Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Huawei HCIA-Security H12-711_V4.0 Questions and answers with Dumpstech

Exam H12-711_V4.0 Premium Access

View all detail and faqs for the H12-711_V4.0 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions
Questions # 11:

ARP man-in-the-middle attacks are a type of spoofing attack technique.

Options:

A.

TRUE

B.

FALSE

Questions # 12:

Which of the following attributes are contained in the distinguished name DN in LDAP?

Options:

A.

CN

B.

DIT

C.

DC

D.

OU

Questions # 13:

_____ Authentication is to configure user information (including local user's user name, password and various attributes) on the network access server. The advantage is that it is fast.[fill in the blank]*

Options:

Questions # 14:

For which of the following parameters can the packet filtering firewall filter?

Options:

A.

Port packet payload

B.

IP address of the port source destination

C.

The MAC address of the source destination

D.

Port number and protocol number of the port source

Questions # 15:

The shard cache technology will wait for the arrival of the first shard packet, and then reassemble and decrypt all the packets, and then do subsequent processing by the device to ensure that the session can proceed normally in some application scenarios.

Options:

A.

TRUE

B.

FALSE

Questions # 16:

Which of the following is not the default security zone of the firewall

Options:

A.

untrust trust

B.

trust zone

C.

dmz zone

D.

isp zone)

Questions # 17:

What is correct in the following description of Security Alliance in IPSec?

There are two ways to set up an IPSec SA

Options:

A.

manual and IKE.

IPSec SA is uniquely identified by a triple.

B.

IPSec SA is a one-way logical connection, usually established in pairs (Inbound and Outbound).

C.

Security Alliance SA is a communication peer agreement for certain elements that describes how peers can communicate securely using secure services such as encryption.

Questions # 18:

Please classify the following security defenses into the correct classification.

Question # 18

Options:

Questions # 19:

Which of the following is not an encryption algorithm in a VPN?

Options:

A.

The RIP

B.

AES

C.

3DES

D.

DES

Questions # 20:

Which of the following statements is incorrect about PKI?

Options:

A.

PKI enables users to verify the validity of access devices, ensuring that users connect to secure and legitimate networks.

B.

PKI prevents attacks initiated by malicious users resending obtained packets.

C.

PKI ensures that data is accessible only to authorized devices and users, protecting data privacy.

D.

PKI protects data against tampering and eavesdropping, ensuring the privacy of data transmitted on the network.

Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions