Weekend Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

H12-725_V4.0 Sample Questions Answers

Questions 4

Which of the following statements is false about health check?

Options:

A.

Health check supports DNS detection protocols.

B.

In addition to link connectivity detection, health check can also detect the delay, jitter, and packet loss rate of links in real time.

C.

The health check function cannot be used together with PBR.

D.

Firewalls can detect network connectivity in real time based on the health check result.

Buy Now
Questions 5

Which of the following statements are true about SYN scanning attacks?(Select All that Apply)

Options:

A.

When the scanner sends a SYN packet, an RST response indicates a closed port.

B.

If the peer end does not respond to the SYN packet sent by the scanner, the peer host does not exist, or filtering is performed on the network or host.

C.

When the scanner sends a SYN packet, if the peer end responds with a SYN-ACK packet, the scanner then responds with an ACK packet to complete the three-way handshake.

D.

When the scanner sends a SYN packet, a SYN-ACK response indicates an open port.

Buy Now
Questions 6

When gateways are connected using GRE over IPsec, the IPsec encapsulation mode must be tunnel mode.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 7

In SSL VPN, the firewall performs access authorization and control based on which of the following dimensions?

Options:

A.

Role

B.

MAC address

C.

Port number

D.

IP address

Buy Now
Questions 8

In the figure, enterprise A and enterprise B need to communicate securely, and an IPsec tunnel is established between firewall A and firewall B. Which of the following security protocols and encapsulation modes can meet the requirements of this scenario?

Options:

A.

AH+ESP; transport mode

B.

ESP; tunnel mode

C.

ESP; transport mode

D.

AH; tunnel mode

Buy Now
Questions 9

Which of the following technologies does not belong to outbound intelligent uplink selection?

Options:

A.

PBR

B.

Smart DNS

C.

Global route selection policy

D.

ISP-based route selection

Buy Now
Questions 10

The Common Vulnerability Scoring System (CVSS) is a widely used open standard for vulnerability scoring. It uses a modular scoring system. Which of the following is not included in the CVSS?

Options:

A.

Temporal

B.

Base

C.

Environmental

D.

Spatial

Buy Now
Questions 11

IPsec VPN does not support encapsulation of non-IP unicast packets.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 12

In a Huawei network security environment, which of the following is a key advantage of using HWTACACS over RADIUS for device management authentication?

Options:

Options:

A.

HWTACACS encrypts only passwords, while RADIUS encrypts the entire payload.

B.

HWTACACS provides per-command authorization, allowing different privilege levels for different users.

C.

HWTACACS operates over UDP, ensuring faster communication than RADIUS.

D.

HWTACACS does not support accounting, while RADIUS does.

Buy Now
Questions 13

The Nginx application is deployed on a Linux host. By checking Nginx logs, O&M engineers can obtain the complete URL information submitted by users and determine whether the Linux host is under SQL injection attacks.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 14

Which of the following methods are used by flood attacks to cause denial of services?(Select All that Apply)

Options:

A.

Exhaust available bandwidth.

B.

Exhaust server-side resources.

C.

Control network host rights.

D.

Exhaust network device resources.

Buy Now
Questions 15

If data filtering is configured on the firewall but is not correctly referenced in the security policy, the data that should be blocked can still be transmitted normally.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 16

Which of the following items are recorded in the IPS service module logs of a Huawei NGFW?(Select All that Apply)

Options:

A.

Signature ID

B.

Source IP address of the attacker

C.

Attack duration

D.

Signature name

Buy Now
Questions 17

Multiple links can be deployed at the egress of an enterprise network to improve network reliability.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 18

Which of the following statements is false about HTTP behavior?

Options:

A.

When the size of the uploaded or downloaded file or the size of the content obtained through the POST operation reaches the block threshold, the system blocks the uploaded or downloaded file or POST operation.

B.

When the size of the uploaded or downloaded file or the size of the content obtained through the POST operation reaches the alarm threshold, the system generates a log to notify the device administrator and block the behavior.

C.

You can set an alarm threshold and a block threshold to limit the size of the upload file if file upload is allowed.

D.

The POST method of HTTP is commonly used to send information to the server through web pages. For example, use this method when you post threads, submit forms, and use your username and password to log in to a specific system.

Buy Now
Exam Code: H12-725_V4.0
Exam Name: HCIP-Security V4.0 Exam
Last Update: Mar 30, 2025
Questions: 60
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now H12-725_V4.0