Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following H12-711_V3.0 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is H12-711_V4.0

H12-711_V3.0 Exam Dumps - HCIA-Security V3.0

Question # 4

Which of the following options can bewindowsDo you do it in the advanced settings of the firewall? (multiple choice)

A.

Restore defaults

B.

Change notification rules

C.

Set up connection security rules

D.

Set up inbound and outbound rules

Full Access
Question # 5

Digital certificates can be divided into local certificates,CAcertificates, root certificates, self-signed certificates, etc.

A.

True

B.

False

Full Access
Question # 6

aboutTCP/IPDescription of protocol stack packet decapsulation, which of the following is correct? (multiple choice)

A.

The data packet is first transmitted to the data link layer. After parsing, the data link layer information is stripped, and the network layer information is known according to the parsing information, such as:IP

B.

transport layer (TCP) after receiving the data packet, the transport layer information is stripped after parsing, and the upper layer processing protocol is known according to the parsing information, such asUDP

C.

After the network layer receives the data packet, the network layer information is stripped after parsing, and the upper layer processing protocol is known according to the parsing information, such as

HTTP

D.

After the application layer receives the data packet, the application layer information is stripped after parsing, and the final displayed user data is exactly the same as the data sent by the sender host

Full Access
Question # 7

Regarding the firewall security policy statement, which of the following options is false?

A.

If the security policypermit, the discarded packets will not be accumulated"Hits"

B.

When configuring a security policy name, the same name cannot be reused

C.

Adjust the order of security policies without saving configuration files and take effect immediately

D.

HuaweiUSGThe number of security policy entries for the series firewall cannot exceed128strip

Full Access
Question # 8

The most common three-level standard for equal protection includes three aspects: physical security, data security and network security.

A.

is correct

B.

False

Full Access
Question # 9

Which of the following does not belong to the block encryption algorithm in the symmetric encryption algorithm?

A.

RC5

B.

RC4

C.

RC6

D.

RC2

Full Access
Question # 10

HTTPmessage usageUDPcarry, andHTTPSprotocol based onTCPthree-way handshake, soHTTPSSafer and more recommendedHTTPS.

A.

True

B.

False

Full Access
Question # 11

The world's first worm-"Morris Worm"Make people realize that with the deepening of people's dependence on computers, the possibility of computer network being attacked is also increasing, and it is necessary to establish a sound emergency response system

A.

True

B.

False

Full Access
Question # 12

Digital signature technology obtains a digital signature by encrypting which of the following data?

A.

User data

B.

Receiver's public key

C.

sender's public key

D.

digital fingerprint

Full Access
Question # 13

In the classification of information security classified protection systems, which of the following levels define if an information system is compromised. Will it cause damage to social order and public interests? ( )[Multiple Choice Questions]

A.

The third level of security marking protection

B.

Level 4 Structural Protection

C.

Second-level system audit protection

D.

The first level of user self-protection

Full Access
Question # 14

Which of the following security threats are terminal security threats? (multiple choice)

A.

man-in-the-middle attack

B.

There is a vulnerability in the server

C.

User identity is not verified

D.

Users use weak passwords

Full Access
Question # 15

There are three types of frame forwarding behaviors: flooding, ( ), and discarding. (fill in the blank)

Full Access
Question # 16

Regarding the single sign-on supported by the firewall, which one of the following is not included?

A.

RADIUS.Single sign-on

B.

ISM single sign-on

C.

AD single sign-on

D.

HWTACACS single sign-on

Full Access
Question # 17

After the company network administrator configures the dual-system hot backup, he wants to check the status of the current VGMP group, so he typed the command and displayed the following information

HRP_M_

Role: active, peer: active

Running priority:45000, peer:45000

Backup channel1 usage: 30x

Stab1 e time: 1days, 13 hours, 35 minutes

Last state change information: 2020-03-22 16:01:56 HRP core state changed, old_state=normal (active), new_state=normal

(active).local priority F 4

peer_priority 45000.

Configuration:

hello interval: 1000ms

preempt: 60s

mirror configuration:off

mirror session:on

track trunk member:on

auto-sync configuration:on

auto-sync connection- status:on

adjust ospf cost:on

adjust ospfv3-cost:on

adjust bgp-cost:on

nat resource: off

Detail information on:

Gigabi tEthernet0/0/1:up

Gigabi tEthernet0/0/3:up

ospf-cost: +0

then the command he typed in the blank is[fill in the blank]*

Full Access
Question # 18

If there is no hard disk installed on the firewall, when a network intrusion event is found, the event will be recorded in the () log. (fill in the blank)

Full Access
Question # 19

What are the correct options for the following description of the basic concepts of LDAP?

A.

Directory Information Tree DIT: A collection of attributes constitutes a Directory Information Tree.

B.

Unique identifier DN, the name that uniquely identifies an entry in a directory information tree

C.

Relative Distinguished Name RDN, the name of the entry, uniquely identifies child entries of the same parent entry

D.

Attribute: The attribute describes the characteristics of the object. An attribute consists of an attribute type and one or more attribute values.

Full Access
Question # 20

Which of the following SSLVPN functions can and can only access all TCP resources?

A.

Network expansion

B.

Port Forwarding

C.

web proxy

D.

file sharing

Full Access
Question # 21

The scalability of servers is higher than that of personal computers.

A.

TRUE

B.

FALSE

Full Access
Question # 22

Which of the following options is not a communication electronic evidence?

A.

Telephone recording

B.

Chat history

C.

Email

D.

System log

Full Access
Question # 23

Man-in-the-middle attacks are data security threats.

A.

True

B.

False

Full Access
Question # 24

After an engineer completes the source NAT configuration, the internal network still cannot access the external network. The engineer wants to query the detailed information of the address translation by using the command to query the session table, so the engineer directly uses the ( ) command in the user view to query the address translation. information. (fill in the blank)

Full Access
Question # 25

Which of the following descriptions about the main implementation of single sign-on is wrong? ( )[Multiple choice]*

A.

Accept PC message mode

B.

Query the AD server security log mode

C.

Query the syslog server mode

D.

Firewall monitors AD authentication packets

Full Access
Question # 26

There are two ways for a PKI entity to apply for a local certificate from a CA: ( ). (fill in the blank)

Full Access
Question # 27

Which of the following descriptions about the DNS protocol is correct?

A.

There are four types of servers in the DNS domain name resolution system: root server, top-level domain name server, recursive server and cache server.

B.

The DNS protocol port number is 53

C.

DNS protocol transport layer can use either TCP or UDP

D.

If the DNS cache server does not have the domain name resolution cache to be queried, it will directly query the top-level domain name server

Full Access
Question # 28

Which of the following VPNs cannot be used in a Site to-Site scenario? ( )[Multiple choice]*

A.

GRE VPN

B.

L2TP VPN

C.

SSL VPN

D.

IPSEC VPN

Full Access
Question # 29

Under normal circumstances, the Emai1 protocols we often talk about include ____, POP3, and SMTP.[fill in the blank]*

Full Access
Question # 30

Heartbeat message (He11o message): The two FWs send heartbeat messages to each other periodically (the default period is ( ) seconds) to check whether the peer device is alive. (fill in the blank)

Full Access
Question # 31

existUSGIn the series firewalls, which of the following commands can be used to queryNATconversion result?

A.

display nat translation

B.

display firewall session table

C.

display current nat

D.

display firewall nat translation

Full Access
Question # 32

The preservation of electronic evidence is directly related to the legal validity of the evidence, and the authenticity and reliability of the preservation in compliance with legal procedures can be guaranteed. Which of the following is not an evidence preservation technique?

A.

Encryption Technology

B.

digital certificate technology

C.

digital signature technology

D.

Packet Tag Tracking Technology

Full Access
Question # 33

aboutIKE SA, which of the following descriptions is false?

A.

IKE SAis bidirectional

B.

IKEis based onUDPapplication layer protocol

C.

IKE SAit's forIPSec SAServices

D.

The encryption algorithm used by user data packets isIKE SADecide

Full Access
Question # 34

Which of the following information is encrypted during the use of digital envelopes? (multiple choice)

A.

Symmetric key

B.

User data

C.

Receiver's public key

D.

Receiver's private key

Full Access
Question # 35

Which of the following options are malicious programs? (multiple choice)

A.

Trojan horse

B.

Vulnerability

C.

worm

D.

Virus

Full Access
Question # 36

againstIPspoofing attack (IP Spoofing), which of the following is an error?

A.

IPSpoofing attacks are based onIPaddress trust relationship to initiate

B.

IPAfter a successful spoofing attack, the attacker can use forged arbitraryIPThe address impersonates a legitimate host to access key information

C.

The attacker needs to put the sourceIPlandaddress masquerading as a trusted host and sendSYNmarkNote the data segment request connection

D.

based onIPThe hosts in the trust relationship of the addresses can log in directly without entering password authentication.

Full Access
Question # 37

When dual-system hot backup is deployed on the firewall,VRRPWhich of the following protocols should be used to switch the overall status of a backup group?

A.

VRRP

B.

VGMP

C.

HRP

D.

OSPF

Full Access
Question # 38

Digital envelope technology means that the sender uses the receiver's public key to encrypt the data, and then sends the ciphertext to the receiver ( )[Multiple choice]*

A.

TRUE

B.

FALSE

Full Access
Question # 39

Drag the warning level of the network security emergency response on the left into the box on the right, and arrange it from top to bottom in order of severity.[fill in the blank]*

Full Access
Question # 40

Which of the following is not the default security zone of the firewall ( )[Multiple choice]*

A.

untrust trust

B.

trust zone

C.

dmz zone

D.

isp zone)

Full Access
Question # 41

____- The goal is to provide a rapid, composed and effective response in emergency situations, thereby enhancing the ability of the business to recover immediately from a disruptive event.[fill in the blank]*

Full Access
Question # 42

_____ is a flaw in the specific implementation of hardware, software, protocols, or system security policies that could enable an attacker to gain unauthorized access or compromise a system.[fill in the blank]*

Full Access
Question # 43

Which of the following options belong to international organizations related to the standardization of information security? (multiple choice)

A.

International Organization for Standardization(ISO)International Organization for Standardization

B.

International Electrotechnical Commission(IEC) International Electrotechnical Commission

C.

International Telecommunication Union(ITU)ITU

D.

Wi-Fi Alliance Wi-Fialliance organization

Full Access
Question # 44

at HuaweiSDSecIn the solution, which of the following is an analysis layer device?

A.

CIS

B.

Agile Controller

C.

switch

D.

Firehunter

Full Access
Question # 45

Which of the following attacks is not a special packet attack?

A.

ICMPredirected packet attack

B.

ICMPUnreachable Packet Attack

C.

IPaddress scanning attack

D.

oversizedICMPPacket attack

Full Access
Question # 46

Which of the following statements about electronic evidence sources is false?

A.

Facsimile data and mobile phone recordings are electronic evidence related to communication technology.

B.

Movies and TV series are electronic evidence related to network technology.

C.

Database operation records and operating system logs are electronic evidence related to computers•

D.

OS logs,e-mail, chat records can be used as a source of electronic evidence

Full Access
Question # 47

Which of the following is network address port translation (NAPT) and only translate network addresses (No-PAT) difference?

A.

go throughNo-PATAfter conversion, for external network users, all packets come from the sameIPaddress

B.

No-PATOnly supports protocol port translation at the transport layer

C.

NAPTOnly supports protocol address translation at the network layer

D.

No-PATSupports protocol address translation at the network layer

Full Access
Question # 48

Execute the command on the firewall and display the above information. Which of the following descriptions is correct? (multiple choice)

A.

this firewallVGMPgroup status isActive

B.

this firewallG1/0/1virtual interfaceIPaddress is202.38.10.2

C.

this firewallVRIDfor1ofVRRPThe priority of the backup group is100

D.

When the main deviceUSG_AWill not switch in the event of a failure

Full Access
Question # 49

Digital signature is to generate digital fingerprint by using hash algorithm, so as to ensure the integrity of data transmission

A.

True

B.

False

Full Access
Question # 50

existUSGConfiguration on the series firewallNAT Server, will produceserver-mapTable, which of the following is not part of this representation?

A.

PurposeIP

B.

destination port number

C.

agreement number

D.

sourceIP

Full Access
Question # 51

firewallGE1/0/1andGE1/0/2mouth belongs toDMZarea, if you want to implementGE1/0/1The connected area is accessibleGE1/0/2Connected area, which of the following is correct?

A.

needs to be configuredLocalarriveDMZsecurity policy

B.

No configuration required

C.

Interzone security policy needs to be configured

D.

needs to be configuredDMZarrivelocalsecurity policy

Full Access
Question # 52

On the surface, threats such as viruses, loopholes, and Trojan horses are the causes of information security incidents, but at the root, information security incidents are also closely related to people and the information system itself.

A.

True

B.

False

Full Access
Question # 53

Which of the following is true about the security policy configuration command?

A.

prohibited fromtrustRegional accessuntrustarea and the destination address is10.1.10.10hostICMPmessage

B.

prohibited fromtrustRegional accessuntrustarea and the destination address is10.1.0.0/16All hosts on the segmentICMPmessage

C.

prohibited fromtrustRegional accessuntrustregion and the source address is10.1.0.0/16All hosts from the network segmentICMPmessage

D.

prohibited fromtrustRegional accessuntrustregion and the source address is10.2.10.10All hosts from hostICMPmessage

Full Access
Question # 54

The firewall is divided according to the protection object,windowsfirewall belongs to— ?

A.

Software Firewall

B.

hardware firewall

C.

Stand-alone firewall

D.

Internet Firewall

Full Access
Question # 55

aboutHRPWhich of the following options is not included in the content of the master/slave configuration consistency check?

A.

NATStrategy

B.

Whether the heartbeat interface with the same sequence number is configured

C.

The next hop and outgoing interface of the static route

D.

Authentication Policy

Full Access
Question # 56

some applications such asOracleFor database applications, the firewall session connection is interrupted due to no data flow transmission for a long time, resulting in service interruption. Which of the following is the optimal solution?

A.

Configure a long-term connection for a service

B.

turn onASPFFeatures

C.

Optimize security policies

D.

Enable shard cache

Full Access
Question # 57

Firewall in addition to supporting built-inPortalIn addition to authentication, it also supports customizationPortalauthentication, when using customPortalDuring authentication, there is no need to deploy externalPortalserver.

A.

True

B.

False

Full Access
Question # 58

HuaweiUSGfirewallVRRPThe advertisement packets are multicast packets, so each firewall in the backup group must be able to communicate directly at Layer 2.

A.

True

B.

False

Full Access
Question # 59

In the process of digital signature, which of the following is mainly carried outHASHAlgorithms thereby verifying the integrity of data transmissions?

A.

User data

B.

Symmetric key

C.

Receiver's public key

D.

Receiver's private key

Full Access
Question # 60

Which of the following is not a common application scenario of digital certificates? ( )[Multiple choice]*

A.

FTP

B.

HTTPS

C.

IPSEC VPN

D.

SSL VPN

Full Access
Question # 61

Use the Ping command on the firewall to test the reachability to the server (the security zone where the server is located is the DMZ). If a security policy is configured to allow the test traffic, the source security zone is _____.[fill in the blank]*

Full Access
Question # 62

Control actions of firewall inter-domain forwarding security policypermitanddeny, which of the following options are correct? (multiple choice)

A.

The actions of the firewall's default security policy are:deny

B.

The packet matches the interzone security policydenyThe packet is discarded immediately after the action, and other interzone security policies will not continue to be executed.

C.

Even if the packet matches the security policypermitaction, and may not necessarily be forwarded by the firewall

D.

Whether the packet matches the security policypermitaction, ordenyaction, will go toUTMmodule handling

Full Access
Question # 63

According to the management specification, regularly check the network security system and equipment, upgrade the patch, and organize the network security emergency response drill. The above actions belong toMPDRRWhat are the elements of the network security model?

A.

Protection link

B.

Detection link

C.

response link

D.

Management link

Full Access
Question # 64

Which of the following options belong to the default security zone of Huawei Firewall? (multiple choice)

A.

Zonearea

B.

Trustarea

C.

Untrustarea

D.

Securityarea

Full Access
Question # 65
Full Access
Question # 66

Which of the following options isL2TPThe port number used by the packet?

A.

17

B.

500

C.

1701

D.

4500

Full Access
Question # 67

In practical applications, asymmetric encryption is mainly used to encrypt user data

A.

True

B.

False

Full Access
Question # 68

In which of the following scenarios does the firewall generate the Server map table? ( )

A.

NAT Server is deployed on the firewall

B.

ASPF is deployed on the firewall and forwards the traffic of the multi-channel protocol

C.

When the firewall generates a session table, it will generate a Server-map table

D.

Security policies are deployed on the firewall and traffic is released

Full Access
Question # 69
Full Access
Question # 70

in the administratorUSGWhich of the following operations are required during the firewall software version upgrade? (multiple choice)

A.

Upload firewall version software

B.

Restart the device

C.

Factory reset the device

D.

Specify the software version to be loaded on the next boot

Full Access
Question # 71

Please order the following project implementation steps from project initiation.[fill in the blank]*

Full Access
Question # 72

UDPA port scan is when an attacker sends a zero byte lengthUDPmessage to a specific port of the target host, if the port is open, it will return aICMPPort reachable data packets.

A.

True

B.

False

Full Access
Question # 73

GREThe tunnel addresses at both ends of the tunnel can be configured as addresses on different network segments

A.

True

B.

False

Full Access