Huawei h12-711 practice test

Exam Title: HCIA Security V3.0 Exam

Last update: Aug 11 ,2025
Question 1

To configure a NAT policy in command line mode, you need to use the .command ( ) in the system
view to enter the NAT policy configuration view. (all lowercase) (fill in the blank)

Answer:

nat-policy


vote your answer:
Comments
Question 2

( ) means that the computer system has defects and deficiencies in the specific matters of hardware,
software, protocols or system security policies. (Chinese Standard Terminology) (fill in the blank)

Answer:

Vulnerability


vote your answer:
Comments
Question 3

Multiple different ( ) cannot be added to the same interface on the firewall at the same time (fill in
the blank)

Answer:

Safe area


vote your answer:
Comments
Question 4

In USG6000E, the initial priority of VGMP is ( ) (fill in the blank)

Answer:

45000


vote your answer:
Comments
Question 5

( ) is an "indirect intrusion attack. This attack mode is to virtually place a computer controlled by an
intruder between two communicating computers in a network connection through various technical
means. (fill in the blank)

Answer:

Man-in-the-
middle attack


Comments
Question 6

The backup methods of dual-system hot backup include automatic backup ( ), manual batch backup,
and automatic synchronization of the configuration of the active and standby FW after the device
restarts. (fill in the blank)

Answer:

Session fast
backup


Comments
Question 7

After an engineer completes the source NAT configuration, the internal network still cannot access
the external network. The engineer wants to query the detailed information of the address
translation by using the command to query the session table, so the engineer directly uses the ( )
command in the user view to query the address translation. information. (fill in the blank)

Answer:

display
firewall session table


Comments
Question 8

After the firewall detects an intrusion, the administrator can view the intrusion log information in the
firewall business log or ( ) log. (fill in the blank

Answer:

System


vote your answer:
Comments
Question 9

Configure authentication options If you use web push page authentication, you also need to
configure a corresponding security policy to allow the data flow with the default port number ( ) to
reach the firewall itself. (fill in the blank)

Answer:

80


vote your answer:
Comments
Question 10

In the VGMP group state, if the device's own VGMP group priority is equal to the peer device's VGMP
group priority, the device's VGMP group state is ( ). (answer in letters) (fill in the blank)

Answer:

load-balance


vote your answer:
Comments
Question 11

If the company network administrator needs to check the status of the heartbeat interface after
configuring the companys dual-system hot backup, the command he needs to type is ( ) The system
view has been entered by default) (fill in the blank)

Answer:

display hrp
interface


Comments
Question 12

The default policy on the firewall defaults to ( ) all traffic. (fill in the blank)

Answer:

Denied


vote your answer:
Comments
Question 13

The trigger modes of the Portali authentication built in the firewall include pre-authentication and ( )
authentication. (fill in the blank)

Answer:

Conversation


vote your answer:
Comments
Question 14

The goal of ( ) is to provide a rapid, composed and effective response in emergency situations.
Thereby enhancing the ability of a business to recover immediately from a disruptive event. (fill in
the blank)

Answer:

Business
Continuity Plan


Comments
Question 15

Compared with IPSec VPN, ( ) has the advantage of good compatibility and can encapsulate IPX,
multicast packets, etc., and is widely used. (fill in the blank)

Answer:

GRE VPN


vote your answer:
Comments
Page 1 out of 33
Viewing questions 1-15 out of 503
Go To
page 2