Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Huawei H12-711_V4.0 Dumps

HCIA-Security V4.0 Exam Questions and Answers

Question 1

____- The goal is to provide a rapid, composed and effective response in emergency situations, thereby enhancing the ability of the business to recover immediately from a disruptive event.[fill in the blank]*

Options:

Question 2

Digital envelope technology means that the sender uses the receiver's public key to encrypt the data, and then sends the ciphertext to the receiver ( )[Multiple choice]*

Options:

A.

TRUE

B.

FALSE

Question 3

Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution. 1. Inhibition stage, 2. recovery phase, 3. Detection stage, 4. eradication phase[fill in the blank]*

Options:

Question 4

Using the ___ method of the Web proxy, the virtual gateway will encrypt the real URL that the user wants to access, and can adapt to different terminal types.[fill in the blank]*

Options:

Question 5

Data monitoring can be divided into two types: active analysis and passive acquisition.

Options:

A.

TRUE

B.

FALSE

Question 6

Which of the following NAT technologies can implement a public network address to provide source address translation for multiple private network addresses ( )*

Options:

A.

NAPT

B.

NAT Server

C.

Easy-ip

CT Jinglu

D.

NAT No-PAT

Question 7

Which of the following attack methods is to construct special SQL statements and submit sensitive information to exploit program vulnerabilities

Options:

A.

Buffer overflow attack

B.

SQL injection attacks

C.

Worm attack

D.

Phishing attacks

Question 8

IKE SA is a one-way logical connection, and only one IKE SA needs to be established between two peers.

Options:

A.

TRUE

B.

FALSE

Question 9

SSL VPN is a VPN technology that realizes remote secure access through SSL protocol. Which of the following software must be installed when using SSL VPN?

Options:

A.

Browser

B.

Firewall

C.

Client

D.

Antivirus

Question 10

Which of the following descriptions about the main implementation of single sign-on is wrong? ( )[Multiple choice]*

Options:

A.

Accept PC message mode

B.

Query the AD server security log mode

C.

Query the syslog server mode

D.

Firewall monitors AD authentication packets

Question 11

As shown, in transmission mode, which of the following locations should the AH header be inserted in?

as

Options:

A.

3

B.

2

C.

1

D.

4

Question 12

Which of the following protocols is a file transfer protocol?

Options:

A.

Mouth POP3

B.

Mouth NFS

C.

Mouth HITP

D.

Mouth DFTP

Question 13

Which of the following operating modes does NTP support?

Options:

A.

Mouth peer mode

B.

Mouth client/server mode

C.

Mouth broadcast mode

D.

Mouth multicast mode

Page: 1 / 9
Total 91 questions