DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Huawei H12-711 Exam Questions and Answers, Huawei HCIA-Security | SPOTO

SPOTO's latest exam dumps on the homepage, with a 100% pass rate! SPOTO delivers authentic Cisco CCNA, CCNP study materials, CCIE Lab solutions, PMP, CISA, CISM, AWS, and Palo Alto exam dumps. Our comprehensive study materials are meticulously aligned with the latest exam objectives. With a proven track record, we have enabled thousands of candidates worldwide to pass their IT certifications on their first attempt. Over the past 20+ years, SPOTO has successfully placed numerous IT professionals in Fortune 500 companies.
Take other online exams

Question #1
Wildcard mask and subnet mask formats are similar, but values have different meanings, in wildcard mask, 1 indicates that the corresponding IP address bits need to compare, 0 indicates that the corresponding IP address bits to ignore comparisons.
A. TRUEcorrect
B. FALSEcorrect
View answer
Correct Answer: AB
Question #2
Which of the following is not an encryption algorithm in a VPN?
A. AThe RIP
B. BAES
C. C3DES
D. DDES
View answer
Correct Answer: A
Question #3
When configuring a security policy, a security policy can reference the address set or configure multiple destination IP addresses.
A. Truecorrect
B. False
View answer
Correct Answer: A
Question #4
In the GRE configuration environment, under the Tunnel interface mode, Destination address generally refers to:
A. the Tunnel interface IP addresscorrect
B. home terminal outer net export IP address
C. opposite terminal outer net Interface IP addresscorrect
D. the Tunnel interface IP address
View answer
Correct Answer: AC
Question #5
When configuring NAT Server on the USG series firewall, the server-map table will be generated. Which of the following does not belong in the table?
A. Destination IP
B. Destination port number
C. Agreement number
D. Source IPcorrect
View answer
Correct Answer: D
Question #6
Data Analysis Technology is to find, match keywords or key phrases, and analyze the correlation of time in data streams or information streams that have been obtained. Which of the following does not belong to evidence analysis technology?
A. Password decipherment, data decryption technology
B. File Digital Summary Analysis Technology
C. Exploring the technology of the connection between different evidence
D. Spam tracking technologycorrect
View answer
Correct Answer: D
Question #7
About AH and ESP security protocols, which of the following statements are correct? (Multiple Choice)
A. AH can provide the functions of encryption and verificationcorrect
B. ESP can provide the functions of encryption and verificationcorrect
C. AH's protocol number is 51correct
D. ESP's protocol number is 51
View answer
Correct Answer: ABC
Question #8
Which of the following isP2DRThe core part of the model?
A. PolicyStrategy
B. Protectionprotection
C. Detectiondetect
D. Responseresponse
View answer
Correct Answer: A
Question #9
At what layer does packet filtering technology in the firewall filter packets?
A. Transport layer
B. Network layer
C. Physical layer
D. Data link layer
View answer
Correct Answer: B
Question #10
In addition to supporting built-in Portal authentication, firewall also supports custom Portal authentication, and does not require separate deployment of external Portal servers when using custom Portal authentication.
A. True
B. Falsecorrect
View answer
Correct Answer: B
Question #11
ASPF technology enables the firewall to support multi-channel protocols such as FTP, at the same time can also formulate the corresponding security strategy for complex applications.
A. TRUEcorrect
B. FALSE
View answer
Correct Answer: A
Question #12
Which of the following types of encryption technology can be divided into? (multiple choice)
A. Symmetric encryption
B. Symmetric encryption
C. fingerprint encryption
D. data encryption
View answer
Correct Answer: AB
Question #13
Which attack below does not belong to a special packet attack?
A. ICMP redirection packet attack
B. ICMP unreachable packet attack
C. IP address scan attackcorrect
D. Super ICMP Packet Attack
View answer
Correct Answer: C
Question #14
Regarding the characteristics of the routing table, which of the following items is described correctly
A. Port When a packet matches multiple entries in the routing table, it is forwarded based on the route entry with the largest metric
B. Port In the global routing table, there is at most one next hop to the same destination CIDR block
C. There may be multiple next hops in the global routing table to the same destination
D. Port When a packet matches multiple entries in the routing table, it is forwarded according to the longest mask
View answer
Correct Answer: ACD
Question #15
Which of the following is the correct description of windows log event type? (Multiple Choice)
A. A warning event is a successful operation event of an application, driver, or service
B. Error events usually refer to the loss of function and data
C. When the disk space is insufficient, it will be recorded as an "information event"correct
D. Failure audit event refers to a failed audit security login attempt, such as a failure when the user view accesses the network drive is logged as a failed audit event
View answer
Correct Answer: BCD
Question #16
The following features which option does not belong to AH can realize?
A. resistance to prevent replaycorrect
B. data authentication
C. the confidentialitycorrect
D. data integrity test
View answer
Correct Answer: AC
Question #17
Which of the following types of attacks does the DDoS attack belong to?
A. Snooping scanning attack
B. Malformed packet attack
C. Special message attack
D. Traffic attackcorrect
View answer
Correct Answer: D
Question #18
When the firewall hard disk is on the throne, which of the following statement about the firewall log is correct?
A. Administrators can announce the content log to view the detection and defense record of network threats
B. Administrators can understand the user's security risk behavior and the cause of the alarm or blocking reason via threat logs
C. Administrators know the user's behavior, the keyword of the exploitation, and the effectiveness of the audit policy configuration through user activity logs
D. Administrators can use the security policy in which traffic hits in the policy, for fault location when there is a problem
View answer
Correct Answer: D
Question #19
Caesar Code is primarily used to encrypt data by using a stick of a specific specification.
A. True
B. Falsecorrect
View answer
Correct Answer: B
Question #20
Regarding the description of the Windows log event type, which of the following is correct? (Multiple Choice)
A. Warning event refers to an event that the application, driver or service is successful
B. Error events usually refer to the loss of functionality and data
C. When the disk space is insufficient, it will be recorded as a "information event"
D. Failure audit event refers to a failure of security login attempts, such as failure when a user view accesses a network drive, is recorded as a failure audit event
View answer
Correct Answer: ABD
Question #21
Which of the following is a remote authentication method? (Multiple Choice)
A. RADIUScorrect
B. Local
C. HWTACACScorrect
D. LLDP
View answer
Correct Answer: AC
Question #22
The following description of the contents of the each stage of the SSL handshake protocol, which is wrong?
A. the client sends client_Hello message, the server response Server_Hello newscorrect
B. the server sends Server_Hello and then wait for the client sends the messagecorrect
C. after the client receives a series of messages sent by the server and digest, send Client Key Exchange message to the server
D. the client and the server send ChangeCipherSpec and finished messages to each other
View answer
Correct Answer: AB
Question #23
Data analysis technology is to find and match keywords or key phrases in the acquired data stream or information flow, and analyze the correlation of time. Which of the following is not an evidence analysis technique?
A. Password deciphering, data decryption technology
B. Document Digital Abstract Analysis Technology
C. Techniques for discovering the connections between different evidences
D. Spam tracking technologycorrect
View answer
Correct Answer: D
Question #24
Which of the following options arePKIentity orientationCAHow to apply for a local certificate? (multiple choice)
A. Asymmetric encryption algorithm
B. Stream Encryption Algorithm
C. hash algorithm
D. Symmetric encryption algorithm
View answer
Correct Answer: AD
Question #25
"Be good at observation" and "keep suspicion" can help us better identify security threats in the online world.
A. Truecorrect
B. False
View answer
Correct Answer: A
Question #26
The process of electronic forensics includes: protecting the site, obtaining evidence, preserving evidence, identifying evidence, analyzing evidence, tracking and presenting evidence.
A. False
B. True
View answer
Correct Answer: B
Question #27
In tunnel encapsulation mode, there is no need to have the routing to the destination private network segment, because the data will reseal using the new IP header to find routing table.
A. True
B. Falsecorrect
View answer
Correct Answer: B
Question #28
As shown, when configuring the point-to-multipoint scenarios, the headquarters network segment is 10.1.1.0/24, the segment of branch 1 is 10.1.2.0/24, of branch 2 is 10.1.3.0/24. About the protected data flow configuration which defined by headquarters and branch offices, which of the following combinations can be the full matched requirements?
A. 2
B. 2 3 5
C. 2 4 6
D. 4 5 6
View answer
Correct Answer: B
Question #29
Web redirection password authentication function, only the user for the purpose of the port is 80 HTTP business visit, the system only support the "Redirect" to the authentication page for session authentication.
A. TRUEcorrect
B. FALSEcorrect
View answer
Correct Answer: AB
Question #30
Which of the following are the key features of the state inspection firewall include?
A. he processing speed is slow
B. ollow-up packet processing performance is excellent
C. an only detect network layer
D. o the packet filtering detection to each packet
View answer
Correct Answer: B

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: