Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Huawei H12-711_V4.0 - HCIA-Security V4.0 Exam

Page: 3 / 5
Total 153 questions

Which of the following statements is incorrect about DoS attacks?

A.

DoS attacks use IP spoofing to prevent authorized users from connecting to the target server.

B.

DoS attacks stop services or resource access on the target server.

C.

DoS attack forces the target server's buffer to be full and does not receive new requests.

D.

DoS attacks cause unrecoverable physical damage to the target server.

Which of the following characteristics does a denial-of-service attack include?

A.

Unauthorized tampering of the mouth

B.

Unauthorized access to the mouth

C.

Unauthorized activation of the mouth

D.

Unauthorized destruction of the mouth

Database operation records can be used as ___ evidence to backtrack security events.[fill in the blank]*

On a firewall, security policies with the permit action do not need to be configured for traffic between users in the same zone.

A.

TRUE

B.

FALSE

At what layer does packet filtering technology in the firewall filter packets?

A.

Transport layer

B.

Network layer

C.

Physical layer

D.

Data link layer

The trigger modes of the built-in Portal authentication in the firewall include pre-authentication and ____ authentication[fill in the blank]*

In the automatic backup mode of hot standby on the second machine, which of the following sessions is backed up?

A.

ICMP session

B.

TCP half-connection session

C.

Self-session to the firewall

D.

UDP first packet session

Which of the following statements are correct about the PKI system structure?

A.

A PKI entity is an end user of PKI products or services. It can be an individual, an organization, a device such as a router or firewall, or a process running on a computer.

B.

CAs are classified into the root CA and subordinate CAs according to the hierarchy of CAs.

C.

A CA is a trusted entity that issues and manages digital certificates.

D.

A PKI system consists of three parts: entity, certificate authority, and certificate registration authority.

Digital envelope technology means that the sender uses the receiver's public key to encrypt the data, and then sends the ciphertext to the receiver

A.

TRUE

B.

FALSE

The following description of the construction of a digital certificate, which item is wrong

A.

The name of the device that issued the certificate can be different from the subject name in the issuer certificate.

B.

The structure of the certificate follows the specification of the X.509 v3 version.

C.

The simplest certificate consists of a public key, a name, and a digital signature from a certificate authority.

D.

The issuer signs the certificate information with the private key.