www.certfun.com PDF HCIA-Security 1 Trusted Study Guide & Practice Questions for the H12-711 Exam Huawei Certification Here - https://bit.ly/461hdBF - are all the necessary details to pass the H12-711 exam on your first attempt. Get rid of all your worries now and find the details regarding the syllabus, study guide, practice tests, books, and study materials in one place. Through the Huawei H12-711 certification preparation, you can become stronger on the syllabus domains, and getting the Huawei Certified ICT Associate-Security certification gets easy. Certfun.com www.certfun.com PDF HCIA-Security 1 How to Earn the H12-711 Huawei Certified ICT Associate-Security Certification on Your First Attempt? Earning the Huawei H12-711 certification is a dream for many candidates. But, the preparation journey feels difficult to many of them. Here we have gathered all the necessary details like the syllabus and essential H12-711 sample questions to get to the Huawei Certified ICT Associate-Security certification on the first attempt. www.certfun.com PDF HCIA-Security 2 H12-711 HCIA-Security Summary: Exam Name Huawei Certified ICT Associate-Security Exam Code H12-711 Exam Price $200 (USD) Duration 90 mins Number of Questions 60 Passing Score 600/1000 Books / Training HCIA-Security V4.0 Training Material Schedule Exam Pearson VUE Sample Questions Huawei HCIA-Security Sample Questions Practice Exam Huawei H12-711 Certification Practice Exam Let ’ s Explore the Huawei H12-711 Exam Syllabus in Detail: Topic Details Weights Network Security Concepts and Specifications - Network Security Definition - Future Network Security Trends - Information Security Standards and Specifications 5% Network Basics - Network Reference Model - Common Network Devices 10% Common Network Security Threats and Threat Prevention - Overview of Enterprise Network Security Threats - Communication Network Security Requirements and Solutions - Zone Border Security Threats and Threat Prevention - Computing Environment Security Threats and Threat Prevention - Security Requirements and Solutions of the Management Center 5% Firewall Security Policies - Firewall Basic Principles - Application Scenarios of Firewalls in Cyber Security Solutions 10% Firewall NAT Technologies - Overview of NAT - Source NAT - Destination NAT - Bidirectional NAT - NAT ALG and NAT Server 10% Firewall Hot Standby Technologies - Hot Standby Fundamentals - Hot Standby Basic Networking and Configuration 10% Firewall User Management Technologies - AAA Principles - Firewall User Authentication and Application 10% Firewall IPS - Intrusion Overview - Intrusion Prevention 10% www.certfun.com PDF HCIA-Security 3 Topic Details Weights - Antivirus Fundamentals of Encryption and Decryption Technologies - Encryption/Decryption Technology Development - Encryption/Decryption Technology Fundamentals - Common Encryption/Decryption Algorithms - Hash Algorithms 10% PKI Certificate System - Data Communication Security Technologies - PKI System Structure - PKI Working Mechanism 5% Encryption Technology Applications - Application of Cryptography - VPN Overview - VPN Configuration 15% Experience the Actual Exam Structure with Huawei H12-711 Sample Questions: Before jumping into the actual exam, it is crucial to get familiar with the exam structure. For this purpose, we have designed real exam-like sample questions. Solving these questions is highly beneficial to getting an idea about the exam structure and question patterns. For more understanding of your preparation level, go through the H12-711 practice test questions. Find out the beneficial sample questions below - Answers for Huawei H12-711 Sample Questions 01. Which of the following is an "information sabotage incident" in the classification of network security incidents? a) Software and hardware failure b) Information counterfeiting c) Listen to Trojan attack d) Internet Scanning for plagiarism Answer: b 02. DDosWhich of the following attack types is an attack? a) special packet attack b) Malformed Packet Attack c) traffic attack d) snooping scan attack Answer: c www.certfun.com PDF HCIA-Security 4 03. When configuring security policies, you can control traffic based on the user's______. a) Services and Apps b) MAC Address c) VLAN Tag d) DNS Entries Answer: a 04. Regarding the firewall security strategy, which of the following is wrong? a) If the security policy is Permit, the discarded message will not be accumulated "hitting" b) Adjust the order of the security policy, do not need to save the configuration file, take effect immediately c) When configuring the security policy name, you cannot reuse the same name. d) Huawei USG series firewall security strategy entry cannot exceed 128 Answer: d 05.What is the security level of the Untrust zone in Huawei firewalls? a) 5 b) 20 c) 10 d) 15 Answer: a 06. ( ) means that the computer system has defects and deficiencies in the specific matters of hardware, software, protocols or system security policies. a) Threat b) Protocol c) Encryption d) Vulnerability Answer: d 07. Clients in the Trust zone of the firewall can log in to the FTP server in the Untrust zone, but cannot download files. Which of the following methods can solve the problem? (Multiple Choice) www.certfun.com PDF HCIA-Security 5 a) When the FTP working mode is port mode, modify the security policy action from Trust to Untrust zone to allow b) Release 21 port number between Trust and Untrust c) When FTP working mode is Passive mode, modify the security policy action from Trust to Untrust zone to allow d) Enable detect ftp Answer: c, d 08. _________ Mode: Two devices, one active and one standby. Under normal circumstances, business traffic is handled by the main device. When the main equipment fails, the backup equipment takes over the main equipment to process business traffic to ensure uninterrupted business. a) Session failover b) Dual-system hot standby active/standby backup c) Load balancing mode d) Cluster mode Answer: b 09. An employee of a company accesses the company's internal Web server through a firewall. The web page of the website can be opened using a browser, but the Pina command is used to test the reachability of the Web server, and it is displayed as unreachable. What is the possible reason? a) The security policy deployed on the firewall allows the HTTP protocol, but not the ICMP protocol b) WEB server is down c) The security policy deployed on the firewall allows the TCP protocol, but not the ICMP protocol d) The interface of the firewall connecting to the server is not added to the security zone Answer: c 10.Terminal security access control can support? (Choose three.) a) SACG hardware (hardware security access control gateway) b) 802.1X c) ARP control d) Software SACG (host firewall) Answer: a, b, d