Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Huawei HCIA-Security H12-711_V4.0 Questions and answers with CertsForce

Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which of the following attacks can be detected through intrusion prevention?

Options:

A.

Injection attack


B.

Directory traversal


C.

Trojan horse


D.

Buffer overflow attack


Expert Solution
Questions # 22:

____- The goal is to provide a rapid, composed and effective response in emergency situations, thereby enhancing the ability of the business to recover immediately from a disruptive event.[fill in the blank]*


Expert Solution
Questions # 23:

As shown in the figure, what is the authentication range of the AH protocol in tunnel mode?

Question # 23

Options:

A.

The3


B.

The4


C.

The2


D.

The1


Expert Solution
Questions # 24:

Which of the following statements is incorrect about DoS attacks?

Options:

A.

DoS attacks use IP spoofing to prevent authorized users from connecting to the target server.


B.

DoS attacks stop services or resource access on the target server.


C.

DoS attack forces the target server's buffer to be full and does not receive new requests.


D.

DoS attacks cause unrecoverable physical damage to the target server.


Expert Solution
Questions # 25:

Under normal circumstances, the Emai1 protocols we often talk about include ____, POP3, and SMTP.[fill in the blank]*


Expert Solution
Questions # 26:

In the PKI certificate revocation process, a user needs to send a signed and encrypted email to the RA to apply for certificate revocation.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 27:

Database operation records can be used as ___ evidence to backtrack security events.[fill in the blank]*


Expert Solution
Questions # 28:

As shown in the figure, which of the following shows the authentication range of ESP in transport mode?

Options:

A.

4


B.

1


C.

3


D.

2


Expert Solution
Questions # 29:

Regarding the characteristics of the routing table, which of the following items is described correctly

Options:

A.

Port When a packet matches multiple entries in the routing table, it is forwarded based on the route entry with the largest metric.


B.

Port In the global routing table, there is at most one next hop to the same destination CIDR block.


C.

There may be multiple next hops in the global routing table to the same destination.


D.

Port When a packet matches multiple entries in the routing table, it is forwarded according to the longest mask.


Expert Solution
Questions # 30:

As shown in the figure, which of the following shows the authentication range of ESP in transport mode?

Question # 30

Options:

A.

4


B.

1


C.

3


D.

2


Expert Solution
Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions