Winter Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Huawei H12-721 HCNP-Security-CISN (Huawei Certified Network Professional - Constructing Infrastructure of Security Network) Exam Practice Test

Page: 1 / 25
Total 245 questions

HCNP-Security-CISN (Huawei Certified Network Professional - Constructing Infrastructure of Security Network) Questions and Answers

Question 1

What are the drainage schemes that can be used in the scenario of bypass deployment in Huawei's abnormal traffic cleaning solution?

Options:

A.

dynamic routing drainage

B.

static policy routing drainage

C.

static route drainage

D.

MPLS VPN drainage

Question 2

Two USG firewalls failed to establish an IPSec VPN tunnel through the NAT traversal mode. Run the display ike sa command to view the session without any UDP 500 session. What are the possible reasons?

Options:

A.

public network route is unreachable

B.

Intermediate line device disables UDP port 500

C.

Intermediate line device disables UDP 4500 port

D.

Intermediate line device disables ESP packets

Question 3

A user SSL VPN authentication succeeds. The network extension is enabled on the PC. The assigned address has been obtained. The user PC cannot access the resources of the intranet server. Possible reasons?

Options:

A.

configuration error in the "client routing mode" configuration

B.

policy restricts user access

C.

device and intranet server are unreachable

D.

The physical interface IP of the D PC overlaps with the address assigned by the VPN.

Question 4

On the following virtual firewall network, the USG unified security gateway provides leased services to the enterprise. The VPN instance vfw1 is leased to enterprise A. The networking diagram is as follows. The PC C of the enterprise A external network user needs to access the intranet DMZ area server B through NAT. To achieve this requirement, what are the following key configurations?

Question # 4

Options:

A.

[USG] ip vpn-instance vfw1 vpn-id

B.

[USG] ip vpn-instance vfw1 [USG-vpn-vfw1] route-distinguisher 100:1 [USG-vpn-vfw1] quit

C.

[USG] nat server zone vpn-instance vfw1 untrust global 2.1.2.100 inside 192.168.1.2 vpn-instance vfw1

D.

[USG]nat address-group 1 2.1.2.5 2.1.2.10 vpn-instance vfw1

Question 5

What are the following attacks that are special message attacks?

Options:

A.

Ping of Death attack

B.

Super large ICMP packet attack

C.

Tracert packet attack

D.

ICMP unreachable packet attack

Question 6

Virtual firewall virtualizes multiple logical firewalls on a physical firewall device and implements multiple instances?

Options:

A.

secure multi-instance

B.

VPN multi-instance

C.

Configuring multiple instances

D.

exchange multiple instances

Question 7

After the link-group is configured on the device, use the display link-group 1 command to obtain the following information. What information can I get?

Question # 7

Options:

A.

GigabitEthernet 0/0/2 interface has failed.

B.

GigabitEthernet 0/0/1 has failed.

C.

GigabitEthernet 0/0/2 is forcibly converted to fault state because other interfaces in the group are faulty.

D.

GigabitEthernet 0/0/1 is forcibly converted to fault state because other interfaces in the group are faulty.

Question 8

The static fingerprint filtering function is to defend the attack traffic by configuring a static fingerprint to process the packets that hit the fingerprint. Generally, the anti-DDoS device capture function can be used to input fingerprint information to static fingerprint filtering.

Options:

A.

TRUE

B.

FALSE

Question 9

In the L2TP over IPSec application scenario, the USG device encrypts the original data packet with IPSec and then encapsulates the packet with L2TP.

Options:

A.

TRUE

B.

FALSE

Question 10

The traffic limiting policy feature only supports the number of connections initiated by the specified IP or the number of connections received.

Options:

A.

TRUE

B.

FALSE

Question 11

Site to Site IPSec VPN Tunnel Negotiation Fails. How do I view the establishment and configuration of the IKE Phase 2 security association?

Options:

A.

display ike sa

B.

display ipsec sa brief

C.

display ipsec policy

D.

display interface

Question 12

The classification of cyber-attacks includes traffic-based attacks, scanning and snooping attacks, malformed packet attacks, and special packet attacks.

Options:

A.

TRUE

B.

FALSE

Question 13

Avoid DHCP server spoofing attacks. DHCP snooping is usually enabled. What is the correct statement?

Options:

A.

connected user's firewall interface is configured in trusted mode

B.

The firewall interface connected to the DHCP server is configured as untrusted mode.

C.

DHCP relay packets received on the interface in the untrusted mode are discarded.

D.

The DHCP relay packet received in the D trusted mode and passed the DHCP snooping check.

Question 14

The topology diagram of the BFD-bound static route is as follows: The administrator has configured the following on firewall A: [USG9000_A] bfd [USG9000_A-bfd] quit [USG9000_A] bfd aa bind peer-ip 1.1.1.2 [USG9000_A- Bfd session-aa] discriminator local 10 [USG9000_A-bfd session-aa] discriminator remote 20 [USG9000_A-bfd session-aa] commit [USG9000_A-bfd session-aa] quit What are the correct statements about this segment?

Question # 14

Options:

A.

command bfd aa bind peer-ip 1.1.1.2 is used to create a BFD session binding policy for detecting link status.

B.

"[USG9000_A] bfd" is incorrectly configured in this command and should be changed to [USG9000_A] bfd enable to enable BFD function.

C.

[USG9000_A-bfd session-aa] commit is optional. If no system is configured, the system will submit the BFD session log information by default.

D.

The command to bind a BFD session to a static route is also required: [USG9000_A]ip route-static 0.0.0.0 0 1.1.1.2 track bfd-session aa

Question 15

The hot standby and IPSec functions are combined. Which of the following statements is correct?

Options:

A.

USG supports IPSec hot standby in active/standby mode.

B.

IPSec hot standby is not supported in load balancing mode.

C.

must configure session fast backup

D.

must be configured to preempt

Question 16

When the user's SSL VPN has been successfully authenticated, the user cannot access the Web-link resource. On the Web server, view the information as follows: netstat -anp tcp With the following information, which of the following statements is correct?

Question # 16

Options:

A.

intranet server does not open web service

B.

virtual gateway policy configuration error

C.

The connection between the virtual gateway and the intranet server is incorrect.

D.

Virtual gateway and intranet server are unreachable

 

Question 17

As shown in the figure, the firewall is dual-system hot standby. In this networking environment, all service interfaces of the firewall work in routing mode, and OSPF is configured on the upper and lower routers. Assume that the convergence time of OSPF is 30s after the fault is rectified. What is the best configuration for HRP preemption management?

Question # 17

Options:

A.

hrp preempt delay 20

B.

hrp preempt delay 40

C.

hrp preempt delay 30

D.

undo hrp preempt delay

Question 18

An administrator can view the IPSec status information and Debug information as follows. What is the most likely fault?

Question # 18

Options:

A.

local IKE policy does not match the peer IKE policy.

B.

local ike remote name does not match peer ike name

C.

local ipsec proposal does not match the peer ipsec proposal

D.

The local security acl or the peer security acl does not match.

Question 19

If the IPSec policy is configured in the policy template and sub-policy mode, the firewall applies the policy template first and then applies the sub-policy.

Options:

A.

TRUE

B.

FALSE

Question 20

Which of the following statements is true about L2TP over IPSec VPN?

Options:

A.

IPSec packet triggers an L2TP tunnel.

B.

L2TP packet triggers IPSec SA

C.

L2TP tunnel is established first

D.

IPSec tunnel is established first

Question 21

USG A and USG B are configured with a static BFD session. The following is true about the process of establishing and tearing down a BFD session.

Options:

A.

USG A and USG B each start the BFD state machine. The initial state is Down and the BFD packet is Down. The value of Your Discriminator is 0.

B.

After the local BFD status of B USG B is Init, if you continue to receive packets with the status Down, you can re-process and update its local status.

C.

After receiving the BFD packet in the init state, C USG B switches the local state to Up.

D.

After the state transition of "DOWN-->INIT" occurs on D USG A and USG B, a timeout timer is started. If the BFD packet is in the Init or Up state, the local state is automatically switched back to Down.

Question 22

The default interval for sending VGMP hello packets is 1 second. That is, when the hello packet sent by the peer is not received within the range of three hello packets, the peer is considered to be faulty. Master status.

Options:

A.

TRUE

B.

FALSE

Question 23

The Tracert packet attack is an ICMP timeout packet returned by the attacker when the TTL is ____, and the ICMP port unreachable packet returned when the destination address is reached to find the path through which the packet arrives at the destination. Spying on the structure of the network

Options:

A.

0

B.

1

C.

2

D.

varies according to actual conditions

Question 24

What is the correct statement about the ip-link feature?

Options:

A.

ip-link is a function to detect link connectivity

B.

ARP detection mode only supports detecting direct links (or forwarding through Layer 2 devices in the middle)

C.

The firewall sends ICMP or ARP packets to a probe destination address to determine whether the destination address is reachable.

D.

ip-link is associated with VGMP, the ip-link status is down, and the VGMP management group priority is lowered by default.

 

Question 25

For IP-MAC address binding, packets with matching IP and MAC address will enter the next processing flow of the firewall. Packets that do not match IP and MAC address will be discarded.

Options:

A.

TRUE

B.

FALSE

Question 26

Which of the following statements is correct about the IKE main mode and the aggressive mode?

Options:

A.

All negotiation packets in the first phase of the aggressive mode are encrypted.

B.

All the negotiation packets of the first phase in the main mode are encrypted.

C.

barbarian mode uses DH algorithm

D.

will enter the fast mode regardless of whether the negotiation is successful or not.

Question 27

In the case of IPSec VPN NAT traversal, you must use IKE's aggressive mode.

Options:

A.

TRUE

B.

FLASE

Question 28

When an IPSec VPN is set up on both ends of the firewall, the security ACL rules of both ends are mirrored.

Options:

A.

TRUE

B.

FALSE

Question 29

The branch firewall of an enterprise is configured with NAT. As shown in the figure, USG_B is the NAT gateway. The USG_B is used to establish an IPSec VPN with the headquarters. Which parts of the USG_B need to be configured?

Question # 29

Options:

A.

Configure the nat policy. The reference rule is to allow the source and destination of the intranet to be all ACLs.

B.

Configure the IKE peer, use the name authentication, and remote-address is the outbound interface address of the headquarters.

C.

Configure the nat policy. The reference rule is to protect the data flow from the enterprise intranet to the headquarters intranet in the first deny ipsec, and then permit the data flow from the intranet to the internet.

D.

Configure an ipsec policy template and reference ike peer

Question 30

The SSL VPN authentication login is unsuccessful and the message "Bad username or password" is displayed. Which one is wrong?

Options:

A.

username and password are entered incorrectly

B.

user or group filter field configuration error

C.

certificate filter field configuration error

D.

administrator configured a policy to limit the source IP address of the terminal

Question 31

Which of the following is incorrect about IKE V1 and IKE V2?

Options:

A.

IKE V2 establishes a pair of IPSec SAs. Normally, an IKE SA and a pair of IPSec SAs can be completed by exchanging 4 messages twice.

B.

IKE V2 does not have the concept of master mode and barb mode

C.

To establish a pair of IPSec SAs, only 6 messages need to be exchanged in the IKE V1 master mode.

D.

When the IPSec SA established by D IKE V2 is greater than one pair, each pair of SAs needs only one additional exchange, that is, two messages can be completed.

Page: 1 / 25
Total 245 questions