Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Huawei Certified ICT Professional - Constructing Infrastructure of Security Network

Last Update 20 hours ago Total Questions : 217

The Huawei Certified ICT Professional - Constructing Infrastructure of Security Network content is now fully updated, with all current exam questions added 20 hours ago. Deciding to include H12-721 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our H12-721 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these H12-721 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Huawei Certified ICT Professional - Constructing Infrastructure of Security Network practice test comfortably within the allotted time.

Question # 51

The administrator can create vfw1 and vfw2 on the root firewall to provide secure multi-instance services for enterprise A and enterprise B, and configure secure forwarding policies between security zones of vfw1 and vfw2.

A.

TRUE

B.

FALSE

Question # 52

Defense against the cache server The main method of DNS request flood is to use the DNS source authentication technology:

A.

TRUE

B.

FALSE

Question # 53

Which of the following IKE Negotiation Phase 1 main mode negotiation processes is the role of Message 5 and Message 6?

A.

running DH algorithm

B.

Negotiation proposal set

C.

mutual authentication

D.

Negotiate IPSec SA

Question # 54

The virtual firewall forwards multiple instances. The firewall has multiple routing tables and forwarding tables. The addresses are overlapped and are implemented on the same configuration interface. Users with configuration rights can configure and view all data.

A.

TRUE

B.

FALSE

Question # 55

Which of the following states indicates that a BFD session has been successfully established?

A.

down

B.

init

C.

up

D.

AdminUp

Question # 56

In a dual-system hot standby network, the NAT configurations of the two USGs are consistent. When the address in the NAT address pool is on the same network segment as the virtual IP address of the VRRP backup group, the next two graphs show the ARP response of the NAT server and VRRP combination application (lack of a picture).

A.

Figure 1 binds the NAT address pool to the VRRP backup group on the interface connected to the Internet. Figure 2 Binds the NAT address pool to the VRRP backup group on the interface connected to the Internet.

B.

Figure 1 does not bind the NAT address pool to the VRRP backup group on the interface connected to the Internet. Figure 2 does not bind the NAT address pool to the VRRP backup group on the interface connected to the Internet.

C.

Figure 1 does not bind the NAT address pool to the VRRP backup group on the interface connected to the Internet. Figure 2 Binds the NAT address pool to the VRRP backup group on the interface connected to the Internet.

D.

Figure 1 does not bind the NAT address pool to the VRRP backup group on the interface connected to the Internet. Figure 2 does not bind the NAT address pool to the VRRP backup group on the interface connected to the Internet.

Question # 57

Which is incorrect about the IKE DPD statement?

A.

is used for detection of IKE neighbor status

B.

PDUs are sent periodically between B IKE PEERs.

C.

After the DPD function is enabled, the IPSec packet is not received within the interval specified by the interval, and the DPD sends a DPD request to the peer and waits for the response. Text

D.

DPD sends the query only before the encrypted message is sent and the timer expires.

Question # 58

112. The ESP only verifies the IP payload and can perform NAT traversal, but the ESP encrypts the Layer 4 port information and causes the PAT function to be unusable. This problem can be solved by using the IPSec transparent NAT function, which encapsulates the ESP packet in the UDP header and comes with the necessary port information to make the PAT work normally.

A.

TRUE

B.

FALSE

Question # 59

An enterprise network is as follows. Firewall A and firewall B establish an IPSec VPN. After the IPSec configuration is complete, the administrator needs to test the connectivity of the IPSec VPN. Generally, the firewall needs to simulate the traffic of the server A to access the intranet server B. The administrator can use which of the following ping commands.

A.

ping -a

B.

ping -c

C.

ping -t

D.

ping -s

Question # 60

In the first phase of IKE V1, the pre-shared key master mode exchange process, in which message is the SA payload sent?

A.

Message 1 and Message 2

B.

Message 3 and Message 4

C.

Message 5 and Message 6

D.

Message 7 and Message 8

Note: IKE V1 Phase 1 mainly negotiates the following three tasks: First, negotiate the parameters used to establish IKE SA: encryption algorithm, integrity verification algorithm, identity authentication method and authentication word, DH group, IKE SA life cycle, etc. . These parameters are defined in the IKE security proposal. The second is to use the DH algorithm to exchange information related to the key (t

Go to page: