Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

H12-711_V4.0 HCIA-Security V4.0 Exam Questions and Answers

Questions 4

Database operation records can be used as ___ evidence to backtrack security events.[fill in the blank]*

Options:

Buy Now
Questions 5

An enterprise wants to build a server system and requires the following functions: 1. The enterprise needs to have its own dedicated mailbox, and the sending and receiving of emails needs to go through the enterprise's server; 2. The server must provide file transfer and access services. Users in different departments of the enterprise provide accounts with different permissions: 3. When the enterprise accesses the internal webpage of the enterprise, the enterprise can directly enter the domain name in the browser to access. To meet the above requirements, which of the following servers do enterprises need to deploy? ( )*

Options:

A.

Time synchronization server

B.

FTP server (I)

C.

DNS server

D.

Mail server

Buy Now
Questions 6

The IPS detects and analyzes all packets passing through a device and determines whether to permit or block the packets in real time based on the comprehensive detection mechanism. Sort the following steps into the correct order based on the basic implementation mechanism of the IPS.

H12-711_V4.0 Question 6

Options:

Buy Now
Questions 7

Which of the following attributes are contained in the distinguished name DN in LDAP?

Options:

A.

CN

B.

DIT

C.

DC

D.

OU

Buy Now
Questions 8

On a firewall, security policies with the permit action do not need to be configured for traffic between users in the same zone.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 9

As shown in the figure, the process of AD single sign-on (querying the security log mode of AD server), please match the corresponding operation process.

H12-711_V4.0 Question 9

H12-711_V4.0 Question 9

Options:

Buy Now
Questions 10

Huawei Firewall only supports the inter-domain persistent connection function for TCP packets.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 11

Information security aims to protect data in hardware, software, and their systems on information networks to prevent data damage, tampering, or breach due to occasional or malicious reasons and ensure proper system running and non-stop information services.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 12

When the Layer 2 switch receives a unicast frame and the MAC address table entry of the switch is empty, the switch discards the unicast frame.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 13

In the TCP/P protocol core, which of the following protocols works at the application layer?

Options:

A.

IGMP

B.

ICMP

C.

RIP

D.

ARP

Buy Now
Questions 14

_____ Authentication is to configure user information (including local user's user name, password and various attributes) on the network access server. The advantage is that it is fast.[fill in the blank]*

Options:

Buy Now
Questions 15

Which of the following NAT technologies can implement a public network address to provide source address translation for multiple private network addresses ( )*

Options:

A.

NAPT

B.

NAT Server

C.

Easy-ip

CT Jinglu

D.

NAT No-PAT

Buy Now
Questions 16

3-tuple NAT allows external devices to proactively access internal PCs through translated addresses and ports. Even if no security policy is configured on the firewall, the firewall allows such access packets to pass through.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 17

WAF can accurately control and manage users' online behavior and user traffic.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 18

Which of the following descriptions about the heartbeat interface is wrong ( )?

Options:

A.

It is recommended to configure at least two heartbeat interfaces. - One heartbeat interface is used as the master, and the other heartbeat interface is used as the backup.

B.

The interface MTU value is greater than 1500 and cannot be used as a heartbeat interface

C.

The connection method of the heartbeat interface can be directly connected, or it can be connected through a switch or router

D.

MGMT interface (Gigabi tEtherneto/0/0) cannot be used as heartbeat interface

Buy Now
Questions 19

What is correct in the following description of Security Alliance in IPSec?

There are two ways to set up an IPSec SA

Options:

A.

manual and IKE.

IPSec SA is uniquely identified by a triple.

B.

IPSec SA is a one-way logical connection, usually established in pairs (Inbound and Outbound).

C.

Security Alliance SA is a communication peer agreement for certain elements that describes how peers can communicate securely using secure services such as encryption.

Buy Now
Questions 20

Which of the following attacks can be detected through intrusion prevention?

Options:

A.

Injection attack

B.

Directory traversal

C.

Trojan horse

D.

Buffer overflow attack

Buy Now
Questions 21

In most cases, a user applies for a local certificate from a CA, and the CA approves the application and issues the certificate to the user.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 22

Which of the following statements are correct about firewall security zones?

Options:

A.

Security policies do not have to permit mutual access between users in the same zone.

B.

A security policy can permit traffic in one direction.

C.

By default, firewalls have only three security zones: Trust, Untrust, and DMZ.

D.

A firewall interface can be added to multiple security zones.

Buy Now
Questions 23

Which of the following protocols is a multichannel protocol?

Options:

A.

The Telnet

B.

THE HITP

C.

FTP

D.

The SSH

Buy Now
Questions 24

Which of the following packets is controlled by a firewall's security policy by default?

Options:

A.

Multicast

B.

Broadcast

C.

Anycast

D.

Unicast

Buy Now
Questions 25

When logging in to the web UI through HTTPS, you need to specify a local certificate issued by a CA that the web browser trusts for the HTTPS client on the device. Because the web browser can verify the local certificate, this approach avoids malicious attacks and ensures secure logins of administrators.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 26

Which of the following statements are correct about the status of the firewall VGMP group?

Options:

A.

Initialize

B.

Active

C.

Load-balance

D.

Standby

Buy Now
Questions 27

Which of the following are the backup items that HRP can provide?

Options:

A.

Mouth Server-map table entry

B.

Mouth No-PAT table entry

C.

Mouth ARP table entry

D.

Port TCP session table

Buy Now
Questions 28

What type of ACL does ACL number 3001 correspond to?

Options:

A.

Layer 2 ACL

B.

interface ACL

C.

Basic ACL

D.

Advanced ACLs

Buy Now
Questions 29

Sub-interfaces can be created on GE0/0/1 of a firewall. The sub-interfaces can be added to different VLANs, but cannot be added to security zones.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 30

Which of the following authentication modes are supported by AAA?

Options:

A.

RADIUS authentication

B.

No authentication

C.

HWTACACS authentication

D.

Local authentication

Buy Now
Questions 31

Certificates saved in DER format may or may not contain a private key.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 32

The following description of IDS, which items are correct

The IDS cannot be linked to the firewall.

Options:

A.

Mouth IDS is a fine-grained detection device, through which the live network can be monitored more accurately.

B.

The IDS can be upgraded flexibly and in a timely manner, and the strategic configuration operation is convenient and flexible.

C.

With IDS, system administrators can capture traffic from critical nodes and do intelligent analysis to find anomalous and suspicious network behavior and report it to administrators.

Buy Now
Questions 33

Match the following single-packet attack types with their corresponding descriptions.

H12-711_V4.0 Question 33

Options:

Buy Now
Questions 34

What is correct about the following description of device management in the operating system?

Options:

A.

The main task of port device management is to complete the I/O requests made by users and classify I/O devices for users.

B.

Whenever a process makes an I/O request to the system, as long as it is secure, the device allocator will assign the device to the process according to a certain policy.

C.

Device management can virtualize a physical device into multiple logical devices through virtualization technology, providing multiple user processes to use.

D.

In order to alleviate the problem of speed mismatch between CPU and I/O devices and improve the parallelism of CPU and I/O devices, in modern operating systems, almost all I/O devices are exchanging numbers with processors

Buffers are used at all times.

Buy Now
Questions 35

Which type of NAT translates both addresses and port numbers and uses the public IP address of the outbound interface as the post-NAT address?

Options:

A.

NAPT

B.

Easy IP

C.

3-tuple NAT

D.

NAT No-PAT

Buy Now
Questions 36

Please order the following steps in the PKI life cycle correctly, 1. Issued, 2. storage, 3. Update, 4. verify[fill in the blank]*

Options:

Buy Now
Questions 37

Which of the following statements is correct about security zones on a Huawei firewall?

Options:

A.

An interface on a firewall can belong to multiple zones.

B.

The default zones on a firewall can be deleted.

C.

Different security zones on a firewall have the same default security level.

D.

Different interfaces on a firewall can be in the same zone.

Buy Now
Questions 38

As shown in the figure, what is the authentication range of the AH protocol in tunnel mode?

H12-711_V4.0 Question 38

Options:

A.

The3

B.

The4

C.

The2

D.

The1

Buy Now
Questions 39

Which of the following functions help implement IPsec secure transmission of user service data on the Internet by means of encryption and authentication?

Options:

A.

Data encryption

B.

Data origin authentication

C.

Anti-replay

D.

Data integrity check

Buy Now
Questions 40

When using passive mode to establish an FTP connection, the control channel uses port 20 and the data channel uses port 21.

Options:

A.

True

B.

False

Buy Now
Questions 41

Which of the following are the default zones of Huawei firewalls?

Options:

A.

Untrust

B.

Local

C.

DMZ

D.

Trust

Buy Now
Questions 42

In the automatic backup mode of hot standby on the second machine, which of the following sessions is backed up?

Options:

A.

ICMP session

B.

TCP half-connection session

C.

Self-session to the firewall

D.

UDP first packet session

Buy Now
Questions 43

Which of the following problems cannot be solved using PKI?

Options:

A.

The network is congested due to heavy traffic. As a result, the server cannot provide services properly.

B.

The transaction parties cannot verify the identities of each other.

C.

Data may be eavesdropped and tampered with during transmission, and information security cannot be ensured.

D.

No paper receipt is used in transaction, making arbitration difficult.

Buy Now
Questions 44

When logging in to the web UI through HTTPS, you need to specify a local certificate issued by a CA that the web browser trusts for the HTTPS client on the device. Because the web browser can verify the local certificate, this approach avoids malicious attacks and ensures secure logins of administrators.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 45

Which of the following is not an encryption algorithm in a VPN?

Options:

A.

The RIP

B.

AES

C.

3DES

D.

DES

Buy Now
Exam Code: H12-711_V4.0
Exam Name: HCIA-Security V4.0 Exam
Last Update: Mar 19, 2026
Questions: 153

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now H12-711_V4.0 testing engine

PDF (Q&A)

$43.57  $124.49
buy now H12-711_V4.0 pdf