Spring Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Huawei H12-711_V4.0 Dumps

Page: 1 / 15
Total 153 questions

HCIA-Security V4.0 Exam Questions and Answers

Question 1

Which of the following statements is incorrect about information transmission through the heartbeat link between two firewalls that work in hot standby mode?

Options:

A.

Heartbeat packets are sent to synchronize configuration commands and status information between the two firewalls.

B.

Heartbeat packets are periodically sent by the two firewalls to check whether the peer device is alive.

C.

VGMP packets are sent to check the status of the peer device, so as to determine whether a switchover is required.

D.

Configuration consistency check packets are sent to check whether key configurations of the two firewalls are consistent.

Question 2

Which of the following types of packets cannot be filtered by a packet filtering firewall?

Options:

A.

Non-fragmented packets

B.

Forged ICMP error packets

C.

Initial fragments

D.

Non-initial fragments

Question 3

SSL VPN is a VPN technology that realizes remote secure access through SSL protocol. Which of the following software must be installed when using SSL VPN?

Options:

A.

Browser

B.

Firewall

C.

Client

D.

Antivirus

Question 4

Which of the following statements are correct about SYN flood attack defense technologies on Huawei firewalls?

Options:

A.

The TCP connection establishment rate can be limited to defend against SYN flood attacks.

B.

The number of half-open TCP connections can be limited to defend against SYN flood attacks.

C.

SYN cookie technology can be used to defend against SYN flood attacks.

D.

Interzone security policies can be configured to defend against SYN flood attacks.

Question 5

As shown in the figure, nat server global202.106.1.1 inside10.10.1.1 is configured on the firewall. Which of the following is the correct configuration for interzone rules?

as

Options:

A.

rule name c. source-zone untrust. destination-zone trust. destination-address 202.106.1.132, action permit

B.

rule name d, source- zone untrust. destination- zone trust. destination- address10.l0.1.1 32, action permit

C.

rule name b, source- zone untrust, destination- zone trust, source- address10.10.1.1 32, action permit

D.

rule name b, source-zone untrust, destination-zone trust, source-address202.106.l.1 32, action permit

Question 6

Which of the following statements is incorrect about L2TP?

Options:

A.

L2TP VPN is mainly used in remote office scenarios to provide remote intranet resource access for employees on business trips.

B.

L2TP VPN is a tunneling technology used to transmit PPP packets.

C.

PPP packets can be directly transmitted on the Internet.

D.

L2TP VPN can provide remote access services for employees on business trips, regardless of whether they access the Internet through traditional dial-up or Ethernet.

Question 7

Which of the following attack methods is to construct special SQL statements and submit sensitive information to exploit program vulnerabilities

Options:

A.

Buffer overflow attack

B.

SQL injection attacks

C.

Worm attack

D.

Phishing attacks

Question 8

Which of the following problems cannot be solved using PKI?

Options:

A.

The network is congested due to heavy traffic. As a result, the server cannot provide services properly.

B.

The transaction parties cannot verify the identities of each other.

C.

Data may be eavesdropped and tampered with during transmission, and information security cannot be ensured.

D.

No paper receipt is used in transaction, making arbitration difficult.

Question 9

When IKEv1 negotiation phase 1 uses the aggressive mode, only three messages are used. Which of the following is the function of message 3?

Options:

A.

Exchanges Diffie-Hellman public values, necessary auxiliary information, and identity information.

B.

Negotiates IKE proposals.

C.

Enables the responder to send identity information to the initiator for authentication.

D.

Enables the responder to authenticate the initiator.

Question 10

Which of the following is not an encryption algorithm in a VPN?

Options:

A.

The RIP

B.

AES

C.

3DES

D.

DES

Question 11

Which of the following types of malicious code on your computer includes?

Options:

A.

Oral virus

B.

Trojan horses

C.

Port SQL injection

D.

Oral spyware

Question 12

As shown in the figure, what is the authentication range of the AH protocol in tunnel mode?

as

Options:

A.

The3

B.

The4

C.

The2

D.

The1

Question 13

Which of the following statements are incorrect about the differences between routers and Layer 2 switches?

Options:

A.

By default, routers can isolate broadcast domains but not collision domains.

B.

Switches flood broadcast packets.

C.

Routers forward broadcast packets.

D.

By default, switches can isolate collision domains but not broadcast domains.

Question 14

A three-way handshake is required to establish a TCP connection, and a four-way handshake is required to end a TCP connection.

Options:

A.

TRUE

B.

FALSE

Question 15

The RADIUS protocol specifies how to pass user information, billing information, authentication and billing results between the NAS and the RADIUS server, and the RADIUS server is responsible for receiving the user's connection request, completing the authentication, and returning the result to the NAS.

Options:

A.

TRUE

B.

FALSE

Question 16

As shown in the figure, the administrator needs to test the network quality of the 20.0.0/24 CIDR block to the 40.0.0/24 CIDR block on Device B, and the device needs to send large packets for a long time to test the network connectivity and stability.

as

Options:

A.

tracert -a 20.0.0.1 -f 500 -q 9600 40.0.0.2

B.

ping -a 20.0.0.1 -c 500 -s 9600 40.0.0.2

C.

ping -s 20.0.0.1 -h 500-f 9600 40.0.0.2

D.

tracert -a 20.0.0.1 -c 500 -w 9600 40.0.0.2

Question 17

Which of the following packets is controlled by a firewall's security policy by default?

Options:

A.

Multicast

B.

Broadcast

C.

Anycast

D.

Unicast

Question 18

Which of the following protocols are transport layer protocols?

Options:

A.

UDP

B.

FTP

C.

TCP

D.

DHCP

Question 19

Which of the following is not included in the Business Impact Analysis (BIA).

Options:

A.

Risk identification

B.

Impact assessment

C.

Incident handling priority

D.

Business priorities

Question 20

The IPS detects and analyzes all packets passing through a device and determines whether to permit or block the packets in real time based on the comprehensive detection mechanism. Sort the following steps into the correct order based on the basic implementation mechanism of the IPS.

as

Options:

Question 21

During the process of establishing IPSec VPN between peers FW_A and FW_B, two types of security associations need to be established in two stages. In the first stage, _____ is established to verify the identity of the peers.[fill in the blank]*

Options:

Question 22

As shown, in transmission mode, which of the following locations should the AH header be inserted in?

as

Options:

A.

3

B.

2

C.

1

D.

4

Question 23

The keys used by the IPSec encryption and authentication algorithms can be configured manually or dynamically negotiated via the ____ protocol. (abbreviation, all uppercase).

Options:

Question 24

The following description of digital certificates, which one is wrong

Options:

A.

The simplest certificate consists of a public key, a name, and a digital signature from a certificate authority.

B.

Digital certificates contain the owner's public key and related identity information.

C.

In general, the key of a digital certificate has an expiration date.

D.

Digital certificates do not solve the problem of digital signature technology where the public key cannot be determined to be the designated owner.

Question 25

Which of the following is not an application scenario for PKI?

Options:

A.

SSL VPN

B.

IPsec VPN

C.

IPv6 SEND

D.

Web login through HTTPS

Question 26

Which of the following characteristics does a denial-of-service attack include?

Options:

A.

Unauthorized tampering of the mouth

B.

Unauthorized access to the mouth

C.

Unauthorized activation of the mouth

D.

Unauthorized destruction of the mouth

Question 27

In cases where some configurations alter existing session table entries and want them to take effect immediately, you can regenerate the session table by clearing the session table information. All session table information can be cleared by executing the _____firewall session table command.

Options:

Question 28

Which security zone can be deleted and its priority can be reconfigured?

Options:

A.

Untrust

B.

DMZ

C.

Trust

D.

ISP

Question 29

Sub-interfaces can be created on GE0/0/1 of a firewall. The sub-interfaces can be added to different VLANs, but cannot be added to security zones.

Options:

A.

TRUE

B.

FALSE

Question 30

According to the level protection requirements, which of the following behaviors belong to the scope of information security operation and maintenance management? ( )*

Options:

A.

Participate in information security training

B.

Backup or restore data

C.

Develop an emergency response plan

D.

Security hardening of the host

Question 31

Which of the following statements is correct about SSO?

Options:

A.

A user sends the user name and password to the firewall through the Portal authentication page. The password is stored and authenticated on the firewall.

B.

A user sends the user name and password to a third-party authentication server. After the user passes the authentication, the third-party authentication server sends the user's identity information to the firewall, which only records the information but does not participate in the authentication process.

C.

A user accesses the Portal authentication page, obtains an SMS verification code, and enters the verification code. The authentication then succeeds.

D.

A user sends the user name and password to the firewall through the Portal authentication page. The firewall does not store the password but sends the user name and password to a third-party authentication server. The authentication is performed on the authentication server.

Question 32

Which of the following is not an advantage of symmetric encryption algorithms?

Options:

A.

Suitable for encrypting large amounts of data

B.

Low overhead

C.

Good scalability

D.

High efficiency

Question 33

Which layer of the protocol stack does SSL provide end-to-end encrypted transmission services?

Options:

A.

Application layer

B.

Data link layer

C.

Network layer

D.

Transport layer

Question 34

WAF can accurately control and manage users' online behavior and user traffic.

Options:

A.

TRUE

B.

FALSE

Question 35

When the Layer 2 switch receives a unicast frame and the MAC address table entry of the switch is empty, the switch discards the unicast frame.

Options:

A.

TRUE

B.

FALSE

Question 36

IPSec VPN uses an asymmetric algorithm to calculate the ___ key to encrypt data packets.[fill in the blank]

Options:

Question 37

A VRRP group has three states: Initialize, Master, and Backup.

Options:

A.

TRUE

B.

FALSE

Question 38

Please classify the following security defenses into the correct classification.

as

Options:

Question 39

Social engineering is a means of harm such as deception, harm, etc. through psychological traps such as psychological weaknesses, instinctive reactions, curiosity, trust, and greed of victims ( )

Options:

A.

TURE

B.

False

Question 40

3-tuple NAT allows external devices to proactively access internal PCs through translated addresses and ports. Even if no security policy is configured on the firewall, the firewall allows such access packets to pass through.

Options:

A.

TRUE

B.

FALSE

Question 41

Compared with the software architecture of C/S, B/S does not need to install a browser, and users are more flexible and convenient to use.

Options:

A.

TRUE

B.

FALSE

Question 42

An engineer needs to back up the firewall configuration. Now he wants to use a command to view all the current configurations of the firewall. May I ask the command he uses is ____[fill in the blank]*

Options:

Question 43

When logging in to the web UI through HTTPS, you need to specify a local certificate issued by a CA that the web browser trusts for the HTTPS client on the device. Because the web browser can verify the local certificate, this approach avoids malicious attacks and ensures secure logins of administrators.

Options:

A.

TRUE

B.

FALSE

Question 44

In the authentication policy of the firewall, _____ allows the user to not need to enter the user name and password, but can obtain the corresponding relationship between the user and the IP, so as to carry out policy management based on the user[fill in the blank]*

Options:

Question 45

A Web server is deployed in an enterprise intranet to provide Web access services to Internet users, and in order to protect the access security of the server, it should be divided into the _____ area of the firewall.

Options:

Page: 1 / 15
Total 153 questions