New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following H12-222 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H12-222 Exam Dumps - Huawei Certified Network Professional-R&S-IENP

Go to page:
Question # 17

Which of the following statements regarding Free Mobility of the Agile Controller are true? (Multiple Choice)

A.

When administrators configure Free Mobility, they need to select proper authentication points and policy execution points.

B.

In the Free Mobility, Administrators can add static network segments or server resources to security groups, and manually bind their IP addresses to the security groups.

C.

Free Mobility uses a configuration matrix to define access permissions between two security groups such as users and servers.

D.

Free Mobility defines higher forwarding priorities for the VIP user group to ensure their network experience.

Full Access
Question # 18

On the MPLS network shown in the following figure, which of the following statements are true? (Multiple Choice)

A.

The switch uses the directly-connected interface to set up a TCP connection.

B.

The switch's peer LDP ID is an interface IP address of the peer device.

C.

The switch's peer LDP ID is the MPLS LSR ID of the peer device.

D.

The switch uses the LSR ID to set up a TCP connection.

Full Access
Question # 19

Which remote alarm notification modes are supported by eSight? (Multiple Choice)

A.

Email

B.

Voice

C.

SMS message

D.

WeChat

Full Access
Question # 20

Which of the following statements regarding the free mobility application scenario of the Agile Controller is false?

A.

The Agile Controller uniformly deploys permission policies for controlling server access from personnel in each department. The administrator needs to focus on access permissions between departments. A key device in the campus can function as the policy execution point. After the deployment is complete, users can obtain access permissions no matter where they are and what access mode is used.

B.

Policies are deployed automatically to control access between outsourcing personnel and

employees by policies and IP addresses, while ensuring correct the network access permissions of each user. It can also control data sharing among team members to guarantee enterprise data security.

C.

When gateway resources are limited, automatic gateway selection and preferential forwarding of packets from VIP users guarantee fine network experience of VIP users.

D.

The Agile Controller can automatically identify office requirements of working staff, without the need for manual configurations. Users can obtain network access permissions anytime, anywhere.

Full Access
Question # 21

Which of the following statements is false?

A.

LSPs are classified into static and dynamic LSPs. A static LSP is manually configured by an administrator. Adynamic LSP is dynamically established using routing and label distribution protocols.

B.

When labels are allocated manually, ensure that the outgoing label of an upstream node is the same as the incoming label of the downstream node.

C.

LSPs created by static Distribution labels can be dynamically adjusted according to network topology changes, without the need for administrator intervention.

D.

Dynamic LSPs are established using label distribution protocols, such as MP-BGP, RSVP-TE, and LDP.

Full Access
Question # 22

DHCP snooping is a security feature. Which of the following statements regarding DHCP snooping is false?

A.

The DHCP snooping binding table contains dynamic binding entries and static binding entries.

B.

DHCP snooping distinguishes the trusted interface and untrusted interfaces. Untrusted interfaces do not process DHCP Reply packets.

C.

The static binding table is manually set on the inbound interface and the aging time is also manually set.

D.

When DHCP snooping is used at Layer 2, the interface information also can be obtained for the binding table if the Option 82 function is not configured.

Full Access
Question # 23

Application Specific Packet Filter (ASPF) is packet filtering based on the application layer. ASPF checks application layer protocol information, monitors the application layer protocol status of connections, and uses the Servermap table to achieve a special security mechanism. Which of the following statements regarding ASPF and Servermap is false?

A.

ASPF monitors packets during communication.

B.

ASPF dynamically creates and deletes filtering rules.

C.

ASPF uses the Servermap table to dynamically allow data of multi-channel protocols through.

D.

The five-tuple Server-map entry implements a similar function to the session table.

Full Access
Question # 24

What is the default sending interval of BFD packets?

A.

5s

B.

100ms

C.

1000ms

D.

10s

Full Access
Go to page: