Questions for the H12-711 were updated on : Dec 01 ,2025
The initial priority of the USG9500VGMP group is related to which of the following factors ( )? *
C, D
Which of the following descriptions about the heartbeat interface is wrong ( )?[Multiple choice]*
B
Which of the following is not the default security zone of the firewall ( )[Multiple choice]*
D
In the authentication policy of the firewall, _____ allows the user to not need to enter the user name
and password, but can obtain the corresponding relationship between the user and the IP, so as to
carry out policy management based on the user[fill in the blank]*
A
The trigger modes of the built-in Portal authentication in the firewall include pre-authentication and
____ authentication[fill in the blank]*
A
An enterprise wants to build a server system and requires the following functions: 1. The enterprise
needs to have its own dedicated mailbox, and the sending and receiving of emails needs to go
through the enterprise's server; 2. The server must provide file transfer and access services. Users in
different departments of the enterprise provide accounts with different permissions: 3. When the
enterprise accesses the internal webpage of the enterprise, the enterprise can directly enter the
domain name in the browser to access. To meet the above requirements, which of the following
servers do enterprises need to deploy? ( )*
B, C, D
Under normal circumstances, the Emai1 protocols we often talk about include ____, POP3, and
SMTP.[fill in the blank]*
A
Please match the following information security risks to information security incidents one by
one.[fill in the blank]*
physical security risk
Enterprise server permissions are loosely set
Information Security Management Risk
Infected Panda Burning Incense
Information Access Risk
Fire destroyed equipment in computer room
application risk
Talk to people about leaking company secrets
A
An engineer needs to back up the firewall configuration. Now he wants to use a command to view all
the current configurations of the firewall. May I ask the command he uses is ____[fill in the blank]*
A
Social engineering is a means of harm such as deception, harm, etc. through psychological traps such
as psychological weaknesses, instinctive reactions, curiosity, trust, and greed of victims ( )
A
____- The goal is to provide a rapid, composed and effective response in emergency situations,
thereby enhancing the ability of the business to recover immediately from a disruptive event.[fill in
the blank]*
A
Drag the phases of the cybersecurity emergency response on the left into the box on the right, and
arrange them from top to bottom in the order of execution. 1. Inhibition stage, 2. recovery phase, 3.
Detection stage, 4. eradication phase[fill in the blank]*
A
Please order the following steps in the PKI life cycle correctly, 1. Issued, 2. storage, 3. Update, 4.
verify[fill in the blank]*
A
IP packets using the AH+ESP protocol? ( )[Multiple choice]*
A.1
B.2
C.3
D.4
D
We should choose the encryption algorithm according to our own use characteristics. When we need
to encrypt a large amount of data, it is recommended to use the ____ encryption algorithm to
improve the encryption and decryption speed.[fill in the blank]*
A