Huawei h12-711-v4-0 practice test

Exam Title: HCIA-Security V4.0

Last update: Nov 27 ,2025
Question 1

Among the various aspects of the risk assessment of IS027001, which of the following does not
belong to the system design and release process?

  • A. Hold a summary meeting of the project in the information security management stage
  • B. Determine risk disposal measures and implement rectification plans
  • C. Determine risk tolerance and risk appetite
  • D. System integration and information security management system document preparation
Answer:

A


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

Which of the following types of malicious code on your computer includes?

  • A. Oral virus
  • B. Trojan horses
  • C. Port SQL injection
  • D. Oral spyware
Answer:

A, B, C, D


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

For which of the following parameters can the packet filtering firewall filter?

  • A. Port packet payload
  • B. IP address of the port source destination
  • C. The MAC address of the source destination
  • D. Port number and protocol number of the port source
Answer:

B, D


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 4

What is the security level of the Untrust zone in Huawei firewalls?

  • A. 10
  • B. 20
  • C. 5
  • D. 15
Answer:

C


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

Which layer of the protocol stack does SSL provide end-to-end encrypted transmission services?

  • A. Application layer
  • B. Data link layer
  • C. Network layer
  • D. Transport layer
Answer:

D


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

What are the correct entries in the following description of firewall security zones?

  • A. The DMZ security zone solves the problem of server placement well, and this security area can place devices that need to provide network services to the outside world.
  • B. The Local zone is the highest security zone with a priority of 99.
  • C. Data flows between security domains are directional, including Inbound and Outbound.
  • D. Normally, the two communicating parties must exchange messages, that is, there are messages transmitted in both directions between security domains.
Answer:

A, C, D


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

Compared with the software architecture of C/S, B/S does not need to install a browser, and users are
more flexible and convenient to use.

  • A. TRUE
  • B. FALSE
Answer:

A


vote your answer:
A
B
A 0 B 0
Comments
Question 8

What type of ACL does ACL number 3001 correspond to?

  • A. Layer 2 ACL
  • B. interface ACL
  • C. Basic ACL
  • D. Advanced ACLs
Answer:

D


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 9

What is correct about the following description of device management in the operating system?

  • A. The main task of port device management is to complete the I/O requests made by users and classify I/O devices for users.
  • B. Whenever a process makes an I/O request to the system, as long as it is secure, the device allocator will assign the device to the process according to a certain policy.
  • C. Device management can virtualize a physical device into multiple logical devices through virtualization technology, providing multiple user processes to use.
  • D. In order to alleviate the problem of speed mismatch between CPU and I/O devices and improve the parallelism of CPU and I/O devices, in modern operating systems, almost all I/O devices are exchanging numbers with processors Buffers are used at all times.
Answer:

A, B, C, D


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

SSL VPN is a VPN technology that realizes remote secure access through SSL protocol. Which of the
following software must be installed when using SSL VPN?

  • A. Browser
  • B. Firewall
  • C. Client
  • D. Antivirus
Answer:

C


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 9
Viewing questions 1-10 out of 91
Go To
page 2