New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following H12-711_V3.0 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is H12-711_V4.0

H12-711_V3.0 Exam Dumps - HCIA-Security V3.0

Go to page:
Question # 33

aboutIKE SA, which of the following descriptions is false?

A.

IKE SAis bidirectional

B.

IKEis based onUDPapplication layer protocol

C.

IKE SAit's forIPSec SAServices

D.

The encryption algorithm used by user data packets isIKE SADecide

Full Access
Question # 34

Which of the following information is encrypted during the use of digital envelopes? (multiple choice)

A.

Symmetric key

B.

User data

C.

Receiver's public key

D.

Receiver's private key

Full Access
Question # 35

Which of the following options are malicious programs? (multiple choice)

A.

Trojan horse

B.

Vulnerability

C.

worm

D.

Virus

Full Access
Question # 36

againstIPspoofing attack (IP Spoofing), which of the following is an error?

A.

IPSpoofing attacks are based onIPaddress trust relationship to initiate

B.

IPAfter a successful spoofing attack, the attacker can use forged arbitraryIPThe address impersonates a legitimate host to access key information

C.

The attacker needs to put the sourceIPlandaddress masquerading as a trusted host and sendSYNmarkNote the data segment request connection

D.

based onIPThe hosts in the trust relationship of the addresses can log in directly without entering password authentication.

Full Access
Question # 37

When dual-system hot backup is deployed on the firewall,VRRPWhich of the following protocols should be used to switch the overall status of a backup group?

A.

VRRP

B.

VGMP

C.

HRP

D.

OSPF

Full Access
Question # 38

Digital envelope technology means that the sender uses the receiver's public key to encrypt the data, and then sends the ciphertext to the receiver ( )[Multiple choice]*

A.

TRUE

B.

FALSE

Full Access
Question # 39

Drag the warning level of the network security emergency response on the left into the box on the right, and arrange it from top to bottom in order of severity.[fill in the blank]*

Full Access
Question # 40

Which of the following is not the default security zone of the firewall ( )[Multiple choice]*

A.

untrust trust

B.

trust zone

C.

dmz zone

D.

isp zone)

Full Access
Go to page: