Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Huawei HCIA-Security H12-711_V4.0 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam H12-711_V4.0 Premium Access

View all detail and faqs for the H12-711_V4.0 exam


434 Students Passed

95% Average Score

97% Same Questions
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

In the authentication policy of the firewall, _____ allows the user to not need to enter the user name and password, but can obtain the corresponding relationship between the user and the IP, so as to carry out policy management based on the user[fill in the blank]*

Options:

Questions # 2:

Which layer of the protocol stack does SSL provide end-to-end encrypted transmission services?

Options:

A.

Application layer

B.

Data link layer

C.

Network layer

D.

Transport layer

Questions # 3:

The following description of asymmetric encryption algorithms, which item is wrong?

Options:

A.

Compared with symmetric encryption algorithms, the security factor is higher.

B.

Encryption is faster than symmetric encryption algorithms.

C.

Public keys are generally disclosed to users.

D.

Asymmetric encryption algorithms are a pair of keys, divided into public and private keys.

Questions # 4:

For which of the following parameters can the packet filtering firewall filter?

Options:

A.

Port packet payload

B.

IP address of the port source destination

C.

The MAC address of the source destination

D.

Port number and protocol number of the port source

Questions # 5:

In cases where some configurations alter existing session table entries and want them to take effect immediately, you can regenerate the session table by clearing the session table information. All session table information can be cleared by executing the _____firewall session table command.

Options:

Questions # 6:

During the process of establishing IPSec VPN between peers FW_A and FW_B, two types of security associations need to be established in two stages. In the first stage, _____ is established to verify the identity of the peers.[fill in the blank]*

Options:

Questions # 7:

Which of the following is the correct sequence for incident response management

1. Detection 2 Report 3 Mitigation 4 Lessons learned 5 Fix 6 Recovery 7 Response

Options:

A.

1->3->2->7->6->5->4

B.

1->7->3->2->6->5->4

C.

1->3->2->7->5->6->4

D.

1->2->3->7->6->5->4

Questions # 8:

As shown in the figure, the process of AD single sign-on (querying the security log mode of AD server), please match the corresponding operation process.

Question # 8

Question # 8

Options:

Questions # 9:

Which of the following is not an advantage of symmetric encryption algorithms?

Options:

A.

Suitable for encrypting large amounts of data

B.

Low overhead

C.

Good scalability

D.

High efficiency

Questions # 10:

The keys used by the IPSec encryption and authentication algorithms can be configured manually or dynamically negotiated via the ____ protocol. (abbreviation, all uppercase).

Options:

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.