Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Huawei H12-725_V4.0 HCIP-Security V4.0 Exam Exam Practice Test

HCIP-Security V4.0 Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Which of the following statements is false about web rewriting in web proxy?

Options:

A.

The intranet server addresses can be hidden, ensuring high security.

B.

Images may be misplaced.

C.

The fonts may be incomplete.

D.

Internet Explorer controls are required.

Question 2

Network Access Control (NAC) is an end-to-end security control technology that works in combination with AAA to implement access authentication. Which of the following statements about NAC and AAA are true?(Select All that Apply)

Options:

A.

AAA is mainly used for interaction between users and access devices.

B.

NAC is mainly used for interaction between access devices and authentication servers.

C.

NAC provides three authentication modes: 802.1X authentication, MAC address authentication, and Portal authentication.

D.

An AAA server controls network access rights of users through authentication, authorization, and accounting.

Question 3

In quota control policies, which of the following can be set for users?(Select All that Apply)

Options:

A.

Limiting the daily online duration

B.

Limiting the total monthly online traffic

C.

Limiting the total daily online traffic

D.

Limiting the total online duration per month

Question 4

Which of the following items are recorded in the IPS service module logs of a Huawei NGFW?(Select All that Apply)

Options:

A.

Signature ID

B.

Source IP address of the attacker

C.

Attack duration

D.

Signature name

Question 5

In SSL VPN, the firewall performs access authorization and control based on which of the following dimensions?

Options:

A.

Role

B.

MAC address

C.

Port number

D.

IP address

Question 6

Which of the following conditions can be matched by PBR?(Select All that Apply)

Options:

A.

Source IP address

B.

Source security zone

C.

Source MAC address

D.

Application

Question 7

Which of the following protocols can be encapsulated through GRE over IPsec?(Select All that Apply)

Options:

A.

IPX

B.

VRRP

C.

IPv6

D.

OSPF

Question 8

Match the HTTP control items with the corresponding descriptions.

Options:

Question 9

Authentication rules configured on iMaster NCE-Campus support multiple matching conditions, such as matching account information, SSID information, and terminal IP address ranges, so that different authentication rules can be executed for different users.

Options:

A.

TRUE

B.

FALSE

Question 10

Sort the intrusion prevention steps in sequence based on the working mechanism of the firewall device.

Options:

Question 11

The Nginx application is deployed on a Linux host. By checking Nginx logs, O&M engineers can obtain the complete URL information submitted by users and determine whether the Linux host is under SQL injection attacks.

Options:

A.

TRUE

B.

FALSE

Question 12

During deployment of Portal authentication, an authentication-free rule profile needs to be configured to ensure Portal pages can be opened on authentication terminals. To achieve this purpose, the following traffic needs to be permitted in the authentication-free rule profile: DNS resolution traffic of user terminals, traffic from user terminals for accessing Portal pages, and traffic from user terminals to the RADIUS server.

Options:

A.

TRUE

B.

FALSE

Question 13

Which of the following statements is true about the incoming traffic in the firewall virtualsystem?(Select All that Apply)

Options:

A.

Traffic from the public network interface to the private network interface is limited by the outbound bandwidth.

B.

Traffic from the public network interface to the private network interface is limited by the inbound bandwidth.

C.

Traffic from the private network interface to the public network interface is limited by the inbound bandwidth.

D.

Traffic from the private network interface to the public network interface is limited by the outbound bandwidth.

Question 14

Which of the following statements is false about Eth-Trunk?(Select All that Apply)

Options:

A.

The total bandwidth of an Eth-Trunk interface is the sum of the bandwidths of all its member interfaces. This increases the interface bandwidth.

B.

The physical interfaces that are bundled into an Eth-Trunk interface are its member interfaces.

C.

If a member interface of the Eth-Trunk interface is Down, traffic can still be transmitted through other member interfaces.

D.

The manual mode can detect not only link disconnections but also link faults and incorrect connections.

Question 15

Which of the following methods are used by flood attacks to cause denial of services?(Select All that Apply)

Options:

A.

Exhaust available bandwidth.

B.

Exhaust server-side resources.

C.

Control network host rights.

D.

Exhaust network device resources.

Question 16

When Eth-Trunk is deployed for the heartbeat links between firewalls, the Eth-Trunk interface can be configured as a Layer 2 interface as long as the total bandwidth of active links on the Eth-Trunk is greater than 30% of the bandwidth required by service traffic.

Options:

A.

TRUE

B.

FALSE

Question 17

: 51 DRAG DROP

Match the description about virtual systems and VPN instances.

Options:

Question 18

When gateways are connected using GRE over IPsec, the IPsec encapsulation mode must be tunnel mode.

Options:

A.

TRUE

B.

FALSE