Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Huawei H12-711_V4.0 - HCIA-Security V4.0 Exam

Page: 1 / 5
Total 153 questions

Which of the following is not the matching mode of the firewall security protection whitelist rules?

A.

Prefix matching

B.

Fuzzy matching

C.

Keyword matching

D.

Suffix matching

Which of the following problems cannot be solved using PKI?

A.

The network is congested due to heavy traffic. As a result, the server cannot provide services properly.

B.

The transaction parties cannot verify the identities of each other.

C.

Data may be eavesdropped and tampered with during transmission, and information security cannot be ensured.

D.

No paper receipt is used in transaction, making arbitration difficult.

As shown in the figure, nat server global202.106.1.1 inside10.10.1.1 is configured on the firewall. Which of the following is the correct configuration for interzone rules?

A.

rule name c. source-zone untrust. destination-zone trust. destination-address 202.106.1.132, action permit

B.

rule name d, source- zone untrust. destination- zone trust. destination- address10.l0.1.1 32, action permit

C.

rule name b, source- zone untrust, destination- zone trust, source- address10.10.1.1 32, action permit

D.

rule name b, source-zone untrust, destination-zone trust, source-address202.106.l.1 32, action permit

IPSec VPN uses an asymmetric algorithm to calculate the ___ key to encrypt data packets.[fill in the blank]

Which of the following types of malicious code on your computer includes?

A.

Oral virus

B.

Trojan horses

C.

Port SQL injection

D.

Oral spyware

Please order the following steps in the PKI life cycle correctly, 1. Issued, 2. storage, 3. Update, 4. verify[fill in the blank]*

In asymmetric encryption algorithms, only public keys can be used to encrypt data, and private keys are used to decrypt data. This process is irreversible.

A.

TRUE

B.

FALSE

In the Linux system, which of the following is the command to query the P address information?

A.

ifconfig)

B.

display ip interface brief

C.

ipconfig

D.

display ip

Which of the following statements is incorrect about information transmission through the heartbeat link between two firewalls that work in hot standby mode?

A.

Heartbeat packets are sent to synchronize configuration commands and status information between the two firewalls.

B.

Heartbeat packets are periodically sent by the two firewalls to check whether the peer device is alive.

C.

VGMP packets are sent to check the status of the peer device, so as to determine whether a switchover is required.

D.

Configuration consistency check packets are sent to check whether key configurations of the two firewalls are consistent.

Certificates saved in DER format may or may not contain a private key.

A.

TRUE

B.

FALSE