C. SA D. IKE Answer: B

QUESTION NO: 180 Before SVN3000 configure Web proxy basic functions, you need
those data for the following: (Choose two) A. Name of Web resources B. URL address of
the Web resources C. Account Information Web Resources D. All other options are not
right Answer: A,B

"Pass Any Exam. Any Time." - 100% Guarantee

60

Huawei H12-711 Exam

QUESTION NO: 181 Middle attack both passive and active attacks characteristic attack A.
True B. False Answer: A

QUESTION NO: 182 Proxy firewalls need to develop a protocol for each application layer
proxy, long development cycle, but it is difficult to upgrade. A. True B. False Answer: A

QUESTION NO: 183 In GRE VPN technology, GRE packet header belongs transport
protocol. A. True B. False Answer: B
QUESTION NO: 184 In the GRE configuration environment, which of the following
configuration can be achieved without the need to configure rules can guarantee inter-
domain data streams forwarded correctly. "Pass Any Exam. Any Time." - 100% Guarantee

61

Huawei H12-711 Exam A. Tunnel interface to the physical interface and its bearers
belonging to different security zones B. Tunnel interface to the physical interface of its
bearers belonging to the same security zone C. Physical interface belongs Untrust zone and
its bearing Tunnel interface belongs to Local area D. All other options are correct Answer:
B

QUESTION NO: 185 Description of the error based GRE encapsulation and de-
encapsulation yes? A. Packaging process: after the original packet routing to pass through
to find the packet to start trigger GRE tunnel interface module encapsulation B. Packaging
process: After the GRE module package, this package will enter the IP module for further
processing C. Decapsulation process: After receipt of GRE packet destination,find the route
to pass through the packet to the GRE tunnel interface module start trigger decapsulate D.
Decapsulation process: After the GRE module solution package, this package will enter the
IP module for further processing Answer: C

QUESTION NO: 186 When the host receives the ARP response packet, it will not be sent
to verify whether they had the ARP request, but the response bag MAC address and IP
corresponding relationship directly replace the original ARP cache table out A. True B.
False Answer: A

QUESTION NO: 187 IKE negotiation mode include? (Choose two) "Pass Any Exam. Any
Time." - 100% Guarantee

62

Huawei H12-711 Exam A. Master Mode B. Aggressive Mode C. Fast mode D. Transfer
mode Answer: A,B

QUESTION NO: 188 Under USG (Eudemon) series firewall VRP command, which is the
highest level of authority? A. Visit level B. Monitoring level C. Configuration level D.
Management level Answer: D

QUESTION NO: 189 Seen through the display ike sa result follows statements is correct?
(Choose two) current ike sa number: 1 connection-id peer vpn flag phase doi 0x1f1 2.2.2.1
0 RD | ST v1: 1 IPSEC 0x60436dc4 flag meaning RD - READY ST - STAYALIVE RL -
REPLACED FD - FADING TO - TIMEOUT A. The first phase has been successfully
established ike sa B. The second phase has been successfully established ipsec sa C. ike
using version V1 D. ike using version V2 Answer: A,C

"Pass Any Exam. Any Time." - 100% Guarantee


63

Huawei H12-711 Exam

QUESTION NO: 190 Active attacks focused prevention, rather than detection, for such
attacks are generally uses encryption technology to protect the confidentiality of the
information A. True B. False Answer: B

QUESTION NO: 191 VPN tunneling technology and DDN line like the link to achieve
security by building physical channel. A. True B. False Answer: B

QUESTION NO: 192 The main scope of NAT host visits in the same security domain, you
need to convert the IP address of the target host via NAT outbound command. A. True B.
False Answer: B

QUESTION NO: 193

"Pass Any Exam. Any Time." - 100% Guarantee

64

Huawei H12-711 Exam In GRE VPN applications, the network physical interface and
Tunnel interfaces added to the same security zone, you can reduce the inter -domain packet
filtering policy configuration. A. True B. False Answer: A

QUESTION NO: 194 In the WLAN configuration, if the authentication type is set to open
system authentication, all clients will request certification by certification. A. True B. False
Answer: A

QUESTION NO: 195 Stateful inspection firewall session table to track the use of a variety
of active TCP sessions and UDP sessions, which decided to establish a session by the
access control list, only when a packet associated with the session will be forwarded. A.
True B. False Answer: A

QUESTION NO: 196 The following statement on local-address command is correct?


(Choose three) A. Require local-address for the virtual IP address hot standby Network B.
Interface Application IPSec policy if configured with multiple IP addresses(IP address or if
the "Pass Any Exam. Any Time." - 100% Guarantee

65

Huawei H12-711 Exam primary sub-interface),multiple equal-cost routes,and use of virtual


interface templates may be looking in the wrong address,you need to configure the local-
address is the actual the IP address of the IKE negotiation C. local-address should be
consistent with the peer specified remote-address D. The other three options are wrong to
say Answer: A,B,C
QUESTION NO: 197 Which authentication technology is the use of the following ways to
recognize the legitimacy of the user identity? (Choose two) A. Username Password B. USB
KEY C. Cryptographic algorithms D. Private key information to identify Answer: A,B

QUESTION NO: 198 TSM system "Computer Peripherals Monitor" strategy which cannot
be controlled for the following devices? A. Bluetooth devices B. U disk C. Infrared
equipment D. Floppy Answer: B

QUESTION NO: 199 When configuring the firewall packet filtering ACL rules, if we want
to 192.168.0.0/24 network is set to match the object ACL rules, the match operation is
rejected, the following configuration is "Pass Any Exam. Any Time." - 100% Guarantee

66

Huawei H12-711 Exam correct (). A. rule 0 deny source 192.168.0.0 255.255.255.0 B. rule
2 deny source 192.168.0.0 0.0.0.255 C. rule 3 deny source 192.168.0.0 24 D. rule 4 deny
source 192.168.0.0 0.0.255.255 Answer: B

QUESTION NO: 200 About NAT’s statement is correct A. NAT will do within the packet
source address B. NAT compatible with all current IPSec security protocol C. Because the
FTP protocol is a multi- channel protocol,it does not support NAT D. NAT support for TCP
/ IP two,three,four conversion Answer: A

QUESTION NO: 201 Firewall own security zone cannot be deleted, but you can modify the
security level A. True B. False Answer: B

QUESTION NO: 202 pppoe-server bind virtual-template 1 This command applications


which interface? A. LAC’s internal network port B. LAC’s external network "Pass Any
Exam. Any Time." - 100% Guarantee

67

Huawei H12-711 Exam C. LNS within the network port D. LNS external network port
Answer: A

QUESTION NO: 203 USG2000 (Eudemon 200E) series firewall default ACL match type
A. auto B. config C. predefine D. custom Answer: B

QUESTION NO: 204 Security access control gateway (Security Access Control Gateway,
referred SACG) main function is to control network access terminals for different users,
different security situation open different permissions. A. True B. False Answer: A

QUESTION NO: 205 Which of the following options are part of the 5-tuple integral part?
(Choose three) A. Source IP address B. Destination IP address C. Agreement No. D. Source
MAC Address "Pass Any Exam. Any Time." - 100% Guarantee
68

Huawei H12-711 Exam Answer: A,B,C

QUESTION NO: 206 Which of the following stages of the second stage belongs to IKE
exchange mode? A. Master Mode B. Aggressive Mode C. Fast mode D. Passive mode
Answer: C

QUESTION NO: 207 Which of the following is the best technology to solve business
interruption issues for some applications (such as an Oracle database application data flow
due to extended lead -free connection is interrupted)? A. Configure a business long
connection B. Configure default session aging time C. Optimization of packet filtering rules
D. Open the fragment cache Answer: A

QUESTION NO: 208 Security Alliance (SA) is bidirectional security associations can be
achieved through data streams in both directions for security protection. A. True B. False
Answer: B "Pass Any Exam. Any Time." - 100% Guarantee

69

Huawei H12-711 Exam

QUESTION NO: 209 Firewalls are several network access control point, all incoming and
outgoing network protected by a firewall data flow should first go through the firewall and
out to form an information gateway. A. True B. False Answer: A

QUESTION NO: 210 Seen through the display ike proposal command results are as
follows, the following statements is correct? (Choose two) priority authentication
authentication encryption Diffie-Hellman duration method algorithm algorithm group
(seconds) -------------------------------------------------- ------------------------default
PRE_SHARED SHA DES_CBC MODP_768 86400 A. Authentication algorithm is SHA
B. DES encryption algorithm C. DH group using group2 D. Use a barbaric mode Answer:
A,B

QUESTION NO: 211 A USG (Eudemon) L2TP main firewall configuration is as follows:

"Pass Any Exam. Any Time." - 100% Guarantee

70

Huawei H12-711 Exam [LNS] l2tp-group 1 [LNS-l2tp1] tunnel name LNS [LNS-l2tp1]
allow l2tp virtual-template 1 remote client1 [LNS-l2tp1] tunnel authentication [LNS-l2tp1]
tunnel password simple Password123 on the above configuration statement is correct : A.
l2tp-group 1 is the default l2tp group,all the different remote name of the client can be
connected B. Only the remote device or client’s tunnel name when LNS, L2tp able to build
the tunnel C. Enable the L2TP authentication and encryption features D. Client1 only a
remote name for the user to be able to establish the connection l2tp Answer: D
QUESTION NO: 212 After SVN3000 network extensions configured for full- channel
mode (Full Tunnel), network users can access Internet resources. A. True B. False Answer:
B

QUESTION NO: 213 Meaning as access control lists are: [USG (or Eudemon)] acl number
3100 [USG (or Eudemon)-acl-3100] rule deny icmp source 10.1.10.10 0.0.255.255
destination any icmp-type host-unreachable A. The serial number is 3100 rule prohibited to
10.1.10.10 host unreachable packets to all hosts "Pass Any Exam. Any Time." - 100%
Guarantee

71

Huawei H12-711 Exam B. The serial number is 3100 rule prohibiting all 10.1.0.0/16 that
host unreachable packets C. The serial number is 3100 rule prohibited from 10.1.0.0/16 to
all hosts on the network unreachable packets D. Rules of the serial number is 3100,banned
from all hosts 10.1.10.10 host unreachable packets Answer: C

QUESTION NO: 214 USG (Eudemon) series firewall ike default using. dh group2 A. True
B. False Answer: B

QUESTION NO: 215 About trunk port is correct there? (Choose two) A. Upon receipt of a
trunk port carries the label of a data frame,if different from the label and PVID,then
forwarded directly B. Upon receipt of a trunk port carries the label of a data frame,if the
label and PVID different, then discards C. Upon receipt of a trunk port carries the label of a
data frame,if the label and the same PVID, then forwarded directly D. After the trunk port
carries the label when you receive a data frame,if the label and the same PVID, then remove
the label forwarding Answer: A,D

QUESTION NO: 216 Which of the following is not a proxy firewall features:

"Pass Any Exam. Any Time." - 100% Guarantee

72

Huawei H12-711 Exam A. Safe B. Processing speed C. Application layer security D. Easy
to upgrade Answer: D

QUESTION NO: 217 Asymmetric encryption algorithm encryption key and decryption key
are not the same. A. True B. False Answer: A

QUESTION NO: 218 The following fragment cache function on the firewall, saying right
there? (Choose two) A. Configure fragmented packets directly after forwarding,firewall
does not fragment packets cache B. Configure fragmented packets directly after forwarding
the packet is not the first piece fragmented packets,the firewall will be forwarded in
accordance with inter -domain packet filtering policy. C. Fragmented packets will create the
session table will look when forwarding the session table D. Fragmented packets of non-
first fragment packets, because there is no port number, so fragmented packets forwarding
function generallycannotbe used directly in a NAT environment Answer: A,D

QUESTION NO: 219 Which of the following are Huawei security software products?
(Choose three)

"Pass Any Exam. Any Time." - 100% Guarantee

73

Huawei H12-711 Exam A. TSM B. DSM C. eLog D. SVN3000 Answer: A,B,C

QUESTION NO: 220 Address-group {number | name} meaning no-pat in no-pat parameter
is? A. Do address translation B. The port multiplexing C. Not convert the source port D.
Not convert the destination port Answer: C

QUESTION NO: 221 Which of the following user system can be modified, such as user
account or password information directly on SVN3000 system? A. VPNDB Users B. LDAP
user C. Radius Users D. All user system Answer: A

QUESTION NO: 222 Switcher (not configured VLAN) when it receives a data frame, if no
match is found in the MAC address table, it will forward the data frame (including switcher
receiving port) to all ports.

"Pass Any Exam. Any Time." - 100% Guarantee

74

Huawei H12-711 Exam A. True B. False Answer: B

QUESTION NO: 223 SVN3000 port forwarding is based on the way the port control access
to network resources for what applications? A. TCP B. UDP C. TCP or UDP D. SPX
Answer: A

QUESTION NO: 224 GRE VPN tunnel interface (Tunnel Interface) interface borrows the
IP address of the other as its IP address on this interface to enable the dynamic routing
protocol. A. True B. False Answer: B

QUESTION NO: 225 SVN support the following types of file-sharing, which has several?
(Choose two) A. SMB B. Windows C. NFS D. Linux "Pass Any Exam. Any Time." - 100%
Guarantee

75

Huawei H12-711 Exam Answer: A,C

QUESTION NO: 226 After the write function is enabled USB encryption policies, end-user
copy to U disk files are encrypted, only the enterprise user and installed TSM terminal
security agents in order to use these encrypted files, encrypted files copied from disk to the
local U hardware automatically decrypted; A. True B. False Answer: A

QUESTION NO: 227 IKE first and second switching stage comprises ()? (Choose three) A.
Fast mode B. Aggressive Mode C. Transfer mode D. Master Mode Answer: A,B,D

QUESTION NO: 228 ESP packet encapsulation mode in what can be achieved on the
original IP header data confidentiality? A. Transfer mode B. Tunnel Mode C. Transfer
Mode + tunnel mode D. Encryption mode

"Pass Any Exam. Any Time." - 100% Guarantee

76

Huawei H12-711 Exam Answer: B

QUESTION NO: 229 Packet filtering firewall interfaces, inbound high priority area is the
access interface from lowpriority areas in the interface. A. True B. False Answer: B

QUESTION NO: 230 For firewall access control process : 1, 2 routing table lookup, find
interzone packet filtering rules 3, 4 session table lookup, find the blacklist, the correct
order? A. 1-3-2-4 B. 3-2-1-4 C. 3-4-1-2 D. 4-3-1-2 Answer: D

QUESTION NO: 231 SVN provides the following IP address allocation which way?
(Choose three) A. DHCP allocation B. IP address pool(randomly assigned) C. IP address
pool(user account with an IP address binding) D. Virtual IP address allocation Answer:
A,B,C

"Pass Any Exam. Any Time." - 100% Guarantee

77

Huawei H12-711 Exam

QUESTION NO: 232 SVN3000 support functions are not included? A. WEB push B. Port
Forwarding C. File Sharing D. Network expansion Answer: A

QUESTION NO: 233 In IKE Peer view, if the implementation of exchange-mode main,
then the following configuration which is impossible in force? A. remote-address
202.101.0.1 B. remote-address 202.101.0.1 202.101.0.5 C. remote-name chengdu D. All
other options are Answer: C

QUESTION NO: 234 Configuration [LAC-l2tp1] start l2tp ip 3.3.2.1 full username pc1 in,
pc1 mean? A. The end of the tunnel name B. On the end of the tunnel name C. The end of
the account name to initiate certification D. Peer initiates an authentication account name
Answer: C
"Pass Any Exam. Any Time." - 100% Guarantee

78

Huawei H12-711 Exam

QUESTION NO: 235 IKE protocol is based on the framework by the Internet Security
Association and Key Management Protocol ISAKMP definition. It is able to provide auto-
negotiation IPSec key exchange to establish security associations, in order to simplify the
use and management of IPSec. A. True B. False Answer: A

QUESTION NO: 236 SVN support routing protocols include: (Choose three) A. Static
Routing B. RIP C. OSPF D. BGP Answer: A,B,C

QUESTION NO: 237 In the GRE configuration environment, which of the following
statements are true? (Choose three) A. To make both ends of the tunnel to forward data
packets,the two devices are configured through the Tunnel interface routing. B. Enable both
ends to verify the configuration keywords,the keywords should be the same C. When the
local device to send data packets,the IP protocol field value by identifying GRE to decide
whether to submit to the GRE protocol packet processing module D. When receiving a data
packet to the client device,by identifying GRE IP protocol field value to determine whether
the data submitted to the GRE protocol packet processing module Answer: A,B,D

"Pass Any Exam. Any Time." - 100% Guarantee

79

Huawei H12-711 Exam

QUESTION NO: 238 SVN3000 default virtual gateway supports only a few, in order to
increase the number of virtual gateways need to purchase License. A. True B. False
Answer: A

QUESTION NO: 239 Following on inter-domain packet filtering firewall policy Policy,
statements is correct? A. Priority match match between packet filtering Policy in
accordance with the order in the arrangement of the former B. Interzone packet filtering
Policy in accordance with the ID number match the size of a small number of priority match
C. Interzone packet filtering Policy in accordance with the size to match the ID number,a
large number of priority match D. Interzone packet filtering policy automatically arranged
according to the size of the serial number,when changing the order in which numbers can
change with it. Answer: A

QUESTION NO: 240 Commands allow l2tp virtual-template virtual-template-number


[remote remote-name], when l2tp group is 1:00, you must specify the remote-name
parameter A. True B. False Answer: B
"Pass Any Exam. Any Time." - 100% Guarantee

80

Huawei H12-711 Exam

QUESTION NO: 241 Configuration [LNS-l2tp10] allow l2tp virtual-template 1 remote


client1 in, client1 mean? A. The end of the tunnel name B. On the end of the tunnel name
C. The end of the account name to initiate certification D. Peer initiates an authentication
account name Answer: B

QUESTION NO: 242 Which of the following is the TSM system "illegal outreach" strategy
has the function? (Choose two) A. Allows connection to external networks through the legal
route B. Prohibit access to the Internet C. Prohibit access to corporate resources critical
business systems D. Prohibit terminal visits Answer: A,B

QUESTION NO: 243 Which TSM system mainly consists of the following components?
(Choose three) A. SM management server B. SC control server C. Admission Control D.
Anti -virus server Answer: A,B,C

"Pass Any Exam. Any Time." - 100% Guarantee

81

Huawei H12-711 Exam

QUESTION NO: 244 In SVN3000 configuration, set the port number if the Web interface
and IP address to bind to port other than 443, then enter the IP address of the Web interface
login next, followed by the IP address, please add " : port ", such as "https://xxxx:port",
otherwise it will not log the Web interface. A. True B. False Answer: A

QUESTION NO: 245 SVN TCP port forwarding applications include three static ports:
single-port single-server, singleport multi-server, multi-port multi-server. The following are
single-port single server? A. Outlook B. FTP C. Lotus Notes D. Http Answer: D

QUESTION NO: 246 Which of the following business functions SSL VPN will be used to
control? (Choose two) A. Web Proxy B. File Sharing C. Port Forwarding D. Network
expansion Answer: C,D

"Pass Any Exam. Any Time." - 100% Guarantee

82

Huawei H12-711 Exam

QUESTION NO: 247 How to see the number of matches the ACL () A. display current-
configuration B. display ACL all C. display startup saved-configuration D. display device
Answer: B

QUESTION NO: 248 L2TP VPN, and L2TP tunnels and sessions on the statement is
correct: (Choose two) A. Between the same pair of LAC and LNS can create multiple L2TP
tunnel,the tunnel consists of a control connection and at least one session (Session)
composition B. Tunnel multiplexed on the session connection for the session,said carrying
PPP tunnel connecting each C. After the session connection must be established
successfully in the tunnel D. L2TP tunnel control message transmission, data message
transmission in the session Answer: A,C

QUESTION NO: 249 In the TCP three-way handshake, for packet SYN (seq = b, ack = a
+1), the following statement is correct there? A. Confirmation of the number of data packets
is b B. A +1 on the number of packets that are recognized C. A desired number of the next
data packet received is b D. A desired number of the received packet is a +1 Answer: D

"Pass Any Exam. Any Time." - 100% Guarantee

83

Huawei H12-711 Exam

QUESTION NO: 250 As a kind of generic GRE VPN encapsulation protocol encapsulated
in the VPN can include multicast packets, including all L3 packets. A. True B. False
Answer: A

QUESTION NO: 251 What are Web proxy implementations? (Choose two) A. Web-link B.
Web rewritten C. Web Forwarding D. Web pass-through Answer: A,B

QUESTION NO: 252 Which TSM system supports the following authentication methods?
(Choose three) A. User Name Password Authentication B. MAC address authentication C.
Fingerprint Authentication D. LDAP Authentication Answer: A,B,D

"Pass Any Exam. Any Time." - 100% Guarantee

84

Huawei H12-711 Exam QUESTION NO: 253 GRE encapsulation is a work in which of the
following interfaces (protected data stream arriving at the interface)? A. interface tunnel 1
B. interface Ethernet 0/0(within the network) C. interface Ethernet 0/0(external network) D.
interface loopback 1 Answer: A

QUESTION NO: 254 As illustrated connection : PC1 ----- SW1 ------------ SW2 ----- PC2;
SW1 two ports defined for VLAN1 access type port, SW2 two ports defined as VLAN 2
access port type, (PC1 and PC2 in the same subnet) then the following description is
correct? A. Because all access port,in fact, do not pass VLAN tag information, so you can
access PC1 PC2. B. Because VLAN SW2 SW1 and the ends are different, so
youcannotcommunicate between two PC. C. If two switches are connected to the port is set
to trunk ports, two PC can communicate. D. Because PVID default port on the switch is
VLAN 1, so the PC can be both visits. Answer: A

QUESTION NO: 255 TSM systems enable the "Monitoring DHCP settings" strategy, end
users will be forced to only use DHCP to obtain an IP address automatically. A. True B.
False Answer: A

"Pass Any Exam. Any Time." - 100% Guarantee

85

Huawei H12-711 Exam

QUESTION NO: 256 L2TP VPN configuration on the following statement in the correct
precautions are: (Choose three) A. The LNS L2TP client must be configured virtual
interface template (Virtual-Template) the IP address of the virtual interface template needs
to join the domain B. The default firewall requires authentication of the tunnel. If you do
not configure authentication,you need to undo tunnel authentication command C. To enable
L2TP dial-up users can normally access the network address, the address assigned to L2TP
users can dial up the network and the user's address on the same network segment or need
to enable proxy ARP D. LNS side is not allowed to configure multiple L2TP-Group
Answer: A,B,C

QUESTION NO: 257 Which of the following security zones can be conditionally deleted?
A. Regional Security B. trust region C. untrust area D. dmz area Answer: A

QUESTION NO: 258 Stateful inspection firewall can detect TCP protocol, but cannot
detect UDP, since UDP is a connectionless protocol face. A. True B. False Answer: B "Pass
Any Exam. Any Time." - 100% Guarantee

86

Huawei H12-711 Exam

QUESTION NO: 259 The following types of encryption algorithm, encryption and
decryption key are the same? A. DES B. RSA (1024) C. MD5 D. SHA-1 Answer: A

QUESTION NO: 260 When you configure NAT through the web, you need to configure
the trust and untrust regional inbound direction, you need to select the security domain trust
area in front, untrust area on the back. A. True B. False Answer: B

QUESTION NO: 261 IPSec IKE aggressive mode is mainly to solve the problem? A. Solve
the problem of slow negotiation ends of the tunnel B. Negotiation process to resolve
security issues C. Solve the NAT traversal problem D. Address the source address of the
originator of uncertainty andcannotchoose a pre -shared key issues Answer: D

"Pass Any Exam. Any Time." - 100% Guarantee


87

Huawei H12-711 Exam

QUESTION NO: 262 Which of the following algorithms in IPSec encryption algorithm
does not belong? A. DES B. SHA1 C. 3DES D. AES Answer: B

QUESTION NO: 263 In order to ensure the confidentiality of information, the need for
confidentiality encryption algorithm: A. True B. False Answer: B

QUESTION NO: 264 Which of the following are the first stage of IKE exchange mode?
(Choose two) A. Master Mode B. Aggressive Mode C. Fast mode D. Passive mode Answer:
A,B

"Pass Any Exam. Any Time." - 100% Guarantee

88

Huawei H12-711 Exam QUESTION NO: 265 What is the purpose IPSec IKE pre-shared
key configuration is? A. Do the encryption key messages B. The key to decrypt the packets
do C. Do key authentication algorithm D. Do negotiate key exchange material Answer: D

QUESTION NO: 266 ALG main function is to ensure smooth communication protocol
what kind of conduct? A. All application layer protocol B. All the transport layer protocol
C. All network layer protocol D. Multi-channel application layer protocol Answer: D

QUESTION NO: 267 USG2200 (Eudemon200E)-A between USG2200 (Eudemon200E)-B


equipment and the establishment of GRE tunnels, the following configuration of GRE
tunnel establishment does not affect (both ends are configured gre checksum). A side
configuration : gre key usg2200 (or Eudemon200E)-a; B -side configuration : gre key
usg2200 (or Eudemon200E)-b; A. True B. False Answer: B

"Pass Any Exam. Any Time." - 100% Guarantee

89

Huawei H12-711 Exam QUESTION NO: 268 Hybrid port allows multiple VLAN frames
through, and you can enter the port in the direction of some of the Tag VLAN frames
stripped. A. True B. False Answer: B

QUESTION NO: 269 Which of the following techniques can be achieved after a key is
compromised, will not affect the security of other keys? A. DH (Diffie-Hellman) key
exchange and distribution B. Perfect forward secrecy (Perfect Forward Secrecy) C.
Authentication D. Identity Protection Answer: B

QUESTION NO: 270 About Advanced ACL, the following statements is correct? (Choose
two) A. Advanced ACL can match the source IP address B. Advanced ACL can match the
destination IP address C. Advanced ACL can match the source MAC address D. Advanced
ACL can match the destination MAC address Answer: A,B

QUESTION NO: 271

"Pass Any Exam. Any Time." - 100% Guarantee

90

Huawei H12-711 Exam For nat inbound direction, the following statement is correct:
(Choose two) A. Mainly used in internal hosts do not need to know the situation of a public
network of B. Is the source address of the external network user request packet,converted to
network addresses C. Is a network user address into internet addresses D. In order for the
internal private network users can access internet address Answer: A,B

QUESTION NO: 272 Configuration [LAC-l2tp1] start l2tp ip 3.3.2.1 full username pc1 in,
ip address 3.3.1.1 means? A. This initiates an IP address B. The end of the virtual template
address C. The LNS public address D. Virtual template addresses the LNS Answer: C

QUESTION NO: 273 In L2TP scenario, private address allocation is done by the user
which of the following components? A. LAC B. LNS C. VPN Client D. User-configurable
Answer: B

QUESTION NO: 274

"Pass Any Exam. Any Time." - 100% Guarantee

91

Huawei H12-711 Exam In the case of using detect regional command application protocol
if it is non-standard port, which of the following techniques to solve the problems brought
by a non-standard port? A. Port identification B. MAC and IP address binding C. Packet
filtering D. Long connection Answer: A

QUESTION NO: 275 SVN3000 business functions include? (Choose three) A. Web Proxy
B. Network expansion C. Port Sharing D. File Sharing Answer: A,B,D

QUESTION NO: 276 In the TSM system supports access control devices, which of the
following devices do not support access control terminal visits functions? A. Hardware
SACG(Hardware Security Access Control Gateway) B. 802.1X C. Software SACG(host
firewall) D. ARP control Answer: A

QUESTION NO: 277

"Pass Any Exam. Any Time." - 100% Guarantee


92

Huawei H12-711 Exam In the Internet world, the protocol that you can do the following
transport protocols, and can do the passenger protocol: A. IP B. GRE C. IPX D. TCP
Answer: A

QUESTION NO: 278 Encryption refers to the cipher text into the plaintext message to be
transmitted in the network. A. True B. False Answer: B

QUESTION NO: 279 Check whether the L2TP tunnel has been established command is: A.
display l2tp tunnel B. display lac tunnel C. display lns tunnel D. display tunnel Answer: A

QUESTION NO: 280 IP-Link auto- detection results can only be applied to detect double
hot backup. A. True "Pass Any Exam. Any Time." - 100% Guarantee

93

Huawei H12-711 Exam B. False Answer: B

QUESTION NO: 281 What are the common hashing algorithms? (Choose two) A. DES B.
AES C. MD5 D. SHA-1 Answer: C,D

QUESTION NO: 282 What are the main cryptographic services security capabilities?
(Choose three) A. Confidentiality B. Integrity C. Repudiation D. Scalability Answer: A,B,C

QUESTION NO: 283 Which statement is correct? A. Latency refers to the first bit of the
packet enters the firewall to the first bit of the output firewall interval indicator,is an ideal
situation for measuring the speed of processing data firewall B. Refers to the maximum
number of concurrent connections per second, the new set up through the firewall can be a
complete TCP / UDP connection C. If the USG (Eudemon) transparent firewall mode to
work,just like the place in the network "Pass Any Exam. Any Time." - 100% Guarantee

94

Huawei H12-711 Exam bridges (bridge) the same access to the USG (Eudemon) firewall
device without the need to modify the original structure and configuration D. When USG
(Eudemon) firewall using routing mode,no ACL packet filtering,ASPF dynamic filtering,
NAT conversion functions Answer: C

QUESTION NO: 284 SSL is a security protocol that provides a secure connection for TCP-
based application layer protocol, SSL between the TCP / IP protocol stack between the
fourth and fifth layers. SSL provides secure connections for HTTP (Hypertext Transfer
Protocol) protocol. A. True B. False Answer: A

QUESTION NO: 285 VLAN port types include: (Choose three) A. Access Port B. Trunk
ports C. Hybrid port D. Ethernet port Answer: A,B,C
QUESTION NO: 286 In GRE VPN technology, which of the following is an encapsulation
protocol? A. GRE B. IPX "Pass Any Exam. Any Time." - 100% Guarantee

95

Huawei H12-711 Exam Answer: A

QUESTION NO: 287 Huawei firewall security zones are provided by default () (Choose
three) A. local area B. trust region C. untrust area D. Regional Security Answer: A,B,C

QUESTION NO: 288 IPSEC configuration steps include: (Choose three) A. Restart
Firewall B. Define the data flow and inter-domain protection rules C. Configure IPSec
security proposal D. Configure IKE Peer Answer: B,C,D

QUESTION NO: 289 For AH and ESP, the following statement is correct? (Choose three)
A. AH provides data integrity and encryption B. Tunnel mode,AH for the new IP header
must verify,so AH IPSEC VPNcannotbe applied in the middle of a situation nat conversion.
C. AH ESP can provide all of the features in addition to data encryption outside D. Tunnel
mode,ESP packets do not verify the new IP header. Answer: B,C,D "Pass Any Exam. Any
Time." - 100% Guarantee

96

Huawei H12-711 Exam

QUESTION NO: 290 IETF protocol based SSL3.0 launched TLS1.0, also known as
SSL3.1. A. True B. False Answer: A

QUESTION NO: 291 VPN technology belong there? (Choose three) A. GRE B. L2TP C.
DPI D. IPSec Answer: A,B,D

QUESTION NO: 292 Symmetric encryption algorithm encryption key and decryption key
are the same. A. True B. False Answer: A

QUESTION NO: 293

"Pass Any Exam. Any Time." - 100% Guarantee

97

Huawei H12-711 Exam Source port by the application (protocol) decision, the same
application (protocol) using the same source port A. True B. False Answer: B

QUESTION NO: 294 Security Alliance (SA) is the basis of IPSec is agreement between the
communicating peers on certain safety elements. A. True B. False Answer: A

QUESTION NO: 295 LAC device via L2TP users to understand what information is
requested to initiate a tunnel which LNS? A. Source IP address B. Destination IP address C.
The source IP address and destination IP address D. Username + Password Answer: D

QUESTION NO: 296 IPSec by AH (Authentication Header) and ESP (Encapsulating


Security Payload) protocol to achieve these two private security, integrity, authenticity, and
anti-replay, and also through IKE (Internet Key Exchange) provides auto-negotiation
exchanged for IPSec key to establish and "Pass Any Exam. Any Time." - 100% Guarantee

98

Huawei H12-711 Exam maintain security alliance services to simplify the use and
management of IPSec. A. True B. False Answer: A

QUESTION NO: 297 L2TP user authentication statement is correct: A. In the LAC can
authenticate the user B. The LNS can authenticate the user C. After LAC authenticates the
user,LNS can authenticate the user again D. All other options are on the argument Answer:
D

QUESTION NO: 298 L2TP protocol registered ports are: A. TCP 1701 B. TCP 1710 C.
UDP 1701 D. UDP 1702 Answer: C

QUESTION NO: 299 When renting leased line to connect two ISP firewall port to use by
SA, two firewalls are DTE devices, clocks are set to slave. A. True "Pass Any Exam. Any
Time." - 100% Guarantee

99

Huawei H12-711 Exam B. False Answer: A

QUESTION NO: 300 In most scenarios, NAT Inbound refers to the use of an Internet
address instead of the internal LAN address, his role is used to hide the actual IP address of
the Internet server. A. True B. False Answer: B

QUESTION NO: 301 Protocol mainly used for encryption mechanisms are: A. HTTP B.
FTP C. TELNET D. SSL Answer: D

QUESTION NO: 302 TSM management system which supports the following dimensions?
(Choose two) A. Organization and management B. Regional Management Network C.
Management hardware features D. Administration Answer: A,B "Pass Any Exam. Any
Time." - 100% Guarantee

100

Huawei H12-711 Exam

QUESTION NO: 303 IPSec AH + ESP used to establish an IPSec tunnel mode, will create
several IPSec SA? A. 2 B. 3 C. 4 D. 1 Answer: C
QUESTION NO: 304 Microsoft patch does not include what level? A. Key B. Serious C.
Important D. Medium Answer: D

QUESTION NO: 305 Following on the firewall access control lists, statements is correct?
(Choose three) A. Basic Access Control Lists can be filtered for the source and destination
IP address B. Advanced Access Control Lists can be filtered for agreement C. You can
filter on the data link layer protocol header type field in the MAC -based access control list
D. The hardware packet filtering ACL,you can dimension source MAC address, destination
MAC address, protocol,etc. to match traffic Answer: B,C,D "Pass Any Exam. Any Time." -
100% Guarantee

101

Huawei H12-711 Exam

QUESTION NO: 306 USG2000 (Eudemon 200E) Firewall supports the following which
match the pattern? (Choose two) A. config mode B. auto mode C. acl mode D. rule mode
Answer: A,B

QUESTION NO: 307 The vast majority of endpoint security threats from Internet, internal
network only need to deploy anti-virus software can solve the problem. A. True B. False
Answer: B

QUESTION NO: 308 About SVN3000 hardware description, is correct: (Choose three) A.
SVN3000 a 1U standard chassis,the chassis with Console port B. There are four pairs
SVN3000 fixed 10/100/1000M Ethernet optical ports are mutually exclusive C. Provided a
total of two expansion slots on the chassis,one for encryption card is inserted,another spare
for extended functions. D. SVN3000 installed two internal AC or DC power modules,
redundant dual power supply and backup power supply. Answer: A,C,D

"Pass Any Exam. Any Time." - 100% Guarantee

102

Huawei H12-711 Exam

QUESTION NO: 309 Source host sends ARP-request, the data package source IP address
field of the source host IP address, source MAC address field is the MAC address of the
source host, destination IP address field of the destination host IP address, destination MAC
address of the destination host is encapsulated MAC address A. True B. False Answer: B

QUESTION NO: 310 In order to ensure the success of the tunnel verification, LAC and
LNS client -side configuration must be consistent, such as password information. A. True
B. False Answer: A

QUESTION NO: 311 VLAN tag information which is contained in the message section? A.
Ethernet packet header B. IP packet header C. TCP packet header D. UDP packet header
Answer: A

"Pass Any Exam. Any Time." - 100% Guarantee

103

Huawei H12-711 Exam QUESTION NO: 312 USG2000 (Eudemon 200E) firewall on the
same match order of ACL description of the different rules is correct: (Choose three) A. In
multiple rules configured with an ACL,there are two matching order: automatic matching
mode (auto) and configure priority mode (config). B. Firewall defaults to auto mode C. In
automode:depth-first rule matching principles,namely: the higher the smaller the address
range rule priority. D. In configmode:priority rules are configured first match,which is the
serial number of the smaller the priority rule. Answer: A,C,D

QUESTION NO: 313 Similar anti- mask and subnet mask format, but the value has
different meanings: 1 indicates that the corresponding IP address bits need to compare, 0
indicates that the corresponding IP address bits ignored comparison. A. True B. False
Answer: B

QUESTION NO: 314 Which of the following statements is true? (Choose two) A. New
connections per second per second refers to establish TCP connections through the
firewall,including the semi- connection B. Throughput refers to the maximum amount of
data that can be processed simultaneously firewall,generally 1500Byte packets as a test
standard C. Latency refers to the last bit of the packet enters the firewall to the first bit of
the output firewall interval indicator D. Refers to the maximum number of concurrent
connections Connection Firewall can accommodate the number of

"Pass Any Exam. Any Time." - 100% Guarantee

104

Huawei H12-711 Exam Answer: C,D

QUESTION NO: 315 Local firewall security zones do not contain any interface. Ping
firewall on the firewall when an interface IP address, the packet will be given to those
inside the firewall module for processing, not to be forwarded. Because they belong to the
same security zone, so no need to configure interzone packet filtering can communicate
properly. A. True B. False Answer: A

QUESTION NO: 316 Packet filtering firewall main features include: (Choose three) A.
With the complexity and increase the length of ACL,the firewall filtering performance
exponentially decreasing trend B. ACL rules difficult to adapt static dynamic security
filtering requirements C. Do not check the session state data is not analyzed,it is very easy
for hackers to get away D. Complete control of the network to exchange information and
control the session,with high security Answer: A,B,C
QUESTION NO: 317 NAT technology which has the following characteristics? (Choose
two) A. Provide addresses for the network user to hide,there is a certain security B. Does
not support an unlimited number of IP for network NAPT conversion C. For network users
both inside and outside,feel the IP address of the conversion process,the entire process is
transparent for the user, "Pass Any Exam. Any Time." - 100% Guarantee

105

Huawei H12-711 Exam D. After you configure a bidirectional NAT, an external user can
access the network resources within Answer: A,C

QUESTION NO: 318 Which of the following key management techniques are often applied
to the VPN environment? A. IKE B. Authentication C. IPSec D. PKI / CA Answer: A

QUESTION NO: 319 SVN3000 Shared Web gateway can be accessed via IP, domain
names in two ways. A. True B. False Answer: B

QUESTION NO: 320 SVN3000 network expansion capabilities, the need to implement a
remote user can access the corporate network and local area network, and can access the
Internet, the client needs to use routing as follows: A. Full- channel mode (Full Tunnel) B.
Separation channel mode (Split Tunnel) C. Routing (route Tunnel) D. Manually (Manual
Tunnel) "Pass Any Exam. Any Time." - 100% Guarantee

106

Huawei H12-711 Exam Answer: D

QUESTION NO: 321 Firewall configured nat server global 202.106.1.1 inside 10.10.1.1,
and now need to filter through the interface technology package allows users of the public
network WWW server access is correcT. A. rule permit TCP source 202.106.1.1 0 source-
port 80 B. rule permit TCP source 10.10.1.1 0 source-port 80 C. rule permit TCP
destination 202.106.1.1 0 destination-port 80 D. rule permit TCP destination 10.10.1.1 0
destination-port 80 Answer: D

QUESTION NO: 322 There are several IPSec protocol encapsulation mode? (Choose two)
A. Tunnel Mode B. Transfer mode C. Master Mode D. Aggressive Mode Answer: A,B

QUESTION NO: 323 After receiving the L2TP LNS packets, check if the newspaper
wengong IP address is not found in the local header successfully established the link, but
also to the next step L2TP packet of information processing. A. True B. False

"Pass Any Exam. Any Time." - 100% Guarantee

107

Huawei H12-711 Exam Answer: B


QUESTION NO: 324 Multiple interfaces of the firewall can belong to the same security
zone? A. True B. False Answer: A

QUESTION NO: 325 Transparent firewall mode works like a switch, according to MAC
address forwarding for packets matching ACL check is not performed, nor generate the
session table A. True B. False Answer: B

QUESTION NO: 326 Which of the following applications are dynamic port TCP
applications? A. SSH B. FTP C. Http D. Telnet Answer: B

"Pass Any Exam. Any Time." - 100% Guarantee

108

Huawei H12-711 Exam QUESTION NO: 327 L2TP default group primarily to scenes
acceptable any client calls. A. True B. False Answer: A

QUESTION NO: 328 USG (Eudemon) Series firewalls from priority (priority) to define
security zones can be set which of the following values ? (Choose two) A. 150 B. 100 C. 80
D. 40 Answer: C,D

QUESTION NO: 329 Extended access control lists can be used to carry traffic which of the
following Latitude match? (Choose two) A. Source MAC B. Destination MAC C. Source IP
D. The purpose of IP Answer: C,D

QUESTION NO: 330

"Pass Any Exam. Any Time." - 100% Guarantee

109

Huawei H12-711 Exam Address conversion technology advantages include: (Choose three)
A. NAT allows the internal network users(private IP address)to easily access the Internet.
B. NAT allows many hosts to share a single internal LAN IP address of the Internet. C.
Address conversions can handle IP header encryption. D. NAT can shield the user’s internal
network,improve the security of the internal network. Answer: A,B,D

QUESTION NO: 331 TCP / IP V4 version, there are security risks there? (Choose three) A.
Lack of data origin authentication mechanism B. Lack of data packet acknowledgment
mechanism C. Lack of data integrity verification mechanism D. Lack of confidentiality
safeguards Answer: A,C,D

QUESTION NO: 332 ARP-REPLY packet sent using the broadcast, the host can receive on
the same Layer 2 network, and accordingly to the IP and MAC address learning
correspondence. A. True B. False Answer: B

QUESTION NO: 333 The following types of firewall packet processing speed is the fastest
non-first? A. Packet filtering firewall "Pass Any Exam. Any Time." - 100% Guarantee

110

Huawei H12-711 Exam B. Proxy Firewall C. Stateful inspection firewall D. Software


firewalls Answer: C

QUESTION NO: 334 Normal access to the user Wang credited l2tp vpn from outside the
network address, found inside the firewall can ping the network port, but cannot access the
network server, check the configuration discovery, Virtual-Template is added to the untrust
zone within the network port in trust area, resulting in the cause cannot access the server,
the following statements is correct? (Choose two) A. The server is not configured gateway
B. Untrust and trust between domain rules unopened C. Untrust and local inter-domain
rules unopened D. The other three options are correct Answer: A,B

QUESTION NO: 335 Which of the following are VPDN tunneling protocol? (Choose two)
A. PPPOE B. L2TP C. PPTP D. IPSec Answer: B,C

QUESTION NO: 336 TSM system to prohibit end users to copy important data to the
storage medium of information security incidents caused, but the business needs to allow
end users to read data stored inside, "Pass Any Exam. Any Time." - 100% Guarantee

111

Huawei H12-711 Exam enable Which of the following strategies? A. Disable removable
storage devices B. Read-only removable storage devices C. Monitoring removable storage
devices D. Write encrypted removable storage devices Answer: B

QUESTION NO: 337 VPN by business use classification does not include which of the
following? A. Access VPN B. Intranet VPN C. Internet VPN D. Extranet VPN Answer: C

QUESTION NO: 338 If the DNS server addresses SVN configuration has been completed,
the URL of the Web proxy function must be configured IP. A. True B. False Answer: B

QUESTION NO: 339 Use NAT technology to hide internal IP addresses deployment, it is
possible to improve the security of the network.

"Pass Any Exam. Any Time." - 100% Guarantee

112

Huawei H12-711 Exam A. True B. False Answer: A

QUESTION NO: 340 Virtual private network (Virtual Private Network) is a "private data
channel established through shared public network, each virtual network require access to
this network or a terminal connected through tunnels (channels), constituting a dedicated,
having certain security and quality of service network. A. True B. False Answer: A
QUESTION NO: 341 SSL VPN supports file sharing types are divided into two kinds of
SMB and NFS, SMB corresponding Windows hosts, NFS corresponding Linux host. A.
True B. False Answer: A

QUESTION NO: 342 SSL and IPSec security protocols, encryption and authentication.
However, SSL protocol only on the application of both data communications transmission
is encrypted, but not all of the data from one host to another is encrypted (such as TCP / IP
and application layer protocol). A. True B. False "Pass Any Exam. Any Time." - 100%
Guarantee

113

Huawei H12-711 Exam Answer: A

QUESTION NO: 343 USG2000 (Eudemon200E) on how the device is booted into bootrom
main menu (Main Menu)? A. Press CTRL + C B. Press CTRL + B C. Press CTRL + Z D.
Press CTRL + ALT + A Answer: B

QUESTION NO: 344 In the GRE configuration environment, the local peer network device
configuration GRE private network need to point which of the following interfaces or IP
address? (Choose two) A. Tunnel Interface B. External network(Internet)interface C.
Tunnel Interface IP address D. External network(Internet)interface IP address Answer: A,C

QUESTION NO: 345 GRE configuration, the Tunnel interface mode which of the
following items must be configured? (Choose three) A. source ip-address B. destination ip-
address C. Tunnel Interface IP address D. gre encryption-algorithm 3des

"Pass Any Exam. Any Time." - 100% Guarantee

114

Huawei H12-711 Exam Answer: A,B,C

QUESTION NO: 346 Port-mapping function is used to publish certain port internal server
to the external network. A. True B. False Answer: B

QUESTION NO: 347 Which of the following security protocols IPSec NAT traversal
(middle ipsec vpn tunnels circumstances nat device)? A. AH B. ESP C. AH + ESP D. AES
Answer: B

QUESTION NO: 348 SVN3000 web proxy server resources can only be accessed by
clicking on the web SVN list. A. True B. False Answer: B

"Pass Any Exam. Any Time." - 100% Guarantee

115
Huawei H12-711 Exam QUESTION NO: 349 Which of the following symmetric
encryption algorithms in the same scene, encryption and decryption is the fastest? A. DES
B. 3DES C. RSA (1024) D. MD5 Answer: A

QUESTION NO: 350 GRE VPN technology is mainly used in which of the following
scenarios? (Choose two) A. The discontinuous subnets connected B. The non- IP protocol
networks connected via an IP network C. Confidentiality will be required to transfer data
network connected via GRE VPN D. Applied to the need to provide flow control
characteristics of the network and Qos Answer: A,B

QUESTION NO: 351 Here on the NAS-Initialized the L2TP VPN, correct statement are:
(Choose three) A. Remote users via PSTN / ISDN access NAS (LAC), LAC determine
whether the L2TP users. B. L2TP remote user to user,LAC to the LNS initiates channel
connection establishment request. C. LNS assigns a private IP address for remote dial-up
users D. Validation of remote dial-up users can only be done at the LNS Answer: A,B,C

QUESTION NO: 352 "Pass Any Exam. Any Time." - 100% Guarantee

116

Huawei H12-711 Exam When SVN3000 configuration, VPNDB user information to create
a single, you can also create a batch file by importing. A. True B. False Answer: A

QUESTION NO: 353 In ipsec vpn configuration if you use pre-shared key authentication
mode, you can choose whether to configure the key for the end, but if you configure a key,
the key must be the same on both sides. A. True B. False Answer: B

QUESTION NO: 354 You can also use the template mode IPSEC remote-address is the
address specified above. A. True B. False Answer: A

QUESTION NO: 355 ADSL configure dialer-rule 1 ip permit, and configuration of the
following correspondence between? A. dialer1 B. dialer bundle 1 "Pass Any Exam. Any
Time." - 100% Guarantee

117

Huawei H12-711 Exam C. dialer-group 1 D. pppoe-client dial-bundle-number 1 Answer: C

QUESTION NO: 356 For the end user, SVN equivalent web___________, while the
internal servers, SVN has assumed the role of __________ of: A. Server, B. The client,the
client C. Client, server D. Server,the client Answer: D

QUESTION NO: 357 Use NAT technology, the data packets in the network layer
information (IP header) for encryption to enhance the security of the data. A. True B. False
Answer: B
QUESTION NO: 358 All Categories Access Control List support for IP access control
quintuple A. True B. False Answer: B "Pass Any Exam. Any Time." - 100% Guarantee

118

Huawei H12-711 Exam

QUESTION NO: 359 Establish a GRE tunnel between the two companies through the
Internet Internet, the A corporate network port IP address is 192.168.0.1, Tunnel port IP
address is 10.10.10.1, Loopback port IP address is 172.16.15.1, external network is
171.13.15.1. Will the Tunnel interface mode, source address is configured which one? A.
192.168.0.1 B. 10.10.10.1 C. 172.16.15.1 D. 171.13.15.1 Answer: D

QUESTION NO: 360 In the USG (Eudemon) series firewall, which of the following
techniques first to be matched? A. Packet filtering B. Attack prevention C. Blacklist D.
White List Answer: C

QUESTION NO: 361 The main difference between symmetric and asymmetric encryption
algorithm encryption algorithm that different algorithms, but they are using the same key to
encrypt and decrypt. A. True B. False Answer: B "Pass Any Exam. Any Time." - 100%
Guarantee

119

Huawei H12-711 Exam

QUESTION NO: 362 Which of the following IKE exchange mode does not provide
identity protection? A. Master Mode B. Aggressive Mode C. Fast mode D. Passive mode
Answer: B

QUESTION NO: 363 Huawei firewall nat outbound which supports the following scenario?
(Choose three) A. One address translation B. -Many address translation C. -Many address
translation D. Many-to- address translation Answer: A,C,D

You might also like