Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Huawei H12-711_V4.0 Practice Exam with Questions & Answers

Questions 1

Which of the following statements are correct about the status of the firewall VGMP group?

Options:
A.

Initialize

B.

Active

C.

Load-balance

D.

Standby

Huawei H12-711_V4.0 Premium Access
Questions 2

As shown in the figure, packet obtaining software is used to obtain some packets on a terminal. Which of the following statements is correct about the obtained packet information?

H12-711_V4.0 Question 2

Options:
A.

The terminal sends a TCP connection establishment request to 192.168.1.1.

B.

The terminal sends a TCP connection termination request to 192.168.1.1.

C.

The terminal uses Telnet to log in to another device.

D.

The terminal uses HTTP to log in to another device.

Questions 3

What is correct in the following description of Security Alliance in IPSec?

There are two ways to set up an IPSec SA

Options:
A.

manual and IKE.

IPSec SA is uniquely identified by a triple.

B.

IPSec SA is a one-way logical connection, usually established in pairs (Inbound and Outbound).

C.

Security Alliance SA is a communication peer agreement for certain elements that describes how peers can communicate securely using secure services such as encryption.

Questions 4

When using passive mode to establish an FTP connection, the control channel uses port 20 and the data channel uses port 21.

Options:
A.

True

B.

False

Questions 5

In asymmetric encryption algorithms, only public keys can be used to encrypt data, and private keys are used to decrypt data. This process is irreversible.

Options:
A.

TRUE

B.

FALSE

Questions 6

Please classify the following security defenses into the correct classification.

H12-711_V4.0 Question 6

Options:
Questions 7

When logging in to the web UI through HTTPS, you need to specify a local certificate issued by a CA that the web browser trusts for the HTTPS client on the device. Because the web browser can verify the local certificate, this approach avoids malicious attacks and ensures secure logins of administrators.

Options:
A.

TRUE

B.

FALSE

Questions 8

3-tuple NAT allows external devices to proactively access internal PCs through translated addresses and ports. Even if no security policy is configured on the firewall, the firewall allows such access packets to pass through.

Options:
A.

TRUE

B.

FALSE

Questions 9

While working for a company, Tom receives an email with an attachment. Which of the following operations is correct?

Options:
A.

Checking the email's content. If the email is related to work, Tom can open and save the attachment

B.

Opening the attachment directly because email attachments do not affect information security

C.

Checking the email sender. If the email was sent from the company's mailbox, Tom can open and save the attachment

D.

Checking the sender and email information, and using antivirus software to check the attachment

Questions 10

As shown in the figure, what is the authentication range of the AH protocol in tunnel mode?

H12-711_V4.0 Question 10

Options:
A.

The3

B.

The4

C.

The2

D.

The1