New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following H12-711_V3.0 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is H12-711_V4.0

H12-711_V3.0 Exam Dumps - HCIA-Security V3.0

Go to page:
Question # 25

Which of the following descriptions about the main implementation of single sign-on is wrong? ( )[Multiple choice]*

A.

Accept PC message mode

B.

Query the AD server security log mode

C.

Query the syslog server mode

D.

Firewall monitors AD authentication packets

Full Access
Question # 26

There are two ways for a PKI entity to apply for a local certificate from a CA: ( ). (fill in the blank)

Full Access
Question # 27

Which of the following descriptions about the DNS protocol is correct?

A.

There are four types of servers in the DNS domain name resolution system: root server, top-level domain name server, recursive server and cache server.

B.

The DNS protocol port number is 53

C.

DNS protocol transport layer can use either TCP or UDP

D.

If the DNS cache server does not have the domain name resolution cache to be queried, it will directly query the top-level domain name server

Full Access
Question # 28

Which of the following VPNs cannot be used in a Site to-Site scenario? ( )[Multiple choice]*

A.

GRE VPN

B.

L2TP VPN

C.

SSL VPN

D.

IPSEC VPN

Full Access
Question # 29

Under normal circumstances, the Emai1 protocols we often talk about include ____, POP3, and SMTP.[fill in the blank]*

Full Access
Question # 30

Heartbeat message (He11o message): The two FWs send heartbeat messages to each other periodically (the default period is ( ) seconds) to check whether the peer device is alive. (fill in the blank)

Full Access
Question # 31

existUSGIn the series firewalls, which of the following commands can be used to queryNATconversion result?

A.

display nat translation

B.

display firewall session table

C.

display current nat

D.

display firewall nat translation

Full Access
Question # 32

The preservation of electronic evidence is directly related to the legal validity of the evidence, and the authenticity and reliability of the preservation in compliance with legal procedures can be guaranteed. Which of the following is not an evidence preservation technique?

A.

Encryption Technology

B.

digital certificate technology

C.

digital signature technology

D.

Packet Tag Tracking Technology

Full Access
Go to page: