Huawei H12-711_V4.0-ENU HCIA-Security V4.0 Exam Online Training
Huawei H12-711_V4.0-ENU Online Training
The questions for H12-711_V4.0-ENU were last updated at Jan 12,2025.
- Exam Code: H12-711_V4.0-ENU
- Exam Name: HCIA-Security V4.0 Exam
- Certification Provider: Huawei
- Latest update: Jan 12,2025
Which of the following measures can prevent IP spoofing attacks?
- A . Filter specific ports on the border firewall
- B . Set up a route to a specific IP on the border firewall
- C . Deploy target IP address filtering on the border router
- D . Source IP address filtering on the border firewall
Intrusion prevention equipment can effectively defend against which of the following attacks?
- A . Transport layer
- B . Application layer
- C . Network layer
- D . Physical layer
Some applications, such as Oracle database applications, have no data flow transmission for a long time, causing the firewall session connection to be interrupted, resulting in business interruption. Which of the following is the optimal solution?
- A . Configure a long connection for a certain business
- B . Enable ASPF function
- C . Optimize security policies
- D . Enable shard caching
Vulnerabilities, also called vulnerabilities, refer to defects and deficiencies in computer systems in specific matters of hardware, software, protocols, or system security policies.
Which of the following descriptions of vulnerability characteristics is incorrect?
- A . A vulnerability is a security risk that exposes computers to hacker attacks.
- B . The vulnerability can be exploited remotely.
- C . The vulnerability cannot be patched
- D . Vulnerabilities are unknown beforehand and discovered afterward.
Electronic evidence preservation is directly related to the legal validity of evidence. Only preservation that complies with legal procedures can ensure its authenticity and reliability. Which of the following is not an evidence preservation technology?
- A . Encryption technology
- B . Digital certificate technology
- C . Digital signature technology
- D . Message mark tracking technology
If there is an incident of foreign criminals using the Internet to steal our country’s national secrets, what kind of early warning will the country activate?
- A . Orange Alert
- B . Yellow Alert
- C . Blue Alert
- D . Red Alert
When configuring a GRE Tunnel interface, the Destination address generally refers to which of the following parameters?
- A . Local tunnel interface IP address
- B . Local external network export IP address
- C . Peer’s external network egress IP address
- D . Peer tunnel interface IP address
When a network security incident occurs, investigate intrusions, viruses or Trojans, and patch and strengthen the host.
Which stage of network security emergency response does the above action belong to?
- A . Recovery phase
- B . Detection phase
- C . Eradication phase
- D . Inhibition stage
Regarding IKE SA, which of the following descriptions is incorrect?
- A . IKE SA is two-way
- B . IKE is an application layer protocol based on UDP
- C . IKE SA serves IPsec SA
- D . The encryption algorithm used in user data packets is determined by IKE SA.