New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

HCIA-Security H12-711_V3.0 Full Course Free

Page: 8 / 18
Total 492 questions

HCIA-Security V3.0 Questions and Answers

Question 29

existL2TPconfiguration, for the commandTunnel Name, which of the following statements is true? (multiple choice)

Options:

A.

Used to specify the tunnel name of the local end

B.

Used to specify the tunnel name of the peer

C.

both endsTunnel Nnamemust be consistent

D.

If not configuredTunnel Name, the tunnel name is the local system name

Question 30

Which of the following is true about the firewall log when the firewall hard drive is in place?

Options:

A.

Administrators can post content logs to view network threat detection and defense records

B.

Administrators can learn about user security risk behaviors and the reasons for being alerted or blocked through threat logs

C.

Through the user activity log, administrators can obtain information such as user behaviors, searched keywords, and the effectiveness of audit policy configurations.

D.

The administrator can learn the security policy of the traffic hit through the policy hit log, which can be used for fault location when a problem occurs.

Question 31

"Caesar Cipher"Data is mainly encrypted by using a specific specification of stick.

Options:

A.

True

B.

False

Question 32

SIPprotocol usageSDPmessage to establish a session,SDPThe message contains a remote address or a multicast address

Options:

A.

True

B.

False

Page: 8 / 18
Total 492 questions