최신 H12-711_V4.0 무료덤프 - Huawei HCIA-Security V4.0
Which of the following security threats is an application security threat?
정답: A
A small company has only one public network address that is not fixed. The administrator accesses the Internet by using NAT. Which of the following NAT technologies is most suitable for the company's Internet access needs?
정답: C
Huawei NIP6000 can form an interface pair between two interfaces of the same type. Traffic entering from one interface is always forwarded through the other interface without querying the MAC address table.
정답: B
Which of the following descriptions of the main implementation methods of single sign-on is incorrect?
정답: B
When the company network administrator performs dual-machine hot backup, considering the possibility of inconsistent round-trip paths, and wants to enable the session fast backup function, the command that needs to be entered is ()
정답:
hrp mirror session enable
According to the number of users that can support simultaneous operations, operating systems can be divided into single-user operating systems and multi-user operating systems. Which of the following items do not belong to multi-user operating systems? (Multiple Choice)
정답: B,C,D
If the virtual group ID of VRRP is 2, which of the following is the MAC of the virtual router?
정답: A
A certain basic ACL rule is configured as follows, rule permit source 1.1.1.0 0.0.0.255. Which of the following descriptions is correct?
정답: A
When an employee of a company receives a suspicious email with an attachment, which of the following actions is correct?
정답: A
Regarding security policy configuration commands, which of the following is correct?
정답: A
The data link layer is located between the network layer and the physical layer and can provide services to IP, IPv6 and other protocols of the network layer. PDUs at the data link layer are called packets.
정답: B
Regarding the description of IP spoofing, which of the following is incorrect?
정답: B
Deploying HiSec Insight in the enterprise network can effectively discover potential threats and advanced threats in the network, and achieve network-wide security situation awareness within the enterprise.
정답: A
Which of the following stages has the development of information security gone through? (Multiple Choice)
정답: B,C,D
What are the correct options for the following description of the basic concepts of LDAP? (Multiple Choice)
정답: C,D
The degree of harm to national security, social order, public interests, and the legitimate rights and interests of citizens, legal persons, and other organizations after the information system is destroyed shall be determined by factors such as the degree of harm. The security level of information systems is divided into () levels.
정답:
5
When an access user uses Client-Initiated VPN to establish a tunnel with the LNS, how many PPP connections can one tunnel carry?
정답: B