Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

H12-711_V4.0 HCIA-Security V4.0 Questions and Answers

Questions 4

Which of the following is not included in the Business Impact Analysis (BIA).

Options:

A.

Risk identification

B.

Impact assessment

C.

Incident handling priority

D.

Business priorities

Buy Now
Questions 5

As shown in the figure, nat server global202.106.1.1 inside10.10.1.1 is configured on the firewall. Which of the following is the correct configuration for interzone rules? ( )[Multiple choice]*

Options:

A.

rule name c. source-zone untrust. destination-zone trust. destination-address 202.106.1.132, action permit

B.

rule name d, source- zone untrust. destination- zone trust. destination- address10.l0.1.1 32, action permit

C.

rule name b, source- zone untrust, destination- zone trust, source- address10.10.1.1 32, action permit

D.

rule name b, source-zone untrust, destination-zone trust, source-address202.106.l.1 32, action permit

Buy Now
Questions 6

Regarding the characteristics of the routing table, which of the following items is described correctly

Options:

A.

Port When a packet matches multiple entries in the routing table, it is forwarded based on the route entry with the largest metric.

B.

Port In the global routing table, there is at most one next hop to the same destination CIDR block.

C.

There may be multiple next hops in the global routing table to the same destination.

D.

Port When a packet matches multiple entries in the routing table, it is forwarded according to the longest mask.

Buy Now
Questions 7

What is correct in the following description of Security Alliance in IPSec?

There are two ways to set up an IPSec SA

Options:

A.

manual and IKE.

IPSec SA is uniquely identified by a triple.

B.

IPSec SA is a one-way logical connection, usually established in pairs (Inbound and Outbound).

C.

Security Alliance SA is a communication peer agreement for certain elements that describes how peers can communicate securely using secure services such as encryption.

Buy Now
Questions 8

Under normal circumstances, the Emai1 protocols we often talk about include ____, POP3, and SMTP.[fill in the blank]*

Options:

Buy Now
Questions 9

The following description of the intrusion fire protection system IPS, which is correct?

Options:

A.

The port IPS can be concatenated at the network boundary.

B.

The IPS cannot prevent intrusion from occurring in real time.

C.

The port IPS can be attached to the switch and port mirrored through the switch.

D.

Oral IPS has the ability to customize intrusion prevention rules.

Buy Now
Questions 10

What is the security level of the Untrust zone in Huawei firewalls?

Options:

A.

10

B.

20

C.

5

D.

15

Buy Now
Questions 11

As shown in the figure, what is the authentication range of the AH protocol in tunnel mode?

Options:

A.

The3

B.

The4

C.

The2

D.

The1

Buy Now
Questions 12

ARP man-in-the-middle attacks are a type of spoofing attack technique.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 13

Which of the following is the numbering range of Layer 2 ACLs?

Options:

A.

The 3000~3999

B.

The 4000~4999

C.

The 1000~1999

D.

@2000~2999

Buy Now
Exam Code: H12-711_V4.0
Exam Name: HCIA-Security V4.0
Last Update: Apr 29, 2024
Questions: 91
H12-711_V4.0 pdf

H12-711_V4.0 PDF

$28  $80
H12-711_V4.0 Engine

H12-711_V4.0 Testing Engine

$33.25  $95
H12-711_V4.0 PDF + Engine

H12-711_V4.0 PDF + Testing Engine

$45.5  $130