최신 H12-711_V4.0 무료덤프 - Huawei HCIA-Security V4.0
Which of the following is not a requirement for firewall dual-machine hot backup?
정답: A
Which of the following protocols are file transfer protocols? (Multiple Choice)
정답: A,B,C,D
When forwarding unicast data, the Layer 2 switch needs to decapsulate the Layer 3 header of the message before forwarding it.
정답: B
When deploying IPsec VPN tunnel mode, use the AH protocol for packet encapsulation.
In the new IP packet header field, which of the following parameters does not require data integrity check?
In the new IP packet header field, which of the following parameters does not require data integrity check?
정답: C
Which of the following does not include the steps of the security assessment method?
정답: B
Digital envelope refers to the data obtained after the sender uses the receiver's () to encrypt the symmetric key
정답:
Public key
Which of the following traffic will not trigger authentication even if it matches the authentication policy? (Multiple Choice)
정답: A,C,D
Through business logs, what activities of users can the administrator view? (Multiple Choice)
정답: A,B,C
Which of the following is not a feature of GRE VPN?
정답: A
Which of the following descriptions about SSL VPN usage restrictions are correct? (Multiple Choice)
정답: A,C,D
Which of the following items are characteristics of LDAP? (Multiple Choice)
정답: A,B,C,D
Regarding the description of Windows log event types, which options are correct? (Multiple Choice)
정답: C,D
Information security prevention technologies include : data encryption, identity authentication, intrusion prevention, anti-virus, etc.
정답: B
When users in the external network access the internal server, use the two-way NAT function to simultaneously convert the source and destination addresses of the packets, which can avoid setting up a gateway on the internal server and simplify configuration.
정답: A
Even if the DHCP message matches the firewall authentication policy, authentication will not be triggered.
정답: B
Due to changes in user identity, user public key, or user business suspension, users need to revoke their digital certificates, that is, cancel the binding relationship between the public key and user identity information. In PKI, CA mainly uses CCSP protocol and () protocol to revoke certificates.
정답:
CRL
In the MPS 2.0, which item stipulates that "spam should be detected and protected at key network nodes, and the upgrade and update of the spam protection mechanism should be maintained"?
정답: D
SMTP is a Simple Mail Transfer Protocol that provides Internet email services.
What is the SMTP port number?
What is the SMTP port number?
정답: B
Which of the following information is not included in the DHCP binding table?
정답: B