Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Huawei > HCIA-Security > H12-711_V4.0

H12-711_V4.0 HCIA-Security V4.0 Question and Answers

Question # 4

Which of the following NAT technologies can implement a public network address to provide source address translation for multiple private network addresses ( )*

A.

NAPT

B.

NAT Server

C.

Easy-ip

CT Jinglu

D.

NAT No-PAT

Full Access
Question # 5

Please match the following information security risks to information security incidents one by one.[fill in the blank]*

physical security riskEnterprise server permissions are loosely set

Information Security Management RiskInfected Panda Burning Incense

Information Access RiskFire destroyed equipment in computer room

application riskTalk to people about leaking company secrets

Full Access
Question # 6

In the automatic backup mode of hot standby on the second machine, which of the following sessions is backed up?

A.

ICMP session

B.

TCP half-connection session

C.

Self-session to the firewall

D.

UDP first packet session

Full Access
Question # 7

Data monitoring can be divided into two types: active analysis and passive acquisition.

A.

TRUE

B.

FALSE

Full Access
Question # 8

Which of the following zones is not the firewall default security zone?

A.

Trust

B.

The Local

C.

DMZ

D.

Management

Full Access
Question # 9

Which of the following characteristics does a denial-of-service attack include?

A.

Unauthorized tampering of the mouth

B.

Unauthorized access to the mouth

C.

Unauthorized activation of the mouth

D.

Unauthorized destruction of the mouth

Full Access
Question # 10

When the Layer 2 switch receives a unicast frame and the MAC address table entry of the switch is empty, the switch discards the unicast frame.

A.

TRUE

B.

FALSE

Full Access
Question # 11

_____ Authentication is to configure user information (including local user's user name, password and various attributes) on the network access server. The advantage is that it is fast.[fill in the blank]*

Full Access
Question # 12

Which of the following are the backup items that HRP can provide?

A.

Mouth Server-map table entry

B.

Mouth No-PAT table entry

C.

Mouth ARP table entry

D.

Port TCP session table

Full Access
Question # 13

Which of the following descriptions of server authentication is correct?

A.

The visitor sends the username and password that identifies his identity to FW through the portal authentication page, there is no password stored on F7, FT sends the username and password to a third-party authentication server, and the verification process is carried out on the authentication server.

B.

Visitors obtain the SMS verification code through the Portal authentication page, and then enter the SMS verification code to pass the authentication.

C.

The visitor sends the username and password that identifies his identity to the third-party authentication server, and after the authentication is passed, the third-party authentication server sends the visitor's identity information to FW.

D.

The visitor sends the username and password that identifies them to the FW through the portal authentication page, on which the password is stored and the verification process takes place on the FW.

Full Access