Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Huawei H12-711_V4.0 - HCIA-Security V4.0 Exam

Page: 3 / 3
Total 91 questions

The keys used by the IPSec encryption and authentication algorithms can be configured manually or dynamically negotiated via the ____ protocol. (abbreviation, all uppercase).

Both digital envelopes and digital signatures guarantee data security and verify the origin of data.

A.

TRUE

B.

FALSE

When using passive mode to establish an FTP connection, the control channel uses port 20 and the data channel uses port 21. ( )[Multiple choice]*

A.

True

B.

False

Regarding the characteristics of the routing table, which of the following items is described correctly

A.

Port When a packet matches multiple entries in the routing table, it is forwarded based on the route entry with the largest metric.

B.

Port In the global routing table, there is at most one next hop to the same destination CIDR block.

C.

There may be multiple next hops in the global routing table to the same destination.

D.

Port When a packet matches multiple entries in the routing table, it is forwarded according to the longest mask.

The shard cache technology will wait for the arrival of the first shard packet, and then reassemble and decrypt all the packets, and then do subsequent processing by the device to ensure that the session can proceed normally in some application scenarios.

A.

TRUE

B.

FALSE

As shown in the figure, what is the authentication range of the AH protocol in tunnel mode?

A.

The3

B.

The4

C.

The2

D.

The1

A.

1

B.

2

C.

3

D.

4