Text Material Preview
H12-725_V4.0-ENU HCIP-Security V4.0 exam dumps questions are the best material for you to test all the related Huawei exam topics. By using the H12-725_V4.0-ENU exam dumps questions and practicing your skills, you can increase your confidence and chances of passing the H12-725_V4.0-ENU exam. Features of Dumpsinfo’s products Instant Download Free Update in 3 Months Money back guarantee PDF and Software 24/7 Customer Support Besides, Dumpsinfo also provides unlimited access. You can get all Dumpsinfo files at lowest price. HCIP-Security V4.0 H12-725_V4.0-ENU exam free dumps questions are available below for you to study. Full version: H12-725_V4.0-ENU Exam Dumps Questions 1. Habits such as keeping the browser version updated, paying attention to browser pop-ups and not actively visiting unknown websites can effectively prevent phishing attacks. A. True B. False Answer: A 2. If the firewall recognizes keywords during content filtering detection, what impact actions can it take? (Multiple choice) A. Delete attachments B. Block C. Allow D. Alarm 1 / 24 https://www.dumpsinfo.com/unlimited-access/ https://www.dumpsinfo.com/exam/h12-725_v4-0-enu Answer: BD 3. Special control message attack is a potential attack behavior that does not have direct destructive behavior. The attacker detects the network structure by sending special control messages to prepare for subsequent real attacks. A. True B. False Answer: A 4. Since the HTTP protocol is based on the TCP protocol, all HTTP Flood attacks can be prevented by using the method of preventing TCP Flood. A. True B. False Answer: B 5. The main way of SQL injection attack is to construct clever SQL statements and submit them as input items to the server to implement the attack. Specific methods of SQL injection attacks include which of the following? (Multiple choice) A. Use union statement for joint query B. Use insert or update statements to insert or modify data C. Use comment symbols D. Use identities (such as 1=1) Answer: ABCD 6. As shown in the figure, the firewalls at both ends establish GRE over IPSec. The original packet is first encapsulated by IPSec and then GRE encapsulated. A. True B. False Answer: B 7. Undo shutdown the business interface of the standby machine; 8.Which of the following resources are manually allocated to the virtual system? (Multiple choice) A. VLAN B. Safe area C. Bandwidth D. Interface Answer: ACD 2 / 24 https://www.dumpsinfo.com/ 9. Anti-DDoS’s session inspection mechanism can prevent multiple-select which of the following attacks? (Multiple choice) A. TCP connection exhaustion attack B. ACK C. TCP abnormal session attack D. UDP Answer: ABC 10. Please match the following network attack methods with their corresponding description information one by one. Answer: 3 / 24 https://www.dumpsinfo.com/ 11. Which of the following functions can be achieved when Huawei IPS equipment is deployed in the network? (Multiple choice) A. Active defense against scanning attacks B. Control P2P abuse traffic in the network C. Prevent intranet users from SQL injection attacks D. Active defense against vulnerabilities Answer: ABCD 12. Which of the following descriptions of abnormal file type identification results is incorrect? A. The file type cannot be recognized means that the file type cannot be recognized and there is no file extension. B. Unrecognized file type means that neither the file type nor the file extension can be recognized. C. File extension mismatch means that the file type and file extension are inconsistent. D. File corruption refers to the inability to identify the file type due to the file being damaged. Answer: B 13. WAF can protect HTTPS traffic. Its implementation principle is to decrypt, filter, and re-encrypt messages through the public key, private key, and certificate chain uploaded to the WAF device to detect and protect HTTPS encrypted messages. A. True B. False Answer: A 14. Use IKE v1 main mode to establish an IPSec VPN. After detecting the presence of a NAT device, 4 / 24 https://www.dumpsinfo.com/ which of the following ISAKMP messages will be followed by port number conversion? A. Message 5 B. Message 6 C. Message 3 D. Message 4 Answer: A 15. Turn on the email filtering function to detect viruses carried in emails. A. True B. False Answer: B 16. As shown in the figure, the firewall is deployed as a gateway dual-machine hot standby, and the upstream and downstream devices are switches. 5 / 24 https://www.dumpsinfo.com/ To achieve round-trip traffic load balancing, at least how many VRRP backup groups need to be configured in this scenario? A. 4 B. 6 C. 2 D. 3 Answer: C 6 / 24 https://www.dumpsinfo.com/ 17.Which of the following attacks uses return timeout messages with a TTL of 0 to spy on the structure of the target network? A. HTTP B. Tracert attack C. UDP D. ICMP redirect attack Answer: B 18. There are two ways to achieve high reliability of the firewall heartbeat line, the multi-heartbeat interface method and Eth-Trunk. Compared with the multi-heartbeat interface method, the advantage of Eth-runk is that it can increase the communication bandwidth of the link and realize more traffic load sharing. A. True B. False Answer: A 19.In the URL filtering process, which of the following actions is performed as the first step? A. Detect HTTP message anomalies B. Match black and white lists C. Remote query D. Match URL classification Answer: A 20. An engineer is deploying a wireless network. Portal authentication is used for guest access, the authentication point is the wireless controller, and the authentication server uses iMaster NCE- CGampus. The content of the Portal server template configured on the wireless controller is as follows. Which of the following configuration descriptions are correct? (Multiple choice) A. The port number for processing Portal protocol packets on the device is 50200. B. The IP address for communication between the device and the Portal server is 10.10.10.254 C. The URL redirected to the user will contain the ssid name. D. The IP address of the Portal server is 10.23.200.1 Answer: BCD 21. After the dual-machine hot standby system software version upgrade is completed, which of the following items need to be verified? (Multiple choice) A. System software version 7 / 24 https://www.dumpsinfo.com/ B. Firewall active and standby status C. Dual-machine switching D. Session table Answer: BCD 22.Which of the following are the contents contained in the session persistence table entry? (Multiple choice) A. Port number B. Outbound interface C. Source IP address D. Aging time Answer: BCD 23. As shown in the figure, this is a single-server smart DNS scenario in the outbound interface mode. Please sort the following descriptions in the correct order. 8 / 24 https://www.dumpsinfo.com/ Answer: 9 / 24 https://www.dumpsinfo.com/ 24. As shown in the figure, firewall A and firewall B use IKE v1 main mode to establish IPSec VPN. Which of the following ISAKMP messages can detect the existence of NAT devices between the firewalls? (Multiple choice) A. Message 6 B. Message 3 C. Message 5 D. Message 4 Answer: BC 25. Which of the following descriptions about 802.1× authentication is incorrect? A. In EAP termination mode, EAP messages are directly encapsulated into RADIUS B. The 802.1X authentication method is divided into EAP relay method and EAP termination method. In comparison, EAP relay method supports more authentication methods. C. The 802.1X authentication system uses the EAP protocol to realize information exchange between the client, device and authentication server. D. In the 802.1X authentication method, the client must support the 802.1x protocol. Answer: D 26.Link-Group improveslink reliability by binding multiple physical interfaces. When one interface fails, traffic is forwarded from other interfaces. A. True 10 / 24 https://www.dumpsinfo.com/ B. False Answer: B 27.DoS attacks are traffic-based attacks that aim to prevent the target computer or network from providing normal services or resource access, causing the target system service system to stop responding or even crash. A. True B. False Answer: A 28. As shown in the figure, the firewall load balancing network is used, and the upstream and downstream devices are switches. Which of the following descriptions of the firewall VGMP group status in this scenario is correct? A. Firewall A: Active, Firewall B: Standby B. Firewall A: Master, Firewall B: Backup C. Firewall A: Master, Firewall B: Master D. Firewall A: Active, Firewall B: Active Answer: D 29. When using iMaster NCE-Campus as the Portal server, in the Portal server template on the AC, the destination port number used when the device actively sends packets to the Portal server should be configured as (). Answer: 2000 30. In the URL category, _____URL category is a category preset library that is preset with the device and does not require manual loading by the user. This can help users control access to common websites. Answer: Predefined 31. BFD is a bidirectional forwarding detection mechanism that can provide millisecond-level detection, achieve rapid detection of links, and can be used in conjunction with which of the following technologies? (Multiple choice) A. Static routing B. BGP C. Policy routing D. Dual-machine hot backup Answer: ABCD 32. If server authentication is used, which of the following devices may be included in the network access control system architecture? (Multiple choice) A. Data source server B. User terminal C. Authentication server D. Network access equipment Answer: BCD 11 / 24 https://www.dumpsinfo.com/ 33. Which of the following descriptions about Huawei IPS equipment upgrade is correct? A. Upgrading the signature database of Huawei IPS does not require license authorization. B. Upgrading the system version of Huawei IPS will take effect without restarting the device. C. Upgrading the signature database of Huawei IPS requires restarting the device to take effect. D. Upgrade the Huawei IPS signature database to take effect without restarting the device. Answer: D 34. When IPSec uses certificate authentication, it is necessary to verify the legitimacy of the peer certificate. Which of the following is not a factor that needs to be considered to verify the legitimacy of the certificate? A. Whether the certificate is applied for in the same way B. Whether the certificate is within the validity period C. Whether the certificate is located in the CRL repository D. Whether the certificate is issued by the same CA Answer: D 35.Which of the following are traffic-based attacks? (Multiple choice) A. DoS attack B. Malformed message attack C. Scanning and snooping attacks D. DDoS attack Answer: AD 36. By checking the /var/log/secure log file of the Linux host, you can determine whether the host has been attacked by brute force cracking of the login password. A. True B. False Answer: A 37. Which of the following descriptions about the classification of bandwidth resources in virtual systems are correct? (Multiple choice) A. Traffic flowing from the private network interface to the public network interface is limited by the outbound bandwidth. B. In the scenario of cross-virtual system forwarding, the Virtual-if interface defaults to the public network interface. C. The public network interface refers to the interface through which the firewall connects to the Internet. D. Traffic flowing from the public network interface to the private network interface is limited by the bandwidth in the inbound direction. Answer: ABD 38.There are two types of virtual systems on the firewall, namely _____ and virtual systems. Answer: root system 12 / 24 https://www.dumpsinfo.com/ 39.1. During the dual-machine hot standby system version upgrade process, which of the following sequences should be followed for the backup machine upgrade steps? 40. When a firewall performs email filtering, which of the following email transfer protocols does it support? A. SMTPS B. SMTP C. P0P3 D. IMAP Answer: A 41. To implement the access control function through Huawei iMaster NCE-Campus controller, which of the following is not required for authentication and authorization configuration? A. Certification results B. Authorization results C. Certification rules D. Authorization rules Answer: C 42. Which of the following descriptions about using ACLs as IPSec interesting flow matching rules are correct? (Multiple choice) A. ACLs configured in the same IPSec security policy group can contain the same rules. B. If different data flows have different security requirements, different ACLs and corresponding IPSec security policies need to be created. C. If the interface to which the IPSec security policy is applied is also configured with NAT, IPSec will not take effect because the device performs NAT first. At this time, you need to match the ACL rules referenced by IPSec to the IP address after NAT translation. D. The protocol types defined by ACL rules at both ends of the IPSec tunnel must be consistent. For example, if one end uses the IP protocol, the other end must also use the IP protocol Answer: BCD 43. User identity authentication and authorization can be completed on the access control device or can be completed by the server. When an access device is used for authentication and authorization, it is local authentication. Which of the following descriptions of local authentication methods are correct? (Multiple choice) A. When configuring local authorization, the supported authorization parameters are: VLAN, ACL, etc. B. The amount of stored information is limited by the device hardware conditions and is generally used for device login authentication. C. When using local authentication, a third-party server is also required for user information storage, verification, etc. D. Local certification is fast and can reduce operational costs. Answer: BD 44. Which of the following descriptions about bandwidth resource allocation is incorrect? A. Which type of bandwidth resource limits a data flow is subject to depends on the outgoing interface or incoming interface of the traffic. 13 / 24 https://www.dumpsinfo.com/ B. The public network interface refers to the interface connecting to the Internet C. Bandwidth resources in the resource category are divided into three categories: inbound bandwidth, outbound bandwidth and overall bandwidth. D. In the cross-virtual system forwarding scenario, the Virtual-if interface defaults to the public network interface. Answer: B 45.Which of the following types of virtual systems exist on the firewall? (Multiple choice) A. Configure the system B. Virtual system C. Management system D. Root system Answer: BD 46.Which of the following attacks does not expose network topology information? A. Tracert message attack B. Attacker side of IP packets with routing record entries C. Scanning attack D. Teardrop Answer: D 47. Which of the following descriptions of the RADIUS and HWTACACS protocols is incorrect? A. All use shared keys to encrypt transmitted user information B. Both have good flexibility and scalability C. The structure adopts client/server model. D. All support the authorization of configuration commands on the device. Answer: D 48.SSL VPN uses a web proxy to allow mobile users to access intranet web server resources through the firewall as a proxy. A. True B. False Answer: A 49. Which of the following descriptions about deploying a firewall virtual system is incorrect? A. A resource class can be bound to multiple virtual systems at the same time B. You can view the created virtual systems and allocatedresources in the "Virtual System List" C. Configure the resource class first, and then enable the virtual system for binding D. Resource class r0 is bound to the root system by default and cannot be deleted or modified. Answer: C 50. Which of the following descriptions of 802.1X authentication are correct? (Multiple choice) A. The client can send DHCP/ARP or any message to initiate 802.1X authentication. B. The 802.1X authentication system uses the Extensible Authentication Protocol EAP to realize information exchange between the client, device and authentication server. C. The 802.1X protocol is a Layer 2 protocol and does not need to reach Layer 3. It does not have 14 / 24 https://www.dumpsinfo.com/ high requirements on the overall performance of the access device and can effectively reduce network construction costs. D. The client can trigger 802.1X authentication by sending an EAPoL-Start message. Answer: BCD 51.BFD control packets are encapsulated in TCP packets and transmitted, and their destination port number is 3784. A. True B. False Answer: B 52. In a NAT traversal scenario, if a NAT device is detected, the destination port number of the ISAKMP message will become which of the following? A. 4500 B. 51 C. 50 D. 500 Answer: A 53. The third-party access device added on iWaster NCE Campus supports the use of TACACS protocol for docking. A. True B. False Answer: A 54. Which of the following descriptions of outbound traffic in the firewall virtual system is correct? A. Traffic flowing from the private network interface to the public network interface is limited by the bandwidth in the inbound direction. B. Traffic flowing from the public network interface to the private network interface is limited by the bandwidth in the inbound direction. C. Traffic flowing from the private network interface to the public network interface is limited by the outbound bandwidth. D. Traffic flowing from the public network interface to the private network interface is limited by the outbound bandwidth. Answer: C 55. Which of the following descriptions of manual IPSec security policies are correct? (Multiple choice) A. During configuration, the inbound SA parameters of the local end do not necessarily need to be the same as the outbound SA parameters of the opposite end. B. All security parameters of the manual IPSec security policy need to be configured manually. C. Suitable for small static environments D. Administrator configuration workload is heavy Answer: BCD 56. Which vulnerability in the TCP port does the "WannaCry" ransomware exploit to launch network 15 / 24 https://www.dumpsinfo.com/ attacks on Windows systems? A. 139 B. 443 C. 3389 D. 445 Answer: D 57. Which of the following descriptions of keywords in content filtering are correct? (Multiple choice) A. Keywords are content that the device needs to identify when filtering content. B. Keywords include predefined keywords and custom keywords C. The minimum length of keywords that can be matched by text is 2 bytes D. Custom keywords can only be defined in text mode Answer: AB 58. To check whether there is an abnormal task plan (not set by the user) on the Linux host, which of the following commands can be used? A. crontab -u mysql B. crontab -e C. crontab -r D. crontab -l Answer: D 59. Which of the following descriptions of IPS top definition signatures is incorrect? A. The content of predefined signatures is not fixed and can be created, modified or deleted. B. When the action of the predefined signature is blocking, block the packets that hit the signature and record the log. C. When the action of the predefined signature is release, the packets that hit the signature will be released and no log will be recorded. D. When the action of the predefined signature is alarm, the packets that hit the signature will be released, but the log will be recorded. Answer: A 60. As shown in the figure is the global routing strategy based on link priority active and backup backup. 16 / 24 https://www.dumpsinfo.com/ Which of the following descriptions of this scenario is incorrect? (Multiple choice) A. This method can improve the reliability of the business B. If no overload protection threshold is specified for the main interface link, the firewall will not use other links to transmit traffic even if a link overload occurs. C. The ISP1 link has the highest priority, so the interface connecting the fire protection environment to the ISP is the main interface. D. If the main interface link fails, the firewall's interface connecting ISP2 and ISP3 is enabled for load balancing. Answer: BC 61. When administrators create a firewall virtual system, they also need to create a VPN instance with the same name to isolate routes. A. True B. False Answer: B 62. Which of the following descriptions of cleaning centers is incorrect? A. Back-injection methods include: policy routing back-injection, static route back-injection, VPN back- injection and Layer 2 back-injection. B. The cleaning device supports rich and flexible attack prevention technologies, but cannot defend against CC attacks and ICMP Flood attacks. C. There are two methods of traffic diversion: static traffic diversion and dynamic traffic diversion. D. The cleaning center completes functions such as diversion and cleaning of abnormal traffic, and reinjection of cleaned traffic. Answer: B 63. By configuring the smart () function, the firewall can intelligently modify the resolution address in the response message, so that the user can obtain the most appropriate resolution address, that is, 17 / 24 https://www.dumpsinfo.com/ the address that belongs to the same ISF network as the user. Answer: DNS 64. As shown in the figure, IPSec tunnels are established between the headquarters and branches. To achieve IPSec traffic load sharing, at least how many IPSec tunnels need to be established? A. 1 B. 2 C. 4 D. 3 Answer: C 65. When assigning interfaces to a virtual system, the management port cannot be assigned to the virtual system. A. True B. False Answer: A 66. For terminals that access the network through wired methods, MAC bypass authentication requires one more 802.1X authentication step than ordinary MAC authentication. When 802.1X authentication fails, MAC authentication will be tried again. A. True B. False Answer: A 67. When configuring the SSLVPN port forwarding function, the security policy only needs to allow traffic between Untrust and Trust. A. True B. False Answer: B 68. You can view the configuration information and interface status of Eth-Trunk through display eth- trunk, where STATC indicates static LACP mode and _____ indicates manual load balancing mode. 18 / 24 https://www.dumpsinfo.com/ Answer: NORMAL 69. Which of the following descriptions of the AH and ESP protocols is correct? A. All support data source verification B. All support encryption C. All support NAT traversal D. Verify IP headers Answer: A 70. In which of the following access authentication methods, the terminal must obtain an IP address before authentication? A. 802.1×Authentication B. Portal C. MAC authentication D. MAC bypass authentication Answer: B 71.Which of the following items are the differences between transmission mode and tunnel mode? (Multiple choice) A. Tunnel mode has an extra IP header and tunnel mode takes up more bandwidth than transport mode. B. Tunnel mode hides the original IP header information and has better security C. The transmission mode can realize the integrity check of the entire message (except the variable IP header parameters) D. Tunnel mode can encrypt data packets Answer: ABD 72. Which of the following is not an intranet resource that SSL VPN can provide to mobile office users? A. File resources B. UDP resources C. Web resources D. IP resources Answer: B 73. As shown in the figure, BFD and static routing are associated witheach other. Which of the following configurations is correct? 19 / 24 https://www.dumpsinfo.com/ A) B) C) 20 / 24 https://www.dumpsinfo.com/ D) A. Option A B. Option B C. Option C D. Option D Answer: A 74.802.1x authentication user logout methods include client active logout, access device controlled user logout, and server controlled user logout. When the server is used to control user offline, the RADIUS service can force the user to go offline through () messages. Answer: DM 75. Deploying multiple links at the enterprise exit can improve the reliability of the user network. A. True B. False Answer: A 76. The signature filter of IPS is a set of conditions for a series of signatures. Any signature that meets one of the filter conditions can match the signature filter. A. True? B. False 21 / 24 https://www.dumpsinfo.com/ Answer: B 77.SYN scanning technology generally does not leave scanning traces on the target host, and does not require root privileges of the target host. A. True B. False Answer: B 78. Which of the following attacks does the application layer source authentication function of Anti- DDoS prevent? (Multiple choice) A. HTTP B. ACK C. HTTPS D. DNS Answer: ACD 79. If the 802.1X client uses MD5 encryption, the authentication method of the device-side user can be configured as EAP or CHAP; if the 802.1X client uses PEAP authentication, the device-side user authentication method can be configured as () Answer: EAP-PEAP 80. As shown in the figure, the firewall dual-machine hot backup load is deployed uniformly. For the Trust: area, two VRPP backup groups need to be deployed. One group has firewall A as the master, and the other group also has firewall B as the master. A. True B. False Answer: B 81.SYN scanning requires the establishment of a complete TCP connection, and the SYN scan will be recorded in the system log. A. True B. False Answer: B 82. Which of the following descriptions of the characteristics of SSL VPN is incorrect? A. SSL VPN supports few authentication types and is difficult to integrate with the original identity authentication system. B. SSL VPN can support various IP applications C. SSL VPN can parse intranet resources to the application layer and publish applications in a granular manner D. Since the SSL VPN login method uses a browser, the automatic installation and configuration of the client is realized, so that users can quickly log in with their devices anytime and anywhere, and it also relieves the pressure of network administrators in maintaining the client. Answer: A 22 / 24 https://www.dumpsinfo.com/ 83. A customer's current network uses Huawei wireless controller to deploy 802.1X authentication, and the authentication server is iMaster NCE-Campus. During the process of debugging the wireless network, engineers found that the terminal kept failing to authenticate. What are the possible reasons for this problem? (Multiple choice) A. The network between the terminal and the authentication server is unreachable B. The authorization key configured on the wireless controller is inconsistent with the authentication server configuration. C. The service VLAN is not configured on the wireless controller. D. The authentication template configured on the wireless controller is not bound to the access template. Answer: AD 84. WAF devices can effectively and accurately resist CC attacks. Which of the following descriptions of CC attacks is incorrect? A. CC attack is a type of DDoS attack B. The attack cost of CC attacks is relatively high, and launching an attack requires a large amount of bandwidth resources. C. CC attacks can use proxy servers to launch attacks, making it difficult to trace the source of the attack. D. CC attacks are mainly used to attack web servers, causing server resources to be exhausted and even shut down. Answer: B 85. Which of the following descriptions about firewall bandwidth policies is correct? A. In the same group of parent-child policies, the same bandwidth channel can be referenced B. By default, there is a default bandwidth policy on the firewall. The configured conditions are all (any) and the action is flow limiting. C. If bandwidth management is used together with the source NAT function, the address before translation should be specified when configuring the address/matching conditions of the bandwidth policy. D. For maximum bandwidth and connection limit, the child policy can be larger than the parent policy Answer: C 86.Which of the following commands can display the IPSec SA negotiation results and IPSec policy configuration information? A. display ike sa B. display ipsec statistics C. display ipsec sa D. display ike peer Answer: C 87. In the Portal authentication scenario, in order to ensure that the terminal can open the Portal page normally (using iMastar NCE-Campus as the Pertal server), iMaster NCcE-Canmus should be reachable over the network with the authentication terminal. A. True B. False Answer: A 23 / 24 https://www.dumpsinfo.com/ Powered by TCPDF (www.tcpdf.org) 24 / 24 https://www.dumpsinfo.com/ http://www.tcpdf.org