Labour Day Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! H12-721 Huawei Certified ICT Professional - Constructing Infrastructure of Security Network is now Stable and With Pass Result

H12-721 Practice Exam Questions and Answers

Huawei Certified ICT Professional - Constructing Infrastructure of Security Network

Last Update 5 days ago
Total Questions : 217

Huawei Certified ICT Professional - Constructing Infrastructure of Security Network is stable now with all latest exam questions are added 5 days ago. Incorporating H12-721 practice exam questions into your study plan is more than just a preparation strategy.

By familiarizing yourself with the Huawei Certified ICT Professional - Constructing Infrastructure of Security Network exam format, identifying knowledge gaps, applying theoretical knowledge in Huawei practical scenarios, you are setting yourself up for success. H12-721 exam dumps provide a realistic preview, helping you to adapt your preparation strategy accordingly.

H12-721 exam questions often include scenarios and problem-solving exercises that mirror real-world challenges. Working through H12-721 dumps allows you to practice pacing yourself, ensuring that you can complete all Huawei Certified ICT Professional - Constructing Infrastructure of Security Network exam questions within the allotted time frame without sacrificing accuracy.

H12-721 PDF

H12-721 PDF (Printable)
$48
$119.99

H12-721 Testing Engine

H12-721 PDF (Printable)
$56
$139.99

H12-721 PDF + Testing Engine

H12-721 PDF (Printable)
$70.8
$176.99
Question # 1

Which of the following protocol messages cannot be propagated in an IPSec tunnel by default?

Options:

A.  

TCP

B.  

UDP

C.  

ICMP

D.  

IGMP

Discussion 0
Question # 2

The following are traffic-type attacks.

Options:

A.  

IP Flood attack

B.  

HTTP Flood attack

C.  

IP address scanning attack

D.  

ICMP redirect packet attack

Discussion 0
Question # 3

87. The SSL VPN scenario under dual-system hot standby is shown in the following figure. The administrator has enabled the SSL network extension function. The following is about the configuration of the SSL VPN function.

Question # 3

Options:

A.  

virtual gateway created on the master side will not be synchronized to the slave side.

B.  

Bind the address pool to VRRP backup group 2 when configuring network extensions.

C.  

The virtual gateway IP address of the SSL VPN in C USG_A must use 202.38.10.2

D.  

The virtual gateway IP address of the SSL VPN in D USG_B must use 10.100.10.2.

Discussion 0
Question # 4

The following figure shows the L2TP over IPSec application scenario. The client uses the pre-shared-key command to perform IPSec authentication. How should the IPSec security policy be configured on the LNS?

Options:

A.  

uses IKE master mode for negotiation

B.  

Negotiate in IKE aggressive mode

C.  

IPSec security policy

D.  

Configuring an IPSec Policy Template

Discussion 0
Question # 5

Three physical interfaces have been added to the link-group group. When any one of the interfaces fails, what are the following descriptions correct?

Options:

A.  

If any interface in group A fails, the system sets the status of other interfaces in the group to down.

B.  

Any interface in group B fails, and the status of other interfaces in the group does not change.

C.  

After the interfaces in the group are restored to normal, the interfaces in the entire group are reset to up.

D.  

After all the interfaces in the group are restored, the interfaces in the entire group are reset to up.

Discussion 0
Question # 6

The Haiwei Secoway VPN client initiates an L2TP connection. The source port of the L2TP packet is 1710 and the port 1710 of the destination port.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 7

When the ip-link link health check is performed, if it is unable to receive the message several times in the absence of the link, it will be considered as a link failure.

Options:

A.  

1 time

B.  

2 times

C.  

3 times

D.  

5 times

Discussion 0
Question # 8

134. Which of the following is the connection status data to be backed up in the HRP function?

Options:

A.  

ServerMap entry

B.  

port mapping table

C.  

dynamic blacklist

D.  

Session entry

Discussion 0
Question # 9

Which of the following statements is correct about the IKE main mode and the aggressive mode?

Options:

A.  

All negotiation packets in the first phase of the aggressive mode are encrypted.

B.  

All the negotiation packets of the first phase in the main mode are encrypted.

C.  

barbarian mode uses DH algorithm

D.  

will enter the fast mode regardless of whether the negotiation is successful or not.

Discussion 0
Question # 10

IPSec NAT traversal does not support IKE main mode, aggressive mode IP address + pre-shared key mode authentication, because pre-shared key mode authentication needs to extract the source IP address in the IP address to find the pre-shared key corresponding to this address. . The address change caused by the presence of NAT prevents the device from finding the pre-shared key.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 11

The network of an enterprise is as follows. At this time, server A cannot access the web service of server

B.  

The administrator performs troubleshooting and finds that there is no problem in the routing mode of firewall

A.  

The corresponding routing table has been established, but the firewall mode of firewall A is set. error. What is the method used by the administrator to troubleshoot the problem?

Question # 11

Options:

A.  

layering method

B.  

segmentation method

C.  

replacement method

D.  

block method

Discussion 0
Question # 12

What are the correct descriptions of IPSec and IKE below?

Options:

A.  

IPSec has two negotiation modes to establish an S

A.  

One is manual (manual) and the other is IKE (isakmp) auto-negotiation.

B.  

IKE aggressive mode can choose to find the corresponding authentication key according to the negotiation initiator IP address or ID and finally complete the negotiation.

C.  

NAT traversal function deletes the verification process of the UDP port number during the IKE negotiation process, and implements the discovery function of the NAT gateway device in the VPN tunnel. That is, if the NAT gateway device is found, it will be used in the subsequent IPSec data transmission. UDP encapsulation

D.  

IKE security mechanisms include DH Diffie-Hellman exchange and key distribution, complete forward security and SHA1 encryption algorithms.

Discussion 0
Question # 13

The topology diagram of the BFD-bound static route is as follows: The administrator has configured the following on firewall A: [USG9000_A] bfd [USG9000_A-bfd] quit [USG9000_A] bfd aa bind peer-ip 1.1.1.2 [USG9000_A- Bfd session-aa] discriminator local 10 [USG9000_A-bfd session-aa] discriminator remote 20 [USG9000_A-bfd session-aa] commit [USG9000_A-bfd session-aa] quit What are the correct statements about this segment?

Question # 13

Options:

A.  

command bfd aa bind peer-ip 1.1.1.2 is used to create a BFD session binding policy for detecting link status.

B.  

"[USG9000_A] bfd" is incorrectly configured in this command and should be changed to [USG9000_A] bfd enable to enable BFD function.

C.  

[USG9000_A-bfd session-aa] commit is optional. If no system is configured, the system will submit the BFD session log information by default.

D.  

The command to bind a BFD session to a static route is also required: [USG9000_A]ip route-static 0.0.0.0 0 1.1.1.2 track bfd-session aa

Discussion 0
Question # 14

In the application scenario of IPSec traversal by NAT, the active initiator of the firewall must configure NAT traversal, and the firewall at the other end can be configured without NAT traversal.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 15

What type of message is the VRRP hello message?

Options:

A.  

unicast message

B.  

broadcast message

C.  

multicast packet

D.  

UDP packet

Discussion 0
Question # 16

On the following virtual firewall network, the USG unified security gateway provides leased services to the enterprise. The VPN instance vfw1 is leased to enterprise

A.  

The networking diagram is as follows. The PC C of the enterprise A external network user needs to access the intranet DMZ area server B through NAT. To achieve this requirement, what are the following key configurations?

Question # 16

Options:

A.  

[USG] ip vpn-instance vfw1 vpn-id

B.  

[USG] ip vpn-instance vfw1 [USG-vpn-vfw1] route-distinguisher 100:1 [USG-vpn-vfw1] quit

C.  

[USG] nat server zone vpn-instance vfw1 untrust global 2.1.2.100 inside 192.168.1.2 vpn-instance vfw1

D.  

[USG]nat address-group 1 2.1.2.5 2.1.2.10 vpn-instance vfw1

Discussion 0
Question # 17

An enterprise network is as follows. Firewall A and firewall B establish an IPSec VPN. After the IPSec configuration is complete, the administrator needs to test the connectivity of the IPSec VPN. Generally, the firewall needs to simulate the traffic of the server A to access the intranet server

B.  

The administrator can use which of the following ping commands.

Question # 17

Options:

A.  

ping -a

B.  

ping -c

C.  

ping -t

D.  

ping -s

Discussion 0
Question # 18

The SSL VPN authentication login is unsuccessful and the message "Bad username or password" is displayed. Which one is wrong?

Options:

A.  

username and password are entered incorrectly

B.  

user or group filter field configuration error

C.  

certificate filter field configuration error

D.  

administrator configured a policy to limit the source IP address of the terminal

Discussion 0
Question # 19

The classification of cyber-attacks includes traffic-based attacks, scanning and snooping attacks, malformed packet attacks, and special packet attacks.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 20

Networking as shown in the figure: PC1--USG--Router--PC2. If PC1 sends a packet to PC2, what are the three modes for the USG to process fragmented packets?

Options:

A.  

fragment cache

B.  

fragmentation

C.  

slice direct forwarding

D.  

slice defense

Discussion 0
Question # 21

When the user's SSL VPN has been successfully authenticated, the user cannot access the Web-link resource. On the Web server, view the information as follows: netstat -anp tcp With the following information, which of the following statements is correct?

Question # 21

Options:

A.  

intranet server does not open web service

B.  

virtual gateway policy configuration error

C.  

The connection between the virtual gateway and the intranet server is incorrect.

D.  

Virtual gateway and intranet server are unreachable

 

Discussion 0
Question # 22

What are the scenarios in which the USG series firewall service port sends gratuitous ARPs when the following configurations are performed?

Options:

A.  

routing mode + switch

B.  

routing mode + router

C.  

exchange mode + switch

D.  

exchange mode + router

Discussion 0
Question # 23

What are the three elements of an abnormal flow cleaning solution?

Options:

A.  

cleaning center

B.  

Testing Center

C.  

Management Center

D.  

Collection Center

Discussion 0
Question # 24

About load balancing, the following configuration is available: [USG] slb enable [USG]slb [USG-slb] rserver 1 rip 10.1.1.3 weight 32 [USG-slb] rserver 2 rip 10.1.1.4 weight 16 [USG-slb] rserver 3 rip 10.1.1.5 weight 32 [USG-slb] group test [USG-slb-group-test]metric srchash [USG-slb-group-test] add rserver 1 [USG-slb-group-test] add rserver 2 [ USG-slb-group-test] add rserver 3 Which of the following statements is correct?

Options:

A.  

load balancing algorithm is a polling algorithm

B.  

This configuration is a complete load balancing configuration

C.  

determines which server the data stream should flow to based on the weight value. The smaller the weight value, the weaker the processing power of the corresponding real server.

D.  

weight represents the weight of the real server

Discussion 0
Question # 25

When the user logs in to the virtual gateway web page and prompts “Cannot display web page”, what is the possible cause of the failure?

Options:

A.  

user PC and virtual gateway are unreachable

B.  

The IP address of the virtual gateway has been changed.

C.  

uses a shared virtual gateway

D.  

client browser set proxy server

Discussion 0
Question # 26

For IP-MAC address binding, packets with matching IP and MAC address will enter the next processing flow of the firewall. Packets that do not match IP and MAC address will be discarded.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 27

The first packet discarding technology of Huawei Anti-DDoS devices can defend against attack packets that continuously change the source IP address or source port number. The following is incorrect about the first packet discarding technology?

Options:

A.  

UDP protocol does not have a retransmission mechanism, so the first packet drop technique cannot be used.

B.  

The first packet is discarded in combination with source authentication to prevent false source attacks.

C.  

matches the packet based on the triplet (source IP address, source port, protocol), and judges the first packet by the interval of the packet.

D.  

The packet sending interval is lower than the first packet detection rate lower limit, or the packet higher than the first packet detection rate upper limit is considered to be the first packet.

Discussion 0
Question # 28

The DHCP snooping function needs to maintain the binding table. What are the contents of the binding table?

Options:

A.  

MAC

B.  

Vlan

C.  

interface

D.  

DHCP Server IP

Discussion 0
Question # 29

Which of the following is incorrect about IKE V1 and IKE V2?

Options:

A.  

IKE V2 establishes a pair of IPSec SAs. Normally, an IKE SA and a pair of IPSec SAs can be completed by exchanging 4 messages twice.

B.  

IKE V2 does not have the concept of master mode and barb mode

C.  

To establish a pair of IPSec SAs, only 6 messages need to be exchanged in the IKE V1 master mode.

D.  

When the IPSec SA established by D IKE V2 is greater than one pair, each pair of SAs needs only one additional exchange, that is, two messages can be completed.

Discussion 0
Question # 30

Using the virtual firewall technology, users on the two VPNs can log in to their private VPNs through the Root VFW on the public network to directly access private network resources. What are the following statements about the characteristics of the VPN multi-instance service provided by the firewall?

Options:

A.  

security is high, VPN users access through the firewall authentication and authorization, access after access is to use a separate virtual firewall system to manage users, the resources of different VPN users are completely isolated

B.  

VPN access mode is flexible and reliable. It can support from public network to VPN, and can also support from VPN to VPN.

C.  

is easy to maintain, users can manage the entire firewall (including each virtual firewall) without a system administrator account with super user privileges.

D.  

The access control authority is strict. The firewall can control the access rights of the VPN according to the user name and password. This allows different users such as travel employees and super users (need to access different VPN resources) to have different access rights.

Discussion 0
Question # 31

Site to Site IPSec VPN negotiation failed. Which of the following should be checked? 1. Network connectivity issues; 2. View the establishment of IKE phase 1 security associations and related configurations; 3. View the establishment of IKE phase 2 security associations and related configurations; 4. See if the security ACLs at both ends mirror each other.

Options:

A.  

1 4 2 3

B.  

4 2 3 1

C.  

2 3 1 4

D.  

4 1 2 3

Discussion 0
Question # 32

Which of the following is a disadvantage of L2TP VPN?

Options:

A.  

working on layer 2 cannot be routed

B.  

must use L2TP Over IPSec to use

C.  

has no authentication function

D.  

no encryption

Discussion 0
Get H12-721 dumps and pass your exam in 24 hours!

Free Exams Sample Questions