New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

HCIA-Security H12-711_V3.0 Dumps PDF

Page: 18 / 18
Total 492 questions

HCIA-Security V3.0 Questions and Answers

Question 69

Database operation records can be used as ___ evidence to backtrack security events.[fill in the blank]*

Options:

Question 70

Which of the following descriptions of the firewall log is wrong?

Options:

A.

The log level Emergency is the most severe level

B.

Alert log level indicates a major abnormality of the device, requiring immediate action

C.

According to the severity level or urgency of the information. The log can be divided into 8 levels. The more serious the information, the greater the log level value.

D.

The ebug log level indicates that it is general information about the normal operation of the device, and the user does not need to pay attention

Question 71

The administrator is connected to the firewall through the G1/0/0 interface (the interface has been added to the Trust Zone). If the administrator is allowed to perform configuration management through the G1/0/0 login image firewall, how to configure the security policy to release flow direction? ( )[Multiple choice]*

Options:

A.

allows traffic from Trust Zone to Trust Zone

B.

allows traffic from the Trust Zone to the Untrust Zone

C.

allows traffic from Local Zone to Local Zone

D.

allows traffic from the Trust Zone to the Local Zone (I)

Question 72

Digital envelope technology means that the sender uses the receiver's public key to encrypt the data and then sends the ciphertext to the receiver.

Options:

A.

True

B.

False

Page: 18 / 18
Total 492 questions