Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Huawei Certified ICT Professional - Constructing Infrastructure of Security Network

Last Update 20 hours ago Total Questions : 217

The Huawei Certified ICT Professional - Constructing Infrastructure of Security Network content is now fully updated, with all current exam questions added 20 hours ago. Deciding to include H12-721 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our H12-721 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these H12-721 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Huawei Certified ICT Professional - Constructing Infrastructure of Security Network practice test comfortably within the allotted time.

Question # 31

In the DDoS attack defense, if the service learning function is used to find that there is no service or traffic of a certain service in normal traffic, you can use the blocking or traffic limiting method to defend against attacks on the Anti-DDoS device. .

A.

TRUE

B.

FALSE

Question # 32

In the IPSec active/standby link backup application scenario, gateway B uses IPSec tunneling technology and gateway A to establish an IPSec VPN.

A.

TRUE

B.

FALSE

Question # 33

An enterprise network is as follows. At this time, server A cannot access server B. The administrator performs troubleshooting. It finds that server A can access firewall A, but cannot access firewall B. What is the method for administrators to use to troubleshoot problems?

A.

layering method

B.

segmentation method

C.

replacement method

D.

block method

Question # 34

IPSec NAT traversal does not support IKE main mode, aggressive mode IP address + pre-shared key mode authentication, because pre-shared key mode authentication needs to extract the source IP address in the IP address to find the pre-shared key corresponding to this address. . The address change caused by the presence of NAT prevents the device from finding the pre-shared key.

A.

TRUE

B.

FALSE

Question # 35

In Huawei ' s abnormal traffic cleaning solution, the characteristics of the straight-line deployment mode and the bypass deployment mode are correct.

A.

straight path deployment method requires separate deployment of detection equipment

B.

side deployment mode requires separate deployment of detection equipment

C.

bypass deployment mode is more flexible than the direct route deployment mode. You can use static drainage or dynamic drainage.

D.

Straight-line deployment mode Anti-DDoS device performs real-time drainage on all traffic passing through

Question # 36

The constraints of the policy in the traffic limiting policy include quintuple, time period, user identity, and application protocol.

A.

TRUE

B.

FALSE

Question # 37

The load balancing function is configured on the USG firewall for three FTP servers. The IP addresses and weights of the three physical servers are 10.1.13/24 (weight 16); 10.1.1.4/24 (weight 32); 10.1.1.5 /24 (weight 16), and the virtual server address is 202.152.26.123/24. A PC with the host address of 202.152.26.3/24 initiates access to the FTP server. Run the display firewall session table command on the firewall to check the configuration. Which of the following conditions indicates that the load balancing function is successfully implemented?

A.

< USG > display firewall session table Current total sessions: 1 ftp VPN: public-- > public 202.152.26.3:3327-- > 10.1.1.4:21

B.

< USG > display firewall session table Current total sessions:3 ftp VPN: public 202.152.26.3:3327-- > 202.152.26.123:21[10.1.1.3:21] ftp VPN:public-- > public 202.152.26.3:3327 -- > 202.152.26.123:21[10.1.1.4:21] ftp VPN: public-- > public 202.152.26.3:3327-- > 202.152.26.123:21[10.1.1.5:21]

C.

< USG > display firewall session table Current total sessions: 1 ftp VPN: 202.152.26.3:3327-- > 202.152.26.123:21

D.

< USG > display firewall session table Current total sessions: 3 ftp VPN: ftp VPN: public 202.152.26.3:3327-- > 202.152.26.123:21[10.1.1.3:21] ftp VPN: public-- > public 202.152. 26.3:3327-- > 10.1.1.4:21 ftp VPN:public-- > public 202.152.26.3:3327-- > 10.1.1.4:21 ftp VPN:public-- > public 202.152.26.3:3327-- > 10.1. 1.5:21

Question # 38

Which of the following is the correct description of the SMURF attack?

A.

The attacker sends an ICMP request with the destination address or the source address as the broadcast address, causing all hosts or designated hosts of the attacked network to answer, eventually causing the network to crash or the host to crash.

B.

The attacker sends the SYN-ACK message to the attacker ' s IP address.

C.

The attacker can send UDP packets to the network where the attacker is located. The source address of the packet is the address of the attacked host. The destination address is the broadcast address or network address of the subnet where the attacked host resides. The destination port number is 7 or 19.

D.

The attacker uses the network or the host to receive unreachable ICMP packets. The subsequent packets destined for this destination address are considered unreachable, thus disconnecting the destination from the host.

Question # 39

The following figure shows the data packet of the pre-shared key mode main mode exchange process in the first phase of IKE V1. What is captured below?

A.

exchange D-H public value and various auxiliary data

B.

SA suggested strategy

C.

authentication

D.

encryption transformation strategy

Question # 40

Huawei ' s abnormal traffic cleaning solution must deploy an independent testing center.

A.

TRUE

B.

FALSE

Go to page: