Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

Note! Following H12-711_V3.0 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is H12-711_V4.0

H12-711_V3.0 HCIA-Security V3.0 Questions and Answers

Questions 4

According to the number of users operating at the same time, the operating system can be divided into single-user operating system and multi-user operating system. Which of the following items is not a multi-user operating system?

Options:

A.

UNIX

B.

OS/2

C.

Linux

D.

MSDOS

Buy Now
Questions 5

Which of the following is network address port translation (NAPT) and only translate network addresses (No-PAT) difference?

Options:

A.

go throughNo-PATAfter conversion, for external network users, all packets come from the sameIPaddress

B.

No-PATOnly supports protocol port translation at the transport layer

C.

NAPTOnly supports protocol address translation at the network layer

D.

No-PATSupports protocol address translation at the network layer

Buy Now
Questions 6

In the VGMP group state, if the device's own VGMP group priority is equal to the peer device's VGMP group priority, the device's VGMP group state is ( ). (answer in letters) (fill in the blank)

Options:

Buy Now
Questions 7

Compared with IPSec VPN, ( ) has the advantage of good compatibility and can encapsulate IPX, multicast packets, etc., and is widely used. (fill in the blank)

Options:

Buy Now
Questions 8

How many IPSec SAs need to be established to encapsulate P packets using the AH+ESP protocol?

Options:

A.

2

B.

1

C.

4

D.

3

Buy Now
Questions 9

Which of the following descriptions about digital fingerprints in digital signatures is wrong? ( )[Multiple choice]*

Options:

A.

It is the data obtained by the sender after calculating the plaintext information through the HASH algorithm.

B.

The receiver will use the sender's public key to calculate the generated data fingerprint and compare it with the received digital fingerprint.

C.

Digital fingerprints are also known as information digests.

D.

The receiver needs to use the sender's public key to unlock the digital signature to obtain the digital fingerprint.

Buy Now
Questions 10

Which of the following is the default backup mode for dual-system hot standby?

Options:

A.

automatic backup

B.

Manual batch backup

C.

Session fast backup

D.

After the device restarts, the active and standbyFWConfiguration

Buy Now
Questions 11

Equipment sabotage attacks are generally not easy to cause information leakage, but usually cause interruption of network communication services.

Options:

A.

True

B.

False

Buy Now
Questions 12

When configuring user single sign-on, use the receivePCIn message mode, the authentication process has the following steps:

1. visitorPCExecute the login script and send the user login information toADmonitor

2. Firewall extracts user andIPAdd the correspondence to the online user table

3. ADmonitor connected toADThe server queries the login user information and forwards the queried user information to the firewall

4. visitor loginADarea,ADThe server returns a login success message to the user and issues the login script. Which of the following is the correct order?

Options:

A.

1-2-3-4

B.

4-1-3-2

C.

3-2-1-4

D.

1-4-3-2

Buy Now
Questions 13

Which of the following NAT technologies can implement a public network address to provide source address translation for multiple private network addresses ( )*

Options:

A.

NAPT

B.

NAT Server

C.

Easy-ip

CT Jinglu

D.

NAT No-PAT

Buy Now
Questions 14

Which of the following statements about the patch is incorrect?

Options:

A.

A patch is a small program made by the original author of the software for a discovered vulnerability

B.

Not patching does not affect the operation of the system, so whether patching is irrelevant or not.

C.

Patches are generally updated continuously.

D.

Computer users should download and install the latest patches in a timely manner to protect their systems

Buy Now
Questions 15

whenUSGWhich of the following logs can be viewed when the series firewall hard disk is in place? (multiple choice)

Options:

A.

Operation log

B.

business log

C.

Alarm information

D.

Threat log

Buy Now
Questions 16

After the firewall detects a virus, which of the following will release the virus?

Options:

A.

Hit apply exception

B.

Not a protocol supported by the firewall

C.

The source IP hits the whitelist

D.

Hit virus exception

Buy Now
Questions 17

The default authentication domain of the USG6000 series firewall is the _____ domain.[fill in the blank]*

Options:

Buy Now
Questions 18

After the firewall detects an intrusion, the administrator can view the intrusion log information in the firewall business log or ( ) log. (fill in the blank

Options:

Buy Now
Questions 19

The key used by DES encryption is bits, while the key used by 3DES encryption is bits.

Options:

A.

56168

B.

64168

C.

64128

D.

56128

Buy Now
Questions 20

The company administrator uses the ping command to test the connectivity of the network. If he needs to specify the source address of the ehco-request message, what are the additional parameters he needs?

Options:

A.

-i

B.

-a

C.

-C

D.

-f

Buy Now
Questions 21

Which of the following NAT technologies is a destination NAT technology?

Options:

A.

Easy-ip

B.

NAT No-PAT

C.

NAPT

D.

NAT Server

Buy Now
Questions 22

Regarding the description of the firewall security zone and interface relationship, which of the following options is correct? (multiple choice)

Options:

A.

The firewall allows the same physical interface to belong to two different security zones (sub-interfaces are not considered)

B.

There are two security zones with exactly the same security level in the firewall

C.

Different interfaces of the firewall can belong to different security zones

D.

Different interfaces of the firewall can belong to the same security zone

Buy Now
Questions 23

Which of the following is not the default security zone of the firewall ( )[Multiple choice]*

Options:

A.

untrust trust

B.

trust zone

C.

dmz zone

D.

isp zone)

Buy Now
Questions 24

Which of the following options is not included in the processing method adopted by the firewall for the matched authentication data flow?

Options:

A.

Portali certification

B.

Certification-free

C.

WeChat authentication

D.

not certified

Buy Now
Questions 25

Which of the following SSLVPN functions can and can only access all TCP resources?

Options:

A.

Network expansion

B.

Port Forwarding

C.

web proxy

D.

file sharing

Buy Now
Questions 26

In the authentication policy of the firewall, _____ allows the user to not need to enter the user name and password, but can obtain the corresponding relationship between the user and the IP, so as to carry out policy management based on the user[fill in the blank]*

Options:

Buy Now
Questions 27

Which of the following is an action to be taken during the eradication phase in a cybersecurity emergency response? (multiple choice)

Options:

A.

Find Trojan horses, illegal authorizations, and system loopholes, and deal with them in a timely manner

B.

Revise security policies based on security incidents that occur, enable security auditing

C.

Block the behavior of the attack and reduce the impact

D.

Confirm the degree of damage caused by the security incident and report the security incident

Buy Now
Questions 28

When an information security incident occurs, give priority to using ______ emergency response to provide technical support to customers [fill in the blank]*

Options:

Buy Now
Questions 29

Which of the following is not a stand-alone anti-virus technology? ( )[Multiple choice]*

B. Configure anti-virus technology on network firewall

C. Use virus detection tools

D. Patch the system

Options:

Buy Now
Questions 30

IPv6 supports configuring router authorization function on the device, verifying peer identity through digital certificate, and selecting legal device. ( )[Multiple choice]*

Options:

A.

True

B.

False

Buy Now
Questions 31

Please sort from large to small according to the table processing priority of iptables.[fill in the blank]*

Options:

Buy Now
Questions 32

In which of the following scenarios does the firewall generate the Server-map table?

Options:

A.

When the firewall generates a session table, it will generate a Server-map table

B.

ASPF is deployed on the firewall and forwards the traffic of the multi-channel protocol

C.

Security policies are deployed on the firewall and traffic is released

D.

NAT Server is deployed on the firewall

Buy Now
Questions 33

Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution. 1. Inhibition stage, 2. recovery phase, 3. Detection stage, 4. eradication phase[fill in the blank]*

Options:

Buy Now
Questions 34

Please order the following steps in the PKI life cycle correctly, 1. Issued, 2. storage, 3. Update, 4. verify[fill in the blank]*

Options:

Buy Now
Questions 35

In the classification of the information security level protection system, which of the following levels define that if the information system is destroyed, it will cause damage to social order and public interests? (multiple choice)

Options:

A.

first level

User self-protection level

B.

second level

System Audit Protection Level

C.

third level

Safety Mark Protection

D.

fourth level

structured protection

Buy Now
Questions 36

Which of the following options arePKIentity orientationCAHow to apply for a local certificate? (multiple choice)

Options:

A.

Online Application

B.

local application

C.

online application

D.

Apply offline

Buy Now
Questions 37

existUSGOn the series firewall, configurewebAfter the redirection function is enabled, the authentication page cannot pop up. Which of the following is not the cause of the failure?

Options:

A.

The authentication policy is not configured or the authentication policy is incorrectly configured

B.

UnopenedwebAuthentication function

C.

browserSSLVersion and Firewall Authentication PageSSLversion mismatch

D.

The port number of the authentication page service is set to8887

Buy Now
Questions 38

Which of the following DDoS attack types is an attack?

Options:

A.

snooping scan attack

B.

Malformed Packet Attack

C.

special packet attack

D.

traffic attack

Buy Now
Questions 39

When the firewall upgrades the signature database and virus database online through the security service center, the firewall is required to be able to connect to the Internet first, and theDNSaddress

Options:

A.

True

B.

False

Buy Now
Questions 40

Because the server is a kind of computer, we can use our personal computer as a server in the enterprise.

Options:

A.

True

B.

False

Buy Now
Questions 41

aboutNATAddress translation, which of the following statements is false?

Options:

A.

sourceNATconfiguration in technologyNATaddress pool, you can configure only one address poolIPaddress

B.

Address translation can be provided in the local area network according to the needs of usersFTP,WWW,Telnetand other services

C.

Some application layer protocols carry in the dataIPaddress information, make themNATWhen modifying the data in the upper layerIPAddress information

D.

for someTCP,UDPagreement (such asICMP,PPTP), cannot doNATconvert

Buy Now
Questions 42

Which of the following options are at risk from traffic-based attacks? (multiple choice)

Options:

A.

network down

B.

Server down

C.

data stolen

D.

The web page has been tampered with

Buy Now
Questions 43

Intrusion Prevention System (IPS) is a defense system that can block in real time when an intrusion is detected

Options:

A.

True

B.

False

Buy Now
Questions 44

Which of the following options are application risks (multiple choice)

Options:

A.

Internet virus

B.

Email Security

C.

Database system configuration security

D.

WEBservice security

Buy Now
Questions 45

Digital certificate technology solves the problem that the public key owner cannot be determined in digital signature technology

Options:

A.

True

B.

False

Buy Now
Questions 46

Which of the following options are included in the protection of data by encryption technology during data transmission? (multiple choice)

Options:

A.

confidentiality

B.

controllability

C.

integrity

D.

source check

Buy Now
Questions 47

Which of the following options are the possible reasons for the problem that users cannot access network resources in the authentication-free two-way binding mode? (multiple choice)

Options:

A.

Authentication-free users and authenticated users are in the same security area

B.

Authentication-free users do not use the specifiedIP/MACaddressPC

C.

The authentication action in the authentication policy is set to"Do not acknowledge/Certification-free"

D.

Online users have reached the maximum

Buy Now
Questions 48

About disconnectTCPIn the description of the connection four-way handshake, which of the following is false?

Options:

A.

The active closing party sends the firstFINperform an active shutdown while the other party receives thisFINexecution is closed

B.

When passive shutdown receives the firstFIN, it will send back aACK, and randomly generate the confirmation serial number.

C.

The passive closing party needs to pass an end-of-file to the application, the application closes its connection, and causes the sending of an end-of-fileFIN

D.

Sent on passive shutdown sideFINAfter that, the active closing party must send back an acknowledgment and set the acknowledgment sequence number to the received sequence number plus1

Buy Now
Questions 49

Which of the following types of encryption technology can be divided into? (multiple choice)

Options:

A.

Symmetric encryption

B.

Symmetric encryption

C.

fingerprint encryption

D.

data encryption

Buy Now
Questions 50

Security policy conditions can be divided into multiple fields, such as source address, destination address, source port, destination port, etc.

"and"That is to say, this policy is hit only if the information in the packet matches all fields.

Options:

A.

True

B.

False

Buy Now
Questions 51

Regarding the statement of firewall security policy, which of the following options is false?

Options:

A.

If the security policy ispermit, the discarded packets will not be accumulated"Hits"

B.

When configuring a security policy name, the same name cannot be reused

C.

Adjust the order of security policies without saving configuration files and take effect immediately

D.

HuaweiUSGThe security policy entries of the series firewall cannot exceed128strip

Buy Now
Questions 52

Which of the following are the main implementations of gateway antivirus? (multiple choice)

Options:

A.

Proxy scan method

B.

Stream scan method

C.

Packet killing method

D.

File killing method

Buy Now
Questions 53

Common information security standards and specifications mainly include the national level protection system (GB), _______, the American standard TCSEC and the European Union standard ITSEC.[fill in the blank]

Options:

Buy Now
Questions 54

Which of the following statements about electronic evidence sources is false?

Options:

A.

Facsimile data and mobile phone recordings are electronic evidence related to communication technology.

B.

Movies and TV series are electronic evidence related to network technology.

C.

Database operation records and operating system logs are electronic evidence related to computers•

D.

OS logs,e-mail, chat records can be used as a source of electronic evidence

Buy Now
Questions 55

at HuaweiSDSecIn the solution, which of the following options belong to the device of the executive layer? (multiple choice)

Options:

A.

CIS

B.

Fierhunter

C.

router

D.

AntiDDoS

Buy Now
Questions 56

Which of the following options is correct for the description of a buffer overflow attack?

(multiple choice)

Options:

A.

Buffer overflow attacks exploit the flaws of software systems in memory operations to run attack code with high operating privileges

B.

Buffer overflow attacks have nothing to do with the vulnerabilities and architecture of the operating system

C.

Buffer overflow attacks are one of the most common ways to attack the behavior of software systems

D.

Buffer overflow attacks are application-layer attacks

Buy Now
Questions 57

Security technology has different methods in different technical levels and fields. Which of the following devices can be used for network layer security? (multiple choice)

Options:

A.

Vulnerability Scanning Device

B.

firewall

C.

Anti-DDoSequipment

D.

IPS/IDSequipment

Buy Now
Questions 58

Which of the following descriptions about dual-system hot backup is wrong? ( )[Multiple choice]*

Options:

A.

By default the preemption delay is 60s

B.

Whether it is a Layer 2 or Layer 3 interface, whether it is a service interface or a heartbeat interface, it needs to be added to a security zone

C.

By default, the active preemption function is enabled

D.

Dual-system hot backup function requires license support

Buy Now
Questions 59

Which of the following is false for a description of an intrusion detection system?.

Options:

A.

Intrusion detection system can collect a large amount of key information dynamically through network and computer.And can analyze and judge the current state of the entire system environment in time

B.

Once the intrusion detection system finds that there is a behavior that violates the security policy or the system has traces of being attacked, it can implement blocking operations.

C.

Intrusion detection system includes all hardware and software systems used for intrusion detection

D.

The immersion detection system can be linked with firewalls and switches, making it a powerful tool for firewalls"assistant", better and more precise control of traffic access between domains

Buy Now
Questions 60

In order to obtain criminal evidence, it is necessary to master the technology of intrusion tracking. Which of the following options are correct for the description of tracking technology? (multiple choice)

Options:

A.

Packet logging technology through the tracedIPInsert trace data into packets to mark packets on each router they pass through

B.

Link testing technology determines the information of the attack source by testing the network link between routers

C.

Packet marking technology extracts attack source information by logging packets on routers and then using data drilling techniques

D.

Shallow mail behavior analysis can achieveIPAnalysis of addresses, sent time, sending frequency, number of recipients, shallow email headers, and more.

Buy Now
Questions 61

Digital signature technology obtains a digital signature by encrypting which of the following data?

Options:

A.

User data

B.

Receiver's public key

C.

sender's public key

D.

digital fingerprint

Buy Now
Questions 62

Which of the following isUSGUser name for the first login of the series firewall/password?

Options:

A.

usernameadmin

passwordAdmin@123

B.

usernameadmin

passwordadmin@123

C.

usernameadmin

passwordadmin

D.

usernameadmin

passwordAdmin123

Buy Now
Questions 63

Which of the following does not belong toUSGUser authentication method in firewall?

Options:

A.

Certification-free

B.

Password authentication

C.

sign in

D.

Fingerprint authentication

Buy Now
Questions 64

As shown in the figure, aNAT serverapplication scenarios, when usingwebWhen this configuration is performed in the configuration mode. Which of the following statements are correct? (multiple choice)

Options:

A.

When configuring the interzone security policy, you need to set the source security zone toUntrust, the target security area isDMZ

B.

configureNATServer, the internal address is10.1.1.2, the external address is200.10.10.1

C.

When configuring the interzone security policy, set the source security zone toDMZ, the target security area isUntrust

D.

configureNATServer, the internal address is200.10.10.1, the external address is10.1.1.2

Buy Now
Questions 65

Which of the following options is correct regarding the matching conditions of a security policy? (multiple choice)

Options:

A.

matching condition"source security zone"is an optional parameter

B.

matching condition"period"is an optional parameter

C.

matching condition"application"is an optional parameter

D.

matching condition"Serve"is an optional parameter

Buy Now
Questions 66

Which of the following isP2DRThe core part of the model?

Options:

A.

PolicyStrategy

B.

Protectionprotection

C.

Detectiondetect

D.

Responseresponse

Buy Now
Questions 67

When dual-system hot backup is deployed on the firewall,VRRPWhich of the following protocols should be used to switch the overall status of a backup group?

Options:

A.

VRRP

B.

VGMP

C.

HRP

D.

OSPF

Buy Now
Questions 68

Please match the following information security risks to information security incidents one by one.[fill in the blank]*

physical security riskEnterprise server permissions are loosely set

Information Security Management RiskInfected Panda Burning Incense

Information Access RiskFire destroyed equipment in computer room

application riskTalk to people about leaking company secrets

Options:

Buy Now
Questions 69

As shown, the USG firewall NAT configuration is as follows:

Options:

A.

When FTP Server1 responds to Client A, it is converted to the address 1.1.1.5 in Address Ground 1

B.

Source NAT configuration, only for intranet users (10.1.1.0/24) to access the external network for translation

C.

When the IP address of the FTP Server host is changed to 1.11.3. Client A host can still access the FTP Server more

D.

Client A accesses FTP Server 1.1.1.1, and the destination address is converted to 10.1.1.2. The source address remains unchanged

Buy Now
Questions 70

Which of the following statements are true about single sign-on? (multiple choice)

Options:

A.

The device can identify the user who has passed the authentication of the identity authentication system

B.

AD There is only one deployment mode for domain single sign-on

C.

Although there is no need to enter the user password, the authentication server needs to interact with the user password and the device to ensure that the authentication is passed.

D.

AD Domain single sign-on can be synchronized to the firewall by mirroring the login data stream

Buy Now
Questions 71

Regarding the description of vulnerability scanning, which of the following is false?

Options:

A.

Vulnerability scanning is a network-based technology for remotely monitoring the security performance vulnerabilities of target networks or hosts, and can be used to conduct simulated attack experiments and security audits.

B.

Vulnerability scanning is used to detect whether there are vulnerabilities in the target host system, generally scanning the target host for specific vulnerabilities

C.

Vulnerability scanning is a passive preventive measure that can effectively avoid hacker attacks

D.

can be based onpingScan and port scan results for vulnerability scanning

Buy Now
Questions 72

Which of the following statements about the PKI life cycle is correct?

Options:

A.

Certificate renewal: When the certificate expires and the key is leaked, the PKI entity must replace the certificate. The purpose of renewal can be achieved by re-applying, or it can be automatically renewed using SCEP or CPv2 protocol.

B.

Certificate download: The PKI entity downloads the issued certificate to the RA server through SCEP or CIPvz protocol, or through DAP.HIITP or out-of-band mode, download the issued certificate.

C.

Certificate issuance: When a PKI entity applies for a local certificate from a CA, if there is an RA, the RA will first review the identity information of the PKI entity. After the verification is passed, the RA will send the application information to the CA.

D.

Certificate application: certificate application, namely certificate registration, is a PKI entity introducing itself to the CA and obtaining a certificate

Buy Now
Questions 73

In digital signature technology, we usually encrypt the digital fingerprint with the sender's ( ). (fill in the blank)

Options:

Buy Now
Exam Code: H12-711_V3.0
Exam Name: HCIA-Security V3.0
Last Update: Apr 14, 2023
Questions: 492