Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Huawei H12-711_V4.0 HCIA-Security V4.0 Exam Practice Test

HCIA-Security V4.0 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

In the TCP/P protocol core, which of the following protocols works at the application layer? ( )[Multiple choice]*

Options:

A.

IGMP

B.

ICMP

C.

RIP

D.

ARP

Question 2

Which of the following attack methods is to construct special SQL statements and submit sensitive information to exploit program vulnerabilities

Options:

A.

Buffer overflow attack

B.

SQL injection attacks

C.

Worm attack

D.

Phishing attacks

Question 3

Which of the following is not included in the Business Impact Analysis (BIA).

Options:

A.

Risk identification

B.

Impact assessment

C.

Incident handling priority

D.

Business priorities

Question 4

During the process of establishing IPSec VPN between peers FW_A and FW_B, two types of security associations need to be established in two stages. In the first stage, _____ is established to verify the identity of the peers.[fill in the blank]*

Options:

Question 5

The following description of the intrusion fire protection system IPS, which is correct?

Options:

A.

The port IPS can be concatenated at the network boundary.

B.

The IPS cannot prevent intrusion from occurring in real time.

C.

The port IPS can be attached to the switch and port mirrored through the switch.

D.

Oral IPS has the ability to customize intrusion prevention rules.

Question 6

As shown in the figure, nat server global202.106.1.1 inside10.10.1.1 is configured on the firewall. Which of the following is the correct configuration for interzone rules? ( )[Multiple choice]*

Options:

A.

rule name c. source-zone untrust. destination-zone trust. destination-address 202.106.1.132, action permit

B.

rule name d, source- zone untrust. destination- zone trust. destination- address10.l0.1.1 32, action permit

C.

rule name b, source- zone untrust, destination- zone trust, source- address10.10.1.1 32, action permit

D.

rule name b, source-zone untrust, destination-zone trust, source-address202.106.l.1 32, action permit

Question 7

When the Layer 2 switch receives a unicast frame and the MAC address table entry of the switch is empty, the switch discards the unicast frame.

Options:

A.

TRUE

B.

FALSE

Question 8

The shard cache technology will wait for the arrival of the first shard packet, and then reassemble and decrypt all the packets, and then do subsequent processing by the device to ensure that the session can proceed normally in some application scenarios.

Options:

A.

TRUE

B.

FALSE

Question 9

According to the level protection requirements, which of the following behaviors belong to the scope of information security operation and maintenance management? ( )*

Options:

A.

Participate in information security training

B.

Backup or restore data

C.

Develop an emergency response plan

D.

Security hardening of the host

Question 10

The following description of the construction of a digital certificate, which item is wrong

Options:

A.

The name of the device that issued the certificate can be different from the subject name in the issuer certificate.

B.

The structure of the certificate follows the specification of the X.509 v3 version.

C.

The simplest certificate consists of a public key, a name, and a digital signature from a certificate authority.

D.

The issuer signs the certificate information with the private key.

Question 11

Digital envelope technology means that the sender uses the receiver's public key to encrypt the data, and then sends the ciphertext to the receiver ( )[Multiple choice]*

Options:

A.

TRUE

B.

FALSE

Question 12

Under normal circumstances, the Emai1 protocols we often talk about include ____, POP3, and SMTP.[fill in the blank]*

Options:

Question 13

Which of the following zones is not the firewall default security zone?

Options:

A.

Trust

B.

The Local

C.

DMZ

D.

Management