Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Huawei H12-711_V4.0 Dumps

HCIA-Security V4.0 Questions and Answers

Question 1

Under normal circumstances, the Emai1 protocols we often talk about include ____, POP3, and SMTP.[fill in the blank]*

Options:

Question 2

IPSec VPN uses an asymmetric algorithm to calculate the ___ key to encrypt data packets.[fill in the blank]

Options:

Question 3

An enterprise wants to build a server system and requires the following functions: 1. The enterprise needs to have its own dedicated mailbox, and the sending and receiving of emails needs to go through the enterprise's server; 2. The server must provide file transfer and access services. Users in different departments of the enterprise provide accounts with different permissions: 3. When the enterprise accesses the internal webpage of the enterprise, the enterprise can directly enter the domain name in the browser to access. To meet the above requirements, which of the following servers do enterprises need to deploy? ( )*

Options:

A.

Time synchronization server

B.

FTP server (I)

C.

DNS server

D.

Mail server

Question 4

Huawei Firewall only supports the inter-domain persistent connection function for TCP packets.

Options:

A.

TRUE

B.

FALSE

Question 5

Which of the following is not included in the Business Impact Analysis (BIA).

Options:

A.

Risk identification

B.

Impact assessment

C.

Incident handling priority

D.

Business priorities

Question 6

The following description of the AH protocol in IPSec VPN, which one is wrong?

Options:

A.

Supports data source validation

B.

Supports data integrity checking

C.

Supports packet encryption

D.

Support anti-message replay

Question 7

At what layer does packet filtering technology in the firewall filter packets?

Options:

A.

Transport layer

B.

Network layer

C.

Physical layer

D.

Data link layer

Question 8

The following description of IDS, which items are correct

The IDS cannot be linked to the firewall.

Options:

A.

Mouth IDS is a fine-grained detection device, through which the live network can be monitored more accurately.

B.

The IDS can be upgraded flexibly and in a timely manner, and the strategic configuration operation is convenient and flexible.

C.

With IDS, system administrators can capture traffic from critical nodes and do intelligent analysis to find anomalous and suspicious network behavior and report it to administrators.

Question 9

What is the security level of the Untrust zone in Huawei firewalls?

Options:

A.

10

B.

20

C.

5

D.

15

Question 10

Regarding the characteristics of the routing table, which of the following items is described correctly

Options:

A.

Port When a packet matches multiple entries in the routing table, it is forwarded based on the route entry with the largest metric.

B.

Port In the global routing table, there is at most one next hop to the same destination CIDR block.

C.

There may be multiple next hops in the global routing table to the same destination.

D.

Port When a packet matches multiple entries in the routing table, it is forwarded according to the longest mask.

Question 11

Data monitoring can be divided into two types: active analysis and passive acquisition.

Options:

A.

TRUE

B.

FALSE

Question 12

Which of the following attack methods is to construct special SQL statements and submit sensitive information to exploit program vulnerabilities

Options:

A.

Buffer overflow attack

B.

SQL injection attacks

C.

Worm attack

D.

Phishing attacks

Question 13

When the Layer 2 switch receives a unicast frame and the MAC address table entry of the switch is empty, the switch discards the unicast frame.

Options:

A.

TRUE

B.

FALSE