Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

H12-721 Huawei Certified ICT Professional - Constructing Infrastructure of Security Network Questions and Answers

Questions 4

Is the correct statement about TCP proxy and TCP reverse source probing?

Options:

A.

TCP proxy and TCP reverse source probe can prevent SYN Flood

B.

The principle of the TCP proxy is that the device acts as a proxy for the TCP connection between the two ends. When one end initiates the connection, it must first complete the TCP 3 handshake with the device.

C.

Use TCP proxy mode for attack defense, you must enable the state detection mechanism.

D.

TCP reverse source detection detects the source IP by sending a Reset packet.

Buy Now
Questions 5

A user dials to the LNS of the company through L2TP over IPSec using the VPN client, and the final dialup fails. However, the debug ike all and debug l2tp all did not see any information on the LNS. The two stages of establishing ike failed. What are the reasons for the failure?

Options:

A.

Interest traffic ACL configuration error

B.

The firewall (LNS) is connected to the public network. The IPSec policy is not applied to the interface.

C.

IPSec data stream does not reach the firewall

D.

L2TP is not enabled on D LNS

Buy Now
Questions 6

The Tracert packet attack is an ICMP timeout packet returned by the attacker when the TTL is ____, and the ICMP port unreachable packet returned when the destination address is reached to find the path through which the packet arrives at the destination. Spying on the structure of the network

Options:

A.

0

B.

1

C.

2

D.

varies according to actual conditions

Buy Now
Questions 7

What are the scenarios in which the USG series firewall service port sends gratuitous ARPs when the following configurations are performed?

Options:

A.

routing mode + switch

B.

routing mode + router

C.

exchange mode + switch

D.

exchange mode + router

Buy Now
Questions 8

Which of the following IKE Negotiation Phase 1 main mode negotiation processes is the role of Message 5 and Message 6?

Options:

A.

running DH algorithm

B.

Negotiation proposal set

C.

mutual authentication

D.

Negotiate IPSec SA

Buy Now
Questions 9

Which of the following technologies can enhance the security of mobile users accessing the company ' s intranet VPN solution?

Options:

A.

SSL

B.

PPPoE

C.

GRE

D.

L2TP

Buy Now
Questions 10

When there are a large number of BFD sessions in a system, what mode can be used to prevent BFD detection when the cost of sending BFD control packets periodically affects the normal operation of the system?

Options:

A.

sync mode

B.

detection mode

C.

asynchronous mode

D.

query mode

Buy Now
Questions 11

Which is the correct packet encapsulation order for L2TP over IPSec?

Options:

A.

The order from the first package to the post package is PPP-- > UDP-- > L2TP-- > IPSec

B.

The order from the first package to the back package is PPP-- > L2TP-- > UDP-- > IPSec

C.

The order of C from pre-package to post-encapsulation is IPSec -- > L2TP-- > UDP-- > PPP

D.

The order of D from pre-package to post-encapsulation is IPSec -- > PPP -- > L2TP-- > UDP

Buy Now
Questions 12

The malformed packet attack technology uses some legitimate packets to perform reconnaissance or data detection on the network. These packets are legal application types, but they are rarely used in normal networks.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 13

As shown below, the domain abc address pool is the address pool where the L2TP VPN user is located. What is wrong with the following statement?

H12-721 Question 13

Options:

A.

L2TP user can authenticate by domain account

B.

If the value of the used-addr-number field is smaller than the value of the Pool-length field, the number of online users does not exceed the maximum number of users.

C.

The PC behind C can obtain the IP address, but cannot dial the L2TP VPN.

D.

The address range of the D address pool is 100.0.0.2--100.0.0.99

Buy Now
Questions 14

Which of the following methods is used to switch between active and standby links in the IPSec backup and backup system?

Options:

A.

hot standby

B.

link-group

C.

Eth-trunk

D.

ip-link

Buy Now
Questions 15

What are the three elements of an abnormal flow cleaning solution?

Options:

A.

cleaning center

B.

Testing Center

C.

Management Center

D.

Collection Center

Buy Now
Questions 16

Networking as shown in the figure: PC1--USG--Router--PC2. If PC1 sends a packet to PC2, what are the three modes for the USG to process fragmented packets?

Options:

A.

fragment cache

B.

fragmentation

C.

slice direct forwarding

D.

slice defense

Buy Now
Questions 17

SSL works at the application layer and encrypts specific applications. Which layer does IPSec work on and provides transparent encryption protection for this layer and above?

Options:

A.

data link layer

B.

network layer

C.

transport layer

D.

representation layer

Buy Now
Questions 18

In the abnormal traffic cleaning solution, to ensure that the attack traffic can be imported into the cleaning center for cleaning, the VRRP is implemented in Step 12 as shown in the figure. The management center adopts the following configuration: Select Configuration-- > Anti-DDoS- - > " Drainage management " , create a drainage task, configure the protected IP address to 10.1.3.10/32. What kind of route will the cleaning center generate after the above steps are configured?

H12-721 Question 18

Options:

A.

destination address is the 32-bit static host routed by the attacker.

B.

Destination address is routed by the attacker ' s 0-bit iEGP host

C.

destination address is routed by the attacker ' s 32-bit eBGP host.

D.

source address is the attacker ' s 32-bit static host route

Buy Now
Questions 19

In IPSec VPN, which one is incorrect about the difference between the barbaric mode and the main mode?

Options:

A.

main mode does not support NAT traversal in pre-shared key mode, but aggressive mode support

B.

main mode negotiation message is 6, and barb mode is 3

C.

In the NAT traversal scenario, the peer ID cannot use the IP address.

D.

main mode encrypts the exchange of identity information, while barbaric mode does not encrypt identity information

Buy Now
Questions 20

What are the HRP backup methods supported by the USG?

Options:

A.

automatic backup

B.

manual batch backup

C.

fast backup

D.

real-time backup

Buy Now
Questions 21

The console port password can be restored to the factory settings by pressing and holding the USG device Reset button for 1-3 seconds.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 22

What type of message is the VRRP hello message?

Options:

A.

unicast message

B.

broadcast message

C.

multicast packet

D.

UDP packet

Buy Now
Questions 23

A certain network is as follows: LAN----G0/0/0 USG G0/0/1 ----Server. After the administrator analyzes the Attarcker on the LAN network connected to G0/0/0, if you want to prevent ARP flood attacks, limit the ARP traffic to 100 packets/minute. Which is the correct configuration?

Options:

A.

firewall defend arp-flood enable firewall defend arp-flood interface GigabitEthernet 0/0/0 max-rate 100

B.

firewall defend arp-flood enable firewall defend arp-flood interface GigabitEthernet 0/0/0 max-rate 6000

C.

firewall defend arp-flood enable firewall defend arp-flood interface GigabitEthernet 0/0/1 max-rate 100

D.

firewall defend arp-flood enable firewall defend arp-flood interface GigabitEthernet 0/0/1 max-rate 6000

Buy Now
Questions 24

The Haiwei Secoway VPN client initiates an L2TP connection. The source port of the L2TP packet is 1710 and the port 1710 of the destination port.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 25

The management control information and service information of the out-of-band management interface are sent on the same channel.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 26

In the firewall DDoS attack defense technology, the data packet of the session table is not defended. If the data packet of the session has been established, it is directly released.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 27

Because the policy in the traffic limiting policy does not restrict the deny rule, you do not need to use the deny rule.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 28

An administrator can view the IPSec status information and Debug information as follows. What is the most likely fault?

H12-721 Question 28

Options:

A.

local IKE policy does not match the peer IKE policy.

B.

local ike remote name does not match peer ike name

C.

local ipsec proposal does not match the peer ipsec proposal

D.

The local security acl or the peer security acl does not match.

Buy Now
Questions 29

When using manual IPSec negotiation, NAT traversal is also required if there is a NAT device on the network.

Options:

A.

TRUE

B.

FALSEx

Buy Now
Questions 30

Three physical interfaces have been added to the link-group group. When any one of the interfaces fails, what are the following descriptions correct?

Options:

A.

If any interface in group A fails, the system sets the status of other interfaces in the group to down.

B.

Any interface in group B fails, and the status of other interfaces in the group does not change.

C.

After the interfaces in the group are restored to normal, the interfaces in the entire group are reset to up.

D.

After all the interfaces in the group are restored, the interfaces in the entire group are reset to up.

Buy Now
Questions 31

What actions will be performed when the firewall hot standby sends the active/standby switchover?

Options:

A.

send free ARP

B.

Send proxy ARP

C.

VRRP backup group virtual address is unavailable

D.

related switch automatically updates the MAC table

Buy Now
Questions 32

The topology diagram of the BFD-bound static route is as follows: The administrator has configured the following on firewall A: [USG9000_A] bfd [USG9000_A-bfd] quit [USG9000_A] bfd aa bind peer-ip 1.1.1.2 [USG9000_A- Bfd session-aa] discriminator local 10 [USG9000_A-bfd session-aa] discriminator remote 20 [USG9000_A-bfd session-aa] commit [USG9000_A-bfd session-aa] quit What are the correct statements about this segment?

H12-721 Question 32

Options:

A.

command bfd aa bind peer-ip 1.1.1.2 is used to create a BFD session binding policy for detecting link status.

B.

" [USG9000_A] bfd " is incorrectly configured in this command and should be changed to [USG9000_A] bfd enable to enable BFD function.

C.

[USG9000_A-bfd session-aa] commit is optional. If no system is configured, the system will submit the BFD session log information by default.

D.

The command to bind a BFD session to a static route is also required: [USG9000_A]ip route-static 0.0.0.0 0 1.1.1.2 track bfd-session aa

Buy Now
Questions 33

What are the following VPN protocols that do not provide encryption?

Options:

A.

ESP

B.

AH

C.

L2TP

D.

GRE

Buy Now
Questions 34

Which of the following statements is correct about the IKE main mode and the aggressive mode?

Options:

A.

All negotiation packets in the first phase of the aggressive mode are encrypted.

B.

All the negotiation packets of the first phase in the main mode are encrypted.

C.

barbarian mode uses DH algorithm

D.

will enter the fast mode regardless of whether the negotiation is successful or not.

Buy Now
Questions 35

When the ip-link link health check is performed, if it is unable to receive the message several times in the absence of the link, it will be considered as a link failure.

Options:

A.

1 time

B.

2 times

C.

3 times

D.

5 times

Buy Now
Questions 36

By default, GigabitEthernet0/0/0 can be used as an out-of-band management interface in the USG2200 series.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 37

The SSL VPN authentication is successful, but the Web-link resources cannot be accessed. What is the correct one?

Options:

A.

server does not open web service

B.

policy restricts user access

C.

device and intranet server are unreachable

D.

SSL VPN users reach the maximum limit

Buy Now
Questions 38

What are the load balancing algorithms supported by the USG firewall?

Options:

A.

source address hash algorithm

B.

simple polling algorithm (roundrobin)

C.

weighted rounding algorithm (weightff)

D.

ratio (Ratio)

Buy Now
Questions 39

In the IPSec active/standby link backup application scenario, gateway B uses IPSec tunneling technology and gateway A to establish an IPSec VPN.

H12-721 Question 39

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 40

SSL VPN authentication is successful. Using the file sharing function, you can view directories and files, but you cannot upload, delete, and rename files. What are the possible reasons?

Options:

A.

If the file server type is NFS, the user UID and GID attributes do not allow the user to upload, delete, or rename files.

B.

If the type of the file server is SMB, the currently logged-in user has only read permission for the file share resource, but no write permission.

C.

Only the viewing function is enabled in the SSL file sharing function configuration of the C firewall.

D.

Some TCP connections between the virtual gateways of the D file server are blocked by the firewall

Buy Now
Questions 41

When an attack occurs, the result of packet capture on the attacked host (1.1.1.1) is as shown in the figure. What kind of attack is this attack?

H12-721 Question 41

Options:

A.

Smurf attack

B.

Land attack

C.

WinNuke attack

D.

Ping of Death attack

Buy Now
Questions 42

On the web configuration page, choose System -- > High Reliability -- > Hot Standby and click Check for HRP Configuration Consistency. Button. The following window pops up. Which of the following configurations can solve the problem (assuming the heartbeat is added to the DMZ area)?

H12-721 Question 42

Options:

A.

firewall packet-filter default permit interzone trust local

B.

firewall packet-filter default permit interzone trust dmz

C.

firewall packet-filter default permit interzone untrust dmz

D.

firewall packet-filter default permit interzone local

Buy Now
Questions 43

The load balancing function is configured on the USG firewall for three FTP servers. The IP addresses and weights of the three physical servers are 10.1.13/24 (weight 16); 10.1.1.4/24 (weight 32); 10.1.1.5 /24 (weight 16), and the virtual server address is 202.152.26.123/24. A PC with the host address of 202.152.26.3/24 initiates access to the FTP server. Run the display firewall session table command on the firewall to check the configuration. Which of the following conditions indicates that the load balancing function is successfully implemented?

Options:

A.

< USG > display firewall session table Current total sessions: 1 ftp VPN: public-- > public 202.152.26.3:3327-- > 10.1.1.4:21

B.

< USG > display firewall session table Current total sessions:3 ftp VPN: public 202.152.26.3:3327-- > 202.152.26.123:21[10.1.1.3:21] ftp VPN:public-- > public 202.152.26.3:3327 -- > 202.152.26.123:21[10.1.1.4:21] ftp VPN: public-- > public 202.152.26.3:3327-- > 202.152.26.123:21[10.1.1.5:21]

C.

< USG > display firewall session table Current total sessions: 1 ftp VPN: 202.152.26.3:3327-- > 202.152.26.123:21

D.

< USG > display firewall session table Current total sessions: 3 ftp VPN: ftp VPN: public 202.152.26.3:3327-- > 202.152.26.123:21[10.1.1.3:21] ftp VPN: public-- > public 202.152. 26.3:3327-- > 10.1.1.4:21 ftp VPN:public-- > public 202.152.26.3:3327-- > 10.1.1.4:21 ftp VPN:public-- > public 202.152.26.3:3327-- > 10.1. 1.5:21

Buy Now
Questions 44

The ACK flood attack is defended by the load check. The principle is that the cleaning device checks the payload of the ACK packet. If the payloads are all consistent (if the payload content is all 1), the packet is discarded.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 45

The constraints of the policy in the traffic limiting policy include quintuple, time period, user identity, and application protocol.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 46

In the L2TP over IPSec application scenario, the USG device encrypts the original data packet with IPSec and then encapsulates the packet with L2TP.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 47

The attacker sends a large number of invite messages to the SIP server, causing the SIP server to refuse service. Which layer of the OSI model is this attack based on?

Options:

A.

application layer

B.

network layer

C.

transport layer

D.

data link layer

Buy Now
Questions 48

The SSL VPN authentication login is unsuccessful and the message " Bad username or password " is displayed. Which one is wrong?

Options:

A.

username and password are entered incorrectly

B.

user or group filter field configuration error

C.

certificate filter field configuration error

D.

administrator configured a policy to limit the source IP address of the terminal

Buy Now
Questions 49

Which attack method is CC attack?

Options:

A.

denial of service attack

B.

scan snooping attack

C.

malformed packet attack

D.

System-based vulnerability attacks

Buy Now
Questions 50

What are the correct statements about link-group below?

Options:

A.

supports interface state management across switches

B.

supports interface state management across interface boards

C.

supports remote interface state management

D.

support interface board hot swap

Buy Now
Questions 51

Virtual firewall virtualizes multiple logical firewalls on a physical firewall device and implements multiple instances?

Options:

A.

secure multi-instance

B.

VPN multi-instance

C.

Configuring multiple instances

D.

exchange multiple instances

Buy Now
Questions 52

What are the correct statements about the IP address scanning attack and prevention principles?

Options:

A.

IP address scanning attack is an attacker that uses an ICMP packet (such as ping and tracert) to detect the target address.

B.

IP address scanning attack is an attack method used by an attacker to detect a target address by using TCP/UDP packets.

C.

IP address scanning attack defense detects the rate of address scanning behavior of a host. If the rate exceeds the threshold, it is blacklisted.

D.

If the USG starts the blacklist function and is associated with IP address scanning attack prevention, when the scanning rate of a certain source exceeds the set threshold, the excess threshold will be discarded, and the packets sent by this source will be less than the subsequent time. Threshold, can also be forwarded

Buy Now
Questions 53

An enterprise network is as follows. At this time, server A cannot access server B. The administrator performs troubleshooting. It finds that server A can access firewall A, but cannot access firewall B. What is the method for administrators to use to troubleshoot problems?

H12-721 Question 53

Options:

A.

layering method

B.

segmentation method

C.

replacement method

D.

block method

Buy Now
Questions 54

A network is as follows: The l2tp vpn is established through the VPN Client and the USG (LNS). What are the reasons for the dialup failure?

H12-721 Question 54

Options:

A.

The tunnel name of the A LNS is inconsistent with the tunnel name of the client.

B.

L2TP tunnel verification failed

C.

0PPP authentication failed, the PPP authentication mode set on the client PC and LNS is inconsistent.

D.

The client PC cannot obtain the IP address assigned to it from the LNS.

Buy Now
Questions 55

Regarding the Radius authentication process, there are the following steps: 1. The Radius client (network access server) in the network device receives the username and password, and sends an authentication request to the Radius server; 2 the user logs in to the USG access server, etc. When the network device sends the username and password to the network access server; 3. After receiving the legitimate request, the Radius server completes the authentication and returns the required user authorization information to the client. What is the correct order?

Options:

A.

1 2 3

B.

2 1 3

C.

3 1 2

D.

2 3 1

Buy Now
Questions 56

When an IPSec VPN is set up on both ends of the firewall, the security ACL rules of both ends are mirrored.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 57

The topology of the BFD-bound static route is as follows: The administrator has configured the following on firewall A: [USG9000_A] bfd [USG9000_A-bfd] quit [USG9000_A] bfd aa bind peer-ip 1.1.1.2 [USG9000_A- Bfd session-aa] discriminator local 10 [USG9000_A-bfd session-aa] discriminator remote 20 Which of the following configurations can be added to the firewall to implement BFD-bound static routes?

H12-721 Question 57

Options:

A.

[USG9000_A-bfd session-aa] commit

B.

[USG9000_A]bfd aa bind local-ip 1.1.1.1

C.

[USG9000_A]ip route-static 0.0.0.0 0 1.1.1.2 track bfd-session aa

D.

[USG9000_A] ip route-static 0.0.0.0 0 1.1.1.2 bfd-session aa

Buy Now
Questions 58

The hot standby and IPSec functions are combined. Which of the following statements is correct?

Options:

A.

USG supports IPSec hot standby in active/standby mode.

B.

IPSec hot standby is not supported in load balancing mode.

C.

must configure session fast backup

D.

must be configured to preempt

Buy Now
Questions 59

Which of the following is the correct description of the SMURF attack?

Options:

A.

The attacker sends an ICMP request with the destination address or the source address as the broadcast address, causing all hosts or designated hosts of the attacked network to answer, eventually causing the network to crash or the host to crash.

B.

The attacker sends the SYN-ACK message to the attacker ' s IP address.

C.

The attacker can send UDP packets to the network where the attacker is located. The source address of the packet is the address of the attacked host. The destination address is the broadcast address or network address of the subnet where the attacked host resides. The destination port number is 7 or 19.

D.

The attacker uses the network or the host to receive unreachable ICMP packets. The subsequent packets destined for this destination address are considered unreachable, thus disconnecting the destination from the host.

Buy Now
Questions 60

The PC A in the Trust zone is 192.168.3.1. You cannot access the Internet server in the Untrust zone. The configuration between the Trust zone and the Untrust zone is as follows. What are the most likely causes of the following faults?

H12-721 Question 60

Options:

A.

security policy application direction configuration error, should be outbound

B.

Since the firewall default packet-filter is deny is executed first, the subsequent policies are not executed.

C.

policy source 192.168.3.0 0.0.0.255 configuration error, need to be modified to policy source 192.168.3.0 0.0.255.255

D.

policy destination any configuration error, a clear destination IP address must be established

Buy Now
Questions 61

The USG_B status is HRP_M[USG_A], and the USG_B status is HRP_S[USG_B] . The status of the USG_A is HRP_M[USG_A]. However, all traffic did not pass USG_A completely, and half of the traffic also passed USG_B.

Options:

A.

[USG_A]hrp ospf-cost adjust-enable [USG_B] hrp ospf-cost adjust-enable

B.

[USG_B]interface GigabitEthernet 0/0/1 [USG_B- GigabitEthernet 0/0/1] hrp track master

   [USG_B]interface GigabitEthernet 0/0/3 [USG_B- GigabitEthernet 0/0/3] hrp track master

C.

hrp preempt delay 60

D.

The address of the heartbeat is not released to OSPF.

Buy Now
Questions 62

Which of the following is correct about the configuration of the firewall interface bound to the VPN instance?

Options:

A.

ip binding vpn-instance vpn-id

B.

ip binding vpn-instance vpn-instance-name

C.

ip binding vpn-id

D.

ip binding vpn-id vpn-instance-name

Buy Now
Questions 63

The virtual firewall forwards multiple instances. The firewall has multiple routing tables and forwarding tables. The addresses are overlapped and are implemented on the same configuration interface. Users with configuration rights can configure and view all data.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 64

On the USG, you need to delete sslconfig.cfg in the hda1:/ directory. Which of the following commands can complete the operation?

Options:

A.

cd hda 1:/remove sslconfig.cfg

B.

cd hda 1:/delete sslconfig.cfg

C.

cd hda 1:/rmdir sslconfig.cfg

D.

cd hda 1:/mkdir sslconfig.cfg

Buy Now
Questions 65

Which part of the attack packet is matched by the blacklist to achieve attack prevention?

Options:

A.

source address

B.

destination address

C.

source port

D.

destination port

Buy Now
Exam Code: H12-721
Exam Name: Huawei Certified ICT Professional - Constructing Infrastructure of Security Network
Last Update: Apr 30, 2026
Questions: 217

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now H12-721 testing engine

PDF (Q&A)

$43.57  $124.49
buy now H12-721 pdf