Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Huawei H12-711_V4.0 - HCIA-Security V4.0 Exam

Page: 1 / 3
Total 91 questions

As shown in the figure, the process of AD single sign-on (querying the security log mode of AD server), please match the corresponding operation process.

____- The goal is to provide a rapid, composed and effective response in emergency situations, thereby enhancing the ability of the business to recover immediately from a disruptive event.[fill in the blank]*

Which of the following protocols is a multichannel protocol?

A.

The Telnet

B.

THE HITP

C.

FTP

D.

The SSH

In cases where some configurations alter existing session table entries and want them to take effect immediately, you can regenerate the session table by clearing the session table information. All session table information can be cleared by executing the _____firewall session table command.

Which of the following is not included in the Business Impact Analysis (BIA).

A.

Risk identification

B.

Impact assessment

C.

Incident handling priority

D.

Business priorities

Which of the following descriptions of server authentication is correct?

A.

The visitor sends the username and password that identifies his identity to FW through the portal authentication page, there is no password stored on F7, FT sends the username and password to a third-party authentication server, and the verification process is carried out on the authentication server.

B.

Visitors obtain the SMS verification code through the Portal authentication page, and then enter the SMS verification code to pass the authentication.

C.

The visitor sends the username and password that identifies his identity to the third-party authentication server, and after the authentication is passed, the third-party authentication server sends the visitor's identity information to FW.

D.

The visitor sends the username and password that identifies them to the FW through the portal authentication page, on which the password is stored and the verification process takes place on the FW.

In the TCP/P protocol core, which of the following protocols works at the application layer? ( )[Multiple choice]*

A.

IGMP

B.

ICMP

C.

RIP

D.

ARP

A Web server is deployed in an enterprise intranet to provide Web access services to Internet users, and in order to protect the access security of the server, it should be divided into the _____ area of the firewall.

What is the protocol number of the GRE protocol?

A.

47

B.

48

C.

46

D.

The 50th

Digital envelope technology means that the sender uses the receiver's public key to encrypt the data, and then sends the ciphertext to the receiver ( )[Multiple choice]*

A.

TRUE

B.

FALSE