Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

H12-711_V4.0 Exam Dumps - HCIA-Security V4.0 Exam

Searching for workable clues to ace the Huawei H12-711_V4.0 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s H12-711_V4.0 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 33

Which of the following statements are correct about IKE-based SA establishment in IPsec?

A.

SAs are valid permanently.

B.

IKE-based SA establishment applies to medium- and large-sized networks.

C.

The SPI value is generated randomly.

D.

Keys are generated using the DH algorithm and dynamically updated.

Full Access
Question # 34

Which of the following authentication modes are supported by AAA?

A.

RADIUS authentication

B.

No authentication

C.

HWTACACS authentication

D.

Local authentication

Full Access
Question # 35

Please classify the following security defenses into the correct classification.

Full Access
Question # 36

_____ Authentication is to configure user information (including local user's user name, password and various attributes) on the network access server. The advantage is that it is fast.[fill in the blank]*

Full Access
Question # 37

Which of the following descriptions of server authentication is correct?

A.

The visitor sends the username and password that identifies his identity to FW through the portal authentication page, there is no password stored on F7, FT sends the username and password to a third-party authentication server, and the verification process is carried out on the authentication server.

B.

Visitors obtain the SMS verification code through the Portal authentication page, and then enter the SMS verification code to pass the authentication.

C.

The visitor sends the username and password that identifies his identity to the third-party authentication server, and after the authentication is passed, the third-party authentication server sends the visitor's identity information to FW.

D.

The visitor sends the username and password that identifies them to the FW through the portal authentication page, on which the password is stored and the verification process takes place on the FW.

Full Access
Question # 38

Which of the following are application-layer protocols?

A.

DNS

B.

ARP

C.

Telnet

D.

HTTP

Full Access
Question # 39

Which of the following is not the default security zone of the firewall

A.

untrust trust

B.

trust zone

C.

dmz zone

D.

isp zone)

Full Access
Question # 40

3-tuple NAT allows external devices to proactively access internal PCs through translated addresses and ports. Even if no security policy is configured on the firewall, the firewall allows such access packets to pass through.

A.

TRUE

B.

FALSE

Full Access
Go to page: