Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Huawei H12-711_V4.0 Dumps Questions Answers

Page: 1 / 11
Total 153 questions

HCIA-Security V4.0 Exam Questions and Answers

Question 1

What is the security level of the Untrust zone in Huawei firewalls?

Options:

A.

10

B.

20

C.

5

D.

15

Buy Now
Question 2

Which of the following statements are correct about IKE-based SA establishment in IPsec?

Options:

A.

SAs are valid permanently.

B.

IKE-based SA establishment applies to medium- and large-sized networks.

C.

The SPI value is generated randomly.

D.

Keys are generated using the DH algorithm and dynamically updated.

Question 3

Which of the following statements is correct about security zones on a Huawei firewall?

Options:

A.

An interface on a firewall can belong to multiple zones.

B.

The default zones on a firewall can be deleted.

C.

Different security zones on a firewall have the same default security level.

D.

Different interfaces on a firewall can be in the same zone.

Question 4

Which of the following protocols is a file transfer protocol?

Options:

A.

Mouth POP3

B.

Mouth NFS

C.

Mouth HITP

D.

Mouth DFTP

Question 5

Which of the following is not included in the Business Impact Analysis (BIA).

Options:

A.

Risk identification

B.

Impact assessment

C.

Incident handling priority

D.

Business priorities

Question 6

At what layer does packet filtering technology in the firewall filter packets?

Options:

A.

Transport layer

B.

Network layer

C.

Physical layer

D.

Data link layer

Question 7

As shown in the figure, the administrator needs to test the network quality of the 20.0.0/24 CIDR block to the 40.0.0/24 CIDR block on Device B, and the device needs to send large packets for a long time to test the network connectivity and stability.

Options:

A.

tracert -a 20.0.0.1 -f 500 -q 9600 40.0.0.2

B.

ping -a 20.0.0.1 -c 500 -s 9600 40.0.0.2

C.

ping -s 20.0.0.1 -h 500-f 9600 40.0.0.2

D.

tracert -a 20.0.0.1 -c 500 -w 9600 40.0.0.2

Question 8

We should choose the encryption algorithm according to our own use characteristics. When we need to encrypt a large amount of data, it is recommended to use the ____ encryption algorithm to improve the encryption and decryption speed.[fill in the blank]*

Options:

Question 9

Which of the following statements is incorrect about DoS attacks?

Options:

A.

DoS attacks use IP spoofing to prevent authorized users from connecting to the target server.

B.

DoS attacks stop services or resource access on the target server.

C.

DoS attack forces the target server's buffer to be full and does not receive new requests.

D.

DoS attacks cause unrecoverable physical damage to the target server.

Question 10

The following description of asymmetric encryption algorithms, which item is wrong?

Options:

A.

Compared with symmetric encryption algorithms, the security factor is higher.

B.

Encryption is faster than symmetric encryption algorithms.

C.

Public keys are generally disclosed to users.

D.

Asymmetric encryption algorithms are a pair of keys, divided into public and private keys.

Question 11

IPSec VPN uses an asymmetric algorithm to calculate the ___ key to encrypt data packets.[fill in the blank]

Options:

Question 12

On a firewall, security policies with the permit action do not need to be configured for traffic between users in the same zone.

Options:

A.

TRUE

B.

FALSE

Question 13

The traffic direction of a firewall is based on the zone priority. The _____ direction refers to the direction from a low-priority zone to a high-priority zone. Capitalize the first letter.

Options:

Question 14

Devices that need to provide network services externally, such as WWW servers and FTP servers, can be placed in the DMZ.

Options:

A.

TRUE

B.

FALSE

Question 15

Sub-interfaces can be created on GE0/0/1 of a firewall. The sub-interfaces can be added to different VLANs, but cannot be added to security zones.

Options:

A.

TRUE

B.

FALSE

Question 16

Which type of NAT applies to the scenario where there are a small number of Internet access users and the number of public IP addresses is the same as the number of concurrent Internet access users?

Options:

A.

NAPT

B.

NAT No-PAT

C.

3-tuple NAT

D.

Easy IP

Question 17

Information security aims to protect data in hardware, software, and their systems on information networks to prevent data damage, tampering, or breach due to occasional or malicious reasons and ensure proper system running and non-stop information services.

Options:

A.

TRUE

B.

FALSE

Question 18

Match each of the following application layer service protocols with the correct transport layer protocols and port numbers.

Options:

Question 19

Huawei Firewall only supports the inter-domain persistent connection function for TCP packets.

Options:

A.

TRUE

B.

FALSE

Question 20

Which layer of data packets does a packet filtering firewall check?

Options:

A.

Application layer

B.

Physical layer

C.

Network layer

D.

Data link layer

Question 21

Which layer of the protocol stack does SSL provide end-to-end encrypted transmission services?

Options:

A.

Application layer

B.

Data link layer

C.

Network layer

D.

Transport layer

Question 22

Which of the following functions help implement IPsec secure transmission of user service data on the Internet by means of encryption and authentication?

Options:

A.

Data encryption

B.

Data origin authentication

C.

Anti-replay

D.

Data integrity check

Question 23

Which of the following authentication modes are supported by AAA?

Options:

A.

RADIUS authentication

B.

No authentication

C.

HWTACACS authentication

D.

Local authentication

Question 24

Which of the following is not a type of Windows log event?

Options:

A.

Information

B.

Debugging

C.

Error

D.

Warning

Question 25

Which security zone can be deleted and its priority can be reconfigured?

Options:

A.

Untrust

B.

DMZ

C.

Trust

D.

ISP

Question 26

For which of the following parameters can the packet filtering firewall filter?

Options:

A.

Port packet payload

B.

IP address of the port source destination

C.

The MAC address of the source destination

D.

Port number and protocol number of the port source

Question 27

The following description of IDS, which items are correct

The IDS cannot be linked to the firewall.

Options:

A.

Mouth IDS is a fine-grained detection device, through which the live network can be monitored more accurately.

B.

The IDS can be upgraded flexibly and in a timely manner, and the strategic configuration operation is convenient and flexible.

C.

With IDS, system administrators can capture traffic from critical nodes and do intelligent analysis to find anomalous and suspicious network behavior and report it to administrators.

Question 28

Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution. 1. Inhibition stage, 2. recovery phase, 3. Detection stage, 4. eradication phase[fill in the blank]*

Options:

Question 29

Which of the following descriptions about the main implementation of single sign-on is wrong?

Options:

A.

Accept PC message mode

B.

Query the AD server security log mode

C.

Query the syslog server mode

D.

Firewall monitors AD authentication packets

Question 30

_____ Authentication is to configure user information (including local user's user name, password and various attributes) on the network access server. The advantage is that it is fast.[fill in the blank]*

Options:

Question 31

The following description of investigation and evidence collection, which one is correct

Options:

A.

Documentary evidence is required in computer crime.

B.

In all investigation and evidence collection, it is best to have law enforcement agencies involved.

C.

Evidence is not necessarily required in the course of the investigation.

D.

Evidence obtained by wiretapping is also valid.

Question 32

ARP man-in-the-middle attacks are a type of spoofing attack technique.

Options:

A.

TRUE

B.

FALSE

Question 33

As shown, in transmission mode, which of the following locations should the AH header be inserted in?

Options:

A.

3

B.

2

C.

1

D.

4

Question 34

When IKEv1 negotiation phase 1 uses the aggressive mode, only three messages are used. Which of the following is the function of message 3?

Options:

A.

Exchanges Diffie-Hellman public values, necessary auxiliary information, and identity information.

B.

Negotiates IKE proposals.

C.

Enables the responder to send identity information to the initiator for authentication.

D.

Enables the responder to authenticate the initiator.

Question 35

When logging in to the web UI through HTTPS, you need to specify a local certificate issued by a CA that the web browser trusts for the HTTPS client on the device. Because the web browser can verify the local certificate, this approach avoids malicious attacks and ensures secure logins of administrators.

Options:

A.

TRUE

B.

FALSE

Question 36

Arrange the following processes in the correct order based on the PKI lifecycle.

Options:

Question 37

Among the various aspects of the risk assessment of IS027001, which of the following does not belong to the system design and release process?

Options:

A.

Hold a summary meeting of the project in the information security management stage

B.

Determine risk disposal measures and implement rectification plans

C.

Determine risk tolerance and risk appetite

D.

System integration and information security management system document preparation

Question 38

Which of the following statements are correct about the status of the firewall VGMP group?

Options:

A.

Initialize

B.

Active

C.

Load-balance

D.

Standby

Question 39

A three-way handshake is required to establish a TCP connection, and a four-way handshake is required to end a TCP connection.

Options:

A.

TRUE

B.

FALSE

Question 40

Match the following single-packet attack types with their corresponding descriptions.

Options:

Question 41

IPS signatures describe the characteristics of attack behaviors on the network. The firewall detects and defends against attacks by comparing data flows with IPS signatures.

Options:

A.

TRUE

B.

FALSE

Question 42

What are the correct entries in the following description of firewall security zones?

Options:

A.

The DMZ security zone solves the problem of server placement well, and this security area can place devices that need to provide network services to the outside world.

B.

The Local zone is the highest security zone with a priority of 99.

C.

Data flows between security domains are directional, including Inbound and Outbound.

D.

Normally, the two communicating parties must exchange messages, that is, there are messages transmitted in both directions between security domains.

Question 43

In cases where some configurations alter existing session table entries and want them to take effect immediately, you can regenerate the session table by clearing the session table information. All session table information can be cleared by executing the _____firewall session table command.

Options:

Question 44

The following description of the intrusion fire protection system IPS, which is correct?

Options:

A.

The port IPS can be concatenated at the network boundary.

B.

The IPS cannot prevent intrusion from occurring in real time.

C.

The port IPS can be attached to the switch and port mirrored through the switch.

D.

Oral IPS has the ability to customize intrusion prevention rules.

Question 45

As shown in the figure, what is the range of the AH protocol authentication range in transmission mode?

Options:

A.

The4

B.

The3

C.

The2

D.

The1

Page: 1 / 11
Total 153 questions