Leads4pass > Huawei > HCIA-Security > H12-711 > H12-711 Online Practice Questions and Answers

H12-711 Online Practice Questions and Answers

Questions 4

Symmetric encryption algorithm encryption key and decryption key are the same.

A. True

B. False

Buy Now
Questions 5

L2TP user authentication statement is correct:

A. In the LAC can authenticate the user

B. The LNS can authenticate the user

C. After LAC authenticates the user,LNS can authenticate the user again

D. All other options are on the argument

Buy Now
Questions 6

SSL and IPSec security protocols, encryption and authentication. However,SSL protocol only on the application of both data communications transmission is encrypted,but not all of the data from one host to another is encrypted(such as TCP / IP and application layer protocol).

A. True

B. False

Buy Now
Questions 7

In ipsec vpn configuration if you use pre-shared key authentication mode,you can choose whether to configure the key for the end,but if you configure a key,the key must be the same on both sides.

A. True

B. False

Buy Now
Questions 8

Huawei firewall natoutboundwhich supports the following scenario?(Choose three)

A. One address translation

B. -Many address translation

C. -Many address translation

D. Many-to- address translation

Buy Now
Questions 9

Which of the following addresses can be used to manage the SVN web address?(Choose three)

A. Interface address

B. Sub- interface address

C. Sub- IP address of the interface

D. loopback address

Buy Now
Questions 10

Asymmetric encryption algorithm encryption key and decryption key are not the same.

A. True

B. False

Buy Now
Questions 11

In the inter- domain packet filtering firewall,the following is not a direction (Outbound)?

A. Data from the DMZ zone to the Untrust zone flow

B. Data from the Trust zone to the DMZ zone flow

C. Data from the Trust zone to the Untrust zone flow

D. Data from the Trust zone to the Local area streams

Buy Now
Questions 12

In network security,interruption means an attacker to compromise a network system resources,making it become invalid or useless.This is() attack?

A. Availability

B. Confidentiality

C. Integrity

D. Truth

Buy Now
Questions 13

Following the agreement,the work at the network layer have?(Choose two)

A. ICMP

B. IGMP

C. FTP

D. TELNET

Buy Now
Exam Code: H12-711
Exam Name: HCIA-Security V4.0
Last Update: Oct 19, 2024
Questions: 363
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99