Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

H12-721 Huawei Certified ICT Professional - Constructing Infrastructure of Security Network is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

H12-721 Practice Questions

Huawei Certified ICT Professional - Constructing Infrastructure of Security Network

Last Update 3 days ago
Total Questions : 217

Dive into our fully updated and stable H12-721 practice test platform, featuring all the latest Huawei Certified Network Professional HCNP exam questions added this week. Our preparation tool is more than just a Huawei study aid; it's a strategic advantage.

Our free Huawei Certified Network Professional HCNP practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about H12-721. Use this test to pinpoint which areas you need to focus your study on.

H12-721 PDF

H12-721 PDF (Printable)
$43.75
$124.99

H12-721 Testing Engine

H12-721 PDF (Printable)
$50.75
$144.99

H12-721 PDF + Testing Engine

H12-721 PDF (Printable)
$63.7
$181.99
Question # 21

When the user's SSL VPN has been successfully authenticated, the user cannot access the Web-link resource. On the Web server, view the information as follows: netstat -anp tcp With the following information, which of the following statements is correct?

Question # 21

Options:

A.  

intranet server does not open web service

B.  

virtual gateway policy configuration error

C.  

The connection between the virtual gateway and the intranet server is incorrect.

D.  

Virtual gateway and intranet server are unreachable

 

Discussion 0
Question # 22

What are the scenarios in which the USG series firewall service port sends gratuitous ARPs when the following configurations are performed?

Options:

A.  

routing mode + switch

B.  

routing mode + router

C.  

exchange mode + switch

D.  

exchange mode + router

Discussion 0
Question # 23

What are the three elements of an abnormal flow cleaning solution?

Options:

A.  

cleaning center

B.  

Testing Center

C.  

Management Center

D.  

Collection Center

Discussion 0
Question # 24

About load balancing, the following configuration is available: [USG] slb enable [USG]slb [USG-slb] rserver 1 rip 10.1.1.3 weight 32 [USG-slb] rserver 2 rip 10.1.1.4 weight 16 [USG-slb] rserver 3 rip 10.1.1.5 weight 32 [USG-slb] group test [USG-slb-group-test]metric srchash [USG-slb-group-test] add rserver 1 [USG-slb-group-test] add rserver 2 [ USG-slb-group-test] add rserver 3 Which of the following statements is correct?

Options:

A.  

load balancing algorithm is a polling algorithm

B.  

This configuration is a complete load balancing configuration

C.  

determines which server the data stream should flow to based on the weight value. The smaller the weight value, the weaker the processing power of the corresponding real server.

D.  

weight represents the weight of the real server

Discussion 0
Question # 25

When the user logs in to the virtual gateway web page and prompts “Cannot display web page”, what is the possible cause of the failure?

Options:

A.  

user PC and virtual gateway are unreachable

B.  

The IP address of the virtual gateway has been changed.

C.  

uses a shared virtual gateway

D.  

client browser set proxy server

Discussion 0
Question # 26

For IP-MAC address binding, packets with matching IP and MAC address will enter the next processing flow of the firewall. Packets that do not match IP and MAC address will be discarded.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 27

The first packet discarding technology of Huawei Anti-DDoS devices can defend against attack packets that continuously change the source IP address or source port number. The following is incorrect about the first packet discarding technology?

Options:

A.  

UDP protocol does not have a retransmission mechanism, so the first packet drop technique cannot be used.

B.  

The first packet is discarded in combination with source authentication to prevent false source attacks.

C.  

matches the packet based on the triplet (source IP address, source port, protocol), and judges the first packet by the interval of the packet.

D.  

The packet sending interval is lower than the first packet detection rate lower limit, or the packet higher than the first packet detection rate upper limit is considered to be the first packet.

Discussion 0
Question # 28

The DHCP snooping function needs to maintain the binding table. What are the contents of the binding table?

Options:

A.  

MAC

B.  

Vlan

C.  

interface

D.  

DHCP Server IP

Discussion 0
Question # 29

Which of the following is incorrect about IKE V1 and IKE V2?

Options:

A.  

IKE V2 establishes a pair of IPSec SAs. Normally, an IKE SA and a pair of IPSec SAs can be completed by exchanging 4 messages twice.

B.  

IKE V2 does not have the concept of master mode and barb mode

C.  

To establish a pair of IPSec SAs, only 6 messages need to be exchanged in the IKE V1 master mode.

D.  

When the IPSec SA established by D IKE V2 is greater than one pair, each pair of SAs needs only one additional exchange, that is, two messages can be completed.

Discussion 0
Question # 30

Using the virtual firewall technology, users on the two VPNs can log in to their private VPNs through the Root VFW on the public network to directly access private network resources. What are the following statements about the characteristics of the VPN multi-instance service provided by the firewall?

Options:

A.  

security is high, VPN users access through the firewall authentication and authorization, access after access is to use a separate virtual firewall system to manage users, the resources of different VPN users are completely isolated

B.  

VPN access mode is flexible and reliable. It can support from public network to VPN, and can also support from VPN to VPN.

C.  

is easy to maintain, users can manage the entire firewall (including each virtual firewall) without a system administrator account with super user privileges.

D.  

The access control authority is strict. The firewall can control the access rights of the VPN according to the user name and password. This allows different users such as travel employees and super users (need to access different VPN resources) to have different access rights.

Discussion 0
Get H12-721 dumps and pass your exam in 24 hours!

Free Exams Sample Questions