Weekend Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

H12-721 Sample Questions Answers

Questions 4

The classification of cyber-attacks includes traffic-based attacks, scanning and snooping attacks, malformed packet attacks, and special packet attacks.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 5

Using the virtual firewall technology, users on the two VPNs can log in to their private VPNs through the Root VFW on the public network to directly access private network resources. What are the following statements about the characteristics of the VPN multi-instance service provided by the firewall?

Options:

A.

security is high, VPN users access through the firewall authentication and authorization, access after access is to use a separate virtual firewall system to manage users, the resources of different VPN users are completely isolated

B.

VPN access mode is flexible and reliable. It can support from public network to VPN, and can also support from VPN to VPN.

C.

is easy to maintain, users can manage the entire firewall (including each virtual firewall) without a system administrator account with super user privileges.

D.

The access control authority is strict. The firewall can control the access rights of the VPN according to the user name and password. This allows different users such as travel employees and super users (need to access different VPN resources) to have different access rights.

Buy Now
Questions 6

As shown below, the domain abc address pool is the address pool where the L2TP VPN user is located. What is wrong with the following statement?

Options:

A.

L2TP user can authenticate by domain account

B.

If the value of the used-addr-number field is smaller than the value of the Pool-length field, the number of online users does not exceed the maximum number of users.

C.

The PC behind C can obtain the IP address, but cannot dial the L2TP VPN.

D.

The address range of the D address pool is 100.0.0.2--100.0.0.99

Buy Now
Questions 7

Defense against the cache server The main method of DNS request flood is to use the DNS source authentication technology:

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 8

Which of the following states indicates that a BFD session has been successfully established?

Options:

A.

down

B.

init

C.

up

D.

AdminUp

Buy Now
Questions 9

Static fingerprint filtering function, different processing methods for different messages, the following statement is correct?

Options:

A.

TCP/UDP/custom service can extract fingerprints based on the payload (ie the data segment of the message)

B.

DNS packet extracts fingerprints for Query ID

C.

HTTP message extracts fingerprint for universal resource identifier URI

D.

ICMP message extracts fingerprint by identifier

Buy Now
Questions 10

An enterprise network is as follows. At this time, server A cannot access server B. The administrator performs troubleshooting. It finds that server A can access firewall A, but cannot access firewall B. What is the method for administrators to use to troubleshoot problems?

Options:

A.

layering method

B.

segmentation method

C.

replacement method

D.

block method

Buy Now
Questions 11

The hot standby and IPSec functions are combined. Which of the following statements is correct?

Options:

A.

USG supports IPSec hot standby in active/standby mode.

B.

IPSec hot standby is not supported in load balancing mode.

C.

must configure session fast backup

D.

must be configured to preempt

Buy Now
Questions 12

The traffic limiting policy feature only supports the number of connections initiated by the specified IP or the number of connections received.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 13

When the user logs in to the virtual gateway web page and prompts “Cannot display web page”, what is the possible cause of the failure?

Options:

A.

user PC and virtual gateway are unreachable

B.

The IP address of the virtual gateway has been changed.

C.

uses a shared virtual gateway

D.

client browser set proxy server

Buy Now
Questions 14

Which of the following statements about the blacklist is correct?

Options:

A.

When logging in to the device through Web or Telnet, if the username and password are incorrectly entered 3 times, the administrator's IP address will be blacklisted.

B.

Blacklists are classified into static blacklists and dynamic blacklists.

C.

. After the device detects the attack attempt of the user with a specific IP address according to the behavior of the packet, the device dynamically uses the dynamic blacklist technology to blacklist the IP address.

D.

When the packet arrives at the firewall, it first performs packet filtering check and then matches the blacklist.

Buy Now
Questions 15

The following figure shows the L2TP over IPSec application scenario. The client uses the pre-shared-key command to perform IPSec authentication. How should the IPSec security policy be configured on the LNS?

Options:

A.

uses IKE master mode for negotiation

B.

Negotiate in IKE aggressive mode

C.

IPSec security policy

D.

Configuring an IPSec Policy Template

Buy Now
Questions 16

The enterprise network is as shown in the figure. On the USG_A and USG_B, hot standby is configured, and USG_A is the master device. The administrator wants to configure SSL VPN on the firewall so that branch employees can access the headquarters through SSL VPN. Which virtual gateway address should the SSL VPN be?

Options:

A.

202.38.10.2/24

B.

202.38.10.3/24

C.

202.38.10.1/24

D.

10.100.10.2/24

Buy Now
Questions 17

The default interval for sending VGMP hello packets is 1 second. That is, when the hello packet sent by the peer is not received within the range of three hello packets, the peer is considered to be faulty. Master status.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 18

When there are a large number of BFD sessions in a system, what mode can be used to prevent BFD detection when the cost of sending BFD control packets periodically affects the normal operation of the system?

Options:

A.

sync mode

B.

detection mode

C.

asynchronous mode

D.

query mode

Buy Now
Questions 19

The IP address of the USG firewall GE0/0/0 is 192.168.0.1/24, and the firewall functions as the FTP server. The IP address of the PC host is 192.168.0.2/24. The GE0/0/0 interface of the firewall and the PC host are connected through the network cable. Connected, as shown below: PC (192.168.0.2/24)--GE0/0/0 USG. Which of the following commands can be used to complete the backup of the system configuration file vrpcfg.cfg?

Options:

A.

Complete the following command on the firewall: [USG] ftp server enable info:Start FTP server [USG-aaa] local-user ftpuser password simple Ftppass# [USG-aaa] local-user ftpuser service-type ftp [USG-aaa] Local-user ftpuser ftp-directory hda1

B.

Complete the following command on the firewall: ftp 192.168.0.2 Trying 192.168.0.2 ...Press CTRL+K to abort Connected to 192.168.0.2 220 FTP Server ready User(192.168.0.2):(none) ftpuser 331 Password Required for ftpuser Password: 230 User logged in ftp>get vrpcfg.cfg

C.

Complete the following command on the PC: C:\Documents and Settings\Administrator>ftp 192.168.0.1 Connectd to 192.168.0.1 220 FTP service ready User(192.168.0.1 (none)) ftpuser 331 Password required for ftpuser Password:230 user logged In ftp>get VRPcfg.cfg

D.

Complete the following command on the PC: C:\Documents and Settings\Administrator>ftp 192.168.0.1 Connectd to 192.168.0.1 220 FTP service ready User(192.168.0.1 (none)) ftpuser 331 Password required for ftpuser Password:230 user logged In ftp>put VRPcfg.cfg

Buy Now
Questions 20

Which of the following objects can the current limiting policy limit?

Options:

A.

IP connection limit

B.

IP bandwidth limit

C.

P2P protocol data flow restriction

D.

IM protocol data flow restriction

Buy Now
Questions 21

The main function of URPF is to prevent network attack behavior based on destination address spoofing.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 22

Avoid DHCP server spoofing attacks. DHCP snooping is usually enabled. What is the correct statement?

Options:

A.

connected user's firewall interface is configured in trusted mode

B.

The firewall interface connected to the DHCP server is configured as untrusted mode.

C.

DHCP relay packets received on the interface in the untrusted mode are discarded.

D.

The DHCP relay packet received in the D trusted mode and passed the DHCP snooping check.

Buy Now
Questions 23

Which of the following does the virtual firewall technical feature not include?

Options:

A.

provides multi-instance, multi-instance, multi-instance, multi-instance, and multi-instance VPN. The application is flexible and can meet multiple networking requirements.

B.

Each virtual firewall can independently support four security zones: Trust, Untrust, DMZ, and Local. The interfaces are flexibly divided and allocated.

C.

technically guarantees that each virtual system and a separate firewall are identical in implementation, and very secure, and can be directly accessed between virtual systems.

D.

Provide independent administrator privileges for each virtual system

Buy Now
Questions 24

Accessing the headquarters server through the IPSec VPN from the branch computer. The IPSec tunnel can be established normally, but the service is unreachable. What are the possible reasons?

Options:

A.

packet is fragmented, and fragmented packets are discarded on the link.

B.

There is load sharing or dual-machine link, which may be inconsistent with the back and forth path.

C.

route oscillating

D.

DPD detection parameters are inconsistent at both ends

Buy Now
Questions 25

On an Eth-Trunk interface, traffic load balancing can be implemented by configuring different weights on member links.

Options:

A.

TRUE

B.

FLASE

Buy Now
Questions 26

In the networking environment of dual-system hot backup and ip-link, which of the following configurations is the key configuration for ip-link and dual-system hot backup?

Options:

A.

hrp mirror ip-link 1

B.

hrp track ip-link 1 master

C.

hrp track ip-link 1 slave

D.

ip-link check enable

Buy Now
Questions 27

On the USG, you need to delete sslconfig.cfg in the hda1:/ directory. Which of the following commands can complete the operation?

Options:

A.

cd hda 1:/remove sslconfig.cfg

B.

cd hda 1:/delete sslconfig.cfg

C.

cd hda 1:/rmdir sslconfig.cfg

D.

cd hda 1:/mkdir sslconfig.cfg

Buy Now
Questions 28

The virtual firewall forwards multiple instances. The firewall has multiple routing tables and forwarding tables. The addresses are overlapped and are implemented on the same configuration interface. Users with configuration rights can configure and view all data.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 29

According to the capture of the victim host, what kind of attack is this attack?

Options:

A.

ARP Flood attack

B.

HTTP Flood attack

C.

ARP spoofing attack

D.

SYN Flood attack

Buy Now
Questions 30

With regard to the Radius agreement, what are the following statements correct?

Options:

A.

uses the UDP protocol to transmit Radius packets.

B.

authentication and authorization port number can be 1812

C.

Encrypt the account when transferring user accounts and passwords using the Radius protocol

D.

authentication and authorization port number can be 1645

Buy Now
Questions 31

Configure the remote packet capture function on the USG to download the device to the device. You can use the FTP server to analyze the packet.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 32

Which of the following configurations is mandatory when the IKE peer needs to be referenced to the IPSec policy template in the divquarters-branch-based IPSec VPN network (pre-shared key + traversal NAT)?

Options:

A.

ipsec proposal

B.

exchang-mode aggressive

C.

pre-shared-key

D.

remote-address

Buy Now
Questions 33

USG dual-machine hot standby must meet certain conditions and can be used below. What are the following statements correct?

Options:

A.

major and backup equipment must have the same product model

B.

The software version of the active and standby devices must be the same.

C.

The interface IP of the active and standby devices must be the same.

D.

The primary device must be configured, and the standby device does not require any configuration.

Buy Now
Questions 34

An intranet has made a network, the old equipment is offline, the new network equipment is brought online, and after the service test, it is found that most of the original service traffic cannot work normally. What is the quickest way to restore the business?

Options:

A.

layering method

B.

segmentation method

C.

replacement method

D.

block method

Buy Now
Questions 35

The network of an enterprise is as follows. At this time, server A cannot access the web service of server B. The administrator performs troubleshooting and finds that there is no problem in the routing mode of firewall A. The corresponding routing table has been established, but the firewall mode of firewall A is set. error. What is the method used by the administrator to troubleshoot the problem?

Options:

A.

layering method

B.

segmentation method

C.

replacement method

D.

block method

Buy Now
Questions 36

In the DDoS attack defense, if the service learning function is used to find that there is no service or traffic of a certain service in normal traffic, you can use the blocking or traffic limiting method to defend against attacks on the Anti-DDoS device. .

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 37

Two USG firewalls failed to establish an IPSec VPN tunnel through the NAT traversal mode. Run the display ike sa command to view the session without any UDP 500 session. What are the possible reasons?

Options:

A.

public network route is unreachable

B.

Intermediate line device disables UDP port 500

C.

Intermediate line device disables UDP 4500 port

D.

Intermediate line device disables ESP packets

Buy Now
Questions 38

A user dials to the LNS of the company through L2TP over IPSec using the VPN client, and the final dialup fails. However, the debug ike all and debug l2tp all did not see any information on the LNS. The two stages of establishing ike failed. What are the reasons for the failure?

Options:

A.

Interest traffic ACL configuration error

B.

The firewall (LNS) is connected to the public network. The IPSec policy is not applied to the interface.

C.

IPSec data stream does not reach the firewall

D.

L2TP is not enabled on D LNS

Buy Now
Questions 39

What is the correct description of IKE?

Options:

A.

IKE is a protocol carried by UDP and is a signaling protocol of IPSec.

B.

IKE negotiates an SA for IPSec and hands over the established parameters and security associations to IPSec.

C.

IPSec encrypts or verifies the packet by using the SA negotiated by IKE.

D.

IPSec must use IKE key exchange

Buy Now
Questions 40

DDoS is an abnormal packet that an attacker sends a small amount of non-traffic traffic to the attack target (usually a server, such as DNS or WEB) through the network, so that the attacked server resolves the packet when the system crashes or the system is busy.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 41

Virtual firewall virtualizes multiple logical firewalls on a physical firewall device and implements multiple instances?

Options:

A.

secure multi-instance

B.

VPN multi-instance

C.

Configuring multiple instances

D.

exchange multiple instances

Buy Now
Questions 42

The NAT/ASPF log in the session log and the DPI traffic monitoring log provide a “binary” output technology for this type of log. The use of binary input output can greatly reduce the impact on system performance, but The binary form output needs to be configured with the elog log management system.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 43

If the IPSec policy is configured in the policy template and sub-policy mode, the firewall applies the policy template first and then applies the sub-policy.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 44

The IPSec establishment of a device is unsuccessful. The debug print information is as follows. What are the possible causes of the fault?

? %%01IKE/4/WARING(1):phase2:proposal mismatch,please check ipsec proposal configuration 0 34476900 %%01IKE/7/DEBUG(d) dropped message from 3.3.3.1 due to notification type NO_PROPOSAL_CHOSEN

Options:

A.

IKE proposal parameters are inconsistent

B.

IPSec proposal parameters are inconsistent

C.

ike peer configuration error

D.

Security acl configuration error

Buy Now
Questions 45

In the dual-system hot backup, when the slave does not receive the hello packet of the HRP sent in the HRP hello packet period, the slave device is considered to be faulty.

Options:

A.

1

B.

2

C.

3

D.

5

Buy Now
Questions 46

The method of defending a FIN/RST flood attack is to perform a session check. The workflow is to discard the packet and then start the session check when the FIN/RST packet rate exceeds the threshold.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 47

In the hot standby scenario, what is the correct statement about the primary and backup backups?

Options:

A.

batch backup is to back up all information in batches after the first negotiation of two devices is completed.

B.

The backup channel must be an interface on the service board and supports GE and Eth-trunk interfaces.

C.

By default, batch backup is turned on.

D.

Real-time backup is a real-time backup of newly created or refreshed data while the device is running.

Buy Now
Questions 48

Which of the following is incorrect about IKE V1 and IKE V2?

Options:

A.

IKE V2 establishes a pair of IPSec SAs. Normally, an IKE SA and a pair of IPSec SAs can be completed by exchanging 4 messages twice.

B.

IKE V2 does not have the concept of master mode and barb mode

C.

To establish a pair of IPSec SAs, only 6 messages need to be exchanged in the IKE V1 master mode.

D.

When the IPSec SA established by D IKE V2 is greater than one pair, each pair of SAs needs only one additional exchange, that is, two messages can be completed.

Buy Now
Questions 49

In the IKE V1 pre-shared key mode, what is the main role of the data captured in the following figure?

Options:

A.

negotiation phase 2 SA

B.

SA of negotiation phase 1

C.

is used to exchange D-H public values, required random numbers

D.

is used to exchange identity information

Buy Now
Questions 50

On the following virtual firewall network, the USG unified security gateway provides leased services to the enterprise. The VPN instance vfw1 is leased to enterprise A. The networking diagram is as follows. The PC C of the enterprise A external network user needs to access the intranet DMZ area server B through NAT. To achieve this requirement, what are the following key configurations?

Options:

A.

[USG] ip vpn-instance vfw1 vpn-id

B.

[USG] ip vpn-instance vfw1 [USG-vpn-vfw1] route-distinguisher 100:1 [USG-vpn-vfw1] quit

C.

[USG] nat server zone vpn-instance vfw1 untrust global 2.1.2.100 inside 192.168.1.2 vpn-instance vfw1

D.

[USG]nat address-group 1 2.1.2.5 2.1.2.10 vpn-instance vfw1

Buy Now
Questions 51

In the client-initial mode, the L2TP dialup fails. From the debug information below, it can be seen that the most likely cause is the dialup failure.

Options:

A.

username and password are inconsistent with aaa configuration

B.

Ins name configuration error

C.

tunnel password is not configured

D.

is not enabled l2tp

Buy Now
Questions 52

The DHCP snooping function needs to maintain the binding table. What are the contents of the binding table?

Options:

A.

MAC

B.

Vlan

C.

interface

D.

DHCP Server IP

Buy Now
Questions 53

The administrator can create vfw1 and vfw2 on the root firewall to provide secure multi-instance services for enterprise A and enterprise B, and configure secure forwarding policies between security zones of vfw1 and vfw2.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 54

IPSec VPN uses digital certificates for authentication. It has the following steps: 1. verify the certificate signature; 2. find the certificate serial number in the CRL; 3. share the entity certificate between the two devices; 4. verify the validity period of the certificate; . Establish a VPN tunnel. Which of the following is correct?

Options:

A.

3 2 1 4 5

B.

1 3 2 4 5

C.

3 1 4 2 5

D.

2 4 3 1 5

Buy Now
Questions 55

The following are traffic-type attacks.

Options:

A.

IP Flood attack

B.

HTTP Flood attack

C.

IP address scanning attack

D.

ICMP redirect packet attack

Buy Now
Questions 56

In the active/standby mode of the USG dual-system hot standby, the service interface works at Layer 3, and the upstream and downstream routers are connected to the router. The administrator can view: USG_A status is HRP_M[USG_A], USG_B status is HRP_S[USG_B], current 15000+ session Table, every time a switchover occurs, all traffic is interrupted for a period of time, and seamless switching is impossible.

Options:

A.

Execute the command hrp preempt delay 64 to lengthen the delay of preemption.

B.

Check connectivity between heartbeat lines

C.

does not configure session fast backup

D.

no hrp enable

Buy Now
Questions 57

Site to Site IPSec VPN negotiation failed. Which of the following should be checked? 1. Network connectivity issues; 2. View the establishment of IKE phase 1 security associations and related configurations; 3. View the establishment of IKE phase 2 security associations and related configurations; 4. See if the security ACLs at both ends mirror each other.

Options:

A.

1 4 2 3

B.

4 2 3 1

C.

2 3 1 4

D.

4 1 2 3

Buy Now
Questions 58

In dual-system hot backup, the backup channel must be the primary interface on the interface board. Which type is not supported?

Options:

A.

Ethernet

B.

GigabitEthernet

C.

E1

D.

Vlan-if

Buy Now
Questions 59

What are the correct statements about link-group below?

Options:

A.

supports interface state management across switches

B.

supports interface state management across interface boards

C.

supports remote interface state management

D.

support interface board hot swap

Buy Now
Questions 60

What is the correct statement about the ip-link feature?

Options:

A.

ip-link is a function to detect link connectivity

B.

ARP detection mode only supports detecting direct links (or forwarding through Layer 2 devices in the middle)

C.

The firewall sends ICMP or ARP packets to a probe destination address to determine whether the destination address is reachable.

D.

ip-link is associated with VGMP, the ip-link status is down, and the VGMP management group priority is lowered by default.

 

Buy Now
Questions 61

What are the scenarios in which the USG series firewall service port sends gratuitous ARPs when the following configurations are performed?

Options:

A.

routing mode + switch

B.

routing mode + router

C.

exchange mode + switch

D.

exchange mode + router

Buy Now
Questions 62

Which attack method is CC attack?

Options:

A.

denial of service attack

B.

scan snooping attack

C.

malformed packet attack

D.

System-based vulnerability attacks

Buy Now
Questions 63

Which of the following protocol messages cannot be propagated in an IPSec tunnel by default?

Options:

A.

TCP

B.

UDP

C.

ICMP

D.

IGMP

Buy Now
Questions 64

The dual-system hot standby networking environment is as shown in the following figure: VRRP group 1 and 2 are added to the VGMP management group, USG_A is the master device, and USG_B is the standby device. When the USG_A has a fault Status, such as power failure, the USG_B status is switched from Slave to Master. After the USG_A is faulty, its status is switched back to Master and the USG_B status is still Master. What is the reason for this now?

Options:

A.

Two firewalls are in load grouping mode. They are configured as master and slave in the same backup group.

B.

After the fault of the USG_A is restored, the priority of the VRRP backup group is not restored in time.

C.

After the USG_A recovers from the fault, the heartbeat line fails.

D.

is not configured hrp track

Buy Now
Questions 65

In the firewall DDoS attack defense technology, the Anti-DDoS device adopts seven layers of defense technology, and the description based on session defense is correct?

Options:

A.

Based on the application, the validity of the source address of the packet is authenticated. These applications support the protocol interaction. The cleaning device prevents the attack traffic from the virtual source or tool by sending source detection packets.

B.

Session-based defense against concurrent connections, new connections, or connection-depleted connections that exceed the threshold

C.

mainly relies on fingerprint learning and packet capture analysis to obtain traffic characteristics, and to prevent bots or attack traffic initiated by agents to distinguish normal users from access behavior.

D.

Filters scanned messages and special control messages by detecting sessions

Buy Now
Exam Code: H12-721
Exam Name: Huawei Certified ICT Professional - Constructing Infrastructure of Security Network
Last Update: Oct 5, 2025
Questions: 217
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now H12-721