Pass the Huawei Huawei Certified Network Professional HCNP H12-721 Questions and answers with CertsForce

Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions
Questions # 31:

The Tracert packet attack is an ICMP timeout packet returned by the attacker when the TTL is ____, and the ICMP port unreachable packet returned when the destination address is reached to find the path through which the packet arrives at the destination. Spying on the structure of the network

Options:

A.

0


B.

1


C.

2


D.

varies according to actual conditions


Expert Solution
Questions # 32:

The Haiwei Secoway VPN client initiates an L2TP connection. The source port of the L2TP packet is 1710 and the port 1710 of the destination port.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 33:

If the IPSec policy is configured in the policy template and sub-policy mode, the firewall applies the policy template first and then applies the sub-policy.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 34:

71. Which option is incorrect about the HTTP Flood defense principle?

Options:

A.

HTTP Flood source authentication


B.

URI detection of destination IP


C.

fingerprint learning


D.

load check


Expert Solution
Questions # 35:

After the NAT server is configured (no-reverse parameter is added), the firewall automatically generates static Server-Map entries. The first packet matches the Server-Map entry and does not match the session table.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 36:

The principle of HTTPS Flood source authentication defense is that the Anti-DDoS device replaces the SSL server with the client to complete the TCP three-way handshake. If the TCP three-way handshake is complete, the HTTPS flood source authentication check is successful.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 37:

Configure the remote packet capture function on the USG to download the device to the device. You can use the FTP server to analyze the packet.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 38:

What are the drainage schemes that can be used in the scenario of bypass deployment in Huawei's abnormal traffic cleaning solution?

Options:

A.

dynamic routing drainage


B.

static policy routing drainage


C.

static route drainage


D.

MPLS VPN drainage


Expert Solution
Questions # 39:

SSL VPN authentication is successful. Using the file sharing function, you can view directories and files, but you cannot upload, delete, and rename files. What are the possible reasons?

Options:

A.

If the file server type is NFS, the user UID and GID attributes do not allow the user to upload, delete, or rename files.


B.

If the type of the file server is SMB, the currently logged-in user has only read permission for the file share resource, but no write permission.


C.

Only the viewing function is enabled in the SSL file sharing function configuration of the C firewall.


D.

Some TCP connections between the virtual gateways of the D file server are blocked by the firewall


Expert Solution
Questions # 40:

According to the capture of the victim host, what kind of attack is this attack?

Options:

A.

ARP Flood attack


B.

HTTP Flood attack


C.

ARP spoofing attack


D.

SYN Flood attack


Expert Solution
Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions