Weekend Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

H12-711_V4.0 Sample Questions Answers

Questions 4

The network environment is becoming more and more complex, and network security incidents occur frequently. While accelerating the construction of informatization, enterprises must not only resist external attacks, but also prevent internal management personnel from being involved in data leakage and operation and maintenance accidents due to operational errors and other issues. Which of the following options might reduce operational risk?

Options:

A.

According to the administrator configuration, the O&M user corresponds to the background resource account, and restricts the unauthorized use of the account. mouth Based on the password security policy, the O&M security audit system automatically modifies the password of the background resource account at regular intervals.

B.

Each system is independently operated, maintained and managed, and the access process is not audited and monitored.

C.

Oral Each department system is independently authenticated and uses a single static password for authentication.

Buy Now
Questions 5

When IPSec VPN uses tunnel mode to encapsulate packets, which of the following is not within the encryption scope of the ESP security protocol? ( )[Multiple choice]*

Options:

A.

ESP Header

B.

TCP Header

C.

Raw IP Header

D.

ESP Tail

Buy Now
Questions 6

What is the protocol number of the GRE protocol?

Options:

A.

47

B.

48

C.

46

D.

The 50th

Buy Now
Questions 7

In the authentication policy of the firewall, _____ allows the user to not need to enter the user name and password, but can obtain the corresponding relationship between the user and the IP, so as to carry out policy management based on the user[fill in the blank]*

Options:

Buy Now
Questions 8

Which of the following protocols is a file transfer protocol?

Options:

A.

Mouth POP3

B.

Mouth NFS

C.

Mouth HITP

D.

Mouth DFTP

Buy Now
Questions 9

IPSec VPN uses an asymmetric algorithm to calculate the ___ key to encrypt data packets.[fill in the blank]

Options:

Buy Now
Questions 10

Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution. 1. Inhibition stage, 2. recovery phase, 3. Detection stage, 4. eradication phase[fill in the blank]*

Options:

Buy Now
Questions 11

What is correct about the following description of device management in the operating system?

Options:

A.

The main task of port device management is to complete the I/O requests made by users and classify I/O devices for users.

B.

Whenever a process makes an I/O request to the system, as long as it is secure, the device allocator will assign the device to the process according to a certain policy.

C.

Device management can virtualize a physical device into multiple logical devices through virtualization technology, providing multiple user processes to use.

D.

In order to alleviate the problem of speed mismatch between CPU and I/O devices and improve the parallelism of CPU and I/O devices, in modern operating systems, almost all I/O devices are exchanging numbers with processors

Buffers are used at all times.

Buy Now
Questions 12

Which layer of the protocol stack does SSL provide end-to-end encrypted transmission services?

Options:

A.

Application layer

B.

Data link layer

C.

Network layer

D.

Transport layer

Buy Now
Questions 13

Which of the following descriptions of single sign-on is correct?

Options:

A.

The visitor recited the Portal authentication page and sent the username and password to FT to identify his/her identity, and the password was not stored on the FT, and the FI sent the username and password to the third-party authentication server, and the authentication process was carried out on the authentication server.

B.

The visitor sends the username and password that identifies his identity to the third-party authentication server, and after the authentication is passed, the third-party authentication server sends the visitor's identity information to FW. F7 only records the identity information of the visitor and does not participate in the authentication process

C.

Visitors obtain the SMS verification code through the Portal authentication page, and then enter the SMS verification code to pass the authentication.

D.

The visitor sends the username and password that identifies them to the FW through the portal authentication page, on which the password is stored and the verification process takes place on the FW.

Buy Now
Questions 14

Which of the following is the correct sequence for incident response management

1. Detection 2 Report 3 Mitigation 4 Lessons learned 5 Fix 6 Recovery 7 Response

Options:

A.

1->3->2->7->6->5->4

B.

1->7->3->2->6->5->4

C.

1->3->2->7->5->6->4

D.

1->2->3->7->6->5->4

Buy Now
Questions 15

Which of the following NAT technologies can implement a public network address to provide source address translation for multiple private network addresses ( )*

Options:

A.

NAPT

B.

NAT Server

C.

Easy-ip

CT Jinglu

D.

NAT No-PAT

Buy Now
Questions 16

Please order the following steps in the PKI life cycle correctly, 1. Issued, 2. storage, 3. Update, 4. verify[fill in the blank]*

Options:

Buy Now
Questions 17

A Web server is deployed in an enterprise intranet to provide Web access services to Internet users, and in order to protect the access security of the server, it should be divided into the _____ area of the firewall.

Options:

Buy Now
Questions 18

Among the various aspects of the risk assessment of IS027001, which of the following does not belong to the system design and release process?

Options:

A.

Hold a summary meeting of the project in the information security management stage

B.

Determine risk disposal measures and implement rectification plans

C.

Determine risk tolerance and risk appetite

D.

System integration and information security management system document preparation

Buy Now
Questions 19

Data monitoring can be divided into two types: active analysis and passive acquisition.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 20

Under normal circumstances, the Emai1 protocols we often talk about include ____, POP3, and SMTP.[fill in the blank]*

Options:

Buy Now
Questions 21

Please match the following information security risks to information security incidents one by one.[fill in the blank]*

physical security riskEnterprise server permissions are loosely set

Information Security Management RiskInfected Panda Burning Incense

Information Access RiskFire destroyed equipment in computer room

application riskTalk to people about leaking company secrets

Options:

Buy Now
Questions 22

The following description of the AH protocol in IPSec VPN, which one is wrong?

Options:

A.

Supports data source validation

B.

Supports data integrity checking

C.

Supports packet encryption

D.

Support anti-message replay

Buy Now
Questions 23

In the Linux system, which of the following is the command to query the P address information? ( )[Multiple choice]*

Options:

A.

ifconfig)

B.

display ip interface brief

C.

ipconfig

D.

display ip

Buy Now
Questions 24

IKE SA is a one-way logical connection, and only one IKE SA needs to be established between two peers.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 25

What is correct in the following description of Security Alliance in IPSec?

There are two ways to set up an IPSec SA

Options:

A.

manual and IKE.

IPSec SA is uniquely identified by a triple.

B.

IPSec SA is a one-way logical connection, usually established in pairs (Inbound and Outbound).

C.

Security Alliance SA is a communication peer agreement for certain elements that describes how peers can communicate securely using secure services such as encryption.

Buy Now
Questions 26

Huawei Firewall only supports the inter-domain persistent connection function for TCP packets.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 27

In the automatic backup mode of hot standby on the second machine, which of the following sessions is backed up?

Options:

A.

ICMP session

B.

TCP half-connection session

C.

Self-session to the firewall

D.

UDP first packet session

Buy Now
Exam Code: H12-711_V4.0
Exam Name: HCIA-Security V4.0 Exam
Last Update: Oct 11, 2024
Questions: 91
$56  $159.99
$42  $119.99
$35  $99.99
buy now H12-711_V4.0