Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the Huawei HCIA-Security H12-711_V4.0 Questions and answers with ValidTests

Exam H12-711_V4.0 All Questions
Exam H12-711_V4.0 Premium Access

View all detail and faqs for the H12-711_V4.0 exam

Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions
Questions # 21:

Please order the following steps in the PKI life cycle correctly, 1. Issued, 2. storage, 3. Update, 4. verify[fill in the blank]*

Options:

Expert Solution
Questions # 22:

Which of the following descriptions about the main implementation of single sign-on is wrong? ( )[Multiple choice]*

Options:

A.

Accept PC message mode

B.

Query the AD server security log mode

C.

Query the syslog server mode

D.

Firewall monitors AD authentication packets

Expert Solution
Questions # 23:

The following description of asymmetric encryption algorithms, which item is wrong?

Options:

A.

Compared with symmetric encryption algorithms, the security factor is higher.

B.

Encryption is faster than symmetric encryption algorithms.

C.

Public keys are generally disclosed to users.

D.

Asymmetric encryption algorithms are a pair of keys, divided into public and private keys.

Expert Solution
Questions # 24:

In the automatic backup mode of hot standby on the second machine, which of the following sessions is backed up?

Options:

A.

ICMP session

B.

TCP half-connection session

C.

Self-session to the firewall

D.

UDP first packet session

Expert Solution
Questions # 25:

Regarding the characteristics of the routing table, which of the following items is described correctly

Options:

A.

Port When a packet matches multiple entries in the routing table, it is forwarded based on the route entry with the largest metric.

B.

Port In the global routing table, there is at most one next hop to the same destination CIDR block.

C.

There may be multiple next hops in the global routing table to the same destination.

D.

Port When a packet matches multiple entries in the routing table, it is forwarded according to the longest mask.

Expert Solution
Questions # 26:

Which of the following is not included in the Business Impact Analysis (BIA).

Options:

A.

Risk identification

B.

Impact assessment

C.

Incident handling priority

D.

Business priorities

Expert Solution
Questions # 27:

Which of the following statements are correct about SYN flood attack defense technologies on Huawei firewalls?

Options:

A.

The TCP connection establishment rate can be limited to defend against SYN flood attacks.

B.

The number of half-open TCP connections can be limited to defend against SYN flood attacks.

C.

SYN cookie technology can be used to defend against SYN flood attacks.

D.

Interzone security policies can be configured to defend against SYN flood attacks.

Questions # 28:

An engineer needs to back up the firewall configuration. Now he wants to use a command to view all the current configurations of the firewall. May I ask the command he uses is ____[fill in the blank]*

Options:

Questions # 29:

Match each of the following application layer service protocols with the correct transport layer protocols and port numbers.

Question # 29

Options:

Questions # 30:

When the Layer 2 switch receives a unicast frame and the MAC address table entry of the switch is empty, the switch discards the unicast frame.

Options:

A.

TRUE

B.

FALSE

Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions