Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! H12-711_V3.0 has been withdrawn. The new exam code is H12-711_V4.0

H12-711_V3.0 Practice Exam Questions with Answers HCIA-Security V3.0 Certification

Question # 6

SIPprotocol usageSDPmessage to establish a session,SDPThe message contains a remote address or a multicast address

A.

True

B.

False

Full Access
Question # 7

Common scanning attacks include: port scanning tools, vulnerability scanning tools, application scanning tools and database scanning tools, etc.

A.

True

B.

False

Full Access
Question # 8

Which of the following areHRP(Huawei Redundancy Protocol) protocol can back up state information? (multiple choice)

A.

session table

B.

ServerMapentry

C.

Dynamic blacklist

D.

routing table

Full Access
Question # 9

aboutVGMPIn a description of group management, which of the following is false?

A.

VRRPbackup group master/All standby status changes need to be notified to theVGMPmanagement group

B.

The interface types and numbers of the heartbeat ports of the two firewalls can be different, as long as the Layer 2 interoperability can be guaranteed.

C.

Active and standby firewallsVGMPtimed starthellomessage

D.

The active and standby devices learn about the status of each other through the exchange of heartbeat messages, and back up related commands and status information.

Full Access
Question # 10

Data analysis technology is to find and match keywords or key phrases in the acquired data stream or information stream, and analyze the correlation of time. Which of the following is not an evidence analysis technique?

A.

Cryptography, data decryption technology

B.

Digital Abstract Analysis Technology of Documents

C.

Techniques for discovering connections between different pieces of evidence

D.

Spam Tracking Technology

Full Access
Question # 11

Which of the following does not belong toP2DRin the modelDetectionThe method used in the link?

A.

real time monitoring

B.

detect

C.

Call the police

D.

shut down service

Full Access
Question # 12

existVRRP(Virtual Router Redundancy Protocol) group, the primary firewall regularly sends notification messages to the backup firewall, and the backup firewall is only responsible for monitoring notification messages and will not respond

A.

True

B.

False

Full Access
Question # 13

Multiple different ( ) cannot be added to the same interface on the firewall at the same time (fill in the blank)

Full Access
Question # 14

Digital envelope technology means that the sender uses the receiver's public key to encrypt the data, and then sends the ciphertext to the receiver ( )[Multiple choice]*

A.

TRUE

B.

FALSE

Full Access
Question # 15

Which of the following angles should be considered in the information security stage to consider the security of information?

A.

Management

B.

Security system

C.

business

D.

Technology

Full Access
Question # 16

Questionnaire design principles do not include which of the following?

A.

integrity

B.

openness

C.

specificity

D.

consistency

Full Access
Question # 17

aboutSSL VPNdescription, which of the following is correct?

A.

Can be used without a client

B.

yesIPlayer to encrypt

C.

existNATcrossing problem

D.

No authentication required

Full Access
Question # 18

the following aboutVGMPWhich protocol description is wrong?

A.

VGMPmultiple on the same firewallVRRPAll backup groups are added to one management group, and all backup groups are managed by the management group.VRRPbackup group

B.

VGMPthrough the unified control ofVRRPSwitching the status of the backup group to ensure that allVRRPBackup group status is consistent

C.

Status isActiveofVGMPThe group device will periodically sendhellomessage,stdandbyThe end is only responsible for monitoringhellomessage, will not respond

D.

By default whenstandbyend threehelloThe message period does not receive the message sent by the peerhellomessage, it will think that the peer end is faulty, so it will switch itself toActivestate.

Full Access
Question # 19

aboutVPN, which of the following statements is false?

A.

Virtual private network is cheaper than private line

B.

VPNTechnology necessarily involves encryption

C.

VPNTechnology is a technology that multiplexes logical channels on actual physical lines

D.

VPNThe emergence of technology allows traveling employees to remotely access internal corporate servers

Full Access
Question # 20

The matching principle of the security policy is: first search for the manually configured interzone security policy, and if no match is found, the data packet will be discarded directly.

A.

True

B.

False

Full Access
Question # 21

aboutAHandESPSecurity protocol, which of the following options is true? (multiple choice)

A.

AHCan provide encryption and authentication functions

B.

ESPCan provide encryption and authentication functions

C.

AH The protocol number is51

D.

ESPThe protocol number is51

Full Access
Question # 22

The repair of anti-virus software only needs to repair some system files that were accidentally deleted when scanning and killing viruses to prevent the system from crashing

A.

True

B.

False

Full Access
Question # 23

About firewall gateways forHTTPWhich of the following statements is false about the protocol's antivirus response?

A.

When the gateway device blocksHTTPAfter connecting, push to the clientwebpage and generate log

B.

Response methods include announcement and blocking

C.

In alarm mode, the device only generates logs, which is not correct.HTTPThe files transmitted by the protocol are processed and sent out

D.

Blocking means that the device is disconnected from theHTTPserver connection and block file transfer

Full Access
Question # 24

Which of the following is not a key technology of antivirus software?

A.

Shelling technology

B.

self protection

C.

format the disk

D.

Update virus database in real time

Full Access
Question # 25

On the surface, threats such as viruses, loopholes, and Trojan horses are the causes of information security incidents, but at the root, information security incidents are also closely related to people and the information system itself.

A.

True

B.

False

Full Access
Question # 26

againstIPspoofing attack (IP Spoofing), which of the following is an error?

A.

IPSpoofing attacks are based onIPaddress trust relationship to initiate

B.

IPAfter a successful spoofing attack, the attacker can use forged arbitraryIPThe address impersonates a legitimate host to access key information

C.

The attacker needs to put the sourceIPlandaddress masquerading as a trusted host and sendSYNmarkNote the data segment request connection

D.

based onIPThe hosts in the trust relationship of the addresses can log in directly without entering password authentication.

Full Access
Question # 27

aboutPKIOrdering of work processes, which of the following is correct?

H12-711_V3.0 question answer

A.

1-2-6-5-7-4-3-8

B.

1-2-7-6-5-4-3-8

C.

6-5-4-1-2-7-3-8

D.

6-5-4-3-1-2-7-8

Full Access
Question # 28

DDosWhich of the following attack types is an attack?

A.

snooping scan attack

B.

Malformed Packet Attack

C.

special packet attack

D.

traffic attack

Full Access
Question # 29

Which of the following options are key elements of information security precautions? (multiple choice)

A.

asset Management

B.

Security operation and management

C.

Security Products and Technologies

D.

personnel

Full Access
Question # 30

deployIPSec VPNIn tunnel mode, useAHprotocol for packet encapsulation. NewIPIn the header field of the packet, which of the following parameters does not need to be checked for data integrity?

A.

sourceIPaddress

B.

PurposeIPaddress

C.

TTL

D.

Identification

Full Access
Question # 31

TCSECWhich of the following protection levels are included in the standard? (multiple choice)

A.

Verify protection level

B.

Mandatory protection level

C.

autonomous protection level

D.

Passive protection level

Full Access
Question # 32

The method of collecting information by port scanning using scanning tools belongs to the means of ( ) analysis. (fill in the blank)

Full Access
Question # 33

Execute the command on the firewall and display the above information. Which of the following descriptions is correct? (multiple choice)

H12-711_V3.0 question answer

A.

this firewallVGMPgroup status isActive

B.

this firewallG1/0/1virtual interfaceIPaddress is202.38.10.2

C.

this firewallVRIDfor1ofVRRPThe priority of the backup group is100

D.

When the main deviceUSG_AWill not switch in the event of a failure

Full Access
Question # 34

The direction of the traffic can be seen in the ___ of the firewall.[fill in the blank]*

Full Access
Question # 35

According to the management specification, regularly check the network security system and equipment, upgrade the patch, and organize the network security emergency response drill. The above actions belong toMPDRRWhat are the elements of the network security model?

A.

Protection link

B.

Detection link

C.

response link

D.

Management link

Full Access
Question # 36

Which of the following options areIPSec VPNSupported encapsulation modes? (multiple choice)

A.

AHmodel

B.

tunnel mode

C.

transfer mode

D.

ESPmodel

Full Access
Question # 37

Applying for special funds for emergency response and purchasing emergency response software and hardware equipment belong to the work content of which stage of the network's complete emergency response?

A.

preparation stage

B.

Inhibition stage

C.

response phase

D.

recovery phase

Full Access
Question # 38

Which of the following is network address port translation (NAPT) and only translate network addresses (No-PAT) difference?

A.

go throughNo-PATAfter conversion, for external network users, all packets come from the sameIPaddress

B.

No-PATOnly supports protocol port translation at the transport layer

C.

NAPTOnly supports protocol address translation at the network layer

D.

No-PATSupports protocol address translation at the network layer

Full Access
Question # 39

Regarding the NAT policy processing flow, which of the following options are correct? ( )*

A.

Server-map is processed before the security policy is matched

B.

Source NAT policy is processed after security policy match

C.

Source NAT policy queries are processed after the session is created

D.

Server-map is processed after state detection

Full Access
Question # 40

Which of the following statements about the patch is incorrect?

A.

A patch is a small program made by the original author of the software for a discovered vulnerability

B.

Not patching does not affect the operation of the system, so whether patching is irrelevant or not.

C.

Patches are generally updated continuously.

D.

Computer users should download and install the latest patches in a timely manner to protect their systems

Full Access
Question # 41

Personal information leakage is the destruction of the ______ characteristics of information.[fill in the blank]*

Full Access
Question # 42

When configuring security policies, you can control traffic based on the user's______.[fill in the blank]*

Full Access
Question # 43

Equipment sabotage attacks are generally not easy to cause information leakage, but usually cause interruption of network communication services.

A.

True

B.

False

Full Access
Question # 44

Which of the following options belong to international organizations related to the standardization of information security? (multiple choice)

A.

International Organization for Standardization(ISO)International Organization for Standardization

B.

International Electrotechnical Commission(IEC) International Electrotechnical Commission

C.

International Telecommunication Union(ITU)ITU

D.

Wi-Fi Alliance Wi-Fialliance organization

Full Access
Question # 45

Please match the whole worm attack process and attack description.[fill in the blank]*

H12-711_V3.0 question answer

Full Access
Question # 46

at HuaweiUSGOn the series firewalls, the default security policy does not support modification.

A.

True

B.

False

Full Access
Question # 47

The reason why NAPT can realize one-to-many address translation is that the ______ is also translated when the address is translated, so multiple private addresses can share the same public address.[fill in the blank]*

Full Access
Question # 48

Which of the following is true about firewall security policies?

A.

By default, the security policy can control unicast packets and broadcast packets

B.

By default, the security policy can control multicast

C.

By default, the security policy only controls unicast packets.

D.

By default, the security policy can control unicast packets, broadcast packets, and multicast packets.

Full Access
Question # 49

The interface on the firewall cannot forward traffic until it is added ( ). (fill in the blank)

Full Access
Question # 50

Which of the following options is not a passive means of obtaining information? ( )[Multiple choice]*

A.

port scan

B.

port mirroring

C.

capture packets

D.

collect log education

Full Access
Question # 51

The initial priority of the USG9500VGMP group is related to which of the following factors ( )? *

A.

interface bandwidth

B.

VRRP priority

C.

Number of daughter cards on the interface board

D.

The number of CPUs on the D service board

Full Access
Question # 52

During the process of establishing IPSec VPN between peers FW_A and FW_B, two types of security associations need to be established in two stages. In the first stage, _____ is established to verify the identity of the peers.[fill in the blank]*

Full Access
Question # 53

An engineer needs to back up the firewall configuration. Now he wants to use a command to view all the current configurations of the firewall. May I ask the command he uses is ____[fill in the blank]*

Full Access
Question # 54

Which of the following security measures does the monitor correspond to?

A.

Intrusion Detection System

B.

Encrypted VPN

C.

Access control system

D.

Firewall

Full Access
Question # 55

Which of the following does not belong to the block encryption algorithm in the symmetric encryption algorithm?

A.

RC5

B.

RC4

C.

RC6

D.

RC2

Full Access
Question # 56

The CA certificate is the certificate of the CA itself. If there is no multi-level CA in the PKI system, the original certificate of the CA is a self-signed certificate; if there are multiple levels of CA, it will form a CA hierarchy. The top CA is the root CA, which has A CA' self-signed certificate.

A.

True

B.

False

Full Access
Question # 57
A.

1

B.

2

C.

3

D.

4

Full Access
Question # 58

Which of the following SSLVPN functions can and can only access all TCP resources?

A.

Network expansion

B.

Port Forwarding

C.

web proxy

D.

file sharing

Full Access
Question # 59

In USG6000E, the initial priority of VGMP is ( ) (fill in the blank)

Full Access
Question # 60

Information security prevention technologies include: data encryption, identity authentication, intrusion prevention and anti-virus, etc.

A.

True

B.

False

Full Access
Question # 61

When IPSec VPN uses tunnel mode to encapsulate packets, which of the following is not within the encryption scope of the ESP security protocol? ( )[Multiple choice]*

A.

ESP Header

B.

TCP Header

C.

Raw IP Header

D.

ESP Tail

Full Access
Question # 62

If we do not want to generate a reverse Server Mapi entry when configuring NAT Server, we need to add a parameter when configuring NATServerE. This parameter is ( ) (fill in the blank)

Full Access
Question # 63

The company administrator uses the ping command to test the connectivity of the network. If he needs to specify the source address of the ehco-request message, what are the additional parameters he needs?

A.

-i

B.

-a

C.

-C

D.

-f

Full Access
Question # 64

In the authentication policy of the firewall, _____ allows the user to not need to enter the user name and password, but can obtain the corresponding relationship between the user and the IP, so as to carry out policy management based on the user[fill in the blank]*

Full Access
Question # 65

To configure a NAT policy in command line mode, you need to use the .command ( ) in the system view to enter the NAT policy configuration view. (all lowercase) (fill in the blank)

Full Access
Question # 66

Please order the following steps in the PKI life cycle correctly, 1. Issued, 2. storage, 3. Update, 4. verify[fill in the blank]*

Full Access
Question # 67

The firewall imports users locally, and supports importing user information from _____ format files and database dbm files to the local device.[fill in the blank]*

Full Access
Question # 68

Which of the following descriptions about dual-system hot backup is wrong? ( )[Multiple choice]*

A.

By default the preemption delay is 60s

B.

Whether it is a Layer 2 or Layer 3 interface, whether it is a service interface or a heartbeat interface, it needs to be added to a security zone

C.

By default, the active preemption function is enabled

D.

Dual-system hot backup function requires license support

Full Access
Question # 69

Which of the following options isL2TPThe port number used by the packet?

A.

17

B.

500

C.

1701

D.

4500

Full Access
Question # 70

Firewall usagehrp standby config enableAfter the standby device configuration function is enabled by the command, all information that can be backed up can be configured directly on the standby device, and the configuration on the standby device can be synchronized to the active device.

A.

True

B.

False

Full Access
Question # 71

Which of the following information is encrypted during the use of digital envelopes? (multiple choice)

A.

Symmetric key

B.

User data

C.

Receiver's public key

D.

Receiver's private key

Full Access
Question # 72

The administrator wishes to clear the current session table. Which of the following commands is correct? ( )[Multiple choice]*

A.

display session table

B.

display firewall session table

C.

reset firewall session table

D.

clear firewall session table

Full Access
Question # 73

Gratuitous ARP can be used to detect whether the ______ address conflicts, and it can also refresh the switch MAC address table.[fill in the blank]*

Full Access