Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

H12-711_V4.0 Exam Dumps - Huawei HCIA-Security Questions and Answers

Question # 4

Which of the following statements are correct about IKE-based SA establishment in IPsec?

Options:

A.

SAs are valid permanently.

B.

IKE-based SA establishment applies to medium- and large-sized networks.

C.

The SPI value is generated randomly.

D.

Keys are generated using the DH algorithm and dynamically updated.

Buy Now
Question # 5

When logging in to the web UI through HTTPS, you need to specify a local certificate issued by a CA that the web browser trusts for the HTTPS client on the device. Because the web browser can verify the local certificate, this approach avoids malicious attacks and ensures secure logins of administrators.

Options:

A.

TRUE

B.

FALSE

Buy Now
Question # 6

Which security zone can be deleted and its priority can be reconfigured?

Options:

A.

Untrust

B.

DMZ

C.

Trust

D.

ISP

Buy Now
Question # 7

Which of the following statements are correct about SYN flood attack defense technologies on Huawei firewalls?

Options:

A.

The TCP connection establishment rate can be limited to defend against SYN flood attacks.

B.

The number of half-open TCP connections can be limited to defend against SYN flood attacks.

C.

SYN cookie technology can be used to defend against SYN flood attacks.

D.

Interzone security policies can be configured to defend against SYN flood attacks.

Buy Now
Question # 8

Using the ___ method of the Web proxy, the virtual gateway will encrypt the real URL that the user wants to access, and can adapt to different terminal types.[fill in the blank]*

Options:

Buy Now
Question # 9

Which of the following NAT technologies can implement a public network address to provide source address translation for multiple private network addresses ( )*

Options:

A.

NAPT

B.

NAT Server

C.

Easy-ip

CT Jinglu

D.

NAT No-PAT

Buy Now
Question # 10

In the Linux system, which of the following is the command to query the P address information?

Options:

A.

ifconfig)

B.

display ip interface brief

C.

ipconfig

D.

display ip

Buy Now
Question # 11

When using passive mode to establish an FTP connection, the control channel uses port 20 and the data channel uses port 21.

Options:

A.

True

B.

False

Buy Now
Question # 12

While working for a company, Tom receives an email with an attachment. Which of the following operations is correct?

Options:

A.

Checking the email's content. If the email is related to work, Tom can open and save the attachment

B.

Opening the attachment directly because email attachments do not affect information security

C.

Checking the email sender. If the email was sent from the company's mailbox, Tom can open and save the attachment

D.

Checking the sender and email information, and using antivirus software to check the attachment

Buy Now
Question # 13

Please match the following information security risks to information security incidents one by one.[fill in the blank]*

physical security risk Enterprise server permissions are loosely set

Information Security Management Risk Infected Panda Burning Incense

Information Access Risk Fire destroyed equipment in computer room

application risk Talk to people about leaking company secrets

Options:

Buy Now
Exam Code: H12-711_V4.0
Exam Name: HCIA-Security V4.0 Exam
Last Update: Mar 28, 2026
Questions: 153
H12-711_V4.0 pdf

H12-711_V4.0 PDF

$25.5  $84.99
H12-711_V4.0 Engine

H12-711_V4.0 Testing Engine

$28.5  $94.99
H12-711_V4.0 PDF + Engine

H12-711_V4.0 PDF + Testing Engine

$40.5  $134.99