Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

H12-711_V4.0 Huawei HCIA-Security V4.0 Exam Free Practice Exam Questions (2026 Updated)

Prepare effectively for your Huawei H12-711_V4.0 HCIA-Security V4.0 Exam certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 3
Total 153 questions

Which of the following protocols is a file transfer protocol?

A.

Mouth POP3

B.

Mouth NFS

C.

Mouth HITP

D.

Mouth DFTP

Certificates saved in DER format may or may not contain a private key.

A.

TRUE

B.

FALSE

The RADIUS protocol specifies how to pass user information, billing information, authentication and billing results between the NAS and the RADIUS server, and the RADIUS server is responsible for receiving the user's connection request, completing the authentication, and returning the result to the NAS.

A.

TRUE

B.

FALSE

As shown in the figure, what is the range of the AH protocol authentication range in transmission mode?

A.

The4

B.

The3

C.

The2

D.

The1

Which of the following descriptions about the main implementation of single sign-on is wrong?

A.

Accept PC message mode

B.

Query the AD server security log mode

C.

Query the syslog server mode

D.

Firewall monitors AD authentication packets

Which of the following characteristics does a denial-of-service attack include?

A.

Unauthorized tampering of the mouth

B.

Unauthorized access to the mouth

C.

Unauthorized activation of the mouth

D.

Unauthorized destruction of the mouth

Which of the following types of malicious code on your computer includes?

A.

Oral virus

B.

Trojan horses

C.

Port SQL injection

D.

Oral spyware

SSL VPN is a VPN technology that realizes remote secure access through SSL protocol. Which of the following software must be installed when using SSL VPN?

A.

Browser

B.

Firewall

C.

Client

D.

Antivirus

The IPS detects and analyzes all packets passing through a device and determines whether to permit or block the packets in real time based on the comprehensive detection mechanism. Sort the following steps into the correct order based on the basic implementation mechanism of the IPS.

Which of the following statements is correct about SSO?

A.

A user sends the user name and password to the firewall through the Portal authentication page. The password is stored and authenticated on the firewall.

B.

A user sends the user name and password to a third-party authentication server. After the user passes the authentication, the third-party authentication server sends the user's identity information to the firewall, which only records the information but does not participate in the authentication process.

C.

A user accesses the Portal authentication page, obtains an SMS verification code, and enters the verification code. The authentication then succeeds.

D.

A user sends the user name and password to the firewall through the Portal authentication page. The firewall does not store the password but sends the user name and password to a third-party authentication server. The authentication is performed on the authentication server.

As shown in the figure, the administrator needs to test the network quality of the 20.0.0/24 CIDR block to the 40.0.0/24 CIDR block on Device B, and the device needs to send large packets for a long time to test the network connectivity and stability.

A.

tracert -a 20.0.0.1 -f 500 -q 9600 40.0.0.2

B.

ping -a 20.0.0.1 -c 500 -s 9600 40.0.0.2

C.

ping -s 20.0.0.1 -h 500-f 9600 40.0.0.2

D.

tracert -a 20.0.0.1 -c 500 -w 9600 40.0.0.2

Which of the following NAT technologies can implement a public network address to provide source address translation for multiple private network addresses ( )*

A.

NAPT

B.

NAT Server

C.

Easy-ip

CT Jinglu

D.

NAT No-PAT

A Web server is deployed in an enterprise intranet to provide Web access services to Internet users, and in order to protect the access security of the server, it should be divided into the _____ area of the firewall.

Please match the following information security risks to information security incidents one by one.[fill in the blank]*

physical security risk Enterprise server permissions are loosely set

Information Security Management Risk Infected Panda Burning Incense

Information Access Risk Fire destroyed equipment in computer room

application risk Talk to people about leaking company secrets

Which of the following is not a type of Windows log event?

A.

Information

B.

Debugging

C.

Error

D.

Warning

We should choose the encryption algorithm according to our own use characteristics. When we need to encrypt a large amount of data, it is recommended to use the ____ encryption algorithm to improve the encryption and decryption speed.[fill in the blank]*

Which of the following statements are correct about the PKI system structure?

A.

A PKI entity is an end user of PKI products or services. It can be an individual, an organization, a device such as a router or firewall, or a process running on a computer.

B.

CAs are classified into the root CA and subordinate CAs according to the hierarchy of CAs.

C.

A CA is a trusted entity that issues and manages digital certificates.

D.

A PKI system consists of three parts: entity, certificate authority, and certificate registration authority.

In the authentication policy of the firewall, _____ allows the user to not need to enter the user name and password, but can obtain the corresponding relationship between the user and the IP, so as to carry out policy management based on the user[fill in the blank]*

Which of the following are application-layer protocols?

A.

DNS

B.

ARP

C.

Telnet

D.

HTTP

A three-way handshake is required to establish a TCP connection, and a four-way handshake is required to end a TCP connection.

A.

TRUE

B.

FALSE

Page: 2 / 3
Total 153 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved