Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

H12-721 Huawei Certified ICT Professional - Constructing Infrastructure of Security Network is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

H12-721 Practice Questions

Huawei Certified ICT Professional - Constructing Infrastructure of Security Network

Last Update 3 days ago
Total Questions : 217

Dive into our fully updated and stable H12-721 practice test platform, featuring all the latest Huawei Certified Network Professional HCNP exam questions added this week. Our preparation tool is more than just a Huawei study aid; it's a strategic advantage.

Our free Huawei Certified Network Professional HCNP practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about H12-721. Use this test to pinpoint which areas you need to focus your study on.

H12-721 PDF

H12-721 PDF (Printable)
$43.75
$124.99

H12-721 Testing Engine

H12-721 PDF (Printable)
$50.75
$144.99

H12-721 PDF + Testing Engine

H12-721 PDF (Printable)
$63.7
$181.99
Question # 11

The network of an enterprise is as follows. At this time, server A cannot access the web service of server

B.  

The administrator performs troubleshooting and finds that there is no problem in the routing mode of firewall

A.  

The corresponding routing table has been established, but the firewall mode of firewall A is set. error. What is the method used by the administrator to troubleshoot the problem?

Question # 11

Options:

A.  

layering method

B.  

segmentation method

C.  

replacement method

D.  

block method

Discussion 0
Question # 12

What are the correct descriptions of IPSec and IKE below?

Options:

A.  

IPSec has two negotiation modes to establish an S

A.  

One is manual (manual) and the other is IKE (isakmp) auto-negotiation.

B.  

IKE aggressive mode can choose to find the corresponding authentication key according to the negotiation initiator IP address or ID and finally complete the negotiation.

C.  

NAT traversal function deletes the verification process of the UDP port number during the IKE negotiation process, and implements the discovery function of the NAT gateway device in the VPN tunnel. That is, if the NAT gateway device is found, it will be used in the subsequent IPSec data transmission. UDP encapsulation

D.  

IKE security mechanisms include DH Diffie-Hellman exchange and key distribution, complete forward security and SHA1 encryption algorithms.

Discussion 0
Question # 13

The topology diagram of the BFD-bound static route is as follows: The administrator has configured the following on firewall A: [USG9000_A] bfd [USG9000_A-bfd] quit [USG9000_A] bfd aa bind peer-ip 1.1.1.2 [USG9000_A- Bfd session-aa] discriminator local 10 [USG9000_A-bfd session-aa] discriminator remote 20 [USG9000_A-bfd session-aa] commit [USG9000_A-bfd session-aa] quit What are the correct statements about this segment?

Question # 13

Options:

A.  

command bfd aa bind peer-ip 1.1.1.2 is used to create a BFD session binding policy for detecting link status.

B.  

"[USG9000_A] bfd" is incorrectly configured in this command and should be changed to [USG9000_A] bfd enable to enable BFD function.

C.  

[USG9000_A-bfd session-aa] commit is optional. If no system is configured, the system will submit the BFD session log information by default.

D.  

The command to bind a BFD session to a static route is also required: [USG9000_A]ip route-static 0.0.0.0 0 1.1.1.2 track bfd-session aa

Discussion 0
Question # 14

In the application scenario of IPSec traversal by NAT, the active initiator of the firewall must configure NAT traversal, and the firewall at the other end can be configured without NAT traversal.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 15

What type of message is the VRRP hello message?

Options:

A.  

unicast message

B.  

broadcast message

C.  

multicast packet

D.  

UDP packet

Discussion 0
Question # 16

On the following virtual firewall network, the USG unified security gateway provides leased services to the enterprise. The VPN instance vfw1 is leased to enterprise

A.  

The networking diagram is as follows. The PC C of the enterprise A external network user needs to access the intranet DMZ area server B through NAT. To achieve this requirement, what are the following key configurations?

Question # 16

Options:

A.  

[USG] ip vpn-instance vfw1 vpn-id

B.  

[USG] ip vpn-instance vfw1 [USG-vpn-vfw1] route-distinguisher 100:1 [USG-vpn-vfw1] quit

C.  

[USG] nat server zone vpn-instance vfw1 untrust global 2.1.2.100 inside 192.168.1.2 vpn-instance vfw1

D.  

[USG]nat address-group 1 2.1.2.5 2.1.2.10 vpn-instance vfw1

Discussion 0
Question # 17

An enterprise network is as follows. Firewall A and firewall B establish an IPSec VPN. After the IPSec configuration is complete, the administrator needs to test the connectivity of the IPSec VPN. Generally, the firewall needs to simulate the traffic of the server A to access the intranet server

B.  

The administrator can use which of the following ping commands.

Question # 17

Options:

A.  

ping -a

B.  

ping -c

C.  

ping -t

D.  

ping -s

Discussion 0
Question # 18

The SSL VPN authentication login is unsuccessful and the message "Bad username or password" is displayed. Which one is wrong?

Options:

A.  

username and password are entered incorrectly

B.  

user or group filter field configuration error

C.  

certificate filter field configuration error

D.  

administrator configured a policy to limit the source IP address of the terminal

Discussion 0
Question # 19

The classification of cyber-attacks includes traffic-based attacks, scanning and snooping attacks, malformed packet attacks, and special packet attacks.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 20

Networking as shown in the figure: PC1--USG--Router--PC2. If PC1 sends a packet to PC2, what are the three modes for the USG to process fragmented packets?

Options:

A.  

fragment cache

B.  

fragmentation

C.  

slice direct forwarding

D.  

slice defense

Discussion 0
Get H12-721 dumps and pass your exam in 24 hours!

Free Exams Sample Questions