Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the Huawei HCIA-Security H12-711_V4.0 Questions and answers with ValidTests

Exam H12-711_V4.0 All Questions
Exam H12-711_V4.0 Premium Access

View all detail and faqs for the H12-711_V4.0 exam

Viewing page 5 out of 5 pages
Viewing questions 41-50 out of questions
Questions # 41:

Huawei Firewall only supports the inter-domain persistent connection function for TCP packets.

Options:

A.

TRUE

B.

FALSE

Questions # 42:

What is the protocol number of the GRE protocol?

Options:

A.

47

B.

48

C.

46

D.

The 50th

Questions # 43:

Drag the warning level of the network security emergency response on the left into the box on the right, and arrange it from top to bottom in order of severity.[fill in the blank]*

Question # 43

Options:

Questions # 44:

Which of the following is not included in the Business Impact Analysis (BIA).

Options:

A.

Risk identification

B.

Impact assessment

C.

Incident handling priority

D.

Business priorities

Questions # 45:

Which of the following descriptions about the main implementation of single sign-on is wrong?

Options:

A.

Accept PC message mode

B.

Query the AD server security log mode

C.

Query the syslog server mode

D.

Firewall monitors AD authentication packets

Questions # 46:

Which of the following problems cannot be solved using PKI?

Options:

A.

The network is congested due to heavy traffic. As a result, the server cannot provide services properly.

B.

The transaction parties cannot verify the identities of each other.

C.

Data may be eavesdropped and tampered with during transmission, and information security cannot be ensured.

D.

No paper receipt is used in transaction, making arbitration difficult.

Questions # 47:

Which of the following statements is incorrect about PKI?

Options:

A.

PKI enables users to verify the validity of access devices, ensuring that users connect to secure and legitimate networks.

B.

PKI prevents attacks initiated by malicious users resending obtained packets.

C.

PKI ensures that data is accessible only to authorized devices and users, protecting data privacy.

D.

PKI protects data against tampering and eavesdropping, ensuring the privacy of data transmitted on the network.

Questions # 48:

Which of the following statements are correct about the PKI system structure?

Options:

A.

A PKI entity is an end user of PKI products or services. It can be an individual, an organization, a device such as a router or firewall, or a process running on a computer.

B.

CAs are classified into the root CA and subordinate CAs according to the hierarchy of CAs.

C.

A CA is a trusted entity that issues and manages digital certificates.

D.

A PKI system consists of three parts: entity, certificate authority, and certificate registration authority.

Questions # 49:

Data monitoring can be divided into two types: active analysis and passive acquisition.

Options:

A.

TRUE

B.

FALSE

Questions # 50:

In the automatic backup mode of hot standby on the second machine, which of the following sessions is backed up?

Options:

A.

ICMP session

B.

TCP half-connection session

C.

Self-session to the firewall

D.

UDP first packet session

Viewing page 5 out of 5 pages
Viewing questions 41-50 out of questions