Pass the Huawei HCIA-Security H12-711_V4.0 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

As shown in the figure, the process of AD single sign-on (querying the security log mode of AD server), please match the corresponding operation process.

Question # 1

Question # 1


Questions # 2:

Both digital envelopes and digital signatures guarantee data security and verify the origin of data.

Options:

A.

TRUE


B.

FALSE


Questions # 3:

When the Layer 2 switch receives a unicast frame and the MAC address table entry of the switch is empty, the switch discards the unicast frame.

Options:

A.

TRUE


B.

FALSE


Questions # 4:

As shown in the figure, what is the authentication range of the AH protocol in tunnel mode?

Question # 4

Options:

A.

The3


B.

The4


C.

The2


D.

The1


Questions # 5:

WAF can accurately control and manage users' online behavior and user traffic.

Options:

A.

TRUE


B.

FALSE


Questions # 6:

The keys used by the IPSec encryption and authentication algorithms can be configured manually or dynamically negotiated via the ____ protocol. (abbreviation, all uppercase).


Questions # 7:

In the TCP/P protocol core, which of the following protocols works at the application layer? ( )[Multiple choice]*

Options:

A.

IGMP


B.

ICMP


C.

RIP


D.

ARP


Questions # 8:

Which of the following is the correct sequence for incident response management

1. Detection 2 Report 3 Mitigation 4 Lessons learned 5 Fix 6 Recovery 7 Response

Options:

A.

1->3->2->7->6->5->4


B.

1->7->3->2->6->5->4


C.

1->3->2->7->5->6->4


D.

1->2->3->7->6->5->4


Questions # 9:

What are the correct entries in the following description of firewall security zones?

Options:

A.

The DMZ security zone solves the problem of server placement well, and this security area can place devices that need to provide network services to the outside world.


B.

The Local zone is the highest security zone with a priority of 99.


C.

Data flows between security domains are directional, including Inbound and Outbound.


D.

Normally, the two communicating parties must exchange messages, that is, there are messages transmitted in both directions between security domains.


Questions # 10:

The network environment is becoming more and more complex, and network security incidents occur frequently. While accelerating the construction of informatization, enterprises must not only resist external attacks, but also prevent internal management personnel from being involved in data leakage and operation and maintenance accidents due to operational errors and other issues. Which of the following options might reduce operational risk?

Options:

A.

According to the administrator configuration, the O&M user corresponds to the background resource account, and restricts the unauthorized use of the account. mouth Based on the password security policy, the O&M security audit system automatically modifies the password of the background resource account at regular intervals.


B.

Each system is independently operated, maintained and managed, and the access process is not audited and monitored.


C.

Oral Each department system is independently authenticated and uses a single static password for authentication.


Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions