최신 H12-711_V4.0 무료덤프 - Huawei HCIA-Security V4.0
Usually we divide servers into two categories: general servers and functional servers. Which of the following options meets this classification standard?
정답: D
TCP needs to complete the three-way handshake process when establishing a connection, and needs to wave four times when ending the session.
정답: A
After the company network administrator configured dual-machine hot backup, he used commands to check VRRP and other information and obtained the following information.
HRP_M<FWA>
Gigabit Ethernet 0/0/3 Virtual Router 1
State: Master
Virtual IP: 10.3.0.3
Master IP: 10.3.0.1
Priority Run: 120
Priority Config: 100
Master Priority: 120
Preempt: YES
Delay Time: 0s
Timer Run: 60s
Timer Config: 60s
Auth type: NONE
Virtual MAC: 0000-5e00-0101
Check TIL: YES
Config type: vgmp Vrrp
Backup-forward: disabled
Create time: 2020-03-17 17: 35: 54UTC+08: 02
Last change time: 2020-03-22 16: 01: 56 UTC+08: 02
What is the view command he types in the blank space ()
HRP_M<FWA>
Gigabit Ethernet 0/0/3 Virtual Router 1
State: Master
Virtual IP: 10.3.0.3
Master IP: 10.3.0.1
Priority Run: 120
Priority Config: 100
Master Priority: 120
Preempt: YES
Delay Time: 0s
Timer Run: 60s
Timer Config: 60s
Auth type: NONE
Virtual MAC: 0000-5e00-0101
Check TIL: YES
Config type: vgmp Vrrp
Backup-forward: disabled
Create time: 2020-03-17 17: 35: 54UTC+08: 02
Last change time: 2020-03-22 16: 01: 56 UTC+08: 02
What is the view command he types in the blank space ()
정답:
display vrrp
Internet user single sign-on function. Users authenticate directly to the AD server. The device does not interfere with the user authentication process. The AD monitoring service needs to be deployed in the USG device to monitor the authentication information of the AD server.
정답: A
Which of the following operations can be performed on data in a security posture? (Multiple Choice)
정답: A,C
Regarding Huawei routers and switches, which of the following statements are correct? (Multiple Choice)
정답: B,C,D
Which of the following login methods can be used by users to configure the firewall for the first time?
(Multiple Choice)
(Multiple Choice)
정답: A,C
Compared with packet filtering firewalls, proxy firewalls can control the session process and are more secure.
정답: A
In the cyber attack chain (Cyber Kil Chain), which of the following options belong to the steps in the implementation of the attack? (Multiple Choice)
정답: A,B,C,D
Network administrators can collect data that needs to be analyzed on network devices through packet capture, port mirroring or logs.
정답: A
Regarding the deployment method of Huawei IPS, which of the following options are incorrectly described? (Multiple Choice)
정답: A,C
SSL VPN is a VPN technology that realizes remote secure access. Encryption only takes effect on the application layer, and users do not need to use a VPN client, so it has wide applicability.
정답: A
() is an "indirect" intrusion attack. This attack mode uses various technical means to virtually place a computer controlled by the intruder between two communicating computers in a network connection.
정답:
Man-in-the-middle attack
NAPT can map different internal addresses to the same public address to achieve many-to-one address translation.
정답: A
Which of the following is not a function that can be achieved by public key technology?
정답: B