Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

HCNP-Security-CISN (Huawei Certified Network Professional - Constructing Infrastructure of Security Network) Question and Answers

HCNP-Security-CISN (Huawei Certified Network Professional - Constructing Infrastructure of Security Network)

Last Update Apr 28, 2024
Total Questions : 217

We are offering FREE H12-721 Huawei exam questions. All you do is to just go and sign up. Give your details, prepare H12-721 free exam questions and then go for complete pool of HCNP-Security-CISN (Huawei Certified Network Professional - Constructing Infrastructure of Security Network) test questions that will help you more.

H12-721 pdf

H12-721 PDF

$35  $99.99
H12-721 Engine

H12-721 Testing Engine

$42  $119.99
H12-721 PDF + Engine

H12-721 PDF + Testing Engine

$56  $159.99
Questions 1

The main function of URPF is to prevent network attack behavior based on destination address spoofing.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 2

71. Which option is incorrect about the HTTP Flood defense principle?

Options:

A.  

HTTP Flood source authentication

B.  

URI detection of destination IP

C.  

fingerprint learning

D.  

load check

Discussion 0
Questions 3

In the active/standby mode of the USG dual-system hot standby, the service interface works at Layer 3, and the upstream and downstream routers are connected to the router. The administrator can view: USG_A status is HRP_M[USG_A], USG_B status is HRP_S[USG_B], current 15000+ session Table, every time a switchover occurs, all traffic is interrupted for a period of time, and seamless switching is impossible.

Options:

A.  

Execute the command hrp preempt delay 64 to lengthen the delay of preemption.

B.  

Check connectivity between heartbeat lines

C.  

does not configure session fast backup

D.  

no hrp enable

Discussion 0
Questions 4

The USG series firewall is deployed on an enterprise network. You need to log in to the USG through telnet or ssh. Each command entered by the user must be authorized by the server to continue. Which of the following authentication methods can meet the requirements of the enterprise?

Options:

A.  

Radius

B.  

LDAP

C.  

HWTACACS

D.  

AD

Discussion 0
Questions 5

Which of the following configurations is mandatory when the IKE peer needs to be referenced to the IPSec policy template in the divquarters-branch-based IPSec VPN network (pre-shared key + traversal NAT)?

Options:

A.  

ipsec proposal

B.  

exchang-mode aggressive

C.  

pre-shared-key

D.  

remote-address

Discussion 0
Questions 6

An administrator can view the IPSec status information and debugging information as follows. What is the most likely fault?

Options:

A.  

local ike policy does not match the peer ike policy.

B.  

local ike remote namet and peer ikename do not match

C.  

local ipsec proposal does not match the peer ipsec proposal.

D.  

The local security acl or the peer security acl does not match.

Discussion 0
Questions 7

In the client-initial mode, the L2TP dialup fails. From the debug information below, it can be seen that the most likely cause is the dialup failure.

Options:

A.  

username and password are inconsistent with aaa configuration

B.  

Ins name configuration error

C.  

tunnel password is not configured

D.  

is not enabled l2tp

Discussion 0
Questions 8

What are the following VPN protocols that do not provide encryption?

Options:

A.  

ESP

B.  

AH

C.  

L2TP

D.  

GRE

Discussion 0
Questions 9

Two USG firewalls failed to establish an IPSec VPN tunnel through the NAT traversal mode. Run the display ike sa command to view the session without any UDP 500 session. What are the possible reasons?

Options:

A.  

public network route is unreachable

B.  

Intermediate line device disables UDP port 500

C.  

Intermediate line device disables UDP 4500 port

D.  

Intermediate line device disables ESP packets

Discussion 0
Questions 10

To ensure the normal forwarding of large traffic, a network administrator of a company uses two firewalls to implement hot standby. As shown in the following figure, when the configuration is complete, it is found that when A of the two firewalls fails, the data stream being transmitted before the fault has been seriously lost, but the newly transmitted data stream can work normally after the fault. What could be the cause of this phenomenon?

Options:

A.  

The HRP preemption time configured on the firewall is smaller than the convergence time of OSPF.

B.  

is not configured to adjust the COST value of OSPF according to the HRP status.

C.  

The session fast backup function is not configured on the USG. The packets cannot be forwarded normally if the back and forth paths are inconsistent.

D.  

does not enable hrp track on the upstream and downstream interfaces of the firewall.

Discussion 0
Questions 11

Which of the following protocol messages cannot be propagated in an IPSec tunnel by default?

Options:

A.  

TCP

B.  

UDP

C.  

ICMP

D.  

IGMP

Discussion 0
Questions 12

The firewall device defends against the SYN Flood attack by using the technology of source legality verification. The device receives the SYN packet and sends the SYN-ACK probe packet to the source IP address host in the SYN packet. If the host exists, it will Which message is sent?

Options:

A.  

RST message

B.  

FIN message

C.  

ACK message

D.  

SYN message

Discussion 0
Questions 13

The ip-link principle is to continuously send ICMP packets or ARP request packets to the specified destination address, and check whether the ICMP echo reply or ARP reply packet of the destination IP response can be received.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 14

When using the optical bypass interface, the Bypass link has two working modes, automatic mode and forced mode.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 15

Which of the following IKE Negotiation Phase 1 main mode negotiation processes is the role of Message 5 and Message 6?

Options:

A.  

running DH algorithm

B.  

Negotiation proposal set

C.  

mutual authentication

D.  

Negotiate IPSec SA

Discussion 0
Questions 16

When using the Radius server to authenticate users, (the topology is as shown below), not only must the username and password be stored on the Radius server, but the username and password must also be configured on the firewall.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 17

Which of the following is not a message sent during ip-link detection?

Options:

A.  

ARP packet

B.  

IGMP message

C.  

ICMP message

D.  

Hello message

Discussion 0
Questions 18

Which of the following security services can a secure multi-instance provide for a virtual firewall?

Options:

A.  

address binding

B.  

blacklist

C.  

ASPF

D.  

VPN routing

Discussion 0
Questions 19

What is the correct statement about the binding of local users to VPN instances?

Options:

A.  

local user can be bound to a VPN instance by using the local-user user-name vpn-instance vpn-instance-name command.

B.  

By default, the binding between a local user and a VPN instance is implemented.

C.  

. After a local user is bound to a VPN instance, the local user can manage the entire firewall.

D.  

Local users cannot be bound to VPN instances.

Discussion 0
Questions 20

Accessing the headquarters server through the IPSec VPN from the branch computer. The IPSec tunnel can be established normally, but the service is unreachable. What are the possible reasons?

Options:

A.  

packet is fragmented, and fragmented packets are discarded on the link.

B.  

There is load sharing or dual-machine link, which may be inconsistent with the back and forth path.

C.  

route oscillating

D.  

DPD detection parameters are inconsistent at both ends

Discussion 0
Questions 21

Which of the following is correct about the configuration of the firewall interface bound to the VPN instance?

Options:

A.  

ip binding vpn-instance vpn-id

B.  

ip binding vpn-instance vpn-instance-name

C.  

ip binding vpn-id

D.  

ip binding vpn-id vpn-instance-name

Discussion 0
Questions 22

What type of message is the VRRP hello message?

Options:

A.  

unicast message

B.  

broadcast message

C.  

multicast packet

D.  

UDP packet

Discussion 0
Questions 23

According to the capture of the victim host, what kind of attack is this attack?

Options:

A.  

ARP Flood attack

B.  

HTTP Flood attack

C.  

ARP spoofing attack

D.  

SYN Flood attack

Discussion 0
Questions 24

Which of the following objects can the current limiting policy limit?

Options:

A.  

IP connection limit

B.  

IP bandwidth limit

C.  

P2P protocol data flow restriction

D.  

IM protocol data flow restriction

Discussion 0
Questions 25

The FTP network diagram is as follows. The FTP server wants to use the 21000 control port to provide external FTP services. The FTP client cannot access the FTP server.

Options:

A.  

port mapping function is not used. The packets sent from the FTP client to the FTP server on port 21000 are ordinary packets and are not recognized as FTP packets.

B.  

The firewall can only recognize the FTP traffic of port 21 and cannot identify the FTP traffic of port 21000.

C.  

is not configured with ASPF function

D.  

device dropped all UDP traffic

Discussion 0
Questions 26

USG A and USG B are configured with a static BFD session. The following is true about the process of establishing and tearing down a BFD session.

Options:

A.  

USG A and USG B each start the BFD state machine. The initial state is Down and the BFD packet is Down. The value of Your Discriminator is 0.

B.  

After the local BFD status of B USG B is Init, if you continue to receive packets with the status Down, you can re-process and update its local status.

C.  

After receiving the BFD packet in the init state, C USG B switches the local state to Up.

D.  

After the state transition of "DOWN-->INIT" occurs on D USG A and USG B, a timeout timer is started. If the BFD packet is in the Init or Up state, the local state is automatically switched back to Down.

Discussion 0
Questions 27

Which of the following encryption methods does IPSec VPN use to encrypt communication traffic?

Options:

A.  

public key encryption

B.  

private key encryption

C.  

symmetric key encryption

D.  

pre-shared key encryption

Discussion 0
Questions 28

Which attack method is CC attack?

Options:

A.  

denial of service attack

B.  

scan snooping attack

C.  

malformed packet attack

D.  

System-based vulnerability attacks

Discussion 0
Questions 29

Comparing URPF strict mode and loose mode, which of the following statements is incorrect?

Options:

A.  

strict mode requires not only the corresponding entry in the forwarding table, but also the interface must match to pass the URPF check.

B.  

If the source address of the packet does not exist in the FIB table of the USG, and the default route is configured, the packet will be forwarded through the URPF check.

URPF strict mode is recommended in a

C.  

route symmetric environment.

D.  

Loose mode does not check whether the interface matches. As long as the source address of the packet exists in the FIB table of the USG, the packet can pass.

Discussion 0
Questions 30

The following figure shows the L2TP over IPSec application scenario. The client uses the pre-shared-key command to perform IPSec authentication. How should the IPSec security policy be configured on the LNS?

Options:

A.  

uses IKE master mode for negotiation

B.  

Negotiate in IKE aggressive mode

C.  

IPSec security policy

D.  

Configuring an IPSec Policy Template

Discussion 0
Questions 31

Virtual firewall virtualizes multiple logical firewalls on a physical firewall device and implements multiple instances?

Options:

A.  

secure multi-instance

B.  

VPN multi-instance

C.  

Configuring multiple instances

D.  

exchange multiple instances

Discussion 0
Questions 32

What are the drainage schemes that can be used in the scenario of bypass deployment in Huawei's abnormal traffic cleaning solution?

Options:

A.  

dynamic routing drainage

B.  

static policy routing drainage

C.  

static route drainage

D.  

MPLS VPN drainage

Discussion 0