Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Huawei > HCIA-Security > H12-711_V4.0

H12-711_V4.0 HCIA-Security V4.0 Exam Question and Answers

Question # 4

Which of the following statements is incorrect about information transmission through the heartbeat link between two firewalls that work in hot standby mode?

A.

Heartbeat packets are sent to synchronize configuration commands and status information between the two firewalls.

B.

Heartbeat packets are periodically sent by the two firewalls to check whether the peer device is alive.

C.

VGMP packets are sent to check the status of the peer device, so as to determine whether a switchover is required.

D.

Configuration consistency check packets are sent to check whether key configurations of the two firewalls are consistent.

Full Access
Question # 5

IKE SA is a one-way logical connection, and only one IKE SA needs to be established between two peers.

A.

TRUE

B.

FALSE

Full Access
Question # 6

____- The goal is to provide a rapid, composed and effective response in emergency situations, thereby enhancing the ability of the business to recover immediately from a disruptive event.[fill in the blank]*

Full Access
Question # 7

_____ Authentication is to configure user information (including local user's user name, password and various attributes) on the network access server. The advantage is that it is fast.[fill in the blank]*

Full Access
Question # 8

When IPSec VPN uses tunnel mode to encapsulate packets, which of the following is not within the encryption scope of the ESP security protocol?

A.

ESP Header

B.

TCP Header

C.

Raw IP Header

D.

ESP Tail

Full Access
Question # 9

As shown in the figure, the administrator needs to test the network quality of the 20.0.0/24 CIDR block to the 40.0.0/24 CIDR block on Device B, and the device needs to send large packets for a long time to test the network connectivity and stability.

A.

tracert -a 20.0.0.1 -f 500 -q 9600 40.0.0.2

B.

ping -a 20.0.0.1 -c 500 -s 9600 40.0.0.2

C.

ping -s 20.0.0.1 -h 500-f 9600 40.0.0.2

D.

tracert -a 20.0.0.1 -c 500 -w 9600 40.0.0.2

Full Access
Question # 10

As shown in the figure, nat server global202.106.1.1 inside10.10.1.1 is configured on the firewall. Which of the following is the correct configuration for interzone rules?

A.

rule name c. source-zone untrust. destination-zone trust. destination-address 202.106.1.132, action permit

B.

rule name d, source- zone untrust. destination- zone trust. destination- address10.l0.1.1 32, action permit

C.

rule name b, source- zone untrust, destination- zone trust, source- address10.10.1.1 32, action permit

D.

rule name b, source-zone untrust, destination-zone trust, source-address202.106.l.1 32, action permit

Full Access
Question # 11

Database operation records can be used as ___ evidence to backtrack security events.[fill in the blank]*

Full Access
Question # 12

Compared with the software architecture of C/S, B/S does not need to install a browser, and users are more flexible and convenient to use.

A.

TRUE

B.

FALSE

Full Access
Question # 13

Which of the following functions help implement IPsec secure transmission of user service data on the Internet by means of encryption and authentication?

A.

Data encryption

B.

Data origin authentication

C.

Anti-replay

D.

Data integrity check

Full Access
Question # 14

Which of the following protocols are transport layer protocols?

A.

UDP

B.

FTP

C.

TCP

D.

DHCP

Full Access
Question # 15

Which of the following statements are correct about the PKI system structure?

A.

A PKI entity is an end user of PKI products or services. It can be an individual, an organization, a device such as a router or firewall, or a process running on a computer.

B.

CAs are classified into the root CA and subordinate CAs according to the hierarchy of CAs.

C.

A CA is a trusted entity that issues and manages digital certificates.

D.

A PKI system consists of three parts: entity, certificate authority, and certificate registration authority.

Full Access
Question # 16

What type of ACL does ACL number 3001 correspond to?

A.

Layer 2 ACL

B.

interface ACL

C.

Basic ACL

D.

Advanced ACLs

Full Access
Question # 17

Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution.[fill in the blank]*

Full Access
Question # 18

Which of the following descriptions about the heartbeat interface is wrong ( )?

A.

It is recommended to configure at least two heartbeat interfaces. - One heartbeat interface is used as the master, and the other heartbeat interface is used as the backup.

B.

The interface MTU value is greater than 1500 and cannot be used as a heartbeat interface

C.

The connection method of the heartbeat interface can be directly connected, or it can be connected through a switch or router

D.

MGMT interface (Gigabi tEtherneto/0/0) cannot be used as heartbeat interface

Full Access
Question # 19

Which of the following attack methods is to construct special SQL statements and submit sensitive information to exploit program vulnerabilities

A.

Buffer overflow attack

B.

SQL injection attacks

C.

Worm attack

D.

Phishing attacks

Full Access
Question # 20

Which of the following protocols is a multichannel protocol?

A.

The Telnet

B.

THE HITP

C.

FTP

D.

The SSH

Full Access
Question # 21

Which of the following descriptions of single sign-on is correct?

A.

The visitor recited the Portal authentication page and sent the username and password to FT to identify his/her identity, and the password was not stored on the FT, and the FI sent the username and password to the third-party authentication server, and the authentication process was carried out on the authentication server.

B.

The visitor sends the username and password that identifies his identity to the third-party authentication server, and after the authentication is passed, the third-party authentication server sends the visitor's identity information to FW. F7 only records the identity information of the visitor and does not participate in the authentication process

C.

Visitors obtain the SMS verification code through the Portal authentication page, and then enter the SMS verification code to pass the authentication.

D.

The visitor sends the username and password that identifies them to the FW through the portal authentication page, on which the password is stored and the verification process takes place on the FW.

Full Access
Question # 22

WAF can accurately control and manage users' online behavior and user traffic.

A.

TRUE

B.

FALSE

Full Access
Question # 23

The trigger modes of the built-in Portal authentication in the firewall include pre-authentication and ____ authentication[fill in the blank]*

Full Access
Question # 24

When forwarding a TCP, UDP, or ICMP packet, the firewall needs to query the session table in order to determine the connection to which the packet belongs and take corresponding measures.

A.

TRUE

B.

FALSE

Full Access
Question # 25

Which of the following are the backup items that HRP can provide?

A.

Mouth Server-map table entry

B.

Mouth No-PAT table entry

C.

Mouth ARP table entry

D.

Port TCP session table

Full Access
Question # 26

Which of the following are application-layer protocols?

A.

DNS

B.

ARP

C.

Telnet

D.

HTTP

Full Access
Question # 27

The following description of IDS, which items are correct

The IDS cannot be linked to the firewall.

A.

Mouth IDS is a fine-grained detection device, through which the live network can be monitored more accurately.

B.

The IDS can be upgraded flexibly and in a timely manner, and the strategic configuration operation is convenient and flexible.

C.

With IDS, system administrators can capture traffic from critical nodes and do intelligent analysis to find anomalous and suspicious network behavior and report it to administrators.

Full Access
Question # 28

A Web server is deployed in an enterprise intranet to provide Web access services to Internet users, and in order to protect the access security of the server, it should be divided into the _____ area of the firewall.

Full Access
Question # 29

Which of the following protocols is a file transfer protocol?

A.

Mouth POP3

B.

Mouth NFS

C.

Mouth HITP

D.

Mouth DFTP

Full Access
Question # 30

What is the security level of the Untrust zone in Huawei firewalls?

A.

10

B.

20

C.

5

D.

15

Full Access
Question # 31

Please classify the following security defenses into the correct classification.

Full Access
Question # 32

Drag the warning level of the network security emergency response on the left into the box on the right, and arrange it from top to bottom in order of severity.[fill in the blank]*

Full Access
Question # 33

How frequently should antivirus signature databases be updated to ensure the effectiveness of an antivirus program or software?

A.

Every month

B.

Every day

C.

Three months

D.

Half a month

Full Access
Question # 34

Which of the following statements are incorrect about the differences between routers and Layer 2 switches?

A.

By default, routers can isolate broadcast domains but not collision domains.

B.

Switches flood broadcast packets.

C.

Routers forward broadcast packets.

D.

By default, switches can isolate collision domains but not broadcast domains.

Full Access
Question # 35

Sub-interfaces can be created on GE0/0/1 of a firewall. The sub-interfaces can be added to different VLANs, but cannot be added to security zones.

A.

TRUE

B.

FALSE

Full Access
Question # 36

On a firewall, security policies with the permit action do not need to be configured for traffic between users in the same zone.

A.

TRUE

B.

FALSE

Full Access
Question # 37

Which of the following is not included in the Business Impact Analysis (BIA).

A.

Risk identification

B.

Impact assessment

C.

Incident handling priority

D.

Business priorities

Full Access
Question # 38

Which of the following problems cannot be solved using PKI?

A.

The network is congested due to heavy traffic. As a result, the server cannot provide services properly.

B.

The transaction parties cannot verify the identities of each other.

C.

Data may be eavesdropped and tampered with during transmission, and information security cannot be ensured.

D.

No paper receipt is used in transaction, making arbitration difficult.

Full Access
Question # 39

The traffic direction of a firewall is based on the zone priority. The _____ direction refers to the direction from a low-priority zone to a high-priority zone. Capitalize the first letter.

Full Access
Question # 40

As shown in the figure, what is the authentication range of the AH protocol in tunnel mode?

A.

The3

B.

The4

C.

The2

D.

The1

Full Access
Question # 41

Sub-interfaces can be created on GE0/0/1 of a firewall. The sub-interfaces can be added to different VLANs, but cannot be added to security zones.

A.

TRUE

B.

FALSE

Full Access
Question # 42

The following description of asymmetric encryption algorithms, which item is wrong?

A.

Compared with symmetric encryption algorithms, the security factor is higher.

B.

Encryption is faster than symmetric encryption algorithms.

C.

Public keys are generally disclosed to users.

D.

Asymmetric encryption algorithms are a pair of keys, divided into public and private keys.

Full Access
Question # 43

Which layer of data packets does a packet filtering firewall check?

A.

Application layer

B.

Physical layer

C.

Network layer

D.

Data link layer

Full Access
Question # 44

As shown in the figure, which of the following shows the authentication range of ESP in transport mode?

A.

4

B.

1

C.

3

D.

2

Full Access
Question # 45

What is the protocol number of the GRE protocol?

A.

47

B.

48

C.

46

D.

The 50th

Full Access