Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

H12-711_V4.0 Exam Dumps - HCIA-Security V4.0 Exam

Searching for workable clues to ace the Huawei H12-711_V4.0 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s H12-711_V4.0 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 17

In most cases, a user applies for a local certificate from a CA, and the CA approves the application and issues the certificate to the user.

A.

TRUE

B.

FALSE

Full Access
Question # 18

The trigger modes of the built-in Portal authentication in the firewall include pre-authentication and ____ authentication[fill in the blank]*

Full Access
Question # 19

Which of the following statements are correct about the PKI system structure?

A.

A PKI entity is an end user of PKI products or services. It can be an individual, an organization, a device such as a router or firewall, or a process running on a computer.

B.

CAs are classified into the root CA and subordinate CAs according to the hierarchy of CAs.

C.

A CA is a trusted entity that issues and manages digital certificates.

D.

A PKI system consists of three parts: entity, certificate authority, and certificate registration authority.

Full Access
Question # 20

In the automatic backup mode of hot standby on the second machine, which of the following sessions is backed up?

A.

ICMP session

B.

TCP half-connection session

C.

Self-session to the firewall

D.

UDP first packet session

Full Access
Question # 21

At what layer does packet filtering technology in the firewall filter packets?

A.

Transport layer

B.

Network layer

C.

Physical layer

D.

Data link layer

Full Access
Question # 22

Digital envelope technology means that the sender uses the receiver's public key to encrypt the data, and then sends the ciphertext to the receiver

A.

TRUE

B.

FALSE

Full Access
Question # 23

Which of the following are antivirus response actions of the firewall?

A.

Block

B.

Alert

C.

Delete attachment

D.

Declare

Full Access
Question # 24

Which of the following is not the matching mode of the firewall security protection whitelist rules?

A.

Prefix matching

B.

Fuzzy matching

C.

Keyword matching

D.

Suffix matching

Full Access
Go to page: