Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

H12-711_V4.0 HCIA-Security V4.0 Exam Questions and Answers

Questions 4

Match the following user categories and authentication modes.

Options:

Buy Now
Questions 5

When using passive mode to establish an FTP connection, the control channel uses port 20 and the data channel uses port 21.

Options:

A.

True

B.

False

Buy Now
Questions 6

What is the protocol number of the GRE protocol?

Options:

A.

47

B.

48

C.

46

D.

The 50th

Buy Now
Questions 7

The shard cache technology will wait for the arrival of the first shard packet, and then reassemble and decrypt all the packets, and then do subsequent processing by the device to ensure that the session can proceed normally in some application scenarios.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 8

The RADIUS protocol specifies how to pass user information, billing information, authentication and billing results between the NAS and the RADIUS server, and the RADIUS server is responsible for receiving the user's connection request, completing the authentication, and returning the result to the NAS.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 9

Which of the following protocols is a multichannel protocol?

Options:

A.

The Telnet

B.

THE HITP

C.

FTP

D.

The SSH

Buy Now
Questions 10

When logging in to the web UI through HTTPS, you need to specify a local certificate issued by a CA that the web browser trusts for the HTTPS client on the device. Because the web browser can verify the local certificate, this approach avoids malicious attacks and ensures secure logins of administrators.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 11

The IPS detects and analyzes all packets passing through a device and determines whether to permit or block the packets in real time based on the comprehensive detection mechanism. Sort the following steps into the correct order based on the basic implementation mechanism of the IPS.

Options:

Buy Now
Questions 12

____- The goal is to provide a rapid, composed and effective response in emergency situations, thereby enhancing the ability of the business to recover immediately from a disruptive event.[fill in the blank]*

Options:

Buy Now
Questions 13

The network environment is becoming more and more complex, and network security incidents occur frequently. While accelerating the construction of informatization, enterprises must not only resist external attacks, but also prevent internal management personnel from being involved in data leakage and operation and maintenance accidents due to operational errors and other issues. Which of the following options might reduce operational risk?

Options:

A.

According to the administrator configuration, the O & M user corresponds to the background resource account, and restricts the unauthorized use of the account. mouth Based on the password security policy, the O & M security audit system automatically modifies the password of the background resource account at regular intervals.

B.

Each system is independently operated, maintained and managed, and the access process is not audited and monitored.

C.

Oral Each department system is independently authenticated and uses a single static password for authentication.

Buy Now
Questions 14

As shown in the figure, which of the following shows the authentication range of ESP in transport mode?

Options:

A.

4

B.

1

C.

3

D.

2

Buy Now
Questions 15

Match the following single-packet attack types with their corresponding descriptions.

Options:

Buy Now
Questions 16

Which of the following is not included in the Business Impact Analysis (BIA).

Options:

A.

Risk identification

B.

Impact assessment

C.

Incident handling priority

D.

Business priorities

Buy Now
Questions 17

Compared with the software architecture of C/S, B/S does not need to install a browser, and users are more flexible and convenient to use.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 18

IPS signatures describe the characteristics of attack behaviors on the network. The firewall detects and defends against attacks by comparing data flows with IPS signatures.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 19

Which of the following statements is correct about characteristics of a firewall?

Options:

A.

The firewall is a comprehensive security device with multiple security features to defend against zero-day vulnerabilities.

B.

The firewall can prevent unauthorized information on the extranet from being sent to the intranet.

C.

The firewall can defend against all external network threats.

D.

The firewall has the antivirus function. Therefore, the antivirus system does not need to be deployed on the network where the firewall is deployed.

Buy Now
Questions 20

The following description of the construction of a digital certificate, which item is wrong

Options:

A.

The name of the device that issued the certificate can be different from the subject name in the issuer certificate.

B.

The structure of the certificate follows the specification of the X.509 v3 version.

C.

The simplest certificate consists of a public key, a name, and a digital signature from a certificate authority.

D.

The issuer signs the certificate information with the private key.

Buy Now
Questions 21

Social engineering is a means of harm such as deception, harm, etc. through psychological traps such as psychological weaknesses, instinctive reactions, curiosity, trust, and greed of victims ( )

Options:

A.

TURE

B.

False

Buy Now
Questions 22

In asymmetric encryption algorithms, only public keys can be used to encrypt data, and private keys are used to decrypt data. This process is irreversible.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 23

What is correct about the following description of device management in the operating system?

Options:

A.

The main task of port device management is to complete the I/O requests made by users and classify I/O devices for users.

B.

Whenever a process makes an I/O request to the system, as long as it is secure, the device allocator will assign the device to the process according to a certain policy.

C.

Device management can virtualize a physical device into multiple logical devices through virtualization technology, providing multiple user processes to use.

D.

In order to alleviate the problem of speed mismatch between CPU and I/O devices and improve the parallelism of CPU and I/O devices, in modern operating systems, almost all I/O devices are exchanging numbers with processors

Buffers are used at all times.

Buy Now
Questions 24

Which layer of data packets does a packet filtering firewall check?

Options:

A.

Application layer

B.

Physical layer

C.

Network layer

D.

Data link layer

Buy Now
Questions 25

IKE SA is a one-way logical connection, and only one IKE SA needs to be established between two peers.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 26

What is the security level of the Untrust zone in Huawei firewalls?

Options:

A.

10

B.

20

C.

5

D.

15

Buy Now
Questions 27

The trigger authentication method for firewall access user authentication does not include which of the following?

Options:

A.

MPLS VPN

B.

SSL VPN

C.

IPSec VPN

D.

L2TP VPN

Buy Now
Questions 28

Using the ___ method of the Web proxy, the virtual gateway will encrypt the real URL that the user wants to access, and can adapt to different terminal types.[fill in the blank]*

Options:

Buy Now
Questions 29

_____ Authentication is to configure user information (including local user's user name, password and various attributes) on the network access server. The advantage is that it is fast.[fill in the blank]*

Options:

Buy Now
Questions 30

A Web server is deployed in an enterprise intranet to provide Web access services to Internet users, and in order to protect the access security of the server, it should be divided into the _____ area of the firewall.

Options:

Buy Now
Questions 31

Devices that need to provide network services externally, such as WWW servers and FTP servers, can be placed in the DMZ.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 32

In cases where some configurations alter existing session table entries and want them to take effect immediately, you can regenerate the session table by clearing the session table information. All session table information can be cleared by executing the _____firewall session table command.

Options:

Buy Now
Questions 33

Which of the following attacks can be detected through intrusion prevention?

Options:

A.

Injection attack

B.

Directory traversal

C.

Trojan horse

D.

Buffer overflow attack

Buy Now
Questions 34

As shown, in transmission mode, which of the following locations should the AH header be inserted in?

Options:

A.

3

B.

2

C.

1

D.

4

Buy Now
Questions 35

Which of the following types of malicious code on your computer includes?

Options:

A.

Oral virus

B.

Trojan horses

C.

Port SQL injection

D.

Oral spyware

Buy Now
Questions 36

On a firewall, security policies with the permit action do not need to be configured for traffic between users in the same zone.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 37

Which of the following is not a type of Windows log event?

Options:

A.

Information

B.

Debugging

C.

Error

D.

Warning

Buy Now
Questions 38

An engineer needs to back up the firewall configuration. Now he wants to use a command to view all the current configurations of the firewall. May I ask the command he uses is ____[fill in the blank]*

Options:

Buy Now
Questions 39

Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution.[fill in the blank]*

Options:

Buy Now
Questions 40

A three-way handshake is required to establish a TCP connection, and a four-way handshake is required to end a TCP connection.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 41

In most cases, a user applies for a local certificate from a CA, and the CA approves the application and issues the certificate to the user.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 42

Which of the following are disadvantages of the packet filtering firewall?

Options:

A.

The software implementation limits the processing speed, making the firewall vulnerable to DoS attacks.

B.

An attacker can set the IP address of his/her host to an IP address permitted by a packet filter. In this way, packets from the attacker's host can easily pass through the packet filter.

C.

Static ACL rules cannot meet dynamic security requirements.

D.

The connection status list is dynamically managed.

Buy Now
Questions 43

For which of the following parameters can the packet filtering firewall filter?

Options:

A.

Port packet payload

B.

IP address of the port source destination

C.

The MAC address of the source destination

D.

Port number and protocol number of the port source

Buy Now
Questions 44

Huawei Firewall only supports the inter-domain persistent connection function for TCP packets.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 45

Which of the following is the correct sequence for incident response management

1. Detection 2 Report 3 Mitigation 4 Lessons learned 5 Fix 6 Recovery 7 Response

Options:

A.

1- > 3- > 2- > 7- > 6- > 5- > 4

B.

1- > 7- > 3- > 2- > 6- > 5- > 4

C.

1- > 3- > 2- > 7- > 5- > 6- > 4

D.

1- > 2- > 3- > 7- > 6- > 5- > 4

Buy Now
Exam Code: H12-711_V4.0
Exam Name: HCIA-Security V4.0 Exam
Last Update: Apr 7, 2026
Questions: 153
H12-711_V4.0 pdf

H12-711_V4.0 PDF

$25.5  $84.99
H12-711_V4.0 Engine

H12-711_V4.0 Testing Engine

$30  $99.99
H12-711_V4.0 PDF + Engine

H12-711_V4.0 PDF + Testing Engine

$40.5  $134.99