VPN tunneling technology is to achieve data encryption algorithm (such as DES, 3DES) transmission in the network will not be intercepted.
A. True
B. False
The following does not belong to the IP packet quintuple is ()
A. Source IP address
B. Destination MAC address
C. Agreement No.
D. Source port
GRE VPN itself does not have to provide data integrity verification and confidentiality of transmission capacity.
A. True
B. False
If the main mode IKE negotiation mode, you can only configure the IP address in the form of ID type. If aggressive mode negotiation mode, you can only configure the ID type the name of the form.
A. True
B. False
Hardware packet filtering ACL number ranges?
A. 2000-2999
B. 3000-3999
C. 4000-4999
D. 9000-9499
Proxy firewall to check request from the user, the user checks the security policy through the firewall on behalf of external users to establish a connection to the real server, forwarding an external user request, and returns a response back to the real server to the external user.
A. True
B. False
About the VLAN tag processing, the following description of the error is?
A. When Trunk port receives a frame,if the frame does not contain 802.1Q tag header, will be marked with PVID port; If the frame contains the 802.1Q tag header, no change.
B. When Trunk port to send the frame,when the port's PVID VLAN ID of the frame is not the same,discarded; When PVID VLAN ID and port with the same time frame,the pass-through
C. When Access port receives a frame,if the frame does not contain 802.1Q tag header, will be marked with PVID port; If the frame contains the 802.1Q tag header, the switch does not deal with them directly discarded.
D. When Access port to send frames,stripping 802.1Q tag header, frame issued ordinary Ethernet frames
About domain NAT statement is correct (Note: the internal network IP address is a private address, the IP address of the network boundary public address) (Choose two)
A. First NAT within the user's source IP address of the request packet into the network server IP address
B. Will request packets based on source and destination IP address conversion
C. The request packet destination IP address into the IP address of the network server
D. After the data within the network server will receive a packet processing, packet destination IP address back to convert that into a public IP address(the IP address of the network boundary)
The following information about the different types of firewalls correct to say there? (Choose three)
A. Packet filtering firewall for each packet through the firewall,should be carried out to check ACL match
B. Stateful inspection firewall does not hit only the first session packets matching ACL checks
C. Stateful inspection firewall needs to be configured packet " go " and "back" in both directions ACL
D. Proxy Firewall is the essence of the business directly between the internal network and external network users to take over
Priority DMZ area is how much?
A. 5
B. 50
C. 85
D. 100
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Huawei exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your HC-711-ENU exam preparations and Huawei certification application, do not hesitate to visit our Vcedump.com to find your solutions here.