Special Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

H12-725_V4.0 Exam Dumps - Huawei Certification Questions and Answers

Question # 14

The Common Vulnerability Scoring System (CVSS) is a widely used open standard for vulnerability scoring. It uses a modular scoring system. Which of the following is not included in the CVSS?

Options:

A.

Temporal

B.

Base

C.

Environmental

D.

Spatial

Buy Now
Question # 15

Which of the following statements are true about SYN scanning attacks?(Select All that Apply)

Options:

A.

When the scanner sends a SYN packet, an RST response indicates a closed port.

B.

If the peer end does not respond to the SYN packet sent by the scanner, the peer host does not exist, or filtering is performed on the network or host.

C.

When the scanner sends a SYN packet, if the peer end responds with a SYN-ACK packet, the scanner then responds with an ACK packet to complete the three-way handshake.

D.

When the scanner sends a SYN packet, a SYN-ACK response indicates an open port.

Buy Now
Question # 16

When an IPsec VPN is established in aggressive mode, AH+ESP can be used to encapsulate packets in NAT traversal scenarios.

Options:

A.

TRUE

B.

FALSE

Buy Now
Question # 17

Which of the following methods are used by flood attacks to cause denial of services?(Select All that Apply)

Options:

A.

Exhaust available bandwidth.

B.

Exhaust server-side resources.

C.

Control network host rights.

D.

Exhaust network device resources.

Buy Now
Question # 18

Which of the following protocols can be encapsulated through GRE over IPsec?(Select All that Apply)

Options:

A.

IPX

B.

VRRP

C.

IPv6

D.

OSPF

Buy Now
Question # 19

If data filtering is configured on the firewall but is not correctly referenced in the security policy, the data that should be blocked can still be transmitted normally.

Options:

A.

TRUE

B.

FALSE

Buy Now
Question # 20

Which of the following is the function of Message 1 and Message 2 during IKEv1 phase-1 negotiation in main mode?

Options:

A.

Mutual identity authentication

B.

Negotiation of the IKE proposals used between peers

C.

IPsec SA negotiation

D.

Exchange of key-related information (materials used for key generation) using the DH algorithm and generation of keys

Buy Now
Question # 21

Which of the following statements is false about RADIUS and HWTACACS?

Options:

A.

Both of them feature good flexibility and extensibility.

B.

Both of them use the client/server model.

C.

Both of them support authorization of configuration commands.

D.

Both of them use shared keys to encrypt user information.

Buy Now
Exam Code: H12-725_V4.0
Exam Name: HCIP-Security V4.0 Exam
Last Update: Apr 1, 2025
Questions: 60
H12-725_V4.0 pdf

H12-725_V4.0 PDF

$25.5  $84.99
H12-725_V4.0 Engine

H12-725_V4.0 Testing Engine

$28.5  $94.99
H12-725_V4.0 PDF + Engine

H12-725_V4.0 PDF + Testing Engine

$40.5  $134.99