Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

H12-721 Exam Dumps - Huawei Certified ICT Professional - Constructing Infrastructure of Security Network

Question # 4

The ip-link sends a probe packet to the specified IP address. By default, after 3 probe failures, the link to this IP address is considered faulty.

A.

TRUE

B.

FALSE

Full Access
Question # 5

Based on the following information analysis on the firewall, which of the following options are correct?

A.

The first packet of this data flow enters from the Trust zone interface and is sent from the Untrust zone interface.

B.

This data stream has been NAT translated

C.

uses NPAT conversion technology

D.

firewall has virtual firewall function enabled

Full Access
Question # 6

DDoS is an abnormal packet that an attacker sends a small amount of non-traffic traffic to the attack target (usually a server, such as DNS or WEB) through the network, so that the attacked server resolves the packet when the system crashes or the system is busy.

A.

TRUE

B.

FALSE

Full Access
Question # 7

About load balancing, the following configuration is available: [USG] slb enable [USG]slb [USG-slb] rserver 1 rip 10.1.1.3 weight 32 [USG-slb] rserver 2 rip 10.1.1.4 weight 16 [USG-slb] rserver 3 rip 10.1.1.5 weight 32 [USG-slb] group test [USG-slb-group-test]metric srchash [USG-slb-group-test] add rserver 1 [USG-slb-group-test] add rserver 2 [ USG-slb-group-test] add rserver 3 Which of the following statements is correct?

A.

load balancing algorithm is a polling algorithm

B.

This configuration is a complete load balancing configuration

C.

determines which server the data stream should flow to based on the weight value. The smaller the weight value, the weaker the processing power of the corresponding real server.

D.

weight represents the weight of the real server

Full Access
Question # 8

The management control information and service information of the out-of-band management interface are sent on the same channel.

A.

TRUE

B.

FALSE

Full Access
Question # 9

In the hot standby scenario, what is the correct statement about the primary and backup backups?

A.

batch backup is to back up all information in batches after the first negotiation of two devices is completed.

B.

The backup channel must be an interface on the service board and supports GE and Eth-trunk interfaces.

C.

By default, batch backup is turned on.

D.

Real-time backup is a real-time backup of newly created or refreshed data while the device is running.

Full Access
Question # 10

Run the display ike sa command to check the IKE SA information. The following statement is correct?

A.

phase 1 and phase 2 have been established

B.

negotiates through the IKE V2 protocol

C.

VPN instance name is public

D.

IPSec SA status is Ready

Full Access
Question # 11

The console port password can be restored to the factory settings by pressing and holding the USG device Reset button for 1-3 seconds.

A.

TRUE

B.

FALSE

Full Access
Question # 12

The malformed packet attack technology uses some legitimate packets to perform reconnaissance or data detection on the network. These packets are legal application types, but only normal network packets are rarely used.

A.

TRUE

B.

FALSE

Full Access
Question # 13

The ACK flood attack uses a botnet to send a large number of ACK packets, which impacts the network bandwidth and causes network link congestion. If the number of attack packets is large, the server processing performance is exhausted, thus rejecting normal services. Under the Huawei Anti-DDoS device to prevent this attack, compare the two processing methods - strict mode and basic mode, what is correct?

A.

bypass deployment dynamic drainage using strict mode

B.

In strict mode, the cleaning device does not check the established session, that is, the ACK packet does not hit the session, and the device discards the packet directly.

C.

If the cleaning device checks that the ACK packet hits the session, the session creation reason will be checked regardless of the strict mode or the basic mode.

D.

adopts "basic mode". Even if the session is not detected on the cleaning device, the device discards several ACK packets and starts session checking.

Full Access
Question # 14

The enterprise network is as shown in the figure. On the USG_A and USG_B, hot standby is configured, and USG_A is the master device. The administrator wants to configure SSL VPN on the firewall so that branch employees can access the headquarters through SSL VPN. Which virtual gateway address should the SSL VPN be?

A.

202.38.10.2/24

B.

202.38.10.3/24

C.

202.38.10.1/24

D.

10.100.10.2/24

Full Access
Question # 15

In the client-initial mode, the L2TP dialup fails. From the debug information below, it can be seen that the most likely cause is the dialup failure.

A.

username and password are inconsistent with aaa configuration

B.

Ins name configuration error

C.

tunnel password is not configured

D.

is not enabled l2tp

Full Access
Question # 16

The hot standby and IPSec functions are combined. Which of the following statements is correct?

A.

USG supports IPSec hot standby in active/standby mode.

B.

IPSec hot standby is not supported in load balancing mode.

C.

must configure session fast backup

D.

must be configured to preempt

Full Access
Question # 17

USG dual-machine hot standby must meet certain conditions and can be used below. What are the following statements correct?

A.

major and backup equipment must have the same product model

B.

The software version of the active and standby devices must be the same.

C.

The interface IP of the active and standby devices must be the same.

D.

The primary device must be configured, and the standby device does not require any configuration.

Full Access
Question # 18

An administrator can view the IPSec status information and Debug information as follows. What is the most likely fault?

A.

local IKE policy does not match the peer IKE policy.

B.

local ike remote name does not match peer ike name

C.

local ipsec proposal does not match the peer ipsec proposal

D.

The local security acl or the peer security acl does not match.

Full Access
Question # 19

Which of the following methods is used to switch between active and standby links in the IPSec backup and backup system?

A.

hot standby

B.

link-group

C.

Eth-trunk

D.

ip-link

Full Access
Question # 20

Which of the following encryption methods does IPSec VPN use to encrypt communication traffic?

A.

public key encryption

B.

private key encryption

C.

symmetric key encryption

D.

pre-shared key encryption

Full Access
Question # 21

71. Which option is incorrect about the HTTP Flood defense principle?

A.

HTTP Flood source authentication

B.

URI detection of destination IP

C.

fingerprint learning

D.

load check

Full Access
Question # 22

Which is the correct packet encapsulation order for L2TP over IPSec?

A.

The order from the first package to the post package is PPP-->UDP-->L2TP-->IPSec

B.

The order from the first package to the back package is PPP--> L2TP-->UDP--> IPSec

C.

The order of C from pre-package to post-encapsulation is IPSec --> L2TP-->UDP--> PPP

D.

The order of D from pre-package to post-encapsulation is IPSec --> PPP --> L2TP-->UDP

Full Access
Question # 23

A user wants to limit the maximum bandwidth of the 192.168.1.0/24 network segment to 500M, and limit all IP addresses in the network segment to maintain a bandwidth of 1M. How should I configure a current limiting policy for this requirement?

A.

Configure per-IP traffic limiting. The maximum bandwidth of the host on the 192.168.1.0/24 network segment is 500M.

B.

Configure overall traffic limiting. The maximum bandwidth of the host on the network segment 192.168.1.0/24 is 1M.

C.

Configure the overall traffic limiting. The maximum bandwidth of the host on the 192.168.1.0/24 network segment is 500M.

D.

Configure the overall traffic limiting. The maximum bandwidth of the host on the network segment 192.168.1.0/24 is 500M. Then use the per-IP traffic limiting to ensure that the server bandwidth is 1M.

Full Access
Question # 24

The firewall device defends against the SYN Flood attack by using the technology of source legality verification. The device receives the SYN packet and sends the SYN-ACK probe packet to the source IP address host in the SYN packet. If the host exists, it will Which message is sent?

A.

RST message

B.

FIN message

C.

ACK message

D.

SYN message

Full Access
Question # 25

On the USG, you need to delete sslconfig.cfg in the hda1:/ directory. Which of the following commands can complete the operation?

A.

cd hda 1:/remove sslconfig.cfg

B.

cd hda 1:/delete sslconfig.cfg

C.

cd hda 1:/rmdir sslconfig.cfg

D.

cd hda 1:/mkdir sslconfig.cfg

Full Access
Question # 26

A network is as follows: The l2tp vpn is established through the VPN Client and the USG (LNS). What are the reasons for the dialup failure?

A.

The tunnel name of the A LNS is inconsistent with the tunnel name of the client.

B.

L2TP tunnel verification failed

C.

0PPP authentication failed, the PPP authentication mode set on the client PC and LNS is inconsistent.

D.

The client PC cannot obtain the IP address assigned to it from the LNS.

Full Access
Question # 27

The server health check mechanism is enabled on the USG firewall of an enterprise to detect the running status of the back-end real server (the three servers are Server A, Server B, and Server C). When the USG fails to receive the response from Server B multiple times. When the message is received, Server B will be disabled and the traffic will be distributed to other servers according to the configured policy.

A.

TRUE

B.

FALSE

Full Access
Question # 28

The topology diagram of the BFD-bound static route is as follows: The administrator has configured the following on firewall A: [USG9000_A] bfd [USG9000_A-bfd] quit [USG9000_A] bfd aa bind peer-ip 1.1.1.2 [USG9000_A- Bfd session-aa] discriminator local 10 [USG9000_A-bfd session-aa] discriminator remote 20 [USG9000_A-bfd session-aa] commit [USG9000_A-bfd session-aa] quit What are the correct statements about this segment?

A.

command bfd aa bind peer-ip 1.1.1.2 is used to create a BFD session binding policy for detecting link status.

B.

"[USG9000_A] bfd" is incorrectly configured in this command and should be changed to [USG9000_A] bfd enable to enable BFD function.

C.

[USG9000_A-bfd session-aa] commit is optional. If no system is configured, the system will submit the BFD session log information by default.

D.

The command to bind a BFD session to a static route is also required: [USG9000_A]ip route-static 0.0.0.0 0 1.1.1.2 track bfd-session aa

Full Access
Question # 29

The topology of the BFD-bound static route is as follows: The administrator has configured the following on firewall A: [USG9000_A] bfd [USG9000_A-bfd] quit [USG9000_A] bfd aa bind peer-ip 1.1.1.2 [USG9000_A- Bfd session-aa] discriminator local 10 [USG9000_A-bfd session-aa] discriminator remote 20 Which of the following configurations can be added to the firewall to implement BFD-bound static routes?

A.

[USG9000_A-bfd session-aa] commit

B.

[USG9000_A]bfd aa bind local-ip 1.1.1.1

C.

[USG9000_A]ip route-static 0.0.0.0 0 1.1.1.2 track bfd-session aa

D.

[USG9000_A] ip route-static 0.0.0.0 0 1.1.1.2 bfd-session aa

Full Access
Question # 30

With regard to the Radius agreement, what are the following statements correct?

A.

uses the UDP protocol to transmit Radius packets.

B.

authentication and authorization port number can be 1812

C.

Encrypt the account when transferring user accounts and passwords using the Radius protocol

D.

authentication and authorization port number can be 1645

Full Access
Question # 31

The HRP technology can implement the standby firewall without any configuration information. All the configuration information is synchronized by the main firewall to the standby firewall through HRP, and the configuration information is not lost after the restart.

A.

TRUE

B.

FALSE

Full Access
Question # 32

Which of the following configurations is mandatory when the IKE peer needs to be referenced to the IPSec policy template in the divquarters-branch-based IPSec VPN network (pre-shared key + traversal NAT)?

A.

ipsec proposal

B.

exchang-mode aggressive

C.

pre-shared-key

D.

remote-address

Full Access