Pass the Huawei Huawei Certified Network Professional HCNP H12-721 Questions and answers with CertsForce

Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions
Questions # 41:

In the USG firewall, which two commands can be used to view the running status and memory/CPU usage of the device components (main control board, board, fan, power supply, etc.)?

Options:

A.

display device


B.

display environment


C.

display version


D.

dir


Expert Solution
Questions # 42:

Based on the following information analysis on the firewall, which of the following options are correct?

Question # 42

Options:

A.

The first packet of this data flow enters from the Trust zone interface and is sent from the Untrust zone interface.


B.

This data stream has been NAT translated


C.

uses NPAT conversion technology


D.

firewall has virtual firewall function enabled


Expert Solution
Questions # 43:

When using the optical bypass interface, the Bypass link has two working modes, automatic mode and forced mode.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 44:

Which of the following technologies can enhance the security of mobile users accessing the company's intranet VPN solution?

Options:

A.

SSL


B.

PPPoE


C.

GRE


D.

L2TP


Expert Solution
Questions # 45:

The classification of cyber-attacks includes traffic-based attacks, scanning and snooping attacks, malformed packet attacks, and special packet attacks.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 46:

About load balancing, the following configuration is available: [USG] slb enable [USG]slb [USG-slb] rserver 1 rip 10.1.1.3 weight 32 [USG-slb] rserver 2 rip 10.1.1.4 weight 16 [USG-slb] rserver 3 rip 10.1.1.5 weight 32 [USG-slb] group test [USG-slb-group-test]metric srchash [USG-slb-group-test] add rserver 1 [USG-slb-group-test] add rserver 2 [ USG-slb-group-test] add rserver 3 Which of the following statements is correct?

Options:

A.

load balancing algorithm is a polling algorithm


B.

This configuration is a complete load balancing configuration


C.

determines which server the data stream should flow to based on the weight value. The smaller the weight value, the weaker the processing power of the corresponding real server.


D.

weight represents the weight of the real server


Expert Solution
Questions # 47:

The FTP network diagram is as follows. The FTP server wants to use the 21000 control port to provide external FTP services. The FTP client cannot access the FTP server.

Question # 47

Options:

A.

port mapping function is not used. The packets sent from the FTP client to the FTP server on port 21000 are ordinary packets and are not recognized as FTP packets.


B.

The firewall can only recognize the FTP traffic of port 21 and cannot identify the FTP traffic of port 21000.


C.

is not configured with ASPF function


D.

device dropped all UDP traffic


Expert Solution
Questions # 48:

In the IDC room, a USG firewall can be used to divide into several virtual firewalls, and then the root firewall administrator generates a virtual firewall administrator to manage each virtual firewall.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 49:

Regarding VRRP messages, what are the following statements correct?

Options:

A.

VRRP uses TCP packets.


B.

VRRP uses UDP packets.


C.

The destination address of the C VRRP packet is 224.0.0.18.


D.

The TTL value of the D VRRP packet is 255.

.


Expert Solution
Questions # 50:

In the first phase of IKE V1, the pre-shared key master mode exchange process, in which message is the SA payload sent?

Options:

A.

Message 1 and Message 2


B.

Message 3 and Message 4


C.

Message 5 and Message 6


D.

Message 7 and Message 8

Note: IKE V1 Phase 1 mainly negotiates the following three tasks: First, negotiate the parameters used to establish IKE SA: encryption algorithm, integrity verification algorithm, identity authentication method and authentication word, DH group, IKE SA life cycle, etc. . These parameters are defined in the IKE security proposal. The second is to use the DH algorithm to exchange information related to the key (t


Expert Solution
Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions