March Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

H12-711_V4.0 Exam Dumps - HCIA-Security V4.0

Question # 4

Please order the following steps in the PKI life cycle correctly, 1. Issued, 2. storage, 3. Update, 4. verify[fill in the blank]*

Full Access
Question # 5

Which of the following characteristics does a denial-of-service attack include?

A.

Unauthorized tampering of the mouth

B.

Unauthorized access to the mouth

C.

Unauthorized activation of the mouth

D.

Unauthorized destruction of the mouth

Full Access
Question # 6

Among the various aspects of the risk assessment of IS027001, which of the following does not belong to the system design and release process?

A.

Hold a summary meeting of the project in the information security management stage

B.

Determine risk disposal measures and implement rectification plans

C.

Determine risk tolerance and risk appetite

D.

System integration and information security management system document preparation

Full Access
Question # 7

Under normal circumstances, the Emai1 protocols we often talk about include ____, POP3, and SMTP.[fill in the blank]*

Full Access
Question # 8

The following description of investigation and evidence collection, which one is correct

A.

Documentary evidence is required in computer crime.

B.

In all investigation and evidence collection, it is best to have law enforcement agencies involved.

C.

Evidence is not necessarily required in the course of the investigation.

D.

Evidence obtained by wiretapping is also valid.

Full Access
Question # 9

Data monitoring can be divided into two types: active analysis and passive acquisition.

A.

TRUE

B.

FALSE

Full Access
Question # 10

DES is a stream encryption algorithm, because the cipher capacity is only 56 bits, so it is not enough to deal with the weakness of insufficient security, and later 3DES was proposed.

A.

TRUE

B.

FALSE

Full Access
Question # 11

For which of the following parameters can the packet filtering firewall filter?

A.

Port packet payload

B.

IP address of the port source destination

C.

The MAC address of the source destination

D.

Port number and protocol number of the port source

Full Access
Question # 12

Which of the following is not included in the Business Impact Analysis (BIA).

A.

Risk identification

B.

Impact assessment

C.

Incident handling priority

D.

Business priorities

Full Access
Question # 13

As shown in the figure, nat server global202.106.1.1 inside10.10.1.1 is configured on the firewall. Which of the following is the correct configuration for interzone rules? ( )[Multiple choice]*

A.

rule name c. source-zone untrust. destination-zone trust. destination-address 202.106.1.132, action permit

B.

rule name d, source- zone untrust. destination- zone trust. destination- address10.l0.1.1 32, action permit

C.

rule name b, source- zone untrust, destination- zone trust, source- address10.10.1.1 32, action permit

D.

rule name b, source-zone untrust, destination-zone trust, source-address202.106.l.1 32, action permit

Full Access