H12-224 : HCNP-R&S Fast Track (Huawei Certified Network Professional – Routing & Switching Fast Track) : Part 06

  1. Where is the MPLS label in a data frame?

    • Behind the Layer 3 header and before the Layer 2 header
    • Behind the Layer 2 header and before the Layer 3 header 
    • In the Layer 3 header
    • Before the Layer 2 header
  2. The option field in DHCP messages uses the CLV mode.

    • True 
    • False
  3. What is the POP action in MPLS?

    • The top label is removed from the MPLS label stack. 
    • The top label is added to the MPLS label stack.
    • The top label is replaced with another value.
    • The top label is replaced with the label of another group.
  4. The core of the MPLS technology is label switching.

    • True 
    • False
  5. Which statements about guest VLAN configuration are true? (Choose three.)

    • The guest VLAN must be created before you configure the guest VLAN.
    • The default VLAN of the interface cannot be configured as the guest VLAN.
    • Different interfaces can be configured with different guest VLANs.
    • An interface can be configured with up to eight guest VLANs.
  6. ICMP packets are sent in a Smurf attack and UDP packets are sent in a Fraggle attack.

    • True 
    • False
  7. Packet loss occurs only on the packet receiver.

    • True
    • False 
  8. Two Eudemons in dual-system hot backup can be working in Active-Active mode or Active-Standby mode.

    • True 
    • False
  9. Which of the following indicators are performance indicators of the Eudemon? (Choose three.)

    • Throughput of large-sized or small-sized packets
    • Number of the interface
    • VPN performance
    • Process delay
  10. The NAT multi-instance function on the Eudemon independently maintains a NAT table for each instance to provide address translation services for instances.

    • True 
    • False
  11. Configuring a firewall to work in transparent mode does not change the network topology.

    • True 
    • False
  12. The data transmission rate depends on the bandwidth.

    • True 
    • False
  13. Which of the following information do you check to directly identify a fault in the firewall if the data transmission is interrupted?

    • Session table 
    • Log
    • Global statistics about the firewall
    • Alarms
  14. What about all outgoing labels in the label forwarding table of a device for different routes with the same next hop?

    • They must be different. 
    • They must be the same.
    • They may be the same.
  15. The TCP SYN flood attack usually occurs during the TCP handshake process. How many handshakes are required to set up a TCP connection?

    • 1
    • 2
    • 3
    • 4
  16. Congestion management provides means to manage and control traffic when traffic congestion occurs.

    • True 
    • False
  17. IP addresses added to the blacklist of the Eudemon cannot be deleted.

    • True
    • False 
  18. Two Eudemons in dual-system hot backup mode can be working in Active-Active mode or Active-Standby mode.

    • True 
    • False
  19. What are the functions of DHCP snooping? (Choose three.)

    • Defend against DoS attacks initiated by changing the CHADDR field
    • Defend against bogus DHCP server attacks
    • Defend against Packet Sniffer Mitigation
    • Defend against man-in-the-middle attacks and IP/MAC spoofing attacks
  20. After an interface on a firewall is added to a zone, the interface belongs to the zone.

    • True
    • False
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments