Huawei H12-711_V3.0-ENU HCIA-Security V3.0 Online Training
Huawei H12-711_V3.0-ENU Online Training
The questions for H12-711_V3.0-ENU were last updated at Feb 02,2025.
- Exam Code: H12-711_V3.0-ENU
- Exam Name: HCIA-Security V3.0
- Certification Provider: Huawei
- Latest update: Feb 02,2025
"Be good at observation" and "keep suspicion" can help us better identify security threats in the online world.
- A . True
- B . False
In tunnel encapsulation mode, there is no need to have the routing to the destination private network segment, because the data will reseal using the new IP header to find routing table.
- A . True
- B . False
About the description of the Windows firewall, which of the following statements are correct? (Multiple Choice)
- A . Windows firewalls can only allow or prohibit preset programs or features and programs installed on the system, and cannot customize the release rules in accordance with protocols or port numbers.
- B . Windows firewall not only allows or prohibits preset programs or features and programs installed on the system, but also support to customize the release rules in accordance with protocols or port numbers.
- C . If in the process of setting up the Windows firewall, the Internet cannot be accessed, you can quickly restore the firewall to the initial state using the restored default value function.
- D . Windows firewall can change the notification rule in the closed state
Regarding the investigation and evidence collection, which of the following statement is correct?
- A . Evidence is not necessarily needed in an investigation
- B . Evidence acquired by eavesdropping is also effective
- C . During all investigation and evidence, preferably with law enforcement involved.
- D . Document evidence is required in computer crimes
Regarding the online user management, which of the following is incorrect?
- A . Each user group can include multiple users and user groups
- B . Each user group can belong to multiple parent user groups
- C . The system has a default user group by default, and it is also the system default authentication domain.
- D . Each user at least belongs to one user group, or it can belong to multiple user groups.
Which of the following is not used by the Detection link in the P2DR model?
- A . Real-time monitoring
- B . Detection
- C . Alarm
- D . Close service
Which item below is not a Linux operating system?
- A . CentOS
- B . RedHat
- C . Ubuntu
- D . MAC OS
In some scenarios, it is necessary to convert the source IP address, but also convert the destination IP address, which technology of the following is used by these scenarios?
- A . Two-way NAT
- B . Source Nat
- C . NAT-Server
- D . Nat Alg
Which protocols below can guarantee the confidentiality of data transmission? (Multiple Choice)
- A . Telnet
- B . SSH
- C . FTP
- D . HTTPS
On the USG series firewall, after configuring the web redirection, the the authentication page cannot pop up. Which item below does not belong to the cause?
- A . Unconfigured authentication policy or authentication policy configuration error
- B . Unenable WEB authentication function
- C . Browser SSL version is not matched with the firewall authentication page SSL version
- D . The port number of the authentication page service is set to 8887