Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Huawei H12-721 - Huawei Certified ICT Professional - Constructing Infrastructure of Security Network

Page: 1 / 7
Total 217 questions

An attack source will spoof the server and send a large number of SYN-ACK packets to the attacking target network or server. If the destination port of the packet is the TCP service port of the attacked server, the TCP protocol stack of the server will be abnormal. What is it?

A.

SYN Flood

B.

SYN-ACK Flood

C.

ACK-Flood

D.

Connection Flood

The ip-link principle is to continuously send ICMP packets or ARP request packets to the specified destination address, and check whether the ICMP echo reply or ARP reply packet of the destination IP response can be received.

A.

TRUE

B.

FALSE

What are the following attacks that are malformed?

A.

Smurf attack

B.

Fraggle attack

C.

large ICMP packet attack

D.

IP packet attack with routing entries

A network is as follows: The l2tp vpn is established through the VPN Client and the USG (LNS). What are the reasons for the dialup failure?

A.

The tunnel name of the A LNS is inconsistent with the tunnel name of the client.

B.

L2TP tunnel verification failed

C.

0PPP authentication failed, the PPP authentication mode set on the client PC and LNS is inconsistent.

D.

The client PC cannot obtain the IP address assigned to it from the LNS.

Which of the following statements is true about L2TP over IPSec VPN?

A.

IPSec packet triggers an L2TP tunnel.

B.

L2TP packet triggers IPSec SA

C.

L2TP tunnel is established first

D.

IPSec tunnel is established first

When configuring the USG hot standby, (assuming the backup group number is 1), the configuration command of the virtual address is correct?

A.

vrrp vrid 1 vitual-ip ip address master

B.

vrrp vitual-ip ip address vrid 1 master

C.

vrrp vitual-ip ip address master vrid 1

D.

vrrp master vitual-ip address vrid 1

In the USG firewall, which two commands can be used to view the running status and memory/CPU usage of the device components (main control board, board, fan, power supply, etc.)?

A.

display device

B.

display environment

C.

display version

D.

dir

134. Which of the following is the connection status data to be backed up in the HRP function?

A.

ServerMap entry

B.

port mapping table

C.

dynamic blacklist

D.

Session entry

The topology of the BFD-bound static route is as follows: The administrator has configured the following on firewall A: [USG9000_A] bfd [USG9000_A-bfd] quit [USG9000_A] bfd aa bind peer-ip 1.1.1.2 [USG9000_A- Bfd session-aa] discriminator local 10 [USG9000_A-bfd session-aa] discriminator remote 20 Which of the following configurations can be added to the firewall to implement BFD-bound static routes?

A.

[USG9000_A-bfd session-aa] commit

B.

[USG9000_A]bfd aa bind local-ip 1.1.1.1

C.

[USG9000_A]ip route-static 0.0.0.0 0 1.1.1.2 track bfd-session aa

D.

[USG9000_A] ip route-static 0.0.0.0 0 1.1.1.2 bfd-session aa

In the DDoS attack defense, if the service learning function is used to find that there is no service or traffic of a certain service in normal traffic, you can use the blocking or traffic limiting method to defend against attacks on the Anti-DDoS device. .

A.

TRUE

B.

FALSE