Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

H12-721 HCNP-Security-CISN (Huawei Certified Network Professional - Constructing Infrastructure of Security Network) Questions and Answers

Questions 4

Which of the following is correct about the configuration of the firewall interface bound to the VPN instance?

Options:

A.

ip binding vpn-instance vpn-id

B.

ip binding vpn-instance vpn-instance-name

C.

ip binding vpn-id

D.

ip binding vpn-id vpn-instance-name

Buy Now
Questions 5

IPSec NAT traversal does not support IKE main mode, aggressive mode IP address + pre-shared key mode authentication, because pre-shared key mode authentication needs to extract the source IP address in the IP address to find the pre-shared key corresponding to this address. . The address change caused by the presence of NAT prevents the device from finding the pre-shared key.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 6

The main function of URPF is to prevent network attack behavior based on destination address spoofing.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 7

In a dual-system hot standby network, the NAT configurations of the two USGs are consistent. When the address in the NAT address pool is on the same network segment as the virtual IP address of the VRRP backup group, the next two graphs show the ARP response of the NAT server and VRRP combination application (lack of a picture).

Options:

A.

Figure 1 binds the NAT address pool to the VRRP backup group on the interface connected to the Internet. Figure 2 Binds the NAT address pool to the VRRP backup group on the interface connected to the Internet.

B.

Figure 1 does not bind the NAT address pool to the VRRP backup group on the interface connected to the Internet. Figure 2 does not bind the NAT address pool to the VRRP backup group on the interface connected to the Internet.

C.

Figure 1 does not bind the NAT address pool to the VRRP backup group on the interface connected to the Internet. Figure 2 Binds the NAT address pool to the VRRP backup group on the interface connected to the Internet.

D.

Figure 1 does not bind the NAT address pool to the VRRP backup group on the interface connected to the Internet. Figure 2 does not bind the NAT address pool to the VRRP backup group on the interface connected to the Internet.

Buy Now
Questions 8

In dual-system hot backup, the backup channel must be the primary interface on the interface board. Which type is not supported?

Options:

A.

Ethernet

B.

GigabitEthernet

C.

E1

D.

Vlan-if

Buy Now
Questions 9

The Haiwei Secoway VPN client initiates an L2TP connection. The source port of the L2TP packet is 1710 and the port 1710 of the destination port.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 10

In the IKE V1 pre-shared key mode, what is the main role of the data captured in the following figure?

Options:

A.

negotiation phase 2 SA

B.

SA of negotiation phase 1

C.

is used to exchange D-H public values, required random numbers

D.

is used to exchange identity information

Buy Now
Questions 11

Two USG firewalls establish an IPSec VPN through the Site to Site mode. When viewing the status of a USG A, the following is displayed: display ipsec statistics the security packet statistics: input/output security paskets: 40 input/output security bytes: 400/0 input /output dropped security packets: 0/0 By status information, what information can be obtained correctly?

Options:

A.

USG A has already encrypted 4 packets, and USG A has decrypted packets.

B.

USG A has decrypted the data packet is 4, USG A has encrypted data packet is 0

C.

Site A device on the intranet, there is no route, so the protection data may not be sent to USG A.

D.

IPSec tunnel is not established

Buy Now
Questions 12

In the L2TP over IPSec application scenario, the USG device encrypts the original data packet with IPSec and then encapsulates the packet with L2TP.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 13

An administrator can view the IPSec status information and Debug information as follows. What is the most likely fault?

Options:

A.

local IKE policy does not match the peer IKE policy.

B.

local ike remote name does not match peer ike name

C.

local ipsec proposal does not match the peer ipsec proposal

D.

The local security acl or the peer security acl does not match.

Buy Now
Questions 14

Run the display ike sa command to check the IKE SA information. The following statement is correct?

Options:

A.

phase 1 and phase 2 have been established

B.

negotiates through the IKE V2 protocol

C.

VPN instance name is public

D.

IPSec SA status is Ready

Buy Now
Questions 15

What are the correct statements about the following VRRP and VGMP protocol messages?

Options:

A.

VGMP Hello packet communication between the A VGMP management group and the VRRP backup group

B.

VGMP management group communicates through VGMP Hello messages.

C.

VGMP management group communicates through VRRP packets

D.

VGMP packet communication between the V VGMP management group and the VRRP backup group

Buy Now
Questions 16

The following scan snoop attacks are:

Options:

A.

SIP Flood attack

B.

HTTP Flood attack

C.

IP address scanning attack

D.

ICMP redirect packet attack

Buy Now
Questions 17

A certain network is as follows: LAN----G0/0/0 USG G0/0/1 ----Server. After the administrator analyzes the Attarcker on the LAN network connected to G0/0/0, if you want to prevent ARP flood attacks, limit the ARP traffic to 100 packets/minute. Which is the correct configuration?

Options:

A.

firewall defend arp-flood enable firewall defend arp-flood interface GigabitEthernet 0/0/0 max-rate 100

B.

firewall defend arp-flood enable firewall defend arp-flood interface GigabitEthernet 0/0/0 max-rate 6000

C.

firewall defend arp-flood enable firewall defend arp-flood interface GigabitEthernet 0/0/1 max-rate 100

D.

firewall defend arp-flood enable firewall defend arp-flood interface GigabitEthernet 0/0/1 max-rate 6000

Buy Now
Questions 18

The principle of HTTPS Flood source authentication defense is that the Anti-DDoS device replaces the SSL server with the client to complete the TCP three-way handshake. If the TCP three-way handshake is complete, the HTTPS flood source authentication check is successful.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 19

Virtual firewall technology can achieve overlapping IP addresses.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 20

112. The ESP only verifies the IP payload and can perform NAT traversal, but the ESP encrypts the Layer 4 port information and causes the PAT function to be unusable. This problem can be solved by using the IPSec transparent NAT function, which encapsulates the ESP packet in the UDP header and comes with the necessary port information to make the PAT work normally.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 21

A user dials to the LNS of the company through L2TP over IPSec using the VPN client, and the final dialup fails. However, the debug ike all and debug l2tp all did not see any information on the LNS. The two stages of establishing ike failed. What are the reasons for the failure?

Options:

A.

Interest traffic ACL configuration error

B.

The firewall (LNS) is connected to the public network. The IPSec policy is not applied to the interface.

C.

IPSec data stream does not reach the firewall

D.

L2TP is not enabled on D LNS

Buy Now
Questions 22

In the networking environment of dual-system hot backup and ip-link, which of the following configurations is the key configuration for ip-link and dual-system hot backup?

Options:

A.

hrp mirror ip-link 1

B.

hrp track ip-link 1 master

C.

hrp track ip-link 1 slave

D.

ip-link check enable

Buy Now
Questions 23

In the dual-system hot backup, when the slave does not receive the hello packet of the HRP sent in the HRP hello packet period, the slave device is considered to be faulty.

Options:

A.

1

B.

2

C.

3

D.

5

Buy Now
Questions 24

Accessing the headquarters server through the IPSec VPN from the branch computer. The IPSec tunnel can be established normally, but the service is unreachable. What are the possible reasons?

Options:

A.

packet is fragmented, and fragmented packets are discarded on the link.

B.

There is load sharing or dual-machine link, which may be inconsistent with the back and forth path.

C.

route oscillating

D.

DPD detection parameters are inconsistent at both ends

Buy Now
Questions 25

Based on the following information analysis on the firewall, which of the following options are correct?

Options:

A.

The first packet of this data flow enters from the Trust zone interface and is sent from the Untrust zone interface.

B.

This data stream has been NAT translated

C.

uses NPAT conversion technology

D.

firewall has virtual firewall function enabled

Buy Now
Questions 26

Which of the following attacks is a SYN Flood attack?

Options:

A.

attacker sends a large number of SYN packets, which causes a large number of incomplete TCP connections to occupy the resources of the attacker.

B.

means that the attacker and the attacked object normally establish a TCP full connection, but there is no subsequent message.

C.

means that the attacker sends a large number of ICMP packets, such as ping, to the attacker.

D.

means that the attacker occupies the link bandwidth of the server by sending a large number of UDP packets to the attacker.

Buy Now
Questions 27

The Tracert packet attack is an ICMP timeout packet returned by the attacker when the TTL is ____, and the ICMP port unreachable packet returned when the destination address is reached to find the path through which the packet arrives at the destination. Spying on the structure of the network

Options:

A.

0

B.

1

C.

2

D.

varies according to actual conditions

Buy Now
Questions 28

Which is incorrect about IPSec NAT Traversal?

Options:

A.

Both A AH and ESP support NAT traversal

B.

IPSec NAT traversal does not support IKE main mode (pre-shared mode)

C.

IPSec ESP packets are encapsulated through NAT using UDP packets.

D.

All IKE messages exchanged with the initiator use 4500 port communication

Buy Now
Questions 29

Which of the following is not a message sent during ip-link detection?

Options:

A.

ARP packet

B.

IGMP message

C.

ICMP message

D.

Hello message

Buy Now
Questions 30

Site to Site IPSec VPN negotiation failed. Which of the following should be checked? 1. Network connectivity issues; 2. View the establishment of IKE phase 1 security associations and related configurations; 3. View the establishment of IKE phase 2 security associations and related configurations; 4. See if the security ACLs at both ends mirror each other.

Options:

A.

1 4 2 3

B.

4 2 3 1

C.

2 3 1 4

D.

4 1 2 3

Buy Now
Questions 31

Man-in-the-middle attacks are: the middleman completes the data exchange between the server and the client. In the server's view, all messages are sent or sent to the client. From the client's point of view, all messages are also sent or sent.

Options:

A.

Packet 1: Source IP 1.1.1.1 Source MAC C-C-C Destination IP 1.1.1.2 Destination MAC B-B-B

B.

Packet 1: Source IP 1.1.1.3 Source MAC C-C-C Destination IP 1.1.1.2 Destination MAC B-B-B

C.

Packet 2: Source IP 1.1.1.2 Source MAC C-C-C Destination IP 1.1.1.1 Destination MAC A-A-A

D.

Packet 2: Source IP 1.1.1.3 Source MAC C-C-C Destination IP 1.1.1.1 Destination MAC A-A-A

Buy Now
Questions 32

A network is as follows: The l2tp vpn is established through the VPN Client and the USG (LNS). What are the reasons for the dialup failure?

Options:

A.

The tunnel name of the A LNS is inconsistent with the tunnel name of the client.

B.

L2TP tunnel verification failed

C.

0PPP authentication failed, the PPP authentication mode set on the client PC and LNS is inconsistent.

D.

The client PC cannot obtain the IP address assigned to it from the LNS.

Buy Now
Exam Code: H12-721
Exam Name: HCNP-Security-CISN (Huawei Certified Network Professional - Constructing Infrastructure of Security Network)
Last Update: Dec 3, 2024
Questions: 245
H12-721 pdf

H12-721 PDF

$29.75  $84.99
H12-721 Engine

H12-721 Testing Engine

$35  $99.99
H12-721 PDF + Engine

H12-721 PDF + Testing Engine

$47.25  $134.99