Huawei H12-711_V3.0-ENU HCIA-Security V3.0 Online Training
Huawei H12-711_V3.0-ENU Online Training
The questions for H12-711_V3.0-ENU were last updated at Feb 02,2025.
- Exam Code: H12-711_V3.0-ENU
- Exam Name: HCIA-Security V3.0
- Certification Provider: Huawei
- Latest update: Feb 02,2025
Which item is correct about SSL VPN?
- A . Can be used without the client
- B . Can encrypt the IP layer
- C . There is a NAT crossing problem
- D . No authentication
Some applications such as Oracle Database Applications, has no data streaming for a long time, so that the firewall session connection is interrupted, resulting in business interruption, which of the following is the optimal solution?
- A . Configure a long connection for one business
- B . Open the ASPF function
- C . Optimize safety strategy
- D . Open Split Cache
"Implementing security monitoring management for information and information systems, preventing illegal use of information and information systems", is to achieve which feature in information security?
- A . Confidentiality
- B . Controllability
- C . Non-repudiation
- D . Integrity
When configuring a security policy, a security policy can reference the address set or configure multiple destination IP addresses.
- A . True
- B . False
Which of the following is not a quintuple range?
- A . Source IP
- B . Source Mac
- C . Destination IP
- D . Destination port
Which of the following statement is wrong about the L2TP VPN of Client-Initialized?
- A . After the remote user access the Internet, the L2TP tunnel connection request can be initiated directly from the remote LNS through the client software.
- B . The LNS device receives the user’s L2TP connection request, and the user can be verified according to the username and password.
- C . LNS assign private IP addresses for remote users.
- D . The remote users do not need to install VPN client software
About the description of the vulnerability scan, which of the following is wrong?
- A . Vulnerability Scan is a technology based on network remote monitoring target network or host security performance vulnerability, which can be used to simulate attack experiments and security audits.
- B . Vulnerability scan is used to detect if the target host system has a vulnerability, generally a scan for a specific vulnerability for the target host
- C . Vulnerability scan is a passive prevention measures to effectively avoid hacker attack behavior
- D . Vulnerability scan can be used according to the results of ping scanning and port scanning
Regarding the firewall security strategy, which of the following is wrong?
- A . If the security policy is Permit, the discarded message will not be accumulated "hitting"
- B . When configuring the security policy name, you cannot reuse the same name.
- C . Adjust the order of the security policy, do not need to save the configuration file, take effect immediately
- D . Huawei USG series firewall security strategy entry cannot exceed 128
What protection levels are included in TCSEC standard? (Multiple Choice)
- A . Verification Protection
- B . Forced Protection
- C . Self-protection
- D . Passive Protection
Which one of the options below belong to the component of the PKI architecture? (Multiple Choice)
- A . Terminal entity
- B . Certificate certification authority
- C . Certificate registration authority
- D . Certificate Storage authority