Pre-Summer Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 5
Total 45 questions
Exam Code: H12-711_V4.0                Update: Apr 20, 2026
Exam Name: HCIA-Security V4.0 Exam

Huawei HCIA-Security V4.0 Exam H12-711_V4.0 Exam Dumps: Updated Questions & Answers (April 2026)

Question # 1

Social engineering is a means of harm such as deception, harm, etc. through psychological traps such as psychological weaknesses, instinctive reactions, curiosity, trust, and greed of victims ( )

A.

TURE

B.

False

Question # 2

Using the ___ method of the Web proxy, the virtual gateway will encrypt the real URL that the user wants to access, and can adapt to different terminal types.[fill in the blank]*

Question # 3

An engineer needs to back up the firewall configuration. Now he wants to use a command to view all the current configurations of the firewall. May I ask the command he uses is ____[fill in the blank]*

Question # 4

As shown in the figure, the administrator needs to test the network quality of the 20.0.0/24 CIDR block to the 40.0.0/24 CIDR block on Device B, and the device needs to send large packets for a long time to test the network connectivity and stability.

A.

tracert -a 20.0.0.1 -f 500 -q 9600 40.0.0.2

B.

ping -a 20.0.0.1 -c 500 -s 9600 40.0.0.2

C.

ping -s 20.0.0.1 -h 500-f 9600 40.0.0.2

D.

tracert -a 20.0.0.1 -c 500 -w 9600 40.0.0.2

Question # 5

Which of the following is not an application scenario for PKI?

A.

SSL VPN

B.

IPsec VPN

C.

IPv6 SEND

D.

Web login through HTTPS

Question # 6

In asymmetric encryption algorithms, only public keys can be used to encrypt data, and private keys are used to decrypt data. This process is irreversible.

A.

TRUE

B.

FALSE

Question # 7

Compared with the software architecture of C/S, B/S does not need to install a browser, and users are more flexible and convenient to use.

A.

TRUE

B.

FALSE

Question # 8

The network environment is becoming more and more complex, and network security incidents occur frequently. While accelerating the construction of informatization, enterprises must not only resist external attacks, but also prevent internal management personnel from being involved in data leakage and operation and maintenance accidents due to operational errors and other issues. Which of the following options might reduce operational risk?

A.

According to the administrator configuration, the O & M user corresponds to the background resource account, and restricts the unauthorized use of the account. mouth Based on the password security policy, the O & M security audit system automatically modifies the password of the background resource account at regular intervals.

B.

Each system is independently operated, maintained and managed, and the access process is not audited and monitored.

C.

Oral Each department system is independently authenticated and uses a single static password for authentication.

Question # 9

Which of the following is not the matching mode of the firewall security protection whitelist rules?

A.

Prefix matching

B.

Fuzzy matching

C.

Keyword matching

D.

Suffix matching

Question # 10

Drag the warning level of the network security emergency response on the left into the box on the right, and arrange it from top to bottom in order of severity.[fill in the blank]*

Page: 1 / 5
Total 45 questions

Most Popular Certification Exams

Payment

       

Contact us

Site Secure

mcafee secure

TESTED 20 Apr 2026