New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Passed Exam Today H12-711_V3.0

Page: 6 / 18
Total 492 questions

HCIA-Security V3.0 Questions and Answers

Question 21

Which of the following options isL2TPThe port number used by the packet?

Options:

A.

17

B.

500

C.

1701

D.

4500

Question 22

In order to obtain criminal evidence, it is necessary to master the technology of intrusion tracking. Which of the following options are correct for the description of tracking technology? (multiple choice)

Options:

A.

Packet logging technology through the tracedIPInsert trace data into packets to mark packets on each router they pass through

B.

Link testing technology determines the information of the attack source by testing the network link between routers

C.

Packet marking technology extracts attack source information by logging packets on routers and then using data drilling techniques

D.

Shallow mail behavior analysis can achieveIPAnalysis of addresses, sent time, sending frequency, number of recipients, shallow email headers, and more.

Question 23

In which of the following scenarios does the firewall generate the Server map table? ( )

Options:

A.

NAT Server is deployed on the firewall

B.

ASPF is deployed on the firewall and forwards the traffic of the multi-channel protocol

C.

When the firewall generates a session table, it will generate a Server-map table

D.

Security policies are deployed on the firewall and traffic is released

Question 24

In symmetric encryption algorithms, the ________ algorithm is used over a data communication channel, browser or network link.[fill in the blank]*

Options:

Page: 6 / 18
Total 492 questions