Labour Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

H12-711_V3.0 Sample Questions Answers

Questions 4

Digital signature is to generate digital fingerprint by using hash algorithm, so as to ensure the integrity of data transmission

Options:

A.

True

B.

False

Buy Now
Questions 5

Ways to use a computer to store information about criminal activity that is not a computer crime

Options:

A.

True

B.

False

Buy Now
Questions 6

firewallTrustClients in the domain can log inUntrustin the domainFTPserver, but the file cannot be downloaded, which of the following can solve the problem? (multiple choice)

Options:

A.

existTrustandUntrustrelease betweentwenty oneThe port number

B.

FTPWorks asportmode, modify fromTrustarriveUntrustThe zone's security policy action is Allow

C.

enabledetect ftp

D.

FTPWorks asPassivemode, modify fromTrustarriveUntrustThe zone's security policy action is Allow

Buy Now
Questions 7

Which of the following are multi-user operating systems? (multiple choice)

Options:

A.

MSDOS

B.

UNIX

C.

LINUX

D.

Windows

Buy Now
Questions 8

Which of the following options is correct for the description of a buffer overflow attack?(multiple choice)

Options:

A.

Buffer overflow attacks exploit the flaws of software systems in memory operations to run attack code with high operating privileges.

B.

Buffer overflow attacks have nothing to do with the vulnerabilities and architecture of the operating system.

C.

Buffer overflow attacks are one of the most common ways to attack the behavior of software systems

D.

Buffer overflow attacks are application-layer attacks.

Buy Now
Questions 9

IPSec VPNAn asymmetric encryption algorithm is used to encrypt the transmitted data

Options:

A.

True

B.

False

Buy Now
Questions 10

EuropeTCSECThe guidelines are divided into two modules, functional and evaluation, and are mainly used in the military, government and commercial fields

Options:

A.

True

B.

False

Buy Now
Questions 11

Which of the following options areIATF(Information Assurance Technology Framework) core elements of the model? (multiple choice)

Options:

A.

surroundings

B.

people

C.

Technology

D.

operate

Buy Now
Questions 12

aboutSSL VPNdescription, which of the following is correct?

Options:

A.

Can be used without a client

B.

yesIPlayer to encrypt

C.

existNATcrossing problem

D.

No authentication required

Buy Now
Questions 13

Which of the following options are correct regarding the description of Windows log event types? (multiple choice)

Options:

A.

Warning events are events that refer to the successful operation of an application, driver, or service.

B.

False events generally refer to loss of functionality and data. For example, a service that cannot be loaded as a system boot will generate an error event.

C.

When the disk space is insufficient, it will be recorded as an "information event"

D.

Failed audit events refer to failed audit security logon attempts, such as failure to access a network drive from a user's view, will be logged as a failed audit event.

Buy Now
Questions 14

existUSGConfigure on the system firewallNAT Server, will produceserver-mapTable, which of the following is not part of this representation?

Options:

A.

PurposeIP

B.

destination port number

C.

agreement number

D.

sourceIP

Buy Now
Questions 15

Which of the following is an action to be taken during the summary phase of a cybersecurity emergency response? (multiple choice)

Options:

A.

Establish a defense system and specify control measures

B.

Evaluate the implementation of emergency plans and propose follow-up improvement plans

C.

Judging the effectiveness of isolation measures

D.

Evaluate members of emergency response organizations

Buy Now
Questions 16

In order to obtain criminal evidence, it is necessary to master the technology of intrusion tracking. Which of the following options are correct for the description of tracking technology? (multiple choice)

Options:

A.

Packet logging technology through the tracedIPInsert trace data into packets to mark packets on each router they pass through

B.

Link testing technology determines the information of the attack source by testing the network link between routers

C.

Packet marking technology extracts attack source information by logging packets on routers and then using data drilling techniques

D.

Shallow mail behavior analysis can achieveIPAnalysis of addresses, sent time, sending frequency, number of recipients, shallow email headers, and more.

Buy Now
Questions 17

Equipment sabotage attacks are generally not easy to cause information leakage, but usually cause interruption of network communication services.

Options:

A.

True

B.

False

Buy Now
Questions 18

After the firewall detects a virus, which of the following will release the virus? ( )[Multiple choice]*

Options:

A.

Not a protocol supported by the firewall

B.

Hit apply exception

C.

The source IP hits the whitelist

D.

Hit virus exception

Buy Now
Questions 19

When configuring security policies, you can control traffic based on the user's______.[fill in the blank]*

Options:

Buy Now
Questions 20

Personal information leakage is the destruction of the ______ characteristics of information.[fill in the blank]*

Options:

Buy Now
Questions 21

Security technology has different methods in different technical levels and fields. Which of the following devices can be used for network layer security? (multiple choice)

Options:

A.

Vulnerability Scanning Device

B.

firewall

C.

Anti-DDoSequipment

D.

IPS/IDSequipment

Buy Now
Questions 22

Which of the following options belong to the default security zone of Huawei Firewall? (multiple choice)

Options:

A.

Zonearea

B.

Trustarea

C.

Untrustarea

D.

Securityarea

Buy Now
Questions 23

Digital signature technology obtains a digital signature by encrypting which of the following data?

Options:

A.

User data

B.

Receiver's public key

C.

sender's public key

D.

digital fingerprint

Buy Now
Questions 24

Options:

Buy Now
Questions 25

Which of the following is the default backup mode for dual-system hot standby?

Options:

A.

automatic backup

B.

Manual batch backup

C.

Session fast backup

D.

After the device restarts, the active and standbyFWConfiguration

Buy Now
Questions 26

When an enterprise establishes its own information system, it checks each operation according to the authoritative standards formulated by the international, and can check whether its own information system is safe or not.

Options:

A.

True

B.

False

Buy Now
Questions 27

Which of the following statements is true about Huawei's routers and switchers??(multiple choice)

Options:

A.

Routers can implement some security functions, and some routers can implement more security functions by adding security boards

B.

The main function of the router is to forward data. When the enterprise has security requirements, sometimes a firewall may be a more suitable choice

C.

Switches have some security functions, and some switches can realize more security functions by adding security boards

D.

The switch does not have security features

Buy Now
Questions 28

Which of the following descriptions about digital fingerprints in digital signatures is wrong? ( )[Multiple choice]*

Options:

A.

It is the data obtained by the sender after calculating the plaintext information through the HASH algorithm.

B.

The receiver will use the sender's public key to calculate the generated data fingerprint and compare it with the received digital fingerprint.

C.

Digital fingerprints are also known as information digests.

D.

The receiver needs to use the sender's public key to unlock the digital signature to obtain the digital fingerprint.

Buy Now
Questions 29

According to the management specification, regularly check the network security system and equipment, upgrade the patch, and organize the network security emergency response drill. The above actions belong toMPDRRWhat are the elements of the network security model?

Options:

A.

Protection link

B.

Detection link

C.

response link

D.

Management link

Buy Now
Questions 30

Which of the following protocols is not a protocol type that ASPF can detect? ( )[Multiple choice]*

Options:

A.

PPTP

B.

FTP

C.

MSTP

D.

DNS

Buy Now
Questions 31

The content of intrusion detection covers all kinds of authorized and unauthorized intrusion behaviors. Which of the following behaviors does not belong to the scope of intrusion detection?

Options:

A.

Impersonate another user

B.

The administrator deletes the configuration by mistake

C.

Planting worm Trojans

D.

leak data

Buy Now
Questions 32

The world's first worm-"Morris Worm"Make people realize that with the deepening of people's dependence on computers, the possibility of computer network being attacked is also increasing, and it is necessary to establish a sound emergency response system

Options:

A.

True

B.

False

Buy Now
Questions 33

IPSec VPNAn asymmetric encryption algorithm is used to encrypt the transmitted data

Options:

A.

True

B.

False

Buy Now
Questions 34

In which of the following scenarios does the firewall generate the Server map table? ( )

Options:

A.

NAT Server is deployed on the firewall

B.

ASPF is deployed on the firewall and forwards the traffic of the multi-channel protocol

C.

When the firewall generates a session table, it will generate a Server-map table

D.

Security policies are deployed on the firewall and traffic is released

Buy Now
Questions 35

If there is a practical change in the company structure, it is necessary to re-test whether the business continuity plan is feasible

Options:

A.

True

B.

False

Buy Now
Questions 36

Which of the following attacks is not a special packet attack?

Options:

A.

ICMPredirected packet attack

B.

ICMPUnreachable Packet Attack

C.

IPaddress scanning attack

D.

oversizedICMPPacket attack

Buy Now
Questions 37

Which of the following is not the business scope of the National Internet Emergency Response Center?

Options:

A.

Emergency handling of security incidents

B.

Warning and notification of security incidents

C.

Provide security evaluation services for government departments, enterprises and institutions

D.

Cooperate with other institutions to provide training services

Buy Now
Questions 38

Which of the following is true about the difference between pre-incident prevention strategies and post-incident recovery strategies? (multiple choice)

Options:

A.

Prevention strategies focus on minimizing the likelihood of an accident before a story occurs. Recovery strategies focus on minimizing the impact and damage to the business after an incident

B.

The role of pre-disaster prevention strategies does not include minimizing economic and reputational losses caused by accidents

C.

Recovery strategies are used to improve business high availability

D.

A recovery strategy is part of a business continuity plan

Buy Now
Questions 39

Which of the following is not a requirement for dual-system hot backup of a firewall?

Options:

A.

Firewall hardware models are the same

B.

The firewall software version is the same

C.

The interface type and number used are the same

D.

firewall interfaceIPsame address

Buy Now
Questions 40

When an information security incident occurs, give priority to using ______ emergency response to provide technical support to customers [fill in the blank]*

Options:

Buy Now
Questions 41

firewallGE1/0/1andGE1/0/2mouth belongs toDMZarea, if you want to implementGE1/0/1The connected area is accessibleGE1/0/2Connected area, which of the following is correct?

Options:

A.

needs to be configuredLocalarriveDMZsecurity policy

B.

No configuration required

C.

Interzone security policy needs to be configured

D.

needs to be configuredDMZarrivelocalsecurity policy

Buy Now
Questions 42

DDosWhich of the following attack types is an attack?

Options:

A.

snooping scan attack

B.

Malformed Packet Attack

C.

special packet attack

D.

traffic attack

Buy Now
Questions 43

Which of the following are the basic functions of antivirus software? (multiple choice)

Options:

A.

virus protection

B.

Find viruses

C.

remove virus

D.

replication virus

Buy Now
Questions 44

aboutNATAddress translation, which of the following statements is europium false??

Options:

A.

sourceNATconfiguration in technologyNATaddress pool, you can configure only one address poolIPaddress

B.

Address translation can be provided in the local area network according to the needs of usersFTP,WWW,Telnetand other services

C.

Some application layer protocols carry in the dataIPaddress information, make themNATWhen modifying the data in the upper layerIPAddress information

D.

for some non-TCP,UDPprotocol (such asICMP,PPTP), cannot doNATconvert

Buy Now
Questions 45

The steps of the security assessment method do not include which of the following?

Options:

A.

Manual audit

B.

Penetration testing

C.

Questionnaire

D.

data analysis

Buy Now
Questions 46

Which of the following does not belong toLINUXoperating system?

Options:

A.

CentOS

B.

RedHat

C.

Ubuntu

D.

MAC OS

Buy Now
Questions 47

About disconnectTCPIn the description of the connection four-way handshake, which of the following is false?

Options:

A.

The active closing party sends the firstFINperform an active shutdown while the other party receives thisFINexecution is closed

B.

When passive shutdown receives the firstFIN, it will send back aACK, and randomly generate the confirmation serial number.

C.

The passive closing party needs to pass an end-of-file to the application, the application closes its connection, and causes the sending of an end-of-fileFIN

D.

Sent on passive shutdown sideFINAfter that, the active closing party must send back an acknowledgment and set the acknowledgment sequence number to the received sequence number plus1

Buy Now
Questions 48

Which of the following does not belong toP2DRin the modelDetectionThe method used in the link?

Options:

A.

real time monitoring

B.

detect

C.

Call the police

D.

shut down service

Buy Now
Questions 49

aboutGREEncapsulation and decapsulation, which of the following descriptions is false?

Options:

A.

The encapsulation process, the original data packet is passed to theTunnelDepart after the interfaceGREpackage

B.

packaging process, afterGREAfter the module is encapsulated, this packet will enterIPmodule for further processing

C.

The decapsulation process, the destination receivesGREAfter the message, the data packet is delivered to theTunnelDepart after the interfaceGREDecapsulation

D.

Decapsulation process, afterGREAfter the module is decapsulated, this packet will go inIPmodule for further processing

Buy Now
Questions 50

Regarding the description of vulnerability scanning, which of the following is false?

Options:

A.

Vulnerability scanning is a network-based technology for remotely monitoring the security performance vulnerabilities of target networks or hosts, and can be used to conduct simulated attack experiments and security audits.

B.

Vulnerability scanning is used to detect whether there are vulnerabilities in the target host system, generally scanning the target host for specific vulnerabilities

C.

Vulnerability scanning is a passive preventive measure that can effectively avoid hacker attacks

D.

can be based onpingScan and port scan results for vulnerability scanning

Buy Now
Questions 51

Which of the following statements about OSPF is correct?

Options:

A.

Distance Vector Protocol

B.

Good scalability

C.

No loops

D.

Support authentication

Buy Now
Questions 52

An engineer needs to back up the firewall configuration. Now he wants to use a command to view all the current configurations of the firewall. May I ask the command he uses is ____[fill in the blank]*

Options:

Buy Now
Questions 53

Information security precautions include both management and technical measures. Which of the following measures is not a precautionary method for information security technology?

Options:

A.

Information security training for employees

B.

Scan the server for vulnerabilities

C.

Authenticate employees

D.

Turn on the anti-virus function on the firewall

Buy Now
Questions 54

Which of the following security threats are terminal security threats? (multiple choice)

Options:

A.

man-in-the-middle attack

B.

There is a vulnerability in the server

C.

User identity is not verified

D.

Users use weak passwords

Buy Now
Questions 55

Which of the following VPNs cannot be used in site-to-Site scenarios?

Options:

A.

SSL VPN

B.

L2TP VPN

C.

IPSec VPN

D.

GRE VPN

Buy Now
Questions 56

The initial priority of the USG9500VGMP group is related to which of the following factors ( )? *

Options:

A.

interface bandwidth

B.

VRRP priority

C.

Number of daughter cards on the interface board

D.

The number of CPUs on the D service board

Buy Now
Questions 57

If we do not want to generate a reverse Server Mapi entry when configuring NAT Server, we need to add a parameter when configuring NATServerE. This parameter is ( ) (fill in the blank)

Options:

Buy Now
Questions 58

With the development of technology, some new technologies have emerged in electronic forensics. Which of the following items are new forensics technologies?

Options:

A.

Cloud Forensics

B.

IoT Forensics

C.

Side-Channel Attack Forensics

D.

Log forensics

Buy Now
Questions 59

Which of the following options are available for IPSec VPN peer authentication?

Options:

A.

Digital signature

B.

Digital certificate

C.

Digital envelope

D.

asymmetric key

Buy Now
Questions 60

( ) means that the computer system has defects and deficiencies in the specific matters of hardware, software, protocols or system security policies. (Chinese Standard Terminology) (fill in the blank)

Options:

Buy Now
Questions 61

As shown, the USG firewall NAT configuration is as follows:

Options:

A.

When FTP Server1 responds to Client A, it is converted to the address 1.1.1.5 in Address Ground 1

B.

Source NAT configuration, only for intranet users (10.1.1.0/24) to access the external network for translation

C.

When the IP address of the FTP Server host is changed to 1.11.3. Client A host can still access the FTP Server more

D.

Client A accesses FTP Server 1.1.1.1, and the destination address is converted to 10.1.1.2. The source address remains unchanged

Buy Now
Questions 62

After the company network administrator configures the dual-system hot backup, he wants to check the status of the current VGMP group, so he typed the command and displayed the following information

HRP_M_

Role: active, peer: active

Running priority:45000, peer:45000

Backup channel1 usage: 30x

Stab1 e time: 1days, 13 hours, 35 minutes

Last state change information: 2020-03-22 16:01:56 HRP core state changed, old_state=normal (active), new_state=normal

(active).local priority F 4

peer_priority 45000.

Configuration:

hello interval: 1000ms

preempt: 60s

mirror configuration:off

mirror session:on

track trunk member:on

auto-sync configuration:on

auto-sync connection- status:on

adjust ospf cost:on

adjust ospfv3-cost:on

adjust bgp-cost:on

nat resource: off

Detail information on:

Gigabi tEthernet0/0/1:up

Gigabi tEthernet0/0/3:up

ospf-cost: +0

then the command he typed in the blank is[fill in the blank]*

Options:

Buy Now
Questions 63

Multiple different ( ) cannot be added to the same interface on the firewall at the same time (fill in the blank)

Options:

Buy Now
Questions 64

There are three types of frame forwarding behaviors: flooding, ( ), and discarding. (fill in the blank)

Options:

Buy Now
Questions 65

Heartbeat message (He11o message): The two FWs send heartbeat messages to each other periodically (the default period is ( ) seconds) to check whether the peer device is alive. (fill in the blank)

Options:

Buy Now
Questions 66

Which of the following descriptions about the heartbeat interface is wrong ( )?[Multiple choice]*

Options:

A.

It is recommended to configure at least two heartbeat interfaces. - One heartbeat interface is used as the master, and the other heartbeat interface is used as the backup.

B.

The interface MTU value is greater than 1500 and cannot be used as a heartbeat interface

C.

The connection method of the heartbeat interface can be directly connected, or it can be connected through a switch or router

D.

MGMT interface (Gigabi tEtherneto/0/0) cannot be used as heartbeat interface

Buy Now
Questions 67

( ) is an "indirect intrusion attack. This attack mode is to virtually place a computer controlled by an intruder between two communicating computers in a network connection through various technical means. (fill in the blank)

Options:

Buy Now
Questions 68

( ) Can block discovered network intrusions in real time. (fill in the blank)

Options:

Buy Now
Questions 69

Which of the following is not a type of digital certificate?

Options:

A.

Local certificate

B.

Terminal certificate

C.

Self-signed certificate

D.

Device local certificate

Buy Now
Questions 70

In USG6000E, the initial priority of VGMP is ( ) (fill in the blank)

Options:

Buy Now
Questions 71

The backup methods of dual-system hot backup include automatic backup ( ), manual batch backup, and automatic synchronization of the configuration of the active and standby FW after the device restarts. (fill in the blank)

Options:

Buy Now
Questions 72

The administrator is connected to the firewall through the G1/0/0 interface (the interface has been added to the Trust Zone). If the administrator is allowed to perform configuration management through the G1/0/0 login image firewall, how to configure the security policy to release flow direction? ( )[Multiple choice]*

Options:

A.

allows traffic from Trust Zone to Trust Zone

B.

allows traffic from the Trust Zone to the Untrust Zone

C.

allows traffic from Local Zone to Local Zone

D.

allows traffic from the Trust Zone to the Local Zone (I)

Buy Now
Questions 73

In the Linux system, which of the following is the command to query the P address information? ( )[Multiple choice]*

Options:

A.

ifconfig)

B.

display ip interface brief

C.

ipconfig

D.

display ip

Buy Now
Status:
Expired , and Replaced By
Exam Code: H12-711_V3.0
Exam Name: HCIA-Security V3.0
Last Update: Apr 14, 2023
Questions: 492
$64  $159.99
$48  $119.99
$40  $99.99
buy now H12-711_V3.0