Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Huawei HCIA-Security H12-711_V4.0 Questions and answers with CertsForce

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following NAT technologies can implement a public network address to provide source address translation for multiple private network addresses ( )*

Options:

A.

NAPT


B.

NAT Server


C.

Easy-ip

CT Jinglu


D.

NAT No-PAT


Expert Solution
Questions # 2:

When forwarding a TCP, UDP, or ICMP packet, the firewall needs to query the session table in order to determine the connection to which the packet belongs and take corresponding measures.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 3:

Match the following user categories and authentication modes.

Question # 3


Expert Solution
Questions # 4:

The shard cache technology will wait for the arrival of the first shard packet, and then reassemble and decrypt all the packets, and then do subsequent processing by the device to ensure that the session can proceed normally in some application scenarios.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 5:

Huawei Firewall only supports the inter-domain persistent connection function for TCP packets.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 6:

Compared with the software architecture of C/S, B/S does not need to install a browser, and users are more flexible and convenient to use.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 7:

Which of the following types of malicious code on your computer includes?

Options:

A.

Oral virus


B.

Trojan horses


C.

Port SQL injection


D.

Oral spyware


Expert Solution
Questions # 8:

In the authentication policy of the firewall, _____ allows the user to not need to enter the user name and password, but can obtain the corresponding relationship between the user and the IP, so as to carry out policy management based on the user[fill in the blank]*


Expert Solution
Questions # 9:

The following description of the intrusion fire protection system IPS, which is correct?

Options:

A.

The port IPS can be concatenated at the network boundary.


B.

The IPS cannot prevent intrusion from occurring in real time.


C.

The port IPS can be attached to the switch and port mirrored through the switch.


D.

Oral IPS has the ability to customize intrusion prevention rules.


Expert Solution
Questions # 10:

As shown in the figure, what is the range of the AH protocol authentication range in transmission mode?

Question # 10

Options:

A.

The4


B.

The3


C.

The2


D.

The1


Expert Solution
Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions