Spring Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

H12-711_V4.0 HCIA-Security V4.0 Exam Questions and Answers

Questions 4

In most cases, a user applies for a local certificate from a CA, and the CA approves the application and issues the certificate to the user.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 5

Sub-interfaces can be created on GE0/0/1 of a firewall. The sub-interfaces can be added to different VLANs, but cannot be added to security zones.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 6

Which of the following statements is incorrect about Portal authentication?

Options:

A.

In Portal authentication, users can be authenticated only on the firewall authentication page.

B.

In session authentication, users do not initiate identity authentication. Instead, they access the HTTP service first and are authenticated during the access. Service access is allowed only after authentication.

C.

In user-initiated authentication, users proactively initiate authentication and can access network resources only after authentication.

D.

The built-in Portal authentication triggering modes include session authentication and user-initiated authentication.

Buy Now
Questions 7

Which of the following protocols are transport layer protocols?

Options:

A.

UDP

B.

FTP

C.

TCP

D.

DHCP

Buy Now
Questions 8

As shown in the figure, packet obtaining software is used to obtain some packets on a terminal. Which of the following statements is correct about the obtained packet information?

H12-711_V4.0 Question 8

Options:

A.

The terminal sends a TCP connection establishment request to 192.168.1.1.

B.

The terminal sends a TCP connection termination request to 192.168.1.1.

C.

The terminal uses Telnet to log in to another device.

D.

The terminal uses HTTP to log in to another device.

Buy Now
Questions 9

During the process of establishing IPSec VPN between peers FW_A and FW_B, two types of security associations need to be established in two stages. In the first stage, _____ is established to verify the identity of the peers.[fill in the blank]*

Options:

Buy Now
Questions 10

As shown in the figure, which of the following shows the authentication range of ESP in transport mode?

H12-711_V4.0 Question 10

Options:

A.

4

B.

1

C.

3

D.

2

Buy Now
Questions 11

According to the level protection requirements, which of the following behaviors belong to the scope of information security operation and maintenance management? ( )*

Options:

A.

Participate in information security training

B.

Backup or restore data

C.

Develop an emergency response plan

D.

Security hardening of the host

Buy Now
Questions 12

Regarding the characteristics of the routing table, which of the following items is described correctly

Options:

A.

Port When a packet matches multiple entries in the routing table, it is forwarded based on the route entry with the largest metric.

B.

Port In the global routing table, there is at most one next hop to the same destination CIDR block.

C.

There may be multiple next hops in the global routing table to the same destination.

D.

Port When a packet matches multiple entries in the routing table, it is forwarded according to the longest mask.

Buy Now
Questions 13

In hot standby networking, the heartbeat interfaces of the two firewalls must be directly connected.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 14

Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution. 1. Inhibition stage, 2. recovery phase, 3. Detection stage, 4. eradication phase[fill in the blank]*

Options:

Buy Now
Questions 15

Which of the following is not an advantage of symmetric encryption algorithms?

Options:

A.

Suitable for encrypting large amounts of data

B.

Low overhead

C.

Good scalability

D.

High efficiency

Buy Now
Questions 16

Which of the following is the correct sequence for incident response management

1. Detection 2 Report 3 Mitigation 4 Lessons learned 5 Fix 6 Recovery 7 Response

Options:

A.

1- > 3- > 2- > 7- > 6- > 5- > 4

B.

1- > 7- > 3- > 2- > 6- > 5- > 4

C.

1- > 3- > 2- > 7- > 5- > 6- > 4

D.

1- > 2- > 3- > 7- > 6- > 5- > 4

Buy Now
Questions 17

Under normal circumstances, the Emai1 protocols we often talk about include ____, POP3, and SMTP.[fill in the blank]*

Options:

Buy Now
Questions 18

While working for a company, Tom receives an email with an attachment. Which of the following operations is correct?

Options:

A.

Checking the email's content. If the email is related to work, Tom can open and save the attachment

B.

Opening the attachment directly because email attachments do not affect information security

C.

Checking the email sender. If the email was sent from the company's mailbox, Tom can open and save the attachment

D.

Checking the sender and email information, and using antivirus software to check the attachment

Buy Now
Questions 19

A VRRP group has three states: Initialize, Master, and Backup.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 20

Which of the following is the numbering range of Layer 2 ACLs?

Options:

A.

The 3000~3999

B.

The 4000~4999

C.

The 1000~1999

D.

@2000~2999

Buy Now
Questions 21

Which of the following are disadvantages of the packet filtering firewall?

Options:

A.

The software implementation limits the processing speed, making the firewall vulnerable to DoS attacks.

B.

An attacker can set the IP address of his/her host to an IP address permitted by a packet filter. In this way, packets from the attacker's host can easily pass through the packet filter.

C.

Static ACL rules cannot meet dynamic security requirements.

D.

The connection status list is dynamically managed.

Buy Now
Questions 22

Arrange the following processes in the correct order based on the PKI lifecycle.

H12-711_V4.0 Question 22

Options:

Buy Now
Questions 23

When forwarding a TCP, UDP, or ICMP packet, the firewall needs to query the session table in order to determine the connection to which the packet belongs and take corresponding measures.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 24

The network environment is becoming more and more complex, and network security incidents occur frequently. While accelerating the construction of informatization, enterprises must not only resist external attacks, but also prevent internal management personnel from being involved in data leakage and operation and maintenance accidents due to operational errors and other issues. Which of the following options might reduce operational risk?

Options:

A.

According to the administrator configuration, the O & M user corresponds to the background resource account, and restricts the unauthorized use of the account. mouth Based on the password security policy, the O & M security audit system automatically modifies the password of the background resource account at regular intervals.

B.

Each system is independently operated, maintained and managed, and the access process is not audited and monitored.

C.

Oral Each department system is independently authenticated and uses a single static password for authentication.

Buy Now
Questions 25

Which of the following attributes are contained in the distinguished name DN in LDAP?

Options:

A.

CN

B.

DIT

C.

DC

D.

OU

Buy Now
Questions 26

Which of the following characteristics does a denial-of-service attack include?

Options:

A.

Unauthorized tampering of the mouth

B.

Unauthorized access to the mouth

C.

Unauthorized activation of the mouth

D.

Unauthorized destruction of the mouth

Buy Now
Questions 27

Social engineering is a means of harm such as deception, harm, etc. through psychological traps such as psychological weaknesses, instinctive reactions, curiosity, trust, and greed of victims ( )

Options:

A.

TURE

B.

False

Buy Now
Questions 28

Which of the following types of malicious code on your computer includes?

Options:

A.

Oral virus

B.

Trojan horses

C.

Port SQL injection

D.

Oral spyware

Buy Now
Questions 29

Which of the following statements are correct about the PKI system structure?

Options:

A.

A PKI entity is an end user of PKI products or services. It can be an individual, an organization, a device such as a router or firewall, or a process running on a computer.

B.

CAs are classified into the root CA and subordinate CAs according to the hierarchy of CAs.

C.

A CA is a trusted entity that issues and manages digital certificates.

D.

A PKI system consists of three parts: entity, certificate authority, and certificate registration authority.

Buy Now
Questions 30

Please match the following information security risks to information security incidents one by one.[fill in the blank]*

physical security risk Enterprise server permissions are loosely set

Information Security Management Risk Infected Panda Burning Incense

Information Access Risk Fire destroyed equipment in computer room

application risk Talk to people about leaking company secrets

Options:

Buy Now
Questions 31

IKE SA is a one-way logical connection, and only one IKE SA needs to be established between two peers.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 32

Which of the following operating modes does NTP support?

Options:

A.

Mouth peer mode

B.

Mouth client/server mode

C.

Mouth broadcast mode

D.

Mouth multicast mode

Buy Now
Questions 33

Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution.[fill in the blank]*

H12-711_V4.0 Question 33

Options:

Buy Now
Questions 34

Which of the following authentication modes are supported by AAA?

Options:

A.

RADIUS authentication

B.

No authentication

C.

HWTACACS authentication

D.

Local authentication

Buy Now
Questions 35

Huawei Firewall only supports the inter-domain persistent connection function for TCP packets.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 36

As shown, in transmission mode, which of the following locations should the AH header be inserted in?

H12-711_V4.0 Question 36

Options:

A.

3

B.

2

C.

1

D.

4

Buy Now
Questions 37

Using the ___ method of the Web proxy, the virtual gateway will encrypt the real URL that the user wants to access, and can adapt to different terminal types.[fill in the blank]*

Options:

Buy Now
Questions 38

For which of the following parameters can the packet filtering firewall filter?

Options:

A.

Port packet payload

B.

IP address of the port source destination

C.

The MAC address of the source destination

D.

Port number and protocol number of the port source

Buy Now
Questions 39

When IPSec VPN uses tunnel mode to encapsulate packets, which of the following is not within the encryption scope of the ESP security protocol?

Options:

A.

ESP Header

B.

TCP Header

C.

Raw IP Header

D.

ESP Tail

Buy Now
Questions 40

The trigger modes of the built-in Portal authentication in the firewall include pre-authentication and ____ authentication[fill in the blank]*

Options:

Buy Now
Questions 41

Which of the following statements is correct about security zones on a Huawei firewall?

Options:

A.

An interface on a firewall can belong to multiple zones.

B.

The default zones on a firewall can be deleted.

C.

Different security zones on a firewall have the same default security level.

D.

Different interfaces on a firewall can be in the same zone.

Buy Now
Questions 42

Server mapping entries have fewer elements than session entries, so it can be applied in NAT and ASPF to allow Internet users to initiate connections with the intranet.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 43

Which of the following descriptions about the main implementation of single sign-on is wrong?

Options:

A.

Accept PC message mode

B.

Query the AD server security log mode

C.

Query the syslog server mode

D.

Firewall monitors AD authentication packets

Buy Now
Questions 44

Which of the following protocols is a file transfer protocol?

Options:

A.

Mouth POP3

B.

Mouth NFS

C.

Mouth HITP

D.

Mouth DFTP

Buy Now
Questions 45

In cases where some configurations alter existing session table entries and want them to take effect immediately, you can regenerate the session table by clearing the session table information. All session table information can be cleared by executing the _____firewall session table command.

Options:

Buy Now
Exam Code: H12-711_V4.0
Exam Name: HCIA-Security V4.0 Exam
Last Update: Apr 7, 2026
Questions: 153

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now H12-711_V4.0 testing engine

PDF (Q&A)

$31.5  $104.99
buy now H12-711_V4.0 pdf
dumpsmate guaranteed to pass

24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 07 Apr 2026