Pass the Huawei HCIP-Security H12-725_V4.0 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following statements is false about health check?

Options:

A.

Health check supports DNS detection protocols.


B.

In addition to link connectivity detection, health check can also detect the delay, jitter, and packet loss rate of links in real time.


C.

The health check function cannot be used together with PBR.


D.

Firewalls can detect network connectivity in real time based on the health check result.


Questions # 2:

Which of the following statements is false about web rewriting in web proxy?

Options:

A.

The intranet server addresses can be hidden, ensuring high security.


B.

Images may be misplaced.


C.

The fonts may be incomplete.


D.

Internet Explorer controls are required.


Questions # 3:

In SSL VPN, the firewall performs access authorization and control based on which of the following dimensions?

Options:

A.

Role


B.

MAC address


C.

Port number


D.

IP address


Questions # 4:

During deployment of Portal authentication, an authentication-free rule profile needs to be configured to ensure Portal pages can be opened on authentication terminals. To achieve this purpose, the following traffic needs to be permitted in the authentication-free rule profile: DNS resolution traffic of user terminals, traffic from user terminals for accessing Portal pages, and traffic from user terminals to the RADIUS server.

Options:

A.

TRUE


B.

FALSE


Questions # 5:

Which of the following parameters is not required for an IKE proposal?

Options:

A.

Authentication algorithm


B.

Encapsulation mode


C.

Negotiation mode


D.

Encryption algorithm


Questions # 6:

When a user accesses the virtual gateway, the user can access the SSL VPN only after the user terminal passes the host check policy.

Options:

A.

TRUE


B.

FALSE


Questions # 7:

Which of the following statements is true about the outgoing traffic in the firewall virtual system?

Options:

A.

Traffic from the private network interface to the public network interface is limited by the outbound bandwidth.


B.

Traffic from the public network interface to the private network interface is limited by the outbound bandwidth.


C.

Traffic from the private network interface to the public network interface is limited by the inbound bandwidth.


D.

Traffic from the public network interface to the private network interface is limited by the inbound bandwidth.


Questions # 8:

Which of the following statements is false about virtual system resource allocation?

Options:

A.

Virtual systems can share and preempt resources of the entire device. Such resources can be manually allocated.


B.

To manually allocate resources to a virtual system, an administrator needs to configure a resource class, specify the guaranteed quota and maximum quota of each resource in the resource class, and bind the resource class to the virtual system.


C.

Improper resource allocation may prevent other virtual systems from obtaining resources and services from running properly.


D.

Quota-based resources are automatically allocated based on system specifications.


Questions # 9:

SYN scanning requires a fully established TCP connection and is recorded in system logs.

Options:

A.

TRUE


B.

FALSE


Questions # 10:

When gateways are connected using GRE over IPsec, the IPsec encapsulation mode must be tunnel mode.

Options:

A.

TRUE


B.

FALSE


Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions