Exam Code: H12-711_V3.0 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: HCIA-Security V3.0
Certification Provider: HUAWEI
Free Today! Guaranteed Training- Pass H12-711_V3.0 Exam.
Also have H12-711_V3.0 free dumps questions for you:
NEW QUESTION 1
User authentication is the authentication of the client identity by the SSL virtual gateway, including: ________, server authentication, certificate anonymous authentication and certificate challenge authentication.[fill in the blank]
Solution:
local authentication
Does this meet the goal?
- A. Yes
- B. Not Mastered
Answer: A
NEW QUESTION 2
Which of the following options is NOTwindowsOS log type?
- A. business log
- B. application log
- C. Security log
- D. System log
Answer: A
NEW QUESTION 3
Which of the following options is not a hash algorithm?
- A. MD5
- B. SHA1
- C. SM1
- D. SHA2
Answer: C
NEW QUESTION 4
Which of the following options are technical characteristics of an intrusion prevention system? (multiple choice)
- A. online mode
- B. real-time blocking
- C. Self-learning and adaptive
- D. In-line deployment
Answer: ABC
NEW QUESTION 5
Which of the following is used in digital signature technology to encrypt digital fingerprints?
- A. sender's public key
- B. sender private key
- C. Receiver's public key
- D. Receiver's private key
Answer: B
NEW QUESTION 6
Which of the following options are the possible reasons for the problem that users cannot access network resources in the authentication-free two-way binding mode? (multiple choice)
- A. Authentication-free users and authenticated users are in the same security area
- B. Authentication-free users do not use the specifiedIP/MACaddressPC
- C. The authentication action in the authentication policy is set to"Do not acknowledge/Certification-free"
- D. Online users have reached the maximum
Answer: BD
NEW QUESTION 7
aboutVPN, which of the following statements is false?
- A. Virtual private network is cheaper than private line
- B. VPNTechnology necessarily involves encryption
- C. VPNTechnology is a technology that multiplexes logical channels on actual physical lines
- D. VPNThe emergence of technology allows traveling employees to remotely access internal corporate servers
Answer: B
NEW QUESTION 8
Which of the following statements about electronic evidence sources is false?
- A. Facsimile data and mobile phone recordings are electronic evidence related to communication technology.
- B. Movies and TV series are electronic evidence related to network technology.
- C. Database operation records and operating system logs are electronic evidence related to computers•
- D. OS logs,e-mail, chat records can be used as a source of electronic evidence
Answer: B
NEW QUESTION 9
______ - The goal is to provide a rapid, composed and effective response in emergency situations, thereby enhancing the ability of the business to recover immediately from a disruptive event.[fill in the blank]*
Solution:
business continuity plan
Does this meet the goal?
- A. Yes
- B. Not Mastered
Answer: A
NEW QUESTION 10
Please order the following project implementation steps from project initiation.[fill in the blank]*
Solution:
project initiation and variance analysis, risk assessment, system design and release, system operation and supervision, certification and continuous improvement)
Does this meet the goal?
- A. Yes
- B. Not Mastered
Answer: A
NEW QUESTION 11
The steps of the security assessment method do not include which of the following?
- A. Manual audit
- B. Penetration testing
- C. Questionnaire
- D. data analysis
Answer: D
NEW QUESTION 12
Digital envelope technology means that the sender uses the receiver's public key to encrypt the data and then sends the ciphertext to the receiver.
- A. True
- B. False
Answer: A
NEW QUESTION 13
Which of the following NAT technologies can implement a public network address to provide source address translation for multiple private network addresses ( )*
- A. NAPT
- B. NAT Server
- C. Easy-ipCT Jinglu
- D. NAT No-PAT
Answer: B
NEW QUESTION 14
Which of the following is not a common application scenario of digital certificates? ( )[Multiple choice]*
- A. FTP
- B. HTTPS
- C. IPSEC VPN
- D. SSL VPN
Answer: A
NEW QUESTION 15
Which of the following descriptions about dual-system hot backup is wrong? ( )[Multiple choice]*
- A. By default the preemption delay is 60s
- B. Whether it is a Layer 2 or Layer 3 interface, whether it is a service interface or a heartbeat interface, it needs to be added to a security zone
- C. By default, the active preemption function is enabled
- D. Dual-system hot backup function requires license support
Answer: D
NEW QUESTION 16
Which of the following statements are true about port mirroring? (multiple choice)
- A. The mirror port replicates the packets to the observing port
- B. The observing port sends the received packets to the monitoring device
- C. The mirror port sends the received packets to the monitoring device
- D. The observing port replicates the packets to the mirroring port
Answer: AB
NEW QUESTION 17
HTTPmessage usageUDPcarry, andHTTPSprotocol based onTCPthree-way handshake, soHTTPSSafer and more recommendedHTTPS.
- A. True
- B. False
Answer: B
NEW QUESTION 18
The matching principle of the security policy is: first search for the manually configured interzone security policy, and if no match is found, the data packet will be discarded directly.
- A. True
- B. False
Answer: A
NEW QUESTION 19
In the classification of information security classified protection systems, which of the following levels define if an information system is compromised. Will it cause damage to social order and public interests? (
)[Multiple Choice Questions]
- A. The third level of security marking protection
- B. Level 4 Structural Protection
- C. Second-level system audit protection
- D. The first level of user self-protection
Answer: ABC
NEW QUESTION 20
aboutNATAddress translation, which of the following statements is false?
- A. sourceNATconfiguration in technologyNATaddress pool, you can configure only one address poolIPaddress
- B. Address translation can be provided in the local area network according to the needs of usersFTP,WWW,Telnetand other services
- C. Some application layer protocols carry in the dataIPaddress information, make themNATWhen modifying the data in the upper layerIPAddress information
- D. for someTCP,UDPagreement (such asICMP,PPTP), cannot doNATconvert
Answer: D
NEW QUESTION 21
......
100% Valid and Newest Version H12-711_V3.0 Questions & Answers shared by Dumps-files.com, Get Full Dumps HERE: https://www.dumps-files.com/files/H12-711_V3.0/ (New 492 Q&As)