Pass the Huawei HCIA-Security H12-711_V4.0 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Regarding the characteristics of the routing table, which of the following items is described correctly

Options:

A.

Port When a packet matches multiple entries in the routing table, it is forwarded based on the route entry with the largest metric.


B.

Port In the global routing table, there is at most one next hop to the same destination CIDR block.


C.

There may be multiple next hops in the global routing table to the same destination.


D.

Port When a packet matches multiple entries in the routing table, it is forwarded according to the longest mask.


Expert Solution
Questions # 12:

As shown in the figure, nat server global202.106.1.1 inside10.10.1.1 is configured on the firewall. Which of the following is the correct configuration for interzone rules? ( )[Multiple choice]*

Question # 12

Options:

A.

rule name c. source-zone untrust. destination-zone trust. destination-address 202.106.1.132, action permit


B.

rule name d, source- zone untrust. destination- zone trust. destination- address10.l0.1.1 32, action permit


C.

rule name b, source- zone untrust, destination- zone trust, source- address10.10.1.1 32, action permit


D.

rule name b, source-zone untrust, destination-zone trust, source-address202.106.l.1 32, action permit


Expert Solution
Questions # 13:

Please match the following information security risks to information security incidents one by one.[fill in the blank]*

physical security riskEnterprise server permissions are loosely set

Information Security Management RiskInfected Panda Burning Incense

Information Access RiskFire destroyed equipment in computer room

application riskTalk to people about leaking company secrets


Expert Solution
Questions # 14:

Which of the following characteristics does a denial-of-service attack include?

Options:

A.

Unauthorized tampering of the mouth


B.

Unauthorized access to the mouth


C.

Unauthorized activation of the mouth


D.

Unauthorized destruction of the mouth


Expert Solution
Questions # 15:

Match each of the following application layer service protocols with the correct transport layer protocols and port numbers.

Question # 15


Expert Solution
Questions # 16:

Please classify the following security defenses into the correct classification.

Question # 16


Expert Solution
Questions # 17:

Using the ___ method of the Web proxy, the virtual gateway will encrypt the real URL that the user wants to access, and can adapt to different terminal types.[fill in the blank]*


Expert Solution
Questions # 18:

Please order the following steps in the PKI life cycle correctly, 1. Issued, 2. storage, 3. Update, 4. verify[fill in the blank]*


Expert Solution
Questions # 19:

Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution.[fill in the blank]*

Question # 19


Expert Solution
Questions # 20:

When using passive mode to establish an FTP connection, the control channel uses port 20 and the data channel uses port 21. ( )[Multiple choice]*

Options:

A.

True


B.

False


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions