Question 13

- (Exam Topic 1)
Which of the following options is not included aboutHRP in the content of the master/slave configuration consistency check?

Correct Answer:C

Question 14

- (Exam Topic 3)
Man-in-the-middle attacks are data security threats.

Correct Answer:A

Question 15

- (Exam Topic 3)
The method of collecting information by port scanning using scanning tools belongs to the means of ( ) analysis. (fill in the blank)
Solution:
Penetration

Does this meet the goal?

Correct Answer:A

Question 16

- (Exam Topic 2)
Use the Ping command on the firewall to test the reachability to the server (the security zone where the server is located is the DMZ). If a security policy is configured to allow the test traffic, the source security zone is ______. [fill in the blank]*
Solution:
local

Does this meet the goal?

Correct Answer:A

Question 17

- (Exam Topic 1)
When the firewall upgrades the signature database and virus database online through the security service center, the firewall is required to be able to connect to the Internet first, and theDNSaddress

Correct Answer:A

Question 18

- (Exam Topic 1)
Which of the following options is not part of the quintuple range?

Correct Answer:B

START H12-711_V3.0 EXAM