Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Huawei H12-711_V4.0 HCIA-Security V4.0 Exam Exam Practice Test

Demo: 13 questions
Total 91 questions

HCIA-Security V4.0 Exam Questions and Answers

Question 1

Digital envelope technology means that the sender uses the receiver's public key to encrypt the data, and then sends the ciphertext to the receiver ( )[Multiple choice]*

Options:

A.

TRUE

B.

FALSE

Question 2

Which of the following operating modes does NTP support?

Options:

A.

Mouth peer mode

B.

Mouth client/server mode

C.

Mouth broadcast mode

D.

Mouth multicast mode

Question 3

In the TCP/P protocol core, which of the following protocols works at the application layer? ( )[Multiple choice]*

Options:

A.

IGMP

B.

ICMP

C.

RIP

D.

ARP

Question 4

Which of the following descriptions about the main implementation of single sign-on is wrong? ( )[Multiple choice]*

Options:

A.

Accept PC message mode

B.

Query the AD server security log mode

C.

Query the syslog server mode

D.

Firewall monitors AD authentication packets

Question 5

When the Layer 2 switch receives a unicast frame and the MAC address table entry of the switch is empty, the switch discards the unicast frame.

Options:

A.

TRUE

B.

FALSE

Question 6

In the Linux system, which of the following is the command to query the P address information? ( )[Multiple choice]*

Options:

A.

ifconfig)

B.

display ip interface brief

C.

ipconfig

D.

display ip

Question 7

An enterprise wants to build a server system and requires the following functions: 1. The enterprise needs to have its own dedicated mailbox, and the sending and receiving of emails needs to go through the enterprise's server; 2. The server must provide file transfer and access services. Users in different departments of the enterprise provide accounts with different permissions: 3. When the enterprise accesses the internal webpage of the enterprise, the enterprise can directly enter the domain name in the browser to access. To meet the above requirements, which of the following servers do enterprises need to deploy? ( )*

Options:

A.

Time synchronization server

B.

FTP server (I)

C.

DNS server

D.

Mail server

Question 8

The network environment is becoming more and more complex, and network security incidents occur frequently. While accelerating the construction of informatization, enterprises must not only resist external attacks, but also prevent internal management personnel from being involved in data leakage and operation and maintenance accidents due to operational errors and other issues. Which of the following options might reduce operational risk?

Options:

A.

According to the administrator configuration, the O&M user corresponds to the background resource account, and restricts the unauthorized use of the account. mouth Based on the password security policy, the O&M security audit system automatically modifies the password of the background resource account at regular intervals.

B.

Each system is independently operated, maintained and managed, and the access process is not audited and monitored.

C.

Oral Each department system is independently authenticated and uses a single static password for authentication.

Question 9

SSL VPN is a VPN technology that realizes remote secure access through SSL protocol. Which of the following software must be installed when using SSL VPN?

Options:

A.

Browser

B.

Firewall

C.

Client

D.

Antivirus

Question 10

Which of the following zones is not the firewall default security zone?

Options:

A.

Trust

B.

The Local

C.

DMZ

D.

Management

Question 11

DES is a stream encryption algorithm, because the cipher capacity is only 56 bits, so it is not enough to deal with the weakness of insufficient security, and later 3DES was proposed.

Options:

A.

TRUE

B.

FALSE

Question 12

____- The goal is to provide a rapid, composed and effective response in emergency situations, thereby enhancing the ability of the business to recover immediately from a disruptive event.[fill in the blank]*

Options:

Question 13

We should choose the encryption algorithm according to our own use characteristics. When we need to encrypt a large amount of data, it is recommended to use the ____ encryption algorithm to improve the encryption and decryption speed.[fill in the blank]*

Options:

Demo: 13 questions
Total 91 questions