Huawei H12-711_V4.0-ENU HCIA-Security V4.0 Exam Online Training
Huawei H12-711_V4.0-ENU Online Training
The questions for H12-711_V4.0-ENU were last updated at Jan 12,2025.
- Exam Code: H12-711_V4.0-ENU
- Exam Name: HCIA-Security V4.0 Exam
- Certification Provider: Huawei
- Latest update: Jan 12,2025
Which of the following descriptions about the VGMP group is correct?
- A . The priority of VRRP in the VGMP group will change as VGMP changes.
- B . VGMP is a protocol used to control the status of VRRP groups
- C . The default priority of USG6000 is 65000
- D . The default priority of USG9000 is 45000
How many bits are the keys used by DES encryption technology, and how many bits are used by 3DES encryption technology.
- A . 56168
- B . 64168
- C . 64128
- D . 56128
Which of the following does not include the trigger authentication method for firewall access user authentication?
- A . MPLS VPN
- B . SSL VPN
- C . IPsec VPN
- D . L2TP VPN
Regarding Windows logs, which of the following descriptions is incorrect?
- A . System logs are used to record events generated by operating system components, mainly including crashes and data of drivers, system components and application software.
- B . The system log of windows server 2008 is stored in Application.evtx
- C . Application logs contain events recorded by applications or system programs, mainly recording events related to program operation.
- D . The security log of windows server 2008 is stored in security.evtx
Which of the following is not a stand-alone anti-virus technology?
- A . Configure anti-virus technology on the network firewall
- B . Use virus detection tools
- C . Patch the system
There are various security threats during the use of the server.
Which of the following options is not a server security threat?
- A . Natural disaster
- B . DDos attack
- C . Hacker attack
- D . Malicious programs
Which of the following descriptions of common hashing algorithms is incorrect?
- A . Hashing algorithms can transform inputs of any length into fixed-length outputs.
- B . SHA-1 has faster calculation speed and higher security than the MD5 algorithm.
- C . The SM3 algorithm is a domestic encryption algorithm. It is used for digital signature and verification, message authentication code generation and verification, and random number generation in cryptographic applications. It can meet the security needs of a variety of cryptographic applications.
- D . SHA-2 is an enhanced version of SHA-1, and its security performance is much higher than SHA-1
In IPsec VPN transmission mode, which part of the data packet is encrypted?
- A . Network layer and upper layer data messages
- B . Original IP header
- C . New IP header
- D . Transport layer and upper layer data messages
Which of the following is an "information destruction incident" in the classification of network security incidents?
- A . Software and hardware failure
- B . Information counterfeiting
- C . Network scanning plagiarism
- D . Listen to Trojan attacks
Which of the following options is not an identifier of IPsec SA?
- A . SPI
- B . Destination address
- C . Source address
- D . Security Protocol