New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following H12-223 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H12-223 Exam Dumps - Huawei Certified Network Professional-R&S-IEEP

Go to page:
Question # 17

A local key pair must be configured for a device working as an SSH server.

A.

TRUE

B.

FALSE

Full Access
Question # 18

Which of the following statements regarding NMS usage are true? (Multiple Choice)

A.

The NMS supports alarm management. For example, the Up/Down change of a port can be immediately reported to the NMS through trap, so that the network administrator can discover and rectify network faults in a timely manner.

B.

The NMS supports performance management. It automatically collects statistics about the CPU usage and memory usage of devices, helping the network administrator analyze network performance bottlenecks.

C.

The NMS supports configuration file management, including automatically backing up, comparing, and restoring the configuration file, allowing the network administrator to configure automatic batch configuration file backup.

D.

Based on user requirements, the NMS can generate reports periodically, providing reference for subsequent network optimization.

Full Access
Question # 19

Which of the following is the purpose of access security optimization?

A.

To ensure that sensitive management information will not be intercepted.

B.

To prevent or reduce external network attacks and harm.

C.

To ensure secure access to key services.

D.

To achieve secure user access control.

Full Access
Question # 20

A network administrator fails to access devices on the internal network through Telnet. Which of the following causes is the most impossible?

A.

The route is unreachable, and the client fails to establish a TCP connection with the server.

B.

The number of login users reaches the upper limit.

C.

An ACL is bound in the VTY user interface view.

D.

The protocol inbound all command is configured in the VTY user interface view.

Full Access
Question # 21

The migration rollback time can be determined based on the actual migration situation without the need to plan in advance.

A.

TRUE

B.

FALSE

Full Access
Question # 22

Which of the following statements regarding border security optimization are true? (Multiple Choice)

A.

Border security optimization aims to prevent or reduce external network attacks and harm.

B.

The optimization position is usually located at the network edge.

C.

Optimization measures include attack defense technologies, packet filtering, and hardware firewalls.

D.

Border security optimization aims to achieve secure user access control.

Full Access
Question # 23

During follow-up operations of the structured network troubleshooting process, which of the following parties does not require advertisement of information?

A.

Parties affected by the fault

B.

Authorization parties in each phase of troubleshooting

C.

Other vendors and service providers

D.

Users who are interested in the root cause for the fault

Full Access
Question # 24

Software upgrade operations are similar for Huawei datacom products. Therefore, before a software upgrade, you only need to briefly read the upgrade guide.

A.

TRUE

B.

FALSE

Full Access
Go to page: