Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Huawei HCIA-Security H12-711_V4.0 Questions and answers with Dumpstech

Exam H12-711_V4.0 Premium Access

View all detail and faqs for the H12-711_V4.0 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions
Questions # 31:

Please match the following information security risks to information security incidents one by one.[fill in the blank]*

physical security risk Enterprise server permissions are loosely set

Information Security Management Risk Infected Panda Burning Incense

Information Access Risk Fire destroyed equipment in computer room

application risk Talk to people about leaking company secrets

Options:

Questions # 32:

Which of the following attack methods is to construct special SQL statements and submit sensitive information to exploit program vulnerabilities

Options:

A.

Buffer overflow attack

B.

SQL injection attacks

C.

Worm attack

D.

Phishing attacks

Questions # 33:

Which of the following authentication modes are supported by AAA?

Options:

A.

RADIUS authentication

B.

No authentication

C.

HWTACACS authentication

D.

Local authentication

Questions # 34:

A VRRP group has three states: Initialize, Master, and Backup.

Options:

A.

TRUE

B.

FALSE

Questions # 35:

The network environment is becoming more and more complex, and network security incidents occur frequently. While accelerating the construction of informatization, enterprises must not only resist external attacks, but also prevent internal management personnel from being involved in data leakage and operation and maintenance accidents due to operational errors and other issues. Which of the following options might reduce operational risk?

Options:

A.

According to the administrator configuration, the O & M user corresponds to the background resource account, and restricts the unauthorized use of the account. mouth Based on the password security policy, the O & M security audit system automatically modifies the password of the background resource account at regular intervals.

B.

Each system is independently operated, maintained and managed, and the access process is not audited and monitored.

C.

Oral Each department system is independently authenticated and uses a single static password for authentication.

Questions # 36:

What type of ACL does ACL number 3001 correspond to?

Options:

A.

Layer 2 ACL

B.

interface ACL

C.

Basic ACL

D.

Advanced ACLs

Questions # 37:

Using the ___ method of the Web proxy, the virtual gateway will encrypt the real URL that the user wants to access, and can adapt to different terminal types.[fill in the blank]*

Options:

Questions # 38:

WAF can accurately control and manage users' online behavior and user traffic.

Options:

A.

TRUE

B.

FALSE

Questions # 39:

The following description of the AH protocol in IPSec VPN, which one is wrong?

Options:

A.

Supports data source validation

B.

Supports data integrity checking

C.

Supports packet encryption

D.

Support anti-message replay

Questions # 40:

Arrange the following processes in the correct order based on the PKI lifecycle.

Question # 40

Options:

Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions