Weekend Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Huawei H12-721 Practice Exam with Questions & Answers | Set: 6

Questions 51

In the abnormal traffic cleaning solution of Huawei, in the scenario of bypass deployment, dynamic routing and drainage does not require manual intervention. If an abnormality is detected, the management center generates an automatic drainage task. The traffic is sent to the cleaning device.

Options:
A.

TRUE

B.

FALSE

Huawei H12-721 Premium Access
Questions 52

What are the scenarios in which the USG series firewall service port sends gratuitous ARPs when the following configurations are performed?

Options:
A.

routing mode + switch

B.

routing mode + router

C.

exchange mode + switch

D.

exchange mode + router

Questions 53

Which of the following does the virtual firewall technical feature not include?

Options:
A.

provides multi-instance, multi-instance, multi-instance, multi-instance, and multi-instance VPN. The application is flexible and can meet multiple networking requirements.

B.

Each virtual firewall can independently support four security zones: Trust, Untrust, DMZ, and Local. The interfaces are flexibly divided and allocated.

C.

technically guarantees that each virtual system and a separate firewall are identical in implementation, and very secure, and can be directly accessed between virtual systems.

D.

Provide independent administrator privileges for each virtual system

Questions 54

The principle of HTTPS Flood source authentication defense is that the Anti-DDoS device replaces the SSL server with the client to complete the TCP three-way handshake. If the TCP three-way handshake is complete, the HTTPS flood source authentication check is successful.

Options:
A.

TRUE

B.

FALSE

Questions 55

The figure shows the data flow direction of the Bypass interface in the Bypass working mode and the non-Bypass working mode. What are the following statements about the working flow of the electrical Bypass interface?

H12-721 Question 55

Options:
A.

When the interface is in the non-bypass state, the traffic flows from the GE0 interface to the USG through Router_a. After the USG processes, the traffic flows from the GE1 interface to Router_B.

B.

When the interface is working in the Bypass state, the traffic is forwarded from the GE0 interface to the USG. The USG does not pass any processing and flows directly from the GE1 interface to Router_B.

C.

When the firewall is configured to implement the security priority, the uplink and downlink services are not interrupted when the interface works in the bypass state. Therefore, the device can be kept in the Bypass state.

D.

The electrical bypass interface can only work in Layer 2 mode and has circuit bypass function.

Questions 56

Huawei's abnormal traffic cleaning solution must deploy an independent testing center.

Options:
A.

TRUE

B.

FALSE

Questions 57

Using the virtual firewall technology, users on the two VPNs can log in to their private VPNs through the Root VFW on the public network to directly access private network resources. What are the following statements about the characteristics of the VPN multi-instance service provided by the firewall?

Options:
A.

security is high, VPN users access through the firewall authentication and authorization, access after access is to use a separate virtual firewall system to manage users, the resources of different VPN users are completely isolated

B.

VPN access mode is flexible and reliable. It can support from public network to VPN, and can also support from VPN to VPN.

C.

is easy to maintain, users can manage the entire firewall (including each virtual firewall) without a system administrator account with super user privileges.

D.

The access control authority is strict. The firewall can control the access rights of the VPN according to the user name and password. This allows different users such as travel employees and super users (need to access different VPN resources) to have different access rights.

Questions 58

The constraints of the policy in the traffic limiting policy include quintuple, time period, user identity, and application protocol.

Options:
A.

TRUE

B.

FALSE

Questions 59

Which of the following is correct about the configuration of the firewall interface bound to the VPN instance?

Options:
A.

ip binding vpn-instance vpn-id

B.

ip binding vpn-instance vpn-instance-name

C.

ip binding vpn-id

D.

ip binding vpn-id vpn-instance-name

Questions 60

In the active/standby mode of the USG dual-system hot backup, the service interface works at Layer 3, and the upstream and downstream routers are connected. The administrator checks that the USG_A state has been switched to HRP_M[USG_A] and the USG_B state is also HRP_M[USG_B]. What are the most likely reasons?

H12-721 Question 60

Options:
A.

uses the wrong HRP channel interface

B.

Heartbeat connectivity is problematic

C.

does not configure session fast backup

D.

no hrp enable