Spring Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

H12-711_V4.0 Sample Questions Answers

Questions 4

The network environment is becoming more and more complex, and network security incidents occur frequently. While accelerating the construction of informatization, enterprises must not only resist external attacks, but also prevent internal management personnel from being involved in data leakage and operation and maintenance accidents due to operational errors and other issues. Which of the following options might reduce operational risk?

Options:

A.

According to the administrator configuration, the O & M user corresponds to the background resource account, and restricts the unauthorized use of the account. mouth Based on the password security policy, the O & M security audit system automatically modifies the password of the background resource account at regular intervals.

B.

Each system is independently operated, maintained and managed, and the access process is not audited and monitored.

C.

Oral Each department system is independently authenticated and uses a single static password for authentication.

Buy Now
Questions 5

The following description of asymmetric encryption algorithms, which item is wrong?

Options:

A.

Compared with symmetric encryption algorithms, the security factor is higher.

B.

Encryption is faster than symmetric encryption algorithms.

C.

Public keys are generally disclosed to users.

D.

Asymmetric encryption algorithms are a pair of keys, divided into public and private keys.

Buy Now
Questions 6

The IPS detects and analyzes all packets passing through a device and determines whether to permit or block the packets in real time based on the comprehensive detection mechanism. Sort the following steps into the correct order based on the basic implementation mechanism of the IPS.

Options:

Buy Now
Questions 7

Which of the following are disadvantages of the packet filtering firewall?

Options:

A.

The software implementation limits the processing speed, making the firewall vulnerable to DoS attacks.

B.

An attacker can set the IP address of his/her host to an IP address permitted by a packet filter. In this way, packets from the attacker's host can easily pass through the packet filter.

C.

Static ACL rules cannot meet dynamic security requirements.

D.

The connection status list is dynamically managed.

Buy Now
Questions 8

How frequently should antivirus signature databases be updated to ensure the effectiveness of an antivirus program or software?

Options:

A.

Every month

B.

Every day

C.

Three months

D.

Half a month

Buy Now
Questions 9

Which of the following statements are correct about SYN flood attack defense technologies on Huawei firewalls?

Options:

A.

The TCP connection establishment rate can be limited to defend against SYN flood attacks.

B.

The number of half-open TCP connections can be limited to defend against SYN flood attacks.

C.

SYN cookie technology can be used to defend against SYN flood attacks.

D.

Interzone security policies can be configured to defend against SYN flood attacks.

Buy Now
Questions 10

HTTPS introduces the TLS layer based on HTTP to provide identity authentication, encryption, and integrity check for data transmission.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 11

When IPSec VPN uses tunnel mode to encapsulate packets, which of the following is not within the encryption scope of the ESP security protocol?

Options:

A.

ESP Header

B.

TCP Header

C.

Raw IP Header

D.

ESP Tail

Buy Now
Questions 12

For which of the following parameters can the packet filtering firewall filter?

Options:

A.

Port packet payload

B.

IP address of the port source destination

C.

The MAC address of the source destination

D.

Port number and protocol number of the port source

Buy Now
Questions 13

The RADIUS protocol specifies how to pass user information, billing information, authentication and billing results between the NAS and the RADIUS server, and the RADIUS server is responsible for receiving the user's connection request, completing the authentication, and returning the result to the NAS.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 14

Which type of NAT translates both addresses and port numbers and uses the public IP address of the outbound interface as the post-NAT address?

Options:

A.

NAPT

B.

Easy IP

C.

3-tuple NAT

D.

NAT No-PAT

Buy Now
Questions 15

Which of the following problems cannot be solved using PKI?

Options:

A.

The network is congested due to heavy traffic. As a result, the server cannot provide services properly.

B.

The transaction parties cannot verify the identities of each other.

C.

Data may be eavesdropped and tampered with during transmission, and information security cannot be ensured.

D.

No paper receipt is used in transaction, making arbitration difficult.

Buy Now
Questions 16

Which of the following statements is correct about SSO?

Options:

A.

A user sends the user name and password to the firewall through the Portal authentication page. The password is stored and authenticated on the firewall.

B.

A user sends the user name and password to a third-party authentication server. After the user passes the authentication, the third-party authentication server sends the user's identity information to the firewall, which only records the information but does not participate in the authentication process.

C.

A user accesses the Portal authentication page, obtains an SMS verification code, and enters the verification code. The authentication then succeeds.

D.

A user sends the user name and password to the firewall through the Portal authentication page. The firewall does not store the password but sends the user name and password to a third-party authentication server. The authentication is performed on the authentication server.

Buy Now
Questions 17

Which of the following is not the default security zone of the firewall

Options:

A.

untrust trust

B.

trust zone

C.

dmz zone

D.

isp zone)

Buy Now
Questions 18

When logging in to the web UI through HTTPS, you need to specify a local certificate issued by a CA that the web browser trusts for the HTTPS client on the device. Because the web browser can verify the local certificate, this approach avoids malicious attacks and ensures secure logins of administrators.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 19

IPS signatures describe the characteristics of attack behaviors on the network. The firewall detects and defends against attacks by comparing data flows with IPS signatures.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 20

DES is a stream encryption algorithm, because the cipher capacity is only 56 bits, so it is not enough to deal with the weakness of insufficient security, and later 3DES was proposed.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 21

As shown in the figure, nat server global202.106.1.1 inside10.10.1.1 is configured on the firewall. Which of the following is the correct configuration for interzone rules?

Options:

A.

rule name c. source-zone untrust. destination-zone trust. destination-address 202.106.1.132, action permit

B.

rule name d, source- zone untrust. destination- zone trust. destination- address10.l0.1.1 32, action permit

C.

rule name b, source- zone untrust, destination- zone trust, source- address10.10.1.1 32, action permit

D.

rule name b, source-zone untrust, destination-zone trust, source-address202.106.l.1 32, action permit

Buy Now
Questions 22

Which of the following protocols is a multichannel protocol?

Options:

A.

The Telnet

B.

THE HITP

C.

FTP

D.

The SSH

Buy Now
Questions 23

In the authentication policy of the firewall, _____ allows the user to not need to enter the user name and password, but can obtain the corresponding relationship between the user and the IP, so as to carry out policy management based on the user[fill in the blank]*

Options:

Buy Now
Questions 24

Under normal circumstances, the Emai1 protocols we often talk about include ____, POP3, and SMTP.[fill in the blank]*

Options:

Buy Now
Questions 25

The following description of the AH protocol in IPSec VPN, which one is wrong?

Options:

A.

Supports data source validation

B.

Supports data integrity checking

C.

Supports packet encryption

D.

Support anti-message replay

Buy Now
Questions 26

According to the level protection requirements, which of the following behaviors belong to the scope of information security operation and maintenance management? ( )*

Options:

A.

Participate in information security training

B.

Backup or restore data

C.

Develop an emergency response plan

D.

Security hardening of the host

Buy Now
Questions 27

Sub-interfaces can be created on GE0/0/1 of a firewall. The sub-interfaces can be added to different VLANs, but cannot be added to security zones.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 28

Which of the following are the backup items that HRP can provide?

Options:

A.

Mouth Server-map table entry

B.

Mouth No-PAT table entry

C.

Mouth ARP table entry

D.

Port TCP session table

Buy Now
Questions 29

Which of the following is not the matching mode of the firewall security protection whitelist rules?

Options:

A.

Prefix matching

B.

Fuzzy matching

C.

Keyword matching

D.

Suffix matching

Buy Now
Questions 30

Which type of NAT applies to the scenario where there are a small number of Internet access users and the number of public IP addresses is the same as the number of concurrent Internet access users?

Options:

A.

NAPT

B.

NAT No-PAT

C.

3-tuple NAT

D.

Easy IP

Buy Now
Questions 31

Which of the following protocols is a file transfer protocol?

Options:

A.

Mouth POP3

B.

Mouth NFS

C.

Mouth HITP

D.

Mouth DFTP

Buy Now
Questions 32

A VRRP group has three states: Initialize, Master, and Backup.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 33

3-tuple NAT allows external devices to proactively access internal PCs through translated addresses and ports. Even if no security policy is configured on the firewall, the firewall allows such access packets to pass through.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 34

What is the protocol number of the GRE protocol?

Options:

A.

47

B.

48

C.

46

D.

The 50th

Buy Now
Questions 35

Which of the following statements are incorrect about the differences between routers and Layer 2 switches?

Options:

A.

By default, routers can isolate broadcast domains but not collision domains.

B.

Switches flood broadcast packets.

C.

Routers forward broadcast packets.

D.

By default, switches can isolate collision domains but not broadcast domains.

Buy Now
Questions 36

The following description of the construction of a digital certificate, which item is wrong

Options:

A.

The name of the device that issued the certificate can be different from the subject name in the issuer certificate.

B.

The structure of the certificate follows the specification of the X.509 v3 version.

C.

The simplest certificate consists of a public key, a name, and a digital signature from a certificate authority.

D.

The issuer signs the certificate information with the private key.

Buy Now
Questions 37

Which of the following statements are correct about the PKI system structure?

Options:

A.

A PKI entity is an end user of PKI products or services. It can be an individual, an organization, a device such as a router or firewall, or a process running on a computer.

B.

CAs are classified into the root CA and subordinate CAs according to the hierarchy of CAs.

C.

A CA is a trusted entity that issues and manages digital certificates.

D.

A PKI system consists of three parts: entity, certificate authority, and certificate registration authority.

Buy Now
Questions 38

What are the correct entries in the following description of firewall security zones?

Options:

A.

The DMZ security zone solves the problem of server placement well, and this security area can place devices that need to provide network services to the outside world.

B.

The Local zone is the highest security zone with a priority of 99.

C.

Data flows between security domains are directional, including Inbound and Outbound.

D.

Normally, the two communicating parties must exchange messages, that is, there are messages transmitted in both directions between security domains.

Buy Now
Questions 39

The trigger modes of the built-in Portal authentication in the firewall include pre-authentication and ____ authentication[fill in the blank]*

Options:

Buy Now
Questions 40

Which of the following is not included in the Business Impact Analysis (BIA).

Options:

A.

Risk identification

B.

Impact assessment

C.

Incident handling priority

D.

Business priorities

Buy Now
Questions 41

When the Layer 2 switch receives a unicast frame and the MAC address table entry of the switch is empty, the switch discards the unicast frame.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 42

Compared with the software architecture of C/S, B/S does not need to install a browser, and users are more flexible and convenient to use.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 43

As shown in the figure, packet obtaining software is used to obtain some packets on a terminal. Which of the following statements is correct about the obtained packet information?

Options:

A.

The terminal sends a TCP connection establishment request to 192.168.1.1.

B.

The terminal sends a TCP connection termination request to 192.168.1.1.

C.

The terminal uses Telnet to log in to another device.

D.

The terminal uses HTTP to log in to another device.

Buy Now
Questions 44

Which of the following zones is not the firewall default security zone?

Options:

A.

Trust

B.

The Local

C.

DMZ

D.

Management

Buy Now
Questions 45

Which of the following statements is correct about security zones on a Huawei firewall?

Options:

A.

An interface on a firewall can belong to multiple zones.

B.

The default zones on a firewall can be deleted.

C.

Different security zones on a firewall have the same default security level.

D.

Different interfaces on a firewall can be in the same zone.

Buy Now
Exam Code: H12-711_V4.0
Exam Name: HCIA-Security V4.0 Exam
Last Update: Apr 8, 2026
Questions: 153
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now H12-711_V4.0