Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Huawei H12-711_V4.0 HCIA-Security V4.0 Exam Exam Practice Test

Demo: 45 questions
Total 153 questions

HCIA-Security V4.0 Exam Questions and Answers

Question 1

Certificates saved in DER format may or may not contain a private key.

Options:

A.

TRUE

B.

FALSE

Question 2

What type of ACL does ACL number 3001 correspond to?

Options:

A.

Layer 2 ACL

B.

interface ACL

C.

Basic ACL

D.

Advanced ACLs

Question 3

Which of the following statements is incorrect about Portal authentication?

Options:

A.

In Portal authentication, users can be authenticated only on the firewall authentication page.

B.

In session authentication, users do not initiate identity authentication. Instead, they access the HTTP service first and are authenticated during the access. Service access is allowed only after authentication.

C.

In user-initiated authentication, users proactively initiate authentication and can access network resources only after authentication.

D.

The built-in Portal authentication triggering modes include session authentication and user-initiated authentication.

Question 4

Under normal circumstances, the Emai1 protocols we often talk about include ____, POP3, and SMTP.[fill in the blank]*

Options:

Question 5

Which of the following operating modes does NTP support?

Options:

A.

Mouth peer mode

B.

Mouth client/server mode

C.

Mouth broadcast mode

D.

Mouth multicast mode

Question 6

What is correct in the following description of Security Alliance in IPSec?

There are two ways to set up an IPSec SA

Options:

A.

manual and IKE.

IPSec SA is uniquely identified by a triple.

B.

IPSec SA is a one-way logical connection, usually established in pairs (Inbound and Outbound).

C.

Security Alliance SA is a communication peer agreement for certain elements that describes how peers can communicate securely using secure services such as encryption.

Question 7

Match the following user categories and authentication modes.

Options:

Question 8

Which of the following descriptions of single sign-on is correct?

Options:

A.

The visitor recited the Portal authentication page and sent the username and password to FT to identify his/her identity, and the password was not stored on the FT, and the FI sent the username and password to the third-party authentication server, and the authentication process was carried out on the authentication server.

B.

The visitor sends the username and password that identifies his identity to the third-party authentication server, and after the authentication is passed, the third-party authentication server sends the visitor's identity information to FW. F7 only records the identity information of the visitor and does not participate in the authentication process

C.

Visitors obtain the SMS verification code through the Portal authentication page, and then enter the SMS verification code to pass the authentication.

D.

The visitor sends the username and password that identifies them to the FW through the portal authentication page, on which the password is stored and the verification process takes place on the FW.

Question 9

A three-way handshake is required to establish a TCP connection, and a four-way handshake is required to end a TCP connection.

Options:

A.

TRUE

B.

FALSE

Question 10

Which of the following statements are correct about firewall security zones?

Options:

A.

Security policies do not have to permit mutual access between users in the same zone.

B.

A security policy can permit traffic in one direction.

C.

By default, firewalls have only three security zones: Trust, Untrust, and DMZ.

D.

A firewall interface can be added to multiple security zones.

Question 11

Which of the following statements are correct about IKE-based SA establishment in IPsec?

Options:

A.

SAs are valid permanently.

B.

IKE-based SA establishment applies to medium- and large-sized networks.

C.

The SPI value is generated randomly.

D.

Keys are generated using the DH algorithm and dynamically updated.

Question 12

In cases where some configurations alter existing session table entries and want them to take effect immediately, you can regenerate the session table by clearing the session table information. All session table information can be cleared by executing the _____firewall session table command.

Options:

Question 13

The RADIUS protocol specifies how to pass user information, billing information, authentication and billing results between the NAS and the RADIUS server, and the RADIUS server is responsible for receiving the user's connection request, completing the authentication, and returning the result to the NAS.

Options:

A.

TRUE

B.

FALSE

Question 14

Which of the following protocols is a multichannel protocol?

Options:

A.

The Telnet

B.

THE HITP

C.

FTP

D.

The SSH

Question 15

In hot standby networking, the heartbeat interfaces of the two firewalls must be directly connected.

Options:

A.

TRUE

B.

FALSE

Question 16

The keys used by the IPSec encryption and authentication algorithms can be configured manually or dynamically negotiated via the ____ protocol. (abbreviation, all uppercase).

Options:

Question 17

Which of the following are the default zones of Huawei firewalls?

Options:

A.

Untrust

B.

Local

C.

DMZ

D.

Trust

Question 18

Sub-interfaces can be created on GE0/0/1 of a firewall. The sub-interfaces can be added to different VLANs, but cannot be added to security zones.

Options:

A.

TRUE

B.

FALSE

Question 19

The trigger authentication method for firewall access user authentication does not include which of the following?

Options:

A.

MPLS VPN

B.

SSL VPN

C.

IPSec VPN

D.

L2TP VPN

Question 20

Which of the following characteristics does a denial-of-service attack include?

Options:

A.

Unauthorized tampering of the mouth

B.

Unauthorized access to the mouth

C.

Unauthorized activation of the mouth

D.

Unauthorized destruction of the mouth

Question 21

Which of the following functions help implement IPsec secure transmission of user service data on the Internet by means of encryption and authentication?

Options:

A.

Data encryption

B.

Data origin authentication

C.

Anti-replay

D.

Data integrity check

Question 22

As shown in the figure, nat server global202.106.1.1 inside10.10.1.1 is configured on the firewall. Which of the following is the correct configuration for interzone rules?

Options:

A.

rule name c. source-zone untrust. destination-zone trust. destination-address 202.106.1.132, action permit

B.

rule name d, source- zone untrust. destination- zone trust. destination- address10.l0.1.1 32, action permit

C.

rule name b, source- zone untrust, destination- zone trust, source- address10.10.1.1 32, action permit

D.

rule name b, source-zone untrust, destination-zone trust, source-address202.106.l.1 32, action permit

Question 23

Which of the following attacks can be detected through intrusion prevention?

Options:

A.

Injection attack

B.

Directory traversal

C.

Trojan horse

D.

Buffer overflow attack

Question 24

Which of the following is not an encryption algorithm in a VPN?

Options:

A.

The RIP

B.

AES

C.

3DES

D.

DES

Question 25

The traffic direction of a firewall is based on the zone priority. The _____ direction refers to the direction from a low-priority zone to a high-priority zone. Capitalize the first letter.

Options:

Question 26

Which of the following statements is incorrect about DoS attacks?

Options:

A.

DoS attacks use IP spoofing to prevent authorized users from connecting to the target server.

B.

DoS attacks stop services or resource access on the target server.

C.

DoS attack forces the target server's buffer to be full and does not receive new requests.

D.

DoS attacks cause unrecoverable physical damage to the target server.

Question 27

The following description of digital certificates, which one is wrong

Options:

A.

The simplest certificate consists of a public key, a name, and a digital signature from a certificate authority.

B.

Digital certificates contain the owner's public key and related identity information.

C.

In general, the key of a digital certificate has an expiration date.

D.

Digital certificates do not solve the problem of digital signature technology where the public key cannot be determined to be the designated owner.

Question 28

Which of the following is not the matching mode of the firewall security protection whitelist rules?

Options:

A.

Prefix matching

B.

Fuzzy matching

C.

Keyword matching

D.

Suffix matching

Question 29

As shown in the figure, what is the authentication range of the AH protocol in tunnel mode?

Options:

A.

The3

B.

The4

C.

The2

D.

The1

Question 30

Which of the following authentication modes are supported by AAA?

Options:

A.

RADIUS authentication

B.

No authentication

C.

HWTACACS authentication

D.

Local authentication

Question 31

Which of the following statements are correct about the PKI system structure?

Options:

A.

A PKI entity is an end user of PKI products or services. It can be an individual, an organization, a device such as a router or firewall, or a process running on a computer.

B.

CAs are classified into the root CA and subordinate CAs according to the hierarchy of CAs.

C.

A CA is a trusted entity that issues and manages digital certificates.

D.

A PKI system consists of three parts: entity, certificate authority, and certificate registration authority.

Question 32

Compared with the software architecture of C/S, B/S does not need to install a browser, and users are more flexible and convenient to use.

Options:

A.

TRUE

B.

FALSE

Question 33

Which of the following NAT technologies can implement a public network address to provide source address translation for multiple private network addresses ( )*

Options:

A.

NAPT

B.

NAT Server

C.

Easy-ip

CT Jinglu

D.

NAT No-PAT

Question 34

During the process of establishing IPSec VPN between peers FW_A and FW_B, two types of security associations need to be established in two stages. In the first stage, _____ is established to verify the identity of the peers.[fill in the blank]*

Options:

Question 35

What is the security level of the Untrust zone in Huawei firewalls?

Options:

A.

10

B.

20

C.

5

D.

15

Question 36

DES is a stream encryption algorithm, because the cipher capacity is only 56 bits, so it is not enough to deal with the weakness of insufficient security, and later 3DES was proposed.

Options:

A.

TRUE

B.

FALSE

Question 37

Which of the following is not the default security zone of the firewall

Options:

A.

untrust trust

B.

trust zone

C.

dmz zone

D.

isp zone)

Question 38

Which of the following statements is incorrect about information transmission through the heartbeat link between two firewalls that work in hot standby mode?

Options:

A.

Heartbeat packets are sent to synchronize configuration commands and status information between the two firewalls.

B.

Heartbeat packets are periodically sent by the two firewalls to check whether the peer device is alive.

C.

VGMP packets are sent to check the status of the peer device, so as to determine whether a switchover is required.

D.

Configuration consistency check packets are sent to check whether key configurations of the two firewalls are consistent.

Question 39

Database operation records can be used as ___ evidence to backtrack security events.[fill in the blank]*

Options:

Question 40

As shown in the figure, the administrator needs to test the network quality of the 20.0.0/24 CIDR block to the 40.0.0/24 CIDR block on Device B, and the device needs to send large packets for a long time to test the network connectivity and stability.

Options:

A.

tracert -a 20.0.0.1 -f 500 -q 9600 40.0.0.2

B.

ping -a 20.0.0.1 -c 500 -s 9600 40.0.0.2

C.

ping -s 20.0.0.1 -h 500-f 9600 40.0.0.2

D.

tracert -a 20.0.0.1 -c 500 -w 9600 40.0.0.2

Question 41

Social engineering is a means of harm such as deception, harm, etc. through psychological traps such as psychological weaknesses, instinctive reactions, curiosity, trust, and greed of victims ( )

Options:

A.

TURE

B.

False

Question 42

Please order the following steps in the PKI life cycle correctly, 1. Issued, 2. storage, 3. Update, 4. verify[fill in the blank]*

Options:

Question 43

In most cases, a user applies for a local certificate from a CA, and the CA approves the application and issues the certificate to the user.

Options:

A.

TRUE

B.

FALSE

Question 44

An enterprise wants to build a server system and requires the following functions: 1. The enterprise needs to have its own dedicated mailbox, and the sending and receiving of emails needs to go through the enterprise's server; 2. The server must provide file transfer and access services. Users in different departments of the enterprise provide accounts with different permissions: 3. When the enterprise accesses the internal webpage of the enterprise, the enterprise can directly enter the domain name in the browser to access. To meet the above requirements, which of the following servers do enterprises need to deploy? ( )*

Options:

A.

Time synchronization server

B.

FTP server (I)

C.

DNS server

D.

Mail server

Question 45

Arrange the following processes in the correct order based on the PKI lifecycle.

Options:

Demo: 45 questions
Total 153 questions