New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following H12-711_V3.0 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is H12-711_V4.0

H12-711_V3.0 Exam Dumps - HCIA-Security V3.0

Go to page:
Question # 49

Digital signature is to generate digital fingerprint by using hash algorithm, so as to ensure the integrity of data transmission

A.

True

B.

False

Full Access
Question # 50

existUSGConfiguration on the series firewallNAT Server, will produceserver-mapTable, which of the following is not part of this representation?

A.

PurposeIP

B.

destination port number

C.

agreement number

D.

sourceIP

Full Access
Question # 51

firewallGE1/0/1andGE1/0/2mouth belongs toDMZarea, if you want to implementGE1/0/1The connected area is accessibleGE1/0/2Connected area, which of the following is correct?

A.

needs to be configuredLocalarriveDMZsecurity policy

B.

No configuration required

C.

Interzone security policy needs to be configured

D.

needs to be configuredDMZarrivelocalsecurity policy

Full Access
Question # 52

On the surface, threats such as viruses, loopholes, and Trojan horses are the causes of information security incidents, but at the root, information security incidents are also closely related to people and the information system itself.

A.

True

B.

False

Full Access
Question # 53

Which of the following is true about the security policy configuration command?

A.

prohibited fromtrustRegional accessuntrustarea and the destination address is10.1.10.10hostICMPmessage

B.

prohibited fromtrustRegional accessuntrustarea and the destination address is10.1.0.0/16All hosts on the segmentICMPmessage

C.

prohibited fromtrustRegional accessuntrustregion and the source address is10.1.0.0/16All hosts from the network segmentICMPmessage

D.

prohibited fromtrustRegional accessuntrustregion and the source address is10.2.10.10All hosts from hostICMPmessage

Full Access
Question # 54

The firewall is divided according to the protection object,windowsfirewall belongs to— ?

A.

Software Firewall

B.

hardware firewall

C.

Stand-alone firewall

D.

Internet Firewall

Full Access
Question # 55

aboutHRPWhich of the following options is not included in the content of the master/slave configuration consistency check?

A.

NATStrategy

B.

Whether the heartbeat interface with the same sequence number is configured

C.

The next hop and outgoing interface of the static route

D.

Authentication Policy

Full Access
Question # 56

some applications such asOracleFor database applications, the firewall session connection is interrupted due to no data flow transmission for a long time, resulting in service interruption. Which of the following is the optimal solution?

A.

Configure a long-term connection for a service

B.

turn onASPFFeatures

C.

Optimize security policies

D.

Enable shard cache

Full Access
Go to page: