Spring Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

H12-711_V4.0 HCIA-Security V4.0 Exam Questions and Answers

Questions 4

The following description of the construction of a digital certificate, which item is wrong

Options:

A.

The name of the device that issued the certificate can be different from the subject name in the issuer certificate.

B.

The structure of the certificate follows the specification of the X.509 v3 version.

C.

The simplest certificate consists of a public key, a name, and a digital signature from a certificate authority.

D.

The issuer signs the certificate information with the private key.

Buy Now
Questions 5

The following description of IDS, which items are correct

The IDS cannot be linked to the firewall.

Options:

A.

Mouth IDS is a fine-grained detection device, through which the live network can be monitored more accurately.

B.

The IDS can be upgraded flexibly and in a timely manner, and the strategic configuration operation is convenient and flexible.

C.

With IDS, system administrators can capture traffic from critical nodes and do intelligent analysis to find anomalous and suspicious network behavior and report it to administrators.

Buy Now
Questions 6

A three-way handshake is required to establish a TCP connection, and a four-way handshake is required to end a TCP connection.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 7

When IPSec VPN uses tunnel mode to encapsulate packets, which of the following is not within the encryption scope of the ESP security protocol?

Options:

A.

ESP Header

B.

TCP Header

C.

Raw IP Header

D.

ESP Tail

Buy Now
Questions 8

Which of the following statements is incorrect about Portal authentication?

Options:

A.

In Portal authentication, users can be authenticated only on the firewall authentication page.

B.

In session authentication, users do not initiate identity authentication. Instead, they access the HTTP service first and are authenticated during the access. Service access is allowed only after authentication.

C.

In user-initiated authentication, users proactively initiate authentication and can access network resources only after authentication.

D.

The built-in Portal authentication triggering modes include session authentication and user-initiated authentication.

Buy Now
Questions 9

Which of the following statements is correct about characteristics of a firewall?

Options:

A.

The firewall is a comprehensive security device with multiple security features to defend against zero-day vulnerabilities.

B.

The firewall can prevent unauthorized information on the extranet from being sent to the intranet.

C.

The firewall can defend against all external network threats.

D.

The firewall has the antivirus function. Therefore, the antivirus system does not need to be deployed on the network where the firewall is deployed.

Buy Now
Questions 10

The RADIUS protocol specifies how to pass user information, billing information, authentication and billing results between the NAS and the RADIUS server, and the RADIUS server is responsible for receiving the user's connection request, completing the authentication, and returning the result to the NAS.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 11

Which of the following packets is controlled by a firewall's security policy by default?

Options:

A.

Multicast

B.

Broadcast

C.

Anycast

D.

Unicast

Buy Now
Questions 12

Which of the following is not an advantage of symmetric encryption algorithms?

Options:

A.

Suitable for encrypting large amounts of data

B.

Low overhead

C.

Good scalability

D.

High efficiency

Buy Now
Questions 13

Which of the following are disadvantages of the packet filtering firewall?

Options:

A.

The software implementation limits the processing speed, making the firewall vulnerable to DoS attacks.

B.

An attacker can set the IP address of his/her host to an IP address permitted by a packet filter. In this way, packets from the attacker's host can easily pass through the packet filter.

C.

Static ACL rules cannot meet dynamic security requirements.

D.

The connection status list is dynamically managed.

Buy Now
Questions 14

Which of the following is not an application scenario for PKI?

Options:

A.

SSL VPN

B.

IPsec VPN

C.

IPv6 SEND

D.

Web login through HTTPS

Buy Now
Questions 15

Which of the following characteristics does a denial-of-service attack include?

Options:

A.

Unauthorized tampering of the mouth

B.

Unauthorized access to the mouth

C.

Unauthorized activation of the mouth

D.

Unauthorized destruction of the mouth

Buy Now
Questions 16

Database operation records can be used as ___ evidence to backtrack security events.[fill in the blank]*

Options:

Buy Now
Questions 17

Options:

A.

1

B.

2

C.

3

D.

4

Buy Now
Questions 18

Match each of the following application layer service protocols with the correct transport layer protocols and port numbers.

Options:

Buy Now
Questions 19

WAF can accurately control and manage users' online behavior and user traffic.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 20

A Web server is deployed in an enterprise intranet to provide Web access services to Internet users, and in order to protect the access security of the server, it should be divided into the _____ area of the firewall.

Options:

Buy Now
Questions 21

How frequently should antivirus signature databases be updated to ensure the effectiveness of an antivirus program or software?

Options:

A.

Every month

B.

Every day

C.

Three months

D.

Half a month

Buy Now
Questions 22

Which of the following functions help implement IPsec secure transmission of user service data on the Internet by means of encryption and authentication?

Options:

A.

Data encryption

B.

Data origin authentication

C.

Anti-replay

D.

Data integrity check

Buy Now
Questions 23

Which of the following descriptions about the main implementation of single sign-on is wrong?

Options:

A.

Accept PC message mode

B.

Query the AD server security log mode

C.

Query the syslog server mode

D.

Firewall monitors AD authentication packets

Buy Now
Questions 24

ARP man-in-the-middle attacks are a type of spoofing attack technique.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 25

Which of the following NAT technologies can implement a public network address to provide source address translation for multiple private network addresses ( )*

Options:

A.

NAPT

B.

NAT Server

C.

Easy-ip

CT Jinglu

D.

NAT No-PAT

Buy Now
Questions 26

HTTPS introduces the TLS layer based on HTTP to provide identity authentication, encryption, and integrity check for data transmission.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 27

We should choose the encryption algorithm according to our own use characteristics. When we need to encrypt a large amount of data, it is recommended to use the ____ encryption algorithm to improve the encryption and decryption speed.[fill in the blank]*

Options:

Buy Now
Questions 28

Which of the following attack methods is to construct special SQL statements and submit sensitive information to exploit program vulnerabilities

Options:

A.

Buffer overflow attack

B.

SQL injection attacks

C.

Worm attack

D.

Phishing attacks

Buy Now
Questions 29

Which of the following statements is incorrect about DoS attacks?

Options:

A.

DoS attacks use IP spoofing to prevent authorized users from connecting to the target server.

B.

DoS attacks stop services or resource access on the target server.

C.

DoS attack forces the target server's buffer to be full and does not receive new requests.

D.

DoS attacks cause unrecoverable physical damage to the target server.

Buy Now
Questions 30

As shown in the figure, the administrator needs to test the network quality of the 20.0.0/24 CIDR block to the 40.0.0/24 CIDR block on Device B, and the device needs to send large packets for a long time to test the network connectivity and stability.

Options:

A.

tracert -a 20.0.0.1 -f 500 -q 9600 40.0.0.2

B.

ping -a 20.0.0.1 -c 500 -s 9600 40.0.0.2

C.

ping -s 20.0.0.1 -h 500-f 9600 40.0.0.2

D.

tracert -a 20.0.0.1 -c 500 -w 9600 40.0.0.2

Buy Now
Questions 31

What is the protocol number of the GRE protocol?

Options:

A.

47

B.

48

C.

46

D.

The 50th

Buy Now
Questions 32

In asymmetric encryption algorithms, only public keys can be used to encrypt data, and private keys are used to decrypt data. This process is irreversible.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 33

DES is a stream encryption algorithm, because the cipher capacity is only 56 bits, so it is not enough to deal with the weakness of insufficient security, and later 3DES was proposed.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 34

Which of the following authentication modes are supported by AAA?

Options:

A.

RADIUS authentication

B.

No authentication

C.

HWTACACS authentication

D.

Local authentication

Buy Now
Questions 35

Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution. 1. Inhibition stage, 2. recovery phase, 3. Detection stage, 4. eradication phase[fill in the blank]*

Options:

Buy Now
Questions 36

Which of the following protocols are transport layer protocols?

Options:

A.

UDP

B.

FTP

C.

TCP

D.

DHCP

Buy Now
Questions 37

What are the correct entries in the following description of firewall security zones?

Options:

A.

The DMZ security zone solves the problem of server placement well, and this security area can place devices that need to provide network services to the outside world.

B.

The Local zone is the highest security zone with a priority of 99.

C.

Data flows between security domains are directional, including Inbound and Outbound.

D.

Normally, the two communicating parties must exchange messages, that is, there are messages transmitted in both directions between security domains.

Buy Now
Questions 38

As shown in the figure, what is the authentication range of the AH protocol in tunnel mode?

Options:

A.

The3

B.

The4

C.

The2

D.

The1

Buy Now
Questions 39

Which of the following statements is incorrect about L2TP?

Options:

A.

L2TP VPN is mainly used in remote office scenarios to provide remote intranet resource access for employees on business trips.

B.

L2TP VPN is a tunneling technology used to transmit PPP packets.

C.

PPP packets can be directly transmitted on the Internet.

D.

L2TP VPN can provide remote access services for employees on business trips, regardless of whether they access the Internet through traditional dial-up or Ethernet.

Buy Now
Questions 40

An engineer needs to back up the firewall configuration. Now he wants to use a command to view all the current configurations of the firewall. May I ask the command he uses is ____[fill in the blank]*

Options:

Buy Now
Questions 41

While working for a company, Tom receives an email with an attachment. Which of the following operations is correct?

Options:

A.

Checking the email's content. If the email is related to work, Tom can open and save the attachment

B.

Opening the attachment directly because email attachments do not affect information security

C.

Checking the email sender. If the email was sent from the company's mailbox, Tom can open and save the attachment

D.

Checking the sender and email information, and using antivirus software to check the attachment

Buy Now
Questions 42

As shown in the figure, which of the following shows the authentication range of ESP in transport mode?

Options:

A.

4

B.

1

C.

3

D.

2

Buy Now
Questions 43

When logging in to the web UI through HTTPS, you need to specify a local certificate issued by a CA that the web browser trusts for the HTTPS client on the device. Because the web browser can verify the local certificate, this approach avoids malicious attacks and ensures secure logins of administrators.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 44

Arrange the following processes in the correct order based on the PKI lifecycle.

Options:

Buy Now
Questions 45

Which of the following is the numbering range of Layer 2 ACLs?

Options:

A.

The 3000~3999

B.

The 4000~4999

C.

The 1000~1999

D.

@2000~2999

Buy Now
Exam Code: H12-711_V4.0
Exam Name: HCIA-Security V4.0 Exam
Last Update: Apr 7, 2026
Questions: 153
H12-711_V4.0 pdf

H12-711_V4.0 PDF

$25.5  $84.99
H12-711_V4.0 Engine

H12-711_V4.0 Testing Engine

$30  $99.99
H12-711_V4.0 PDF + Engine

H12-711_V4.0 PDF + Testing Engine

$40.5  $134.99