Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Huawei H12-725_V4.0 Dumps

HCIP-Security V4.0 Exam Questions and Answers

Question 1

Which of the following statements is false about the ATIC system architecture?

Options:

A.

SecoManager functions as the management center and uses the Browser/Server architecture.

B.

The ATIC consists of the management server, collector, and controller.

C.

One management center can centrally manage multiple geographically dispersed detecting and cleaning devices.

D.

The ATIC management server manages detecting and cleaning devices.

Question 2

When a user accesses the virtual gateway, the user can access the SSL VPN only after the user terminal passes the host check policy.

Options:

A.

TRUE

B.

FALSE

Question 3

Which of the following parameters is not required for an IKE proposal?

Options:

A.

Authentication algorithm

B.

Encapsulation mode

C.

Negotiation mode

D.

Encryption algorithm

Question 4

*In the data filtering profile on the firewall, keyword group "Keyword" is invoked in the upload direction of HTTP applications, the action is block, and the keyword group is invoked in the security policy. Given this, if the regular expression "b.d" is configured in the keyword group "Keyword,” which of the following texts can be posted by internal employees on the forum?

Options:

A.

abroad

B.

beside

C.

boring

D.

bad

Question 5

Match the HTTP control items with the corresponding descriptions.

as

Options:

Question 6

On a WLAN where the WAC has Portal authentication configured, VLAN authorization can be implemented with no additional configuration required. After Portal authentication is complete, the WAC forwards STA traffic based on the authorized VLANs.

Options:

A.

TRUE

B.

FALSE

Question 7

Which of the following statements is false about RADIUS and HWTACACS?

Options:

A.

Both of them feature good flexibility and extensibility.

B.

Both of them use the client/server model.

C.

Both of them support authorization of configuration commands.

D.

Both of them use shared keys to encrypt user information.

Question 8

Multiple links can be deployed at the egress of an enterprise network to improve network reliability.

Options:

A.

TRUE

B.

FALSE

Question 9

Which of the following statements is false about the restrictions on configuring bandwidth profiles in parent and child policies on a firewall?

Options:

A.

The connection limit specified in a child policy cannot be smaller than that specified in the parent policy.

B.

Both the parent and child policies must both use the same traffic limiting mode; that is, either "setting the upstream and downstream bandwidths" or "setting the overall bandwidth".

C.

The parent and child policies must reference different bandwidth profiles.

D.

The maximum bandwidth specified in a child policy cannot be greater than that specified in the parent policy.

Question 10

Network Access Control (NAC) is an end-to-end security control technology that works in combination with AAA to implement access authentication. Which of the following statements about NAC and AAA are true?(Select All that Apply)

Options:

A.

AAA is mainly used for interaction between users and access devices.

B.

NAC is mainly used for interaction between access devices and authentication servers.

C.

NAC provides three authentication modes: 802.1X authentication, MAC address authentication, and Portal authentication.

D.

An AAA server controls network access rights of users through authentication, authorization, and accounting.

Question 11

The figure shows the defense mechanism of an HTTP flood attack. Which source IP detection technology is displayed in the figure?

as

Options:

A.

302 redirect mode

B.

Basic mode

C.

URI monitoring

D.

Enhanced mode

Question 12

HWTACACS is a centralized information exchange protocol based on the client/server structure. It uses UDP for transmission and performs authentication, authorization, and accounting for users accessing the Internet through Point-to-Point Protocol (PPP) or Virtual Private Dial-up Network (VPDN) and administrative users logging in to devices.

Options:

A.

TRUE

B.

FALSE

Question 13

The Nginx application is deployed on a Linux host. By checking Nginx logs, O&M engineers can obtain the complete URL information submitted by users and determine whether the Linux host is under SQL injection attacks.

Options:

A.

TRUE

B.

FALSE

Question 14

: 51 DRAG DROP

Match the description about virtual systems and VPN instances.

as

Options:

Question 15

Authentication rules configured on iMaster NCE-Campus support multiple matching conditions, such as matching account information, SSID information, and terminal IP address ranges, so that different authentication rules can be executed for different users.

Options:

A.

TRUE

B.

FALSE

Question 16

In the figure, if 802.1X authentication is used for wired users on the network, the network admission device and terminals must be connected through a Layer 2 network.

as

Options:

Options:

A.

TRUE

B.

FALSE

Question 17

Which of the following statements are true about SYN scanning attacks?(Select All that Apply)

Options:

A.

When the scanner sends a SYN packet, an RST response indicates a closed port.

B.

If the peer end does not respond to the SYN packet sent by the scanner, the peer host does not exist, or filtering is performed on the network or host.

C.

When the scanner sends a SYN packet, if the peer end responds with a SYN-ACK packet, the scanner then responds with an ACK packet to complete the three-way handshake.

D.

When the scanner sends a SYN packet, a SYN-ACK response indicates an open port.

Question 18

In SSL VPN, the firewall performs access authorization and control based on which of the following dimensions?

Options:

A.

Role

B.

MAC address

C.

Port number

D.

IP address

Page: 1 / 6
Total 60 questions