Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Huawei HCIA-Security H12-711_V4.0 Questions and answers with CertsForce

Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions
Questions # 11:

As shown, in transmission mode, which of the following locations should the AH header be inserted in?

Question # 11

Options:

A.

3


B.

2


C.

1


D.

4


Expert Solution
Questions # 12:

Which of the following problems cannot be solved using PKI?

Options:

A.

The network is congested due to heavy traffic. As a result, the server cannot provide services properly.


B.

The transaction parties cannot verify the identities of each other.


C.

Data may be eavesdropped and tampered with during transmission, and information security cannot be ensured.


D.

No paper receipt is used in transaction, making arbitration difficult.


Expert Solution
Questions # 13:

The keys used by the IPSec encryption and authentication algorithms can be configured manually or dynamically negotiated via the ____ protocol. (abbreviation, all uppercase).


Expert Solution
Questions # 14:

Which of the following is the numbering range of Layer 2 ACLs?

Options:

A.

The 3000~3999


B.

The 4000~4999


C.

The 1000~1999


D.

@2000~2999


Expert Solution
Questions # 15:

Data monitoring can be divided into two types: active analysis and passive acquisition.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 16:

What is the protocol number of the GRE protocol?

Options:

A.

47


B.

48


C.

46


D.

The 50th


Expert Solution
Questions # 17:

Drag the warning level of the network security emergency response on the left into the box on the right, and arrange it from top to bottom in order of severity.[fill in the blank]*

Question # 17


Expert Solution
Questions # 18:

Which layer of data packets does a packet filtering firewall check?

Options:

A.

Application layer


B.

Physical layer


C.

Network layer


D.

Data link layer


Expert Solution
Questions # 19:

Which layer of the protocol stack does SSL provide end-to-end encrypted transmission services?

Options:

A.

Application layer


B.

Data link layer


C.

Network layer


D.

Transport layer


Expert Solution
Questions # 20:

On a firewall, security policies with the permit action do not need to be configured for traffic between users in the same zone.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions