Pass the Huawei Huawei Certified Network Professional HCNP H12-721 Questions and answers with CertsForce

Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions
Questions # 51:

In the hot standby scenario, what is the correct statement about the primary and backup backups?

Options:

A.

batch backup is to back up all information in batches after the first negotiation of two devices is completed.


B.

The backup channel must be an interface on the service board and supports GE and Eth-trunk interfaces.


C.

By default, batch backup is turned on.


D.

Real-time backup is a real-time backup of newly created or refreshed data while the device is running.


Expert Solution
Questions # 52:

Which of the following statements is true for virtual service technology?

Options:

A.

For multiple real servers, the real servers need to be in the same network segment and in the same security zone.


B.

For multiple real servers, the real servers may not be in the same network segment, but they must be in the same security zone.


C.

For multiple real servers, the real server may not be in the same security zone, but must be in the same network segment


D.

For multiple real servers, the network segment and security zone where the real server is located does not affect the load balancing function.


Expert Solution
Questions # 53:

What are the correct descriptions of IPSec and IKE below?

Options:

A.

IPSec has two negotiation modes to establish an SA. One is manual (manual) and the other is IKE (isakmp) auto-negotiation.


B.

IKE aggressive mode can choose to find the corresponding authentication key according to the negotiation initiator IP address or ID and finally complete the negotiation.


C.

NAT traversal function deletes the verification process of the UDP port number during the IKE negotiation process, and implements the discovery function of the NAT gateway device in the VPN tunnel. That is, if the NAT gateway device is found, it will be used in the subsequent IPSec data transmission. UDP encapsulation


D.

IKE security mechanisms include DH Diffie-Hellman exchange and key distribution, complete forward security and SHA1 encryption algorithms.


Expert Solution
Questions # 54:

Run the display ike sa command to check the IKE SA information. The following statement is correct?

Question # 54

Options:

A.

phase 1 and phase 2 have been established


B.

negotiates through the IKE V2 protocol


C.

VPN instance name is public


D.

IPSec SA status is Ready


Expert Solution
Questions # 55:

The HRP technology can implement the standby firewall without any configuration information. All the configuration information is synchronized by the main firewall to the standby firewall through HRP, and the configuration information is not lost after the restart.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 56:

Which of the following protocol messages cannot be propagated in an IPSec tunnel by default?

Options:

A.

TCP


B.

UDP


C.

ICMP


D.

IGMP


Expert Solution
Questions # 57:

The USG series firewall is deployed on an enterprise network. You need to log in to the USG through telnet or ssh. Each command entered by the user must be authorized by the server to continue. Which of the following authentication methods can meet the requirements of the enterprise?

Options:

A.

Radius


B.

LDAP


C.

HWTACACS


D.

AD


Expert Solution
Questions # 58:

The dual-system hot backup load balancing service interface works at Layer 3, and the upstream and downstream routers are connected to each other. The two USG devices are active and standby. Therefore, both the hrp track master and the hrp track slave must be configured on the morning service interface.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 59:

The network administrator of a company discards traffic that exceeds the throughput of the device. The USG discards the traffic that exceeds the device throughput. The USG discards the traffic that exceeds the device throughput. The following command can achieve this function?

Options:

A.

utm bypass enable


B.

undo utm bypass enable


C.

ips bypass enable


D.

undo ips bypass enable


Expert Solution
Questions # 60:

The topology of the BFD-bound static route is as follows: The administrator has configured the following on firewall A: [USG9000_A] bfd [USG9000_A-bfd] quit [USG9000_A] bfd aa bind peer-ip 1.1.1.2 [USG9000_A- Bfd session-aa] discriminator local 10 [USG9000_A-bfd session-aa] discriminator remote 20 Which of the following configurations can be added to the firewall to implement BFD-bound static routes?

Question # 60

Options:

A.

[USG9000_A-bfd session-aa] commit


B.

[USG9000_A]bfd aa bind local-ip 1.1.1.1


C.

[USG9000_A]ip route-static 0.0.0.0 0 1.1.1.2 track bfd-session aa


D.

[USG9000_A] ip route-static 0.0.0.0 0 1.1.1.2 bfd-session aa


Expert Solution
Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions