Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Huawei HCIA-Security H12-711_V4.0 Questions and answers with Dumpstech

Exam H12-711_V4.0 Premium Access

View all detail and faqs for the H12-711_V4.0 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

Under normal circumstances, the Emai1 protocols we often talk about include ____, POP3, and SMTP.[fill in the blank]*

Options:

Questions # 2:

Which of the following descriptions about the heartbeat interface is wrong ( )?

Options:

A.

It is recommended to configure at least two heartbeat interfaces. - One heartbeat interface is used as the master, and the other heartbeat interface is used as the backup.

B.

The interface MTU value is greater than 1500 and cannot be used as a heartbeat interface

C.

The connection method of the heartbeat interface can be directly connected, or it can be connected through a switch or router

D.

MGMT interface (Gigabi tEtherneto/0/0) cannot be used as heartbeat interface

Questions # 3:

As shown in the figure, the process of AD single sign-on (querying the security log mode of AD server), please match the corresponding operation process.

Question # 3

Question # 3

Options:

Questions # 4:

3-tuple NAT allows external devices to proactively access internal PCs through translated addresses and ports. Even if no security policy is configured on the firewall, the firewall allows such access packets to pass through.

Options:

A.

TRUE

B.

FALSE

Questions # 5:

Which of the following is the numbering range of Layer 2 ACLs?

Options:

A.

The 3000~3999

B.

The 4000~4999

C.

The 1000~1999

D.

@2000~2999

Questions # 6:

The following description of the construction of a digital certificate, which item is wrong

Options:

A.

The name of the device that issued the certificate can be different from the subject name in the issuer certificate.

B.

The structure of the certificate follows the specification of the X.509 v3 version.

C.

The simplest certificate consists of a public key, a name, and a digital signature from a certificate authority.

D.

The issuer signs the certificate information with the private key.

Questions # 7:

Which of the following is the correct sequence for incident response management

1. Detection 2 Report 3 Mitigation 4 Lessons learned 5 Fix 6 Recovery 7 Response

Options:

A.

1- > 3- > 2- > 7- > 6- > 5- > 4

B.

1- > 7- > 3- > 2- > 6- > 5- > 4

C.

1- > 3- > 2- > 7- > 5- > 6- > 4

D.

1- > 2- > 3- > 7- > 6- > 5- > 4

Questions # 8:

As shown in the figure, what is the authentication range of the AH protocol in tunnel mode?

Question # 8

Options:

A.

The3

B.

The4

C.

The2

D.

The1

Questions # 9:

IPS signatures describe the characteristics of attack behaviors on the network. The firewall detects and defends against attacks by comparing data flows with IPS signatures.

Options:

A.

TRUE

B.

FALSE

Questions # 10:

As shown, in transmission mode, which of the following locations should the AH header be inserted in?

Question # 10

Options:

A.

3

B.

2

C.

1

D.

4

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions