Spring Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Huawei H12-711_V4.0 HCIA-Security V4.0 Exam Exam Practice Test

Page: 1 / 15
Total 153 questions

HCIA-Security V4.0 Exam Questions and Answers

Question 1

A Web server is deployed in an enterprise intranet to provide Web access services to Internet users, and in order to protect the access security of the server, it should be divided into the _____ area of the firewall.

Options:

Question 2

Which of the following attacks can be detected through intrusion prevention?

Options:

A.

Injection attack

B.

Directory traversal

C.

Trojan horse

D.

Buffer overflow attack

Question 3

Which of the following is not the matching mode of the firewall security protection whitelist rules?

Options:

A.

Prefix matching

B.

Fuzzy matching

C.

Keyword matching

D.

Suffix matching

Question 4

Which of the following problems cannot be solved using PKI?

Options:

A.

The network is congested due to heavy traffic. As a result, the server cannot provide services properly.

B.

The transaction parties cannot verify the identities of each other.

C.

Data may be eavesdropped and tampered with during transmission, and information security cannot be ensured.

D.

No paper receipt is used in transaction, making arbitration difficult.

Question 5

Which of the following types of packets cannot be filtered by a packet filtering firewall?

Options:

A.

Non-fragmented packets

B.

Forged ICMP error packets

C.

Initial fragments

D.

Non-initial fragments

Question 6

Which of the following statements are correct about the status of the firewall VGMP group?

Options:

A.

Initialize

B.

Active

C.

Load-balance

D.

Standby

Question 7

The following description of IDS, which items are correct

The IDS cannot be linked to the firewall.

Options:

A.

Mouth IDS is a fine-grained detection device, through which the live network can be monitored more accurately.

B.

The IDS can be upgraded flexibly and in a timely manner, and the strategic configuration operation is convenient and flexible.

C.

With IDS, system administrators can capture traffic from critical nodes and do intelligent analysis to find anomalous and suspicious network behavior and report it to administrators.

Question 8

_____ Authentication is to configure user information (including local user's user name, password and various attributes) on the network access server. The advantage is that it is fast.[fill in the blank]*

Options:

Question 9

Which type of NAT translates both addresses and port numbers and uses the public IP address of the outbound interface as the post-NAT address?

Options:

A.

NAPT

B.

Easy IP

C.

3-tuple NAT

D.

NAT No-PAT

Question 10

While working for a company, Tom receives an email with an attachment. Which of the following operations is correct?

Options:

A.

Checking the email's content. If the email is related to work, Tom can open and save the attachment

B.

Opening the attachment directly because email attachments do not affect information security

C.

Checking the email sender. If the email was sent from the company's mailbox, Tom can open and save the attachment

D.

Checking the sender and email information, and using antivirus software to check the attachment

Question 11

What is the protocol number of the GRE protocol?

Options:

A.

47

B.

48

C.

46

D.

The 50th

Question 12

When IPSec VPN uses tunnel mode to encapsulate packets, which of the following is not within the encryption scope of the ESP security protocol?

Options:

A.

ESP Header

B.

TCP Header

C.

Raw IP Header

D.

ESP Tail

Question 13

Which of the following packets is controlled by a firewall's security policy by default?

Options:

A.

Multicast

B.

Broadcast

C.

Anycast

D.

Unicast

Question 14

When logging in to the web UI through HTTPS, you need to specify a local certificate issued by a CA that the web browser trusts for the HTTPS client on the device. Because the web browser can verify the local certificate, this approach avoids malicious attacks and ensures secure logins of administrators.

Options:

A.

TRUE

B.

FALSE

Question 15

Which layer of the protocol stack does SSL provide end-to-end encrypted transmission services?

Options:

A.

Application layer

B.

Data link layer

C.

Network layer

D.

Transport layer

Question 16

Which of the following statements is correct about security zones on a Huawei firewall?

Options:

A.

An interface on a firewall can belong to multiple zones.

B.

The default zones on a firewall can be deleted.

C.

Different security zones on a firewall have the same default security level.

D.

Different interfaces on a firewall can be in the same zone.

Question 17

Which of the following is not a type of Windows log event?

Options:

A.

Information

B.

Debugging

C.

Error

D.

Warning

Question 18

Which of the following is not an encryption algorithm in a VPN?

Options:

A.

The RIP

B.

AES

C.

3DES

D.

DES

Question 19

Which of the following attack methods is to construct special SQL statements and submit sensitive information to exploit program vulnerabilities

Options:

A.

Buffer overflow attack

B.

SQL injection attacks

C.

Worm attack

D.

Phishing attacks

Question 20

Which of the following statements are correct about firewall security zones?

Options:

A.

Security policies do not have to permit mutual access between users in the same zone.

B.

A security policy can permit traffic in one direction.

C.

By default, firewalls have only three security zones: Trust, Untrust, and DMZ.

D.

A firewall interface can be added to multiple security zones.

Question 21

Information security aims to protect data in hardware, software, and their systems on information networks to prevent data damage, tampering, or breach due to occasional or malicious reasons and ensure proper system running and non-stop information services.

Options:

A.

TRUE

B.

FALSE

Question 22

Devices that need to provide network services externally, such as WWW servers and FTP servers, can be placed in the DMZ.

Options:

A.

TRUE

B.

FALSE

Question 23

Arrange the following processes in the correct order based on the PKI lifecycle.

Question # 23

Options:

Question 24

When using passive mode to establish an FTP connection, the control channel uses port 20 and the data channel uses port 21.

Options:

A.

True

B.

False

Question 25

The trigger authentication method for firewall access user authentication does not include which of the following?

Options:

A.

MPLS VPN

B.

SSL VPN

C.

IPSec VPN

D.

L2TP VPN

Question 26

____- The goal is to provide a rapid, composed and effective response in emergency situations, thereby enhancing the ability of the business to recover immediately from a disruptive event.[fill in the blank]*

Options:

Question 27

Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution. 1. Inhibition stage, 2. recovery phase, 3. Detection stage, 4. eradication phase[fill in the blank]*

Options:

Question 28

Which of the following are antivirus response actions of the firewall?

Options:

A.

Block

B.

Alert

C.

Delete attachment

D.

Declare

Question 29

In the automatic backup mode of hot standby on the second machine, which of the following sessions is backed up?

Options:

A.

ICMP session

B.

TCP half-connection session

C.

Self-session to the firewall

D.

UDP first packet session

Question 30

Which of the following characteristics does a denial-of-service attack include?

Options:

A.

Unauthorized tampering of the mouth

B.

Unauthorized access to the mouth

C.

Unauthorized activation of the mouth

D.

Unauthorized destruction of the mouth

Question 31

What is the security level of the Untrust zone in Huawei firewalls?

Options:

A.

10

B.

20

C.

5

D.

15

Question 32

Which of the following statements are correct about the PKI system structure?

Options:

A.

A PKI entity is an end user of PKI products or services. It can be an individual, an organization, a device such as a router or firewall, or a process running on a computer.

B.

CAs are classified into the root CA and subordinate CAs according to the hierarchy of CAs.

C.

A CA is a trusted entity that issues and manages digital certificates.

D.

A PKI system consists of three parts: entity, certificate authority, and certificate registration authority.

Question 33

Which of the following descriptions about the heartbeat interface is wrong ( )?

Options:

A.

It is recommended to configure at least two heartbeat interfaces. - One heartbeat interface is used as the master, and the other heartbeat interface is used as the backup.

B.

The interface MTU value is greater than 1500 and cannot be used as a heartbeat interface

C.

The connection method of the heartbeat interface can be directly connected, or it can be connected through a switch or router

D.

MGMT interface (Gigabi tEtherneto/0/0) cannot be used as heartbeat interface

Question 34

The keys used by the IPSec encryption and authentication algorithms can be configured manually or dynamically negotiated via the ____ protocol. (abbreviation, all uppercase).

Options:

Question 35

The initial priority of the USG9500VGMP group is related to which of the following factors ( )? *

Options:

A.

interface bandwidth

B.

VRRP priority

C.

Number of daughter cards on the interface board

D.

The number of CPUs on the D service board

Question 36

The shard cache technology will wait for the arrival of the first shard packet, and then reassemble and decrypt all the packets, and then do subsequent processing by the device to ensure that the session can proceed normally in some application scenarios.

Options:

A.

TRUE

B.

FALSE

Question 37

In most cases, a user applies for a local certificate from a CA, and the CA approves the application and issues the certificate to the user.

Options:

A.

TRUE

B.

FALSE

Question 38

What type of ACL does ACL number 3001 correspond to?

Options:

A.

Layer 2 ACL

B.

interface ACL

C.

Basic ACL

D.

Advanced ACLs

Question 39

As shown, in transmission mode, which of the following locations should the AH header be inserted in?

Question # 39

Options:

A.

3

B.

2

C.

1

D.

4

Question 40

Social engineering is a means of harm such as deception, harm, etc. through psychological traps such as psychological weaknesses, instinctive reactions, curiosity, trust, and greed of victims ( )

Options:

A.

TURE

B.

False

Question 41

Which of the following statements are incorrect about the differences between routers and Layer 2 switches?

Options:

A.

By default, routers can isolate broadcast domains but not collision domains.

B.

Switches flood broadcast packets.

C.

Routers forward broadcast packets.

D.

By default, switches can isolate collision domains but not broadcast domains.

Question 42

Which of the following are the backup items that HRP can provide?

Options:

A.

Mouth Server-map table entry

B.

Mouth No-PAT table entry

C.

Mouth ARP table entry

D.

Port TCP session table

Question 43

In the PKI certificate revocation process, a user needs to send a signed and encrypted email to the RA to apply for certificate revocation.

Options:

A.

TRUE

B.

FALSE

Question 44

As shown in the figure, which of the following shows the authentication range of ESP in transport mode?

Options:

A.

4

B.

1

C.

3

D.

2

Question 45

Which of the following is the numbering range of Layer 2 ACLs?

Options:

A.

The 3000~3999

B.

The 4000~4999

C.

The 1000~1999

D.

@2000~2999

Page: 1 / 15
Total 153 questions