Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

H12-721 HCNP-Security-CISN (Huawei Certified Network Professional - Constructing Infrastructure of Security Network) Questions and Answers

Questions 4

The following figure shows the L2TP over IPSec application scenario. The client uses the pre-shared-key command to perform IPSec authentication. How should the IPSec security policy be configured on the LNS?

Options:

A.

uses IKE master mode for negotiation

B.

Negotiate in IKE aggressive mode

C.

IPSec security policy

D.

Configuring an IPSec Policy Template

Buy Now
Questions 5

Connecting the internal network interface address from the firewall By pinging the internal network address of the peer, the IPSec tunnel can be successfully triggered. The internal PC cannot trigger the tunnel establishment. What are the possible reasons?

Options:

A.

IKE proposal configuration problem

B.

IPSec proposal configuration problem

C.

interested traffic ACL source network segment does not include the PC

D.

packet filtering (inter-domain policy) configuration problem

Buy Now
Questions 6

The NAT/ASPF log in the session log and the DPI traffic monitoring log provide a “binary” output technology for this type of log. The use of binary input output can greatly reduce the impact on system performance, but The binary form output needs to be configured with the elog log management system.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 7

In the USG firewall, which two commands can be used to view the running status and memory/CPU usage of the device components (main control board, board, fan, power supply, etc.)?

Options:

A.

display device

B.

display environment

C.

display version

D.

dir

Buy Now
Questions 8

The SSL VPN authentication login is unsuccessful and the message "Bad username or password" is displayed. Which one is wrong?

Options:

A.

username and password are entered incorrectly

B.

user or group filter field configuration error

C.

certificate filter field configuration error

D.

administrator configured a policy to limit the source IP address of the terminal

Buy Now
Questions 9

In the client-initial mode, the L2TP dialup fails. From the debug information below, it can be seen that the most likely cause is the dialup failure.

Options:

A.

username and password are inconsistent with aaa configuration

B.

Ins name configuration error

C.

tunnel password is not configured

D.

is not enabled l2tp

Buy Now
Questions 10

Which of the following statements is correct about the IKE main mode and the aggressive mode?

Options:

A.

All negotiation packets in the first phase of the aggressive mode are encrypted.

B.

All the negotiation packets of the first phase in the main mode are encrypted.

C.

barbarian mode uses DH algorithm

D.

will enter the fast mode regardless of whether the negotiation is successful or not.

Buy Now
Questions 11

Regarding VRRP messages, what are the following statements correct?

Options:

A.

VRRP uses TCP packets.

B.

VRRP uses UDP packets.

C.

The destination address of the C VRRP packet is 224.0.0.18.

D.

The TTL value of the D VRRP packet is 255.

.

Buy Now
Questions 12

What are the scenarios in which the USG series firewall service port sends gratuitous ARPs when the following configurations are performed?

Options:

A.

routing mode + switch

B.

routing mode + router

C.

exchange mode + switch

D.

exchange mode + router

Buy Now
Questions 13

In the TCP/IP protocol, the TCP protocol provides a reliable connection service, which is implemented using a 3-way handshake. First handshake: When establishing a connection, the client sends a SYN packet (SYN=J) to the server and enters the SYN_SENT state, waiting for the server to confirm; the second handshake: the server receives the SYN packet and must send an ACK packet (ACK=1) To confirm the SYN packet of the client, and also send a SYN packet (SYN=K), that is, the SYN-ACK packet, the server enters the SYN_RCVD state; the third handshake: the client receives the SYN-ACK packet of the server. Send the acknowledgement packet ACK (SYN=2 ACK=3) to the server. After the packet is sent, the client and server enter the ESTABUSHED state and complete the handshake. Regarding the three parameters in the 3-way handshake process, which one is correct?

Options:

A.

1=J+1 2=J+1 3=K+1

B.

1=J 2=K+1 3=J+1

C.

1=J+1 2=K+1 3=J+1

D.

1=J+1 2=J 3=K+1

Buy Now
Questions 14

Virtual firewall virtualizes multiple logical firewalls on a physical firewall device and implements multiple instances?

Options:

A.

secure multi-instance

B.

VPN multi-instance

C.

Configuring multiple instances

D.

exchange multiple instances

Buy Now
Questions 15

On the following virtual firewall network, the USG unified security gateway provides leased services to the enterprise. The VPN instance vfw1 is leased to enterprise A. The networking diagram is as follows. The PC C of the enterprise A external network user needs to access the intranet DMZ area server B through NAT. To achieve this requirement, what are the following key configurations?

Options:

A.

[USG] ip vpn-instance vfw1 vpn-id

B.

[USG] ip vpn-instance vfw1 [USG-vpn-vfw1] route-distinguisher 100:1 [USG-vpn-vfw1] quit

C.

[USG] nat server zone vpn-instance vfw1 untrust global 2.1.2.100 inside 192.168.1.2 vpn-instance vfw1

D.

[USG]nat address-group 1 2.1.2.5 2.1.2.10 vpn-instance vfw1

Buy Now
Questions 16

Two USG firewalls establish an IPSec VPN through the Site to Site mode. When viewing the status of a USG A, the following is displayed: display ipsec statistics the security packet statistics: input/output security paskets: 40 input/output security bytes: 400/0 input /output dropped security packets: 0/0 By status information, what information can be obtained correctly?

Options:

A.

USG A has already encrypted 4 packets, and USG A has decrypted packets.

B.

USG A has decrypted the data packet is 4, USG A has encrypted data packet is 0

C.

Site A device on the intranet, there is no route, so the protection data may not be sent to USG A.

D.

IPSec tunnel is not established

Buy Now
Questions 17

L2TP is a tunneling protocol set up for transparent transmission of PPP packets between users and enterprise servers. Which of the following features are included?

Options:

A.

L2TP protocol uses the TCP protocol

B.

supports private address allocation and does not occupy public IP addresses.

C.

and PPP configurations support authentication and work with Radius to support flexible local and remote AAA After combining with IPSec,

D.

supports encryption of packets.

Buy Now
Questions 18

In the IDC room, a USG firewall can be used to divide into several virtual firewalls, and then the root firewall administrator generates a virtual firewall administrator to manage each virtual firewall.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 19

In the abnormal traffic cleaning solution, to ensure that the attack traffic can be imported into the cleaning center for cleaning, the VRRP is implemented in Step 12 as shown in the figure. The management center adopts the following configuration: Select Configuration-->Anti-DDoS- -> "Drainage management", create a drainage task, configure the protected IP address to 10.1.3.10/32. What kind of route will the cleaning center generate after the above steps are configured?

Options:

A.

destination address is the 32-bit static host routed by the attacker.

B.

Destination address is routed by the attacker's 0-bit iEGP host

C.

destination address is routed by the attacker's 32-bit eBGP host.

D.

source address is the attacker's 32-bit static host route

Buy Now
Questions 20

What are the drainage schemes that can be used in the scenario of bypass deployment in Huawei's abnormal traffic cleaning solution?

Options:

A.

dynamic routing drainage

B.

static policy routing drainage

C.

static route drainage

D.

MPLS VPN drainage

Buy Now
Questions 21

An enterprise network is as follows. At this time, server A cannot access server B. The administrator performs troubleshooting. It finds that server A can access firewall A, but cannot access firewall B. What is the method for administrators to use to troubleshoot problems?

Options:

A.

layering method

B.

segmentation method

C.

replacement method

D.

block method

Buy Now
Questions 22

In the L2TP over IPSec application scenario, the USG device encrypts the original data packet with IPSec and then encapsulates the packet with L2TP.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 23

Which of the following protocol messages cannot be propagated in an IPSec tunnel by default?

Options:

A.

TCP

B.

UDP

C.

ICMP

D.

IGMP

Buy Now
Questions 24

Which of the following does the virtual firewall technical feature not include?

Options:

A.

provides multi-instance, multi-instance, multi-instance, multi-instance, and multi-instance VPN. The application is flexible and can meet multiple networking requirements.

B.

Each virtual firewall can independently support four security zones: Trust, Untrust, DMZ, and Local. The interfaces are flexibly divided and allocated.

C.

technically guarantees that each virtual system and a separate firewall are identical in implementation, and very secure, and can be directly accessed between virtual systems.

D.

Provide independent administrator privileges for each virtual system

Buy Now
Questions 25

What are the correct statements about the following VRRP and VGMP protocol messages?

Options:

A.

VGMP Hello packet communication between the A VGMP management group and the VRRP backup group

B.

VGMP management group communicates through VGMP Hello messages.

C.

VGMP management group communicates through VRRP packets

D.

VGMP packet communication between the V VGMP management group and the VRRP backup group

Buy Now
Questions 26

In the IPSec VPN, the digital certificate is used for identity authentication. If the IKE main mode is used for negotiation, the certificate verification is completed in message 5 and message 6.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 27

87. The SSL VPN scenario under dual-system hot standby is shown in the following figure. The administrator has enabled the SSL network extension function. The following is about the configuration of the SSL VPN function.

Options:

A.

virtual gateway created on the master side will not be synchronized to the slave side.

B.

Bind the address pool to VRRP backup group 2 when configuring network extensions.

C.

The virtual gateway IP address of the SSL VPN in C USG_A must use 202.38.10.2

D.

The virtual gateway IP address of the SSL VPN in D USG_B must use 10.100.10.2.

Buy Now
Questions 28

What are the three elements of an abnormal flow cleaning solution?

Options:

A.

cleaning center

B.

Testing Center

C.

Management Center

D.

Collection Center

Buy Now
Questions 29

In the IKE V1 pre-shared key mode, what is the main role of the data captured in the following figure?

Options:

A.

negotiation phase 2 SA

B.

SA of negotiation phase 1

C.

is used to exchange D-H public values, required random numbers

D.

is used to exchange identity information

Buy Now
Questions 30

The administrator can create vfw1 and vfw2 on the root firewall to provide secure multi-instance services for enterprise A and enterprise B, and configure secure forwarding policies between security zones of vfw1 and vfw2.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 31

The principle of HTTPS Flood source authentication defense is that the Anti-DDoS device replaces the SSL server with the client to complete the TCP three-way handshake. If the TCP three-way handshake is complete, the HTTPS flood source authentication check is successful.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 32

The hot standby and IPSec functions are combined. Which of the following statements is correct?

Options:

A.

USG supports IPSec hot standby in active/standby mode.

B.

IPSec hot standby is not supported in load balancing mode.

C.

must configure session fast backup

D.

must be configured to preempt

Buy Now
Exam Code: H12-721
Exam Name: HCNP-Security-CISN (Huawei Certified Network Professional - Constructing Infrastructure of Security Network)
Last Update: May 8, 2024
Questions: 217

PDF + Testing Engine

$130

Testing Engine

$95

PDF (Q&A)

$80