Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

H12-711_V4.0 HCIA-Security V4.0 Exam Questions and Answers

Questions 4

Which type of NAT applies to the scenario where there are a small number of Internet access users and the number of public IP addresses is the same as the number of concurrent Internet access users?

Options:

A.

NAPT

B.

NAT No-PAT

C.

3-tuple NAT

D.

Easy IP

Buy Now
Questions 5

Using the ___ method of the Web proxy, the virtual gateway will encrypt the real URL that the user wants to access, and can adapt to different terminal types.[fill in the blank]*

Options:

Buy Now
Questions 6

When IPSec VPN uses tunnel mode to encapsulate packets, which of the following is not within the encryption scope of the ESP security protocol?

Options:

A.

ESP Header

B.

TCP Header

C.

Raw IP Header

D.

ESP Tail

Buy Now
Questions 7

Which of the following functions help implement IPsec secure transmission of user service data on the Internet by means of encryption and authentication?

Options:

A.

Data encryption

B.

Data origin authentication

C.

Anti-replay

D.

Data integrity check

Buy Now
Questions 8

SSL VPN is a VPN technology that realizes remote secure access through SSL protocol. Which of the following software must be installed when using SSL VPN?

Options:

A.

Browser

B.

Firewall

C.

Client

D.

Antivirus

Buy Now
Questions 9

What is the security level of the Untrust zone in Huawei firewalls?

Options:

A.

10

B.

20

C.

5

D.

15

Buy Now
Questions 10

Please order the following steps in the PKI life cycle correctly, 1. Issued, 2. storage, 3. Update, 4. verify[fill in the blank]*

Options:

Buy Now
Questions 11

Which of the following protocols are transport layer protocols?

Options:

A.

UDP

B.

FTP

C.

TCP

D.

DHCP

Buy Now
Questions 12

In the authentication policy of the firewall, _____ allows the user to not need to enter the user name and password, but can obtain the corresponding relationship between the user and the IP, so as to carry out policy management based on the user[fill in the blank]*

Options:

Buy Now
Questions 13

Sub-interfaces can be created on GE0/0/1 of a firewall. The sub-interfaces can be added to different VLANs, but cannot be added to security zones.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 14

Which of the following statements are correct about the PKI system structure?

Options:

A.

A PKI entity is an end user of PKI products or services. It can be an individual, an organization, a device such as a router or firewall, or a process running on a computer.

B.

CAs are classified into the root CA and subordinate CAs according to the hierarchy of CAs.

C.

A CA is a trusted entity that issues and manages digital certificates.

D.

A PKI system consists of three parts: entity, certificate authority, and certificate registration authority.

Buy Now
Questions 15

Arrange the following processes in the correct order based on the PKI lifecycle.

H12-711_V4.0 Question 15

Options:

Buy Now
Questions 16

The following description of digital certificates, which one is wrong

Options:

A.

The simplest certificate consists of a public key, a name, and a digital signature from a certificate authority.

B.

Digital certificates contain the owner's public key and related identity information.

C.

In general, the key of a digital certificate has an expiration date.

D.

Digital certificates do not solve the problem of digital signature technology where the public key cannot be determined to be the designated owner.

Buy Now
Questions 17

Options:

A.

1

B.

2

C.

3

D.

4

Buy Now
Questions 18

The following description of the AH protocol in IPSec VPN, which one is wrong?

Options:

A.

Supports data source validation

B.

Supports data integrity checking

C.

Supports packet encryption

D.

Support anti-message replay

Buy Now
Questions 19

DES is a stream encryption algorithm, because the cipher capacity is only 56 bits, so it is not enough to deal with the weakness of insufficient security, and later 3DES was proposed.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 20

Which of the following statements is correct about security zones on a Huawei firewall?

Options:

A.

An interface on a firewall can belong to multiple zones.

B.

The default zones on a firewall can be deleted.

C.

Different security zones on a firewall have the same default security level.

D.

Different interfaces on a firewall can be in the same zone.

Buy Now
Questions 21

Which of the following are the default zones of Huawei firewalls?

Options:

A.

Untrust

B.

Local

C.

DMZ

D.

Trust

Buy Now
Questions 22

The RADIUS protocol specifies how to pass user information, billing information, authentication and billing results between the NAS and the RADIUS server, and the RADIUS server is responsible for receiving the user's connection request, completing the authentication, and returning the result to the NAS.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 23

ARP man-in-the-middle attacks are a type of spoofing attack technique.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 24

While working for a company, Tom receives an email with an attachment. Which of the following operations is correct?

Options:

A.

Checking the email's content. If the email is related to work, Tom can open and save the attachment

B.

Opening the attachment directly because email attachments do not affect information security

C.

Checking the email sender. If the email was sent from the company's mailbox, Tom can open and save the attachment

D.

Checking the sender and email information, and using antivirus software to check the attachment

Buy Now
Questions 25

Which of the following is not an advantage of symmetric encryption algorithms?

Options:

A.

Suitable for encrypting large amounts of data

B.

Low overhead

C.

Good scalability

D.

High efficiency

Buy Now
Questions 26

An engineer needs to back up the firewall configuration. Now he wants to use a command to view all the current configurations of the firewall. May I ask the command he uses is ____[fill in the blank]*

Options:

Buy Now
Questions 27

Which of the following statements are correct about the status of the firewall VGMP group?

Options:

A.

Initialize

B.

Active

C.

Load-balance

D.

Standby

Buy Now
Questions 28

Which of the following is not the default security zone of the firewall

Options:

A.

untrust trust

B.

trust zone

C.

dmz zone

D.

isp zone)

Buy Now
Questions 29

Information security aims to protect data in hardware, software, and their systems on information networks to prevent data damage, tampering, or breach due to occasional or malicious reasons and ensure proper system running and non-stop information services.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 30

The trigger authentication method for firewall access user authentication does not include which of the following?

Options:

A.

MPLS VPN

B.

SSL VPN

C.

IPSec VPN

D.

L2TP VPN

Buy Now
Questions 31

Which type of NAT translates both addresses and port numbers and uses the public IP address of the outbound interface as the post-NAT address?

Options:

A.

NAPT

B.

Easy IP

C.

3-tuple NAT

D.

NAT No-PAT

Buy Now
Questions 32

Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution. 1. Inhibition stage, 2. recovery phase, 3. Detection stage, 4. eradication phase[fill in the blank]*

Options:

Buy Now
Questions 33

Which of the following NAT technologies can implement a public network address to provide source address translation for multiple private network addresses ( )*

Options:

A.

NAPT

B.

NAT Server

C.

Easy-ip

CT Jinglu

D.

NAT No-PAT

Buy Now
Questions 34

An enterprise wants to build a server system and requires the following functions: 1. The enterprise needs to have its own dedicated mailbox, and the sending and receiving of emails needs to go through the enterprise's server; 2. The server must provide file transfer and access services. Users in different departments of the enterprise provide accounts with different permissions: 3. When the enterprise accesses the internal webpage of the enterprise, the enterprise can directly enter the domain name in the browser to access. To meet the above requirements, which of the following servers do enterprises need to deploy? ( )*

Options:

A.

Time synchronization server

B.

FTP server (I)

C.

DNS server

D.

Mail server

Buy Now
Questions 35

WAF can accurately control and manage users' online behavior and user traffic.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 36

The network environment is becoming more and more complex, and network security incidents occur frequently. While accelerating the construction of informatization, enterprises must not only resist external attacks, but also prevent internal management personnel from being involved in data leakage and operation and maintenance accidents due to operational errors and other issues. Which of the following options might reduce operational risk?

Options:

A.

According to the administrator configuration, the O & M user corresponds to the background resource account, and restricts the unauthorized use of the account. mouth Based on the password security policy, the O & M security audit system automatically modifies the password of the background resource account at regular intervals.

B.

Each system is independently operated, maintained and managed, and the access process is not audited and monitored.

C.

Oral Each department system is independently authenticated and uses a single static password for authentication.

Buy Now
Questions 37

In hot standby networking, the heartbeat interfaces of the two firewalls must be directly connected.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 38

Which of the following attack methods is to construct special SQL statements and submit sensitive information to exploit program vulnerabilities

Options:

A.

Buffer overflow attack

B.

SQL injection attacks

C.

Worm attack

D.

Phishing attacks

Buy Now
Questions 39

Which of the following is not an application scenario for PKI?

Options:

A.

SSL VPN

B.

IPsec VPN

C.

IPv6 SEND

D.

Web login through HTTPS

Buy Now
Questions 40

On a firewall, security policies with the permit action do not need to be configured for traffic between users in the same zone.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 41

Social engineering is a means of harm such as deception, harm, etc. through psychological traps such as psychological weaknesses, instinctive reactions, curiosity, trust, and greed of victims ( )

Options:

A.

TURE

B.

False

Buy Now
Questions 42

Data monitoring can be divided into two types: active analysis and passive acquisition.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 43

For which of the following parameters can the packet filtering firewall filter?

Options:

A.

Port packet payload

B.

IP address of the port source destination

C.

The MAC address of the source destination

D.

Port number and protocol number of the port source

Buy Now
Questions 44

In the PKI certificate revocation process, a user needs to send a signed and encrypted email to the RA to apply for certificate revocation.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 45

Which of the following descriptions of single sign-on is correct?

Options:

A.

The visitor recited the Portal authentication page and sent the username and password to FT to identify his/her identity, and the password was not stored on the FT, and the FI sent the username and password to the third-party authentication server, and the authentication process was carried out on the authentication server.

B.

The visitor sends the username and password that identifies his identity to the third-party authentication server, and after the authentication is passed, the third-party authentication server sends the visitor's identity information to FW. F7 only records the identity information of the visitor and does not participate in the authentication process

C.

Visitors obtain the SMS verification code through the Portal authentication page, and then enter the SMS verification code to pass the authentication.

D.

The visitor sends the username and password that identifies them to the FW through the portal authentication page, on which the password is stored and the verification process takes place on the FW.

Buy Now
Exam Code: H12-711_V4.0
Exam Name: HCIA-Security V4.0 Exam
Last Update: May 8, 2026
Questions: 153

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now H12-711_V4.0 testing engine

PDF (Q&A)

$43.57  $124.49
buy now H12-711_V4.0 pdf