Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Huawei HCIA-Security H12-711_V4.0 Questions and answers with Dumpstech

Exam H12-711_V4.0 Premium Access

View all detail and faqs for the H12-711_V4.0 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which of the following descriptions of server authentication is correct?

Options:

A.

The visitor sends the username and password that identifies his identity to FW through the portal authentication page, there is no password stored on F7, FT sends the username and password to a third-party authentication server, and the verification process is carried out on the authentication server.

B.

Visitors obtain the SMS verification code through the Portal authentication page, and then enter the SMS verification code to pass the authentication.

C.

The visitor sends the username and password that identifies his identity to the third-party authentication server, and after the authentication is passed, the third-party authentication server sends the visitor's identity information to FW.

D.

The visitor sends the username and password that identifies them to the FW through the portal authentication page, on which the password is stored and the verification process takes place on the FW.

Questions # 22:

Which of the following statements is correct about security zones on a Huawei firewall?

Options:

A.

An interface on a firewall can belong to multiple zones.

B.

The default zones on a firewall can be deleted.

C.

Different security zones on a firewall have the same default security level.

D.

Different interfaces on a firewall can be in the same zone.

Questions # 23:

As shown in the figure, packet obtaining software is used to obtain some packets on a terminal. Which of the following statements is correct about the obtained packet information?

Question # 23

Options:

A.

The terminal sends a TCP connection establishment request to 192.168.1.1.

B.

The terminal sends a TCP connection termination request to 192.168.1.1.

C.

The terminal uses Telnet to log in to another device.

D.

The terminal uses HTTP to log in to another device.

Questions # 24:

____- The goal is to provide a rapid, composed and effective response in emergency situations, thereby enhancing the ability of the business to recover immediately from a disruptive event.[fill in the blank]*

Options:

Questions # 25:

Sub-interfaces can be created on GE0/0/1 of a firewall. The sub-interfaces can be added to different VLANs, but cannot be added to security zones.

Options:

A.

TRUE

B.

FALSE

Questions # 26:

Which of the following operating modes does NTP support?

Options:

A.

Mouth peer mode

B.

Mouth client/server mode

C.

Mouth broadcast mode

D.

Mouth multicast mode

Questions # 27:

IPSec VPN uses an asymmetric algorithm to calculate the ___ key to encrypt data packets.[fill in the blank]

Options:

Questions # 28:

When the Layer 2 switch receives a unicast frame and the MAC address table entry of the switch is empty, the switch discards the unicast frame.

Options:

A.

TRUE

B.

FALSE

Questions # 29:

The IPS detects and analyzes all packets passing through a device and determines whether to permit or block the packets in real time based on the comprehensive detection mechanism. Sort the following steps into the correct order based on the basic implementation mechanism of the IPS.

Question # 29

Options:

Questions # 30:

Which of the following protocols is a file transfer protocol?

Options:

A.

Mouth POP3

B.

Mouth NFS

C.

Mouth HITP

D.

Mouth DFTP

Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions