Weekend Sale Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

HCIA-Security H12-711_V4.0 Book

HCIA-Security V4.0 Questions and Answers

Question 9

What is the security level of the Untrust zone in Huawei firewalls?

Options:

A.

10

B.

20

C.

5

D.

15

Question 10

Regarding the characteristics of the routing table, which of the following items is described correctly

Options:

A.

Port When a packet matches multiple entries in the routing table, it is forwarded based on the route entry with the largest metric.

B.

Port In the global routing table, there is at most one next hop to the same destination CIDR block.

C.

There may be multiple next hops in the global routing table to the same destination.

D.

Port When a packet matches multiple entries in the routing table, it is forwarded according to the longest mask.

Question 11

Data monitoring can be divided into two types: active analysis and passive acquisition.

Options:

A.

TRUE

B.

FALSE

Question 12

Which of the following attack methods is to construct special SQL statements and submit sensitive information to exploit program vulnerabilities

Options:

A.

Buffer overflow attack

B.

SQL injection attacks

C.

Worm attack

D.

Phishing attacks