Pass the Huawei Huawei Certified Network Professional HCNP H12-721 Questions and answers with CertsForce

Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions
Questions # 1:

The ACK flood attack is defended by the load check. The principle is that the cleaning device checks the payload of the ACK packet. If the payloads are all consistent (if the payload content is all 1), the packet is discarded.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 2:

In the IKE V1 pre-shared key mode, what is the main role of the data captured in the following figure?

Question # 2

Options:

A.

negotiation phase 2 SA


B.

SA of negotiation phase 1


C.

is used to exchange D-H public values, required random numbers


D.

is used to exchange identity information


Expert Solution
Questions # 3:

Regarding the Radius authentication process, there are the following steps: 1. The Radius client (network access server) in the network device receives the username and password, and sends an authentication request to the Radius server; 2 the user logs in to the USG access server, etc. When the network device sends the username and password to the network access server; 3. After receiving the legitimate request, the Radius server completes the authentication and returns the required user authorization information to the client. What is the correct order?

Options:

A.

1 2 3


B.

2 1 3


C.

3 1 2


D.

2 3 1


Expert Solution
Questions # 4:

A user wants to limit the maximum bandwidth of the 192.168.1.0/24 network segment to 500M, and limit all IP addresses in the network segment to maintain a bandwidth of 1M. How should I configure a current limiting policy for this requirement?

Options:

A.

Configure per-IP traffic limiting. The maximum bandwidth of the host on the 192.168.1.0/24 network segment is 500M.


B.

Configure overall traffic limiting. The maximum bandwidth of the host on the network segment 192.168.1.0/24 is 1M.


C.

Configure the overall traffic limiting. The maximum bandwidth of the host on the 192.168.1.0/24 network segment is 500M.


D.

Configure the overall traffic limiting. The maximum bandwidth of the host on the network segment 192.168.1.0/24 is 500M. Then use the per-IP traffic limiting to ensure that the server bandwidth is 1M.


Expert Solution
Questions # 5:

What type of message is the VRRP hello message?

Options:

A.

unicast message


B.

broadcast message


C.

multicast packet


D.

UDP packet


Expert Solution
Questions # 6:

When using the SSL VPN client to start the network extension, the prompt "Connection gateway failed", what are the possible reasons for the failure?

Options:

A.

If the proxy server is used, the proxy server settings of the network extension client are incorrect.


B.

The route between the B PC and the virtual gateway is unreachable.


C.

TCP connection between the network extension client and the virtual gateway is blocked by the firewall


D.

username and password are incorrectly configured


Expert Solution
Questions # 7:

What actions will be performed when the firewall hot standby sends the active/standby switchover?

Options:

A.

send free ARP


B.

Send proxy ARP


C.

VRRP backup group virtual address is unavailable


D.

related switch automatically updates the MAC table


Expert Solution
Questions # 8:

The malformed packet attack technology uses some legitimate packets to perform reconnaissance or data detection on the network. These packets are legal application types, but only normal network packets are rarely used.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 9:

What are the possible reasons why the firewall 2 IPSec VPN cannot be established successfully?

Options:

A.

device does not have a route to the intranet


B.

. The ACL referenced by the security policy configured on the gateways at both ends is incorrect.


C.

The IPSec proposal configured on the gateways at both ends is inconsistent.


D.

is not configured with DPD at both ends


Expert Solution
Questions # 10:

In the application scenario of IPSec traversal by NAT, the active initiator of the firewall must configure NAT traversal, and the firewall at the other end can be configured without NAT traversal.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions