Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

H12-711_V4.0 HCIA-Security V4.0 Questions and Answers

Questions 4

Which of the following types of malicious code on your computer includes?

Options:

A.

Oral virus

B.

Trojan horses

C.

Port SQL injection

D.

Oral spyware

Buy Now
Questions 5

Which of the following operating modes does NTP support?

Options:

A.

Mouth peer mode

B.

Mouth client/server mode

C.

Mouth broadcast mode

D.

Mouth multicast mode

Buy Now
Questions 6

Drag the warning level of the network security emergency response on the left into the box on the right, and arrange it from top to bottom in order of severity.[fill in the blank]*

Options:

Buy Now
Questions 7

Which of the following descriptions of single sign-on is correct?

Options:

A.

The visitor recited the Portal authentication page and sent the username and password to FT to identify his/her identity, and the password was not stored on the FT, and the FI sent the username and password to the third-party authentication server, and the authentication process was carried out on the authentication server.

B.

The visitor sends the username and password that identifies his identity to the third-party authentication server, and after the authentication is passed, the third-party authentication server sends the visitor's identity information to FW. F7 only records the identity information of the visitor and does not participate in the authentication process

C.

Visitors obtain the SMS verification code through the Portal authentication page, and then enter the SMS verification code to pass the authentication.

D.

The visitor sends the username and password that identifies them to the FW through the portal authentication page, on which the password is stored and the verification process takes place on the FW.

Buy Now
Questions 8

Which of the following characteristics does a denial-of-service attack include?

Options:

A.

Unauthorized tampering of the mouth

B.

Unauthorized access to the mouth

C.

Unauthorized activation of the mouth

D.

Unauthorized destruction of the mouth

Buy Now
Questions 9

DES is a stream encryption algorithm, because the cipher capacity is only 56 bits, so it is not enough to deal with the weakness of insufficient security, and later 3DES was proposed.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 10

In the TCP/P protocol core, which of the following protocols works at the application layer? ( )[Multiple choice]*

Options:

A.

IGMP

B.

ICMP

C.

RIP

D.

ARP

Buy Now
Questions 11

As shown in the figure, what is the range of the AH protocol authentication range in transmission mode?

Options:

A.

The4

B.

The3

C.

The2

D.

The1

Buy Now
Questions 12

The following description of the AH protocol in IPSec VPN, which one is wrong?

Options:

A.

Supports data source validation

B.

Supports data integrity checking

C.

Supports packet encryption

D.

Support anti-message replay

Buy Now
Questions 13

Please match the following information security risks to information security incidents one by one.[fill in the blank]*

physical security riskEnterprise server permissions are loosely set

Information Security Management RiskInfected Panda Burning Incense

Information Access RiskFire destroyed equipment in computer room

application riskTalk to people about leaking company secrets

Options:

Buy Now
Exam Code: H12-711_V4.0
Exam Name: HCIA-Security V4.0
Last Update: Apr 28, 2024
Questions: 91
H12-711_V4.0 pdf

H12-711_V4.0 PDF

$28  $80
H12-711_V4.0 Engine

H12-711_V4.0 Testing Engine

$33.25  $95
H12-711_V4.0 PDF + Engine

H12-711_V4.0 PDF + Testing Engine

$45.5  $130