When you configure NAT through the web, you need to configure the trust and untrust regional inbound direction, you need to select the security domain trust area in front, untrust area on the back.
A. True
B. False
IPSec IKE aggressive mode is mainly to solve the problem?
A. Solve the problem of slow negotiation ends of the tunnel
B. Negotiation process to resolve security issues
C. Solve the NAT traversal problem
D. Address the source address of the originator of uncertainty andcannotchoose a pre -shared key issues
Which of the following algorithms in IPSec encryption algorithm does not belong?
A. DES
B. SHA1
C. 3DES
D. AES
In order to ensure the confidentiality of information, the need for confidentiality encryption algorithm:
A. True
B. False
Which of the following security zones can be conditionally deleted?
A. Regional Security
B. trust region
C. untrust area
D. dmz area
Stateful inspection firewall can detect TCP protocol, but cannot detect UDP, since UDP is a connectionless protocol face.
A. True
B. False
The following types of encryption algorithm, encryption and decryption key are the same?
A. DES
B. RSA (1024)
C. MD5
D. SHA-1
L2TP VPN configuration on the following statement in the correct precautions are: (Choose three)
A. The LNS L2TP client must be configured virtual interface template (Virtual-Template) the IP address of the virtual interface template needs to join the domain
B. The default firewall requires authentication of the tunnel. If you do not configure authentication,you need to undo tunnel authentication command
C. To enable L2TP dial-up users can normally access the network address, the address assigned to L2TP users can dial up the network and the user's address on the same network segment or need to enable proxy ARP
D. LNS side is not allowed to configure multiple L2TP-Group
As illustrated connection : PC1 ----- SW1 ------------ SW2 ----- PC2; SW1 two ports defined for VLAN1 access type port, SW2 two ports defined as VLAN 2 access port type, (PC1 and PC2 in the same subnet) then the following description is correct?
A. Because all access port,in fact, do not pass VLAN tag information, so you can access PC1 PC2.
B. Because VLAN SW2 SW1 and the ends are different, so youcannotcommunicate between two PC.
C. If two switches are connected to the port is set to trunk ports, two PC can communicate.
D. Because PVID default port on the switch is VLAN 1, so the PC can be both visits.
TSM systems enable the "Monitoring DHCP settings" strategy, end users will be forced to only use DHCP to obtain an IP address automatically.
A. True
B. False
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Huawei exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your HC-711-ENU exam preparations and Huawei certification application, do not hesitate to visit our Vcedump.com to find your solutions here.