Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Huawei H12-711_V4.0 - HCIA-Security V4.0 Exam

Page: 4 / 5
Total 153 questions

_____ Authentication is to configure user information (including local user's user name, password and various attributes) on the network access server. The advantage is that it is fast.[fill in the blank]*

Which of the following statements are correct about IKE-based SA establishment in IPsec?

A.

SAs are valid permanently.

B.

IKE-based SA establishment applies to medium- and large-sized networks.

C.

The SPI value is generated randomly.

D.

Keys are generated using the DH algorithm and dynamically updated.

Which of the following authentication modes are supported by AAA?

A.

RADIUS authentication

B.

No authentication

C.

HWTACACS authentication

D.

Local authentication

Which of the following are the default zones of Huawei firewalls?

A.

Untrust

B.

Local

C.

DMZ

D.

Trust

Please classify the following security defenses into the correct classification.

Which of the following are antivirus response actions of the firewall?

A.

Block

B.

Alert

C.

Delete attachment

D.

Declare

Which of the following descriptions of server authentication is correct?

A.

The visitor sends the username and password that identifies his identity to FW through the portal authentication page, there is no password stored on F7, FT sends the username and password to a third-party authentication server, and the verification process is carried out on the authentication server.

B.

Visitors obtain the SMS verification code through the Portal authentication page, and then enter the SMS verification code to pass the authentication.

C.

The visitor sends the username and password that identifies his identity to the third-party authentication server, and after the authentication is passed, the third-party authentication server sends the visitor's identity information to FW.

D.

The visitor sends the username and password that identifies them to the FW through the portal authentication page, on which the password is stored and the verification process takes place on the FW.

Which of the following are application-layer protocols?

A.

DNS

B.

ARP

C.

Telnet

D.

HTTP

Which of the following is not the default security zone of the firewall

A.

untrust trust

B.

trust zone

C.

dmz zone

D.

isp zone)

3-tuple NAT allows external devices to proactively access internal PCs through translated addresses and ports. Even if no security policy is configured on the firewall, the firewall allows such access packets to pass through.

A.

TRUE

B.

FALSE