Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

H12-711_V4.0 HCIA-Security V4.0 Exam Questions and Answers

Questions 4

Which of the following are application-layer protocols?

Options:

A.

DNS

B.

ARP

C.

Telnet

D.

HTTP

Buy Now
Questions 5

As shown in the figure, the process of AD single sign-on (querying the security log mode of AD server), please match the corresponding operation process.

H12-711_V4.0 Question 5

H12-711_V4.0 Question 5

Options:

Buy Now
Questions 6

Regarding the characteristics of the routing table, which of the following items is described correctly

Options:

A.

Port When a packet matches multiple entries in the routing table, it is forwarded based on the route entry with the largest metric.

B.

Port In the global routing table, there is at most one next hop to the same destination CIDR block.

C.

There may be multiple next hops in the global routing table to the same destination.

D.

Port When a packet matches multiple entries in the routing table, it is forwarded according to the longest mask.

Buy Now
Questions 7

Drag the warning level of the network security emergency response on the left into the box on the right, and arrange it from top to bottom in order of severity.[fill in the blank]*

H12-711_V4.0 Question 7

Options:

Buy Now
Questions 8

The traffic direction of a firewall is based on the zone priority. The _____ direction refers to the direction from a low-priority zone to a high-priority zone. Capitalize the first letter.

Options:

Buy Now
Questions 9

Which of the following statements is incorrect about L2TP?

Options:

A.

L2TP VPN is mainly used in remote office scenarios to provide remote intranet resource access for employees on business trips.

B.

L2TP VPN is a tunneling technology used to transmit PPP packets.

C.

PPP packets can be directly transmitted on the Internet.

D.

L2TP VPN can provide remote access services for employees on business trips, regardless of whether they access the Internet through traditional dial-up or Ethernet.

Buy Now
Questions 10

Which of the following is not an encryption algorithm in a VPN?

Options:

A.

The RIP

B.

AES

C.

3DES

D.

DES

Buy Now
Questions 11

Which of the following statements are correct about the PKI system structure?

Options:

A.

A PKI entity is an end user of PKI products or services. It can be an individual, an organization, a device such as a router or firewall, or a process running on a computer.

B.

CAs are classified into the root CA and subordinate CAs according to the hierarchy of CAs.

C.

A CA is a trusted entity that issues and manages digital certificates.

D.

A PKI system consists of three parts: entity, certificate authority, and certificate registration authority.

Buy Now
Questions 12

In the authentication policy of the firewall, _____ allows the user to not need to enter the user name and password, but can obtain the corresponding relationship between the user and the IP, so as to carry out policy management based on the user[fill in the blank]*

Options:

Buy Now
Questions 13

ARP man-in-the-middle attacks are a type of spoofing attack technique.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 14

Certificates saved in DER format may or may not contain a private key.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 15

IPSec VPN uses an asymmetric algorithm to calculate the ___ key to encrypt data packets.[fill in the blank]

Options:

Buy Now
Questions 16

In most cases, a user applies for a local certificate from a CA, and the CA approves the application and issues the certificate to the user.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 17

In the PKI certificate revocation process, a user needs to send a signed and encrypted email to the RA to apply for certificate revocation.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 18

A Web server is deployed in an enterprise intranet to provide Web access services to Internet users, and in order to protect the access security of the server, it should be divided into the _____ area of the firewall.

Options:

Buy Now
Questions 19

As shown, in transmission mode, which of the following locations should the AH header be inserted in?

H12-711_V4.0 Question 19

Options:

A.

3

B.

2

C.

1

D.

4

Buy Now
Questions 20

Which of the following authentication modes are supported by AAA?

Options:

A.

RADIUS authentication

B.

No authentication

C.

HWTACACS authentication

D.

Local authentication

Buy Now
Questions 21

When logging in to the web UI through HTTPS, you need to specify a local certificate issued by a CA that the web browser trusts for the HTTPS client on the device. Because the web browser can verify the local certificate, this approach avoids malicious attacks and ensures secure logins of administrators.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 22

Options:

A.

1

B.

2

C.

3

D.

4

Buy Now
Questions 23

During the process of establishing IPSec VPN between peers FW_A and FW_B, two types of security associations need to be established in two stages. In the first stage, _____ is established to verify the identity of the peers.[fill in the blank]*

Options:

Buy Now
Questions 24

Which of the following statements are incorrect about the differences between routers and Layer 2 switches?

Options:

A.

By default, routers can isolate broadcast domains but not collision domains.

B.

Switches flood broadcast packets.

C.

Routers forward broadcast packets.

D.

By default, switches can isolate collision domains but not broadcast domains.

Buy Now
Questions 25

Which of the following types of malicious code on your computer includes?

Options:

A.

Oral virus

B.

Trojan horses

C.

Port SQL injection

D.

Oral spyware

Buy Now
Questions 26

The keys used by the IPSec encryption and authentication algorithms can be configured manually or dynamically negotiated via the ____ protocol. (abbreviation, all uppercase).

Options:

Buy Now
Questions 27

Which of the following protocols is a multichannel protocol?

Options:

A.

The Telnet

B.

THE HITP

C.

FTP

D.

The SSH

Buy Now
Questions 28

Using the ___ method of the Web proxy, the virtual gateway will encrypt the real URL that the user wants to access, and can adapt to different terminal types.[fill in the blank]*

Options:

Buy Now
Questions 29

Huawei Firewall only supports the inter-domain persistent connection function for TCP packets.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 30

Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution. 1. Inhibition stage, 2. recovery phase, 3. Detection stage, 4. eradication phase[fill in the blank]*

Options:

Buy Now
Questions 31

Which of the following protocols is a file transfer protocol?

Options:

A.

Mouth POP3

B.

Mouth NFS

C.

Mouth HITP

D.

Mouth DFTP

Buy Now
Questions 32

As shown in the figure, the administrator needs to test the network quality of the 20.0.0/24 CIDR block to the 40.0.0/24 CIDR block on Device B, and the device needs to send large packets for a long time to test the network connectivity and stability.

H12-711_V4.0 Question 32

Options:

A.

tracert -a 20.0.0.1 -f 500 -q 9600 40.0.0.2

B.

ping -a 20.0.0.1 -c 500 -s 9600 40.0.0.2

C.

ping -s 20.0.0.1 -h 500-f 9600 40.0.0.2

D.

tracert -a 20.0.0.1 -c 500 -w 9600 40.0.0.2

Buy Now
Questions 33

Match the following user categories and authentication modes.

H12-711_V4.0 Question 33

Options:

Buy Now
Questions 34

Both digital envelopes and digital signatures guarantee data security and verify the origin of data.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 35

While working for a company, Tom receives an email with an attachment. Which of the following operations is correct?

Options:

A.

Checking the email's content. If the email is related to work, Tom can open and save the attachment

B.

Opening the attachment directly because email attachments do not affect information security

C.

Checking the email sender. If the email was sent from the company's mailbox, Tom can open and save the attachment

D.

Checking the sender and email information, and using antivirus software to check the attachment

Buy Now
Questions 36

What is correct about the following description of device management in the operating system?

Options:

A.

The main task of port device management is to complete the I/O requests made by users and classify I/O devices for users.

B.

Whenever a process makes an I/O request to the system, as long as it is secure, the device allocator will assign the device to the process according to a certain policy.

C.

Device management can virtualize a physical device into multiple logical devices through virtualization technology, providing multiple user processes to use.

D.

In order to alleviate the problem of speed mismatch between CPU and I/O devices and improve the parallelism of CPU and I/O devices, in modern operating systems, almost all I/O devices are exchanging numbers with processors

Buffers are used at all times.

Buy Now
Questions 37

A three-way handshake is required to establish a TCP connection, and a four-way handshake is required to end a TCP connection.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 38

In the TCP/P protocol core, which of the following protocols works at the application layer?

Options:

A.

IGMP

B.

ICMP

C.

RIP

D.

ARP

Buy Now
Questions 39

Digital envelope technology means that the sender uses the receiver's public key to encrypt the data, and then sends the ciphertext to the receiver

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 40

When IKEv1 negotiation phase 1 uses the aggressive mode, only three messages are used. Which of the following is the function of message 3?

Options:

A.

Exchanges Diffie-Hellman public values, necessary auxiliary information, and identity information.

B.

Negotiates IKE proposals.

C.

Enables the responder to send identity information to the initiator for authentication.

D.

Enables the responder to authenticate the initiator.

Buy Now
Questions 41

Which of the following attack methods is to construct special SQL statements and submit sensitive information to exploit program vulnerabilities

Options:

A.

Buffer overflow attack

B.

SQL injection attacks

C.

Worm attack

D.

Phishing attacks

Buy Now
Questions 42

3-tuple NAT allows external devices to proactively access internal PCs through translated addresses and ports. Even if no security policy is configured on the firewall, the firewall allows such access packets to pass through.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 43

Devices that need to provide network services externally, such as WWW servers and FTP servers, can be placed in the DMZ.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 44

What is correct in the following description of Security Alliance in IPSec?

There are two ways to set up an IPSec SA

Options:

A.

manual and IKE.

IPSec SA is uniquely identified by a triple.

B.

IPSec SA is a one-way logical connection, usually established in pairs (Inbound and Outbound).

C.

Security Alliance SA is a communication peer agreement for certain elements that describes how peers can communicate securely using secure services such as encryption.

Buy Now
Questions 45

The following description of asymmetric encryption algorithms, which item is wrong?

Options:

A.

Compared with symmetric encryption algorithms, the security factor is higher.

B.

Encryption is faster than symmetric encryption algorithms.

C.

Public keys are generally disclosed to users.

D.

Asymmetric encryption algorithms are a pair of keys, divided into public and private keys.

Buy Now
Exam Code: H12-711_V4.0
Exam Name: HCIA-Security V4.0 Exam
Last Update: Apr 23, 2026
Questions: 153

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99