Summer Sale - Special Discounts Limited Time 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 63r59951

Note! The H12-711_V3.0 Exam is no longer available. Get in touch with our Live Chat or email us for more information about the H12-711_V4.0 Exam.

H12-711_V3.0 HCIA-Security V3.0 Questions and Answers

Questions 4

Please match the following information security risks to information security incidents one by one.[fill in the blank]*

physical security riskEnterprise server permissions are loosely set

Information Security Management RiskInfected Panda Burning Incense

Information Access RiskFire destroyed equipment in computer room

application riskTalk to people about leaking company secrets

Options:

Buy Now
Questions 5

In USG6000E, the initial priority of VGMP is ( ) (fill in the blank)

Options:

Buy Now
Questions 6

Company network administrator allocation. After the dual-system hot backup is set, run the command to check VRRP and other information, and get the following information

HRP_M

Gigabi tEtherneto/0/3 Virtual Router 1

State: Master

Virtual IP: 10.3.0.3

Master IP: 10.3.0.1

PriorityRun: 120

PriorityConfig:100

MasterPriority: 120

Preempt: YESDelay Time: 0 s

TimerRun: 60s

TimerConfig: 60s

Auth type: NONE

Virtual MAC: 0000-5e00-0101

Check TIL: YES

Config type:vgmp Vrrp

Backup-torward: disabled

Create time:2020-03-17 17:35:54 UTC+08:02

Last change time: 2020-03-22 16:01:56 UTC+08:02

Ask him to type the view command in the blank space is ____

[fill in the blank]*

Options:

Buy Now
Questions 7

Please order the following steps in the PKI life cycle correctly, 1. Issued, 2. storage, 3. Update, 4. verify[fill in the blank]*

Options:

Buy Now
Questions 8

Man-in-the-middle attacks are data security threats.

Options:

A.

True

B.

False

Buy Now
Questions 9

Which of the following attacks is not a cyber attack?

Options:

A.

IP spoofing attack

B.

SmurfI attack

C.

MAC address spoofing attack

D.

ICMP attack

Buy Now
Questions 10

The TCP/IP protocol stack packet encapsulation includes: Which of the following describes the encapsulation order (sort order: ABDC)

Options:

A.

Data

B.

TCP/UDP

C.

MAC

D.

IP

Buy Now
Questions 11

After an engineer completes the source NAT configuration, the internal network still cannot access the external network. The engineer wants to query the detailed information of the address translation by using the command to query the session table, so the engineer directly uses the ( ) command in the user view to query the address translation. information. (fill in the blank)

Options:

Buy Now
Questions 12

An enterprise wants to build a server system and requires the following functions: 1. The enterprise needs to have its own dedicated mailbox, and the sending and receiving of emails needs to go through the enterprise's server; 2. The server must provide file transfer and access services. Users in different departments of the enterprise provide accounts with different permissions: 3. When the enterprise accesses the internal webpage of the enterprise, the enterprise can directly enter the domain name in the browser to access. To meet the above requirements, which of the following servers do enterprises need to deploy? ( )*

Options:

A.

Time synchronization server

B.

FTP server (I)

C.

DNS server

D.

Mail server

Buy Now
Questions 13

In symmetric encryption algorithms, the algorithm is generally used on data communication channels, browsers or network links (). (fill in the blank)

Options:

Buy Now
Questions 14

Which of the following options is not a communication electronic evidence?

Options:

A.

Telephone recording

B.

Chat history

C.

Email

D.

System log

Buy Now
Questions 15

Which of the following is an "information sabotage incident" in the classification of network security incidents?

Options:

A.

Software and hardware failure

B.

Information counterfeiting

C.

Internet Scanning for plagiarism

D.

Listen to Trojan attack

Buy Now
Questions 16

The most common three-level standard for equal protection includes three aspects: physical security, data security and network security.

Options:

A.

is correct

B.

False

Buy Now
Questions 17

We should choose the encryption algorithm according to our own use characteristics. When we need to encrypt a large amount of data, it is recommended to use the ____ encryption algorithm to improve the encryption and decryption speed.[fill in the blank]*

Options:

Buy Now
Questions 18

The IDS is usually installed on the switch to detect intrusion, and at the same time, it can avoid the single point of failure affecting the normal operation of the network.

Options:

A.

True

B.

False

Buy Now
Questions 19

As shown, the USG firewall NAT configuration is as follows:

Options:

A.

When FTP Server1 responds to Client A, it is converted to the address 1.1.1.5 in Address Ground 1

B.

Source NAT configuration, only for intranet users (10.1.1.0/24) to access the external network for translation

C.

When the IP address of the FTP Server host is changed to 1.11.3. Client A host can still access the FTP Server more

D.

Client A accesses FTP Server 1.1.1.1, and the destination address is converted to 10.1.1.2. The source address remains unchanged

Buy Now
Questions 20

Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution.[fill in the blank]*

H12-711_V3.0 Question 20

Options:

Buy Now
Questions 21

Which of the following options is not a private network IP address?

Options:

A.

192.168.254.254/16

B.

172.32.1.1/24

C.

10.32.254.254/24

D.

10.10.10.10/8

Buy Now
Questions 22

There are two ways for a PKI entity to apply for a local certificate from a CA: ( ). (fill in the blank)

Options:

Buy Now
Questions 23

Which of the following does not belong to the log format of the firewall? ( )[Multiple choice]

Options:

A.

binary format

B.

netflow format

C.

ASCII encoding format

D.

Syslog format

Buy Now
Questions 24

Multiple different ( ) cannot be added to the same interface on the firewall at the same time (fill in the blank)

Options:

Buy Now
Questions 25

In digital signature technology, we usually encrypt the digital fingerprint with the sender's ( ). (fill in the blank)

Options:

Buy Now
Questions 26

pass throughdisplay ike sa The results you see are as follows. Which of the following statements is false?

H12-711_V3.0 Question 26

Options:

A.

IKE SAhas been established

B.

IPSec SAhas been established

C.

neighbor address is2.2.2.1

D.

IKEused isV1Version

Buy Now
Questions 27

Which of the following options are malicious programs? (multiple choice)

Options:

A.

Trojan horse

B.

Vulnerability

C.

worm

D.

Virus

Buy Now
Questions 28

Which of the following is an encryption technique used in digital envelopes?

Options:

A.

Symmetric encryption algorithm

B.

Asymmetric encryption algorithm

C.

hash algorithm

D.

Stream Encryption Algorithm

Buy Now
Questions 29

Which of the following are HRP(Huawei Redundancy Protocol) protocol can back up state information? (multiple choice)

Options:

A.

session table

B.

ServerMapentry

C.

Dynamic blacklist

D.

routing table

Buy Now
Questions 30

In a stateful inspection firewall, when the stateful inspection mechanism is enabled, the second packet of the three-way handshake (SYN+ACK) when reaching the firewall, which of the following descriptions is correct if there is no corresponding session table on the firewall?

Options:

A.

The firewall does not create a session table, but allows packets to pass through

B.

If the firewall security policy allows packets to pass, create a session table

C.

Packets must not pass through the firewall

D.

Packets must pass through the firewall and establish a session

Buy Now
Questions 31

at HuaweiSDSecIn the solution, which layer of equipment does the firewall belong to?

Options:

A.

Analysis layer

B.

control layer

C.

executive layer

D.

Monitoring layer

Buy Now
Questions 32

In the process of digital signature, which of the following is mainly carried outHASHAlgorithms thereby verifying the integrity of data transmissions?

Options:

A.

User data

B.

Symmetric key

C.

Receiver's public key

D.

Receiver's private key

Buy Now
Questions 33

Firewall in addition to supporting built-inPortalIn addition to authentication, it also supports customizationPortalauthentication, when using customPortalDuring authentication, there is no need to deploy externalPortalserver.

Options:

A.

True

B.

False

Buy Now
Questions 34

Which of the following is an encryption technique used in digital envelopes?

Options:

A.

Symmetric encryption algorithm

B.

Asymmetric encryption algorithm

C.

hash algorithm

D.

stream-add algorithm

Buy Now
Questions 35

aboutGREEncapsulation and decapsulation, which of the following descriptions is false?

Options:

A.

The encapsulation process, the original data packet is passed to theTunnelDepart after the interfaceGREpackage

B.

packaging process, afterGREAfter the module is encapsulated, this packet will enterIPmodule for further processing

C.

The decapsulation process, the destination receivesGREAfter the message, the data packet is delivered to theTunnelDepart after the interfaceGREDecapsulation

D.

Decapsulation process, afterGREAfter the module is decapsulated, this packet will go inIPmodule for further processing

Buy Now
Questions 36

aboutwindowslog, which of the following descriptions is false?

Options:

A.

System logs are used to record events generated by operating system components, mainly including crashes of drivers, system components and application software, and data

B.

windows server 2008The system logs are stored inApplication.evtxmiddle

C.

The application log contains events recorded by applications or system programs, mainly recording program operation events

D.

windows server 2008The security log is stored insecurity.evtxmiddle

Buy Now
Questions 37

Data analysis technology is to find and match keywords or key phrases in the acquired data stream or information stream, and analyze the correlation of time. Which of the following is not an evidence analysis technique?

Options:

A.

Cryptography, data decryption technology

B.

Digital Abstract Analysis Technology of Documents

C.

Techniques for discovering connections between different pieces of evidence

D.

Spam Tracking Technology

Buy Now
Questions 38

aboutwindowsandlinuxWhich of the following statements is false?

Options:

A.

linuxIt is difficult for beginners to get started and needs some learning and guidance

B.

windowsCompatible with most software and play most games

C.

linuxis open source, do what you want

D.

windowsIt's open source, do what you want

Buy Now
Questions 39

NAPTtechnology can realize a public networkIPThe address is used by multiple private network hosts

Options:

A.

True

B.

False

Buy Now
Questions 40

Which of the following is an action to be taken during the summary phase of a cybersecurity emergency response? (multiple choice)

Options:

A.

Establish a defense system and specify control measures

B.

Evaluate the implementation of emergency plans and propose follow-up improvement plans

C.

Judging the effectiveness of isolation measures

D.

Evaluate members of emergency response organizations

Buy Now
Questions 41

Digital signature is to generate digital fingerprint by using hash algorithm, so as to ensure the integrity of data transmission

Options:

A.

True

B.

False

Buy Now
Questions 42

DDosWhich of the following attack types is an attack?

Options:

A.

snooping scan attack

B.

Malformed Packet Attack

C.

special packet attack

D.

traffic attack

Buy Now
Questions 43

Firewall usagehrp standby config enableAfter the command to enable the configuration function of the standby device, all the information that can be backed up can be configured directly on the standby device, and the configuration on the standby device can be synchronized to the active device.

Options:

A.

True

B.

False

Buy Now
Questions 44

useiptablesWrite a rule that doesn't allow172.16.0.0/16Which of the following rules is correct?

Options:

A.

iptables -t fielter -A INPUT -s 172.16.0.0/16 -p all -j DROP

B.

iptables -t fielter -P INPUT -s 172.16.0.0/16 -p all -j DROP

C.

iptables -t fielter -P INPUT -s 172.16.0.0/16 -p all -j ACCEPT

D.

iptables -t fielter -P INPUT -d 172.16.0.0/16 -p all -j ACCEPT

Buy Now
Questions 45

On the surface, threats such as viruses, loopholes, and Trojan horses are the causes of information security incidents, but at the root, information security incidents are also closely related to people and the information system itself.

Options:

A.

True

B.

False

Buy Now
Questions 46

Evidence identification needs to address the verification of the integrity of the evidence and determine whether it meets the applicable standards. Which of the following statements is correct about the criteria for identification of evidence?

Options:

A.

The relevance standard means that if the telephony evidence can have a substantial impact on the facts of the case to a certain extent, the court should rule that it is relevant.

B.

The standard of objectivity means that the acquisition, storage, and submission of electronic evidence should be legal, and not constitute a serious violation of basic rights such as national interests, social welfare, and personal privacy.

C.

The standard of legality is to ensure that the content of electronic evidence remains unchanged from the initial acquisition and collection to the submission and use as litigation evidence.

D.

The standard of fairness refers to the evidentiary material obtained by the legal subject through legal means, which has evidential capacity.

Buy Now
Questions 47

Servers are classified by form factor, which of the following types can be classified? (multiple choice)

Options:

A.

blade server

B.

tower server

C.

rack server

D.

x86server

Buy Now
Questions 48

Which of the following options is notUSG6000What file formats are supported by serial devices for saving certificates?

Options:

A.

PKCS#12

B.

DER

C.

PEM

D.

PKCS#

Buy Now
Questions 49

IPSec VPNAn asymmetric encryption algorithm is used to encrypt the transmitted data

Options:

A.

True

B.

False

Buy Now
Questions 50

existIPSec VPNIn the transmission mode, which part of the encrypted data packet is?

Options:

A.

Network layer and upper layer data packets

B.

OriginalIPheader

C.

newIPheader

D.

Transport layer and upper layer data packets

Buy Now
Questions 51

aboutNATPolicy processing flow, which of the following options are correct? (multiple choice)

Options:

A.

Server-mapProcess after state detection

B.

sourceNATPolicy queries are processed after the session is created

C.

sourceNATPolicies are processed after a security policy match

D.

Server-mapProcess before security policy match

Buy Now
Questions 52

When configuring user single sign-on, if you use the mode of querying the AD server security log, please check the followingcertifiedProcedureEnterRow ordering:[fill in the blank]*

The AD monitor forwards the user login message to F7, and the user goes online at F7.

AD monitor through the WMI interface provided by AD server. Connect to the AD server to query the security log. Get the user login message.

accessboardrecord AD domain, AD servicedevicerecorduseHouseholdsuperiorStringinformation into the security log.

The AD monitor starts from the time when the AD single sign-on service starts, and regularly queries the security logs generated on the AD server.

Options:

Buy Now
Questions 53

After the firewall detects a virus, which of the following will release the virus? ( )[Multiple choice]*

Options:

A.

Not a protocol supported by the firewall

B.

Hit apply exception

C.

The source IP hits the whitelist

D.

Hit virus exception

Buy Now
Questions 54

In the classification of the information security level protection system, which of the following levels define that if the information system is destroyed, it will cause damage to social order and public interests? (multiple choice)

Options:

A.

first level

User self-protection level

B.

second level

System Audit Protection Level

C.

third level

Safety Mark Protection

D.

fourth level

structured protection

Buy Now
Questions 55

againstARPDescription of spoofing attack, which of the following is false

Options:

A.

ARPThe implementation mechanism only considers normal business interactions, and does not perform any verification on abnormal business interactions or malicious behaviors

B.

ARPSpoofing attacks can only be done byARPReply to achieve, can not passARPrequest fulfillment

C.

When a host sends normalARPWhen the request is made, the attacker will preemptively answer, causing the host to establish an erroneousIPandMACMapping relations

D.

ARPStatic binding is the solutionARPA scheme of spoofing attack, mainly used in scenarios with small network scale

Buy Now
Questions 56

UDPA port scan is when an attacker sends a zero byte lengthUDPmessage to a specific port of the target host, if the port is open, it will return aICMPPort reachable data packets.

Options:

A.

True

B.

False

Buy Now
Questions 57

Which of the following options is notIPSec SAlogo?

Options:

A.

SPI

B.

Destination address

C.

source address

D.

Security Protocol

Buy Now
Questions 58

Which of the following categories are included in Huawei Firewall User Management? (multiple choice)

Options:

A.

Internet user management

B.

Access user management

C.

Admin user management

D.

Device user management

Buy Now
Questions 59

In which of the following scenarios does the firewall generate the Server map table? ( )

Options:

A.

NAT Server is deployed on the firewall

B.

ASPF is deployed on the firewall and forwards the traffic of the multi-channel protocol

C.

When the firewall generates a session table, it will generate a Server-map table

D.

Security policies are deployed on the firewall and traffic is released

Buy Now
Questions 60

When using the ______ function of SSL VPN, the virtual gateway will assign an intranet IP address to the access user, which is used for the access user to access the P resources of the intranet[fill in the blank]*

Options:

Buy Now
Questions 61

User authentication is the authentication of the client identity by the SSL virtual gateway, including: ______, server authentication, certificate anonymous authentication and certificate challenge authentication.[fill in the blank]

Options:

Buy Now
Questions 62

In order to obtain criminal evidence, it is necessary to master the technology of intrusion tracking. Which of the following options are correct for the description of tracking technology? (multiple choice)

Options:

A.

Packet logging technology through the tracedIPInsert trace data into packets to mark packets on each router mentioned

B.

Link detection technology determines the information of the attack source by testing the network connection between routers

C.

Packet marking technology extracts attack source information by logging packets on routers and then using data drilling techniques

D.

Shallow mail behavior analysis can achieveIPlandAnalysis of information such as address, sending time, sending frequency, number of recipients, shallow email headers, etc.

Buy Now
Questions 63

Huawei's Agile-Controller products belong to ______ in the HiSec solution.[fill in the blank]

Options:

Buy Now
Questions 64

Which of the following protocols is not a protocol type that ASPF can detect? ( )[Multiple choice]*

Options:

A.

PPTP

B.

FTP

C.

MSTP

D.

DNS

Buy Now
Questions 65

When the user uses the session authentication method to trigger the firewall built-inPortalDuring authentication, users do not actively perform identity authentication, advanced service access, and device push"redirect"to the certification page

Options:

A.

True

B.

False

Buy Now
Questions 66

Which of the following statements is true about Huawei's routers and switchers??(multiple choice)

Options:

A.

Routers can implement some security functions, and some routers can implement more security functions by adding security boards

B.

The main function of the router is to forward data. When the enterprise has security requirements, sometimes a firewall may be a more suitable choice

C.

Switches have some security functions, and some switches can realize more security functions by adding security boards

D.

The switch does not have security features

Buy Now
Questions 67

ASPF (Application specific Packet Filter)It is a packet filtering technology based on the application layer, andserver-mapTables implement special security mechanisms. aboutASPFandserver-mapWhich of the following statements is correct? (multiple choice)

Options:

A.

ASPFMonitor messages during communication

B.

ASPFcan be created dynamicallyserver-map

C.

ASPFpass throughserver-mapTable implementation dynamically allows multi-channel protocol data to pass through

D.

Quintupleserver-mapThe table entry implements a similar function to the session table

Buy Now
Questions 68

HTTPmessage usageUDPcarry, andHTTPSprotocol based onTCPthree-way handshake, soHTTPSSafer and more recommendedHTTPS.

Options:

A.

True

B.

False

Buy Now
Questions 69

Which of the following information is not the backup content included in the status information backup in the dual-system hot backup? ( )[Multiple choice]*

Options:

A.

IPSEC tunnel

B.

NAPT related table items

C.

IPv4 session table

D.

Routing table

Buy Now
Questions 70

When configuring user single sign-on, use the receivePCIn message mode, the authentication process has the following steps:

1. visitorPCExecute the login script and send the user login information toADmonitor

2. Firewall extracts user andIPAdd the correspondence to the online user table

3. ADmonitor connected toADThe server queries the login user information and forwards the queried user information to the firewall

4. visitor loginADarea,ADThe server returns a login success message to the user and issues the login script. Which of the following is the correct order?

Options:

A.

1-2-3-4

B.

4-1-3-2

C.

3-2-1-4

D.

1-4-3-2

Buy Now
Questions 71

Which of the following is an action to be taken during the eradication phase in a cybersecurity emergency response? (multiple choice)

Options:

A.

Find Trojan horses, illegal authorizations, and system loopholes, and deal with them in a timely manner

B.

Revise security policies based on security incidents that occur, enable security auditing

C.

Block the behavior of the attack and reduce the impact

D.

Confirm the degree of damage caused by the security incident and report the security incident

Buy Now
Questions 72

In order to obtain criminal evidence, it is necessary to master the technology of intrusion tracking. Which of the following options are correct for the description of tracking technology? (multiple choice)

Options:

A.

Packet logging technology through the tracedIPInsert trace data into packets to mark packets on each router they pass through

B.

Link testing technology determines the information of the attack source by testing the network link between routers

C.

Packet marking technology extracts attack source information by logging packets on routers and then using data drilling techniques

D.

Shallow mail behavior analysis can achieveIPAnalysis of addresses, sent time, sending frequency, number of recipients, shallow email headers, and more.

Buy Now
Questions 73

When an information security incident occurs, give priority to using ______ emergency response to provide technical support to customers [fill in the blank]*

Options:

Buy Now
Exam Code: H12-711_V3.0
Exam Name: HCIA-Security V3.0
Last Update: Dec 11, 2023
Questions: 492