Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

H12-711_V4.0 Huawei HCIA-Security V4.0 Exam Free Practice Exam Questions (2026 Updated)

Prepare effectively for your Huawei H12-711_V4.0 HCIA-Security V4.0 Exam certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 3
Total 153 questions

In most cases, a user applies for a local certificate from a CA, and the CA approves the application and issues the certificate to the user.

A.

TRUE

B.

FALSE

Match each of the following application layer service protocols with the correct transport layer protocols and port numbers.

Compared with the software architecture of C/S, B/S does not need to install a browser, and users are more flexible and convenient to use.

A.

TRUE

B.

FALSE

The following description of the AH protocol in IPSec VPN, which one is wrong?

A.

Supports data source validation

B.

Supports data integrity checking

C.

Supports packet encryption

D.

Support anti-message replay

An enterprise wants to build a server system and requires the following functions: 1. The enterprise needs to have its own dedicated mailbox, and the sending and receiving of emails needs to go through the enterprise's server; 2. The server must provide file transfer and access services. Users in different departments of the enterprise provide accounts with different permissions: 3. When the enterprise accesses the internal webpage of the enterprise, the enterprise can directly enter the domain name in the browser to access. To meet the above requirements, which of the following servers do enterprises need to deploy? ( )*

A.

Time synchronization server

B.

FTP server (I)

C.

DNS server

D.

Mail server

Which of the following statements are correct about the status of the firewall VGMP group?

A.

Initialize

B.

Active

C.

Load-balance

D.

Standby

The following description of digital certificates, which one is wrong

A.

The simplest certificate consists of a public key, a name, and a digital signature from a certificate authority.

B.

Digital certificates contain the owner's public key and related identity information.

C.

In general, the key of a digital certificate has an expiration date.

D.

Digital certificates do not solve the problem of digital signature technology where the public key cannot be determined to be the designated owner.

Which of the following functions help implement IPsec secure transmission of user service data on the Internet by means of encryption and authentication?

A.

Data encryption

B.

Data origin authentication

C.

Anti-replay

D.

Data integrity check

3-tuple NAT allows external devices to proactively access internal PCs through translated addresses and ports. Even if no security policy is configured on the firewall, the firewall allows such access packets to pass through.

A.

TRUE

B.

FALSE

Digital envelope technology means that the sender uses the receiver's public key to encrypt the data, and then sends the ciphertext to the receiver

A.

TRUE

B.

FALSE

In the TCP/P protocol core, which of the following protocols works at the application layer?

A.

IGMP

B.

ICMP

C.

RIP

D.

ARP

As shown in the figure, which of the following shows the authentication range of ESP in transport mode?

A.

4

B.

1

C.

3

D.

2

Which of the following statements is correct about characteristics of a firewall?

A.

The firewall is a comprehensive security device with multiple security features to defend against zero-day vulnerabilities.

B.

The firewall can prevent unauthorized information on the extranet from being sent to the intranet.

C.

The firewall can defend against all external network threats.

D.

The firewall has the antivirus function. Therefore, the antivirus system does not need to be deployed on the network where the firewall is deployed.

Which of the following operating modes does NTP support?

A.

Mouth peer mode

B.

Mouth client/server mode

C.

Mouth broadcast mode

D.

Mouth multicast mode

What is correct about the following description of device management in the operating system?

A.

The main task of port device management is to complete the I/O requests made by users and classify I/O devices for users.

B.

Whenever a process makes an I/O request to the system, as long as it is secure, the device allocator will assign the device to the process according to a certain policy.

C.

Device management can virtualize a physical device into multiple logical devices through virtualization technology, providing multiple user processes to use.

D.

In order to alleviate the problem of speed mismatch between CPU and I/O devices and improve the parallelism of CPU and I/O devices, in modern operating systems, almost all I/O devices are exchanging numbers with processors

Buffers are used at all times.

HTTPS introduces the TLS layer based on HTTP to provide identity authentication, encryption, and integrity check for data transmission.

A.

TRUE

B.

FALSE

A.

1

B.

2

C.

3

D.

4

Which of the following problems cannot be solved using PKI?

A.

The network is congested due to heavy traffic. As a result, the server cannot provide services properly.

B.

The transaction parties cannot verify the identities of each other.

C.

Data may be eavesdropped and tampered with during transmission, and information security cannot be ensured.

D.

No paper receipt is used in transaction, making arbitration difficult.

Drag the warning level of the network security emergency response on the left into the box on the right, and arrange it from top to bottom in order of severity.[fill in the blank]*

When IPSec VPN uses tunnel mode to encapsulate packets, which of the following is not within the encryption scope of the ESP security protocol?

A.

ESP Header

B.

TCP Header

C.

Raw IP Header

D.

ESP Tail

Page: 1 / 3
Total 153 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved