Easter Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Huawei H12-725_V4.0 HCIP-Security V4.0 Exam Exam Practice Test

Page: 1 / 6
Total 60 questions

HCIP-Security V4.0 Exam Questions and Answers

Question 1

Which of the following parameters is not required for an IKE proposal?

Options:

A.

Authentication algorithm

B.

Encapsulation mode

C.

Negotiation mode

D.

Encryption algorithm

Question 2

Which of the following methods are used by flood attacks to cause denial of services?(Select All that Apply)

Options:

A.

Exhaust available bandwidth.

B.

Exhaust server-side resources.

C.

Control network host rights.

D.

Exhaust network device resources.

Question 3

In the figure, if 802.1X authentication is used for wired users on the network, the network admission device and terminals must be connected through a Layer 2 network.

Question # 3

Options:

Options:

A.

TRUE

B.

FALSE

Question 4

In the figure, enterprise A and enterprise B need to communicate securely, and an IPsec tunnel is established between firewall A and firewall B. Which of the following security protocols and encapsulation modes can meet the requirements of this scenario?

Options:

A.

AH+ESP; transport mode

B.

ESP; tunnel mode

C.

ESP; transport mode

D.

AH; tunnel mode

Question 5

During deployment of Portal authentication, an authentication-free rule profile needs to be configured to ensure Portal pages can be opened on authentication terminals. To achieve this purpose, the following traffic needs to be permitted in the authentication-free rule profile: DNS resolution traffic of user terminals, traffic from user terminals for accessing Portal pages, and traffic from user terminals to the RADIUS server.

Options:

A.

TRUE

B.

FALSE

Question 6

The figure shows the defense mechanism of an HTTP flood attack. Which source IP detection technology is displayed in the figure?

Question # 6

Options:

A.

302 redirect mode

B.

Basic mode

C.

URI monitoring

D.

Enhanced mode

Question 7

Which of the following statements is true about the outgoing traffic in the firewall virtual system?

Options:

A.

Traffic from the private network interface to the public network interface is limited by the outbound bandwidth.

B.

Traffic from the public network interface to the private network interface is limited by the outbound bandwidth.

C.

Traffic from the private network interface to the public network interface is limited by the inbound bandwidth.

D.

Traffic from the public network interface to the private network interface is limited by the inbound bandwidth.

Question 8

In SSL VPN, the firewall performs access authorization and control based on which of the following dimensions?

Options:

A.

Role

B.

MAC address

C.

Port number

D.

IP address

Question 9

*In the data filtering profile on the firewall, keyword group "Keyword" is invoked in the upload direction of HTTP applications, the action is block, and the keyword group is invoked in the security policy. Given this, if the regular expression "b.d" is configured in the keyword group "Keyword,” which of the following texts can be posted by internal employees on the forum?

Options:

A.

abroad

B.

beside

C.

boring

D.

bad

Question 10

In the figure, FW_A connects to FW_B through two links working in active/standby mode. When the active link of FW_A is faulty, the old IPsec tunnel 1 needs to be torn down, and IPsec tunnel 2 needs to be established with FW_B through the standby link to route traffic. In this case, configuring the IKE _____ detection mechanism on FW_A helps detect link faults and tear down the IPsec tunnel.(Enter lowercase letters.)

Question # 10

Options:

Question 11

If a Portal authentication user goes offline but neither the access device nor the RADIUS server detects this event, many problems may occur. To prevent this from occurring, the access device needs to detect a user logout immediately, delete the user entry, and instruct the RADIUS server to stop accounting. Which of the following can trigger a Portal user logout?(Select All that Apply)

Options:

A.

The Portal server logs out the user.

B.

The authentication server logs out the user.

C.

The user initiates a logout request.

D.

The access device logs out the user.

Question 12

Which of the following statements are true about SYN scanning attacks?(Select All that Apply)

Options:

A.

When the scanner sends a SYN packet, an RST response indicates a closed port.

B.

If the peer end does not respond to the SYN packet sent by the scanner, the peer host does not exist, or filtering is performed on the network or host.

C.

When the scanner sends a SYN packet, if the peer end responds with a SYN-ACK packet, the scanner then responds with an ACK packet to complete the three-way handshake.

D.

When the scanner sends a SYN packet, a SYN-ACK response indicates an open port.

Question 13

Before configuring DDoS attack defense, you must configure different thresholds for defense against different types of attacks. Each threshold can be considered an upper limit for normal network traffic. When the rate of traffic exceeds the pre-configured threshold, the firewall considers it to be attack traffic and takes a corresponding action to defend against it.

Options:

A.

TRUE

B.

FALSE

Question 14

Which of the following is not a process for remote users to access intranet resources through SSL VPN?

Options:

A.

Resource access

B.

User authentication

C.

Access accounting

D.

User login

Question 15

The Common Vulnerability Scoring System (CVSS) is a widely used open standard for vulnerability scoring. It uses a modular scoring system. Which of the following is not included in the CVSS?

Options:

A.

Temporal

B.

Base

C.

Environmental

D.

Spatial

Question 16

Which of the following is not a response action for abnormal file identification?

Options:

A.

Alert

B.

Block

C.

Allow

D.

Delete

Question 17

When Eth-Trunk is deployed for the heartbeat links between firewalls, the Eth-Trunk interface can be configured as a Layer 2 interface as long as the total bandwidth of active links on the Eth-Trunk is greater than 30% of the bandwidth required by service traffic.

Options:

A.

TRUE

B.

FALSE

Question 18

Which of the following statements is false about virtual system resource allocation?

Options:

A.

Virtual systems can share and preempt resources of the entire device. Such resources can be manually allocated.

B.

To manually allocate resources to a virtual system, an administrator needs to configure a resource class, specify the guaranteed quota and maximum quota of each resource in the resource class, and bind the resource class to the virtual system.

C.

Improper resource allocation may prevent other virtual systems from obtaining resources and services from running properly.

D.

Quota-based resources are automatically allocated based on system specifications.

Page: 1 / 6
Total 60 questions