H12-224 : HCNP-R&S Fast Track (Huawei Certified Network Professional – Routing & Switching Fast Track) : Part 06
-
Where is the MPLS label in a data frame?
- Behind the Layer 3 header and before the Layer 2 header
- Behind the Layer 2 header and before the Layer 3 header
- In the Layer 3 header
- Before the Layer 2 header
-
The option field in DHCP messages uses the CLV mode.
- True
- False
-
What is the POP action in MPLS?
- The top label is removed from the MPLS label stack.
- The top label is added to the MPLS label stack.
- The top label is replaced with another value.
- The top label is replaced with the label of another group.
-
The core of the MPLS technology is label switching.
- True
- False
-
Which statements about guest VLAN configuration are true? (Choose three.)
- The guest VLAN must be created before you configure the guest VLAN.
- The default VLAN of the interface cannot be configured as the guest VLAN.
- Different interfaces can be configured with different guest VLANs.
- An interface can be configured with up to eight guest VLANs.
-
ICMP packets are sent in a Smurf attack and UDP packets are sent in a Fraggle attack.
- True
- False
-
Packet loss occurs only on the packet receiver.
- True
- False
-
Two Eudemons in dual-system hot backup can be working in Active-Active mode or Active-Standby mode.
- True
- False
-
Which of the following indicators are performance indicators of the Eudemon? (Choose three.)
- Throughput of large-sized or small-sized packets
- Number of the interface
- VPN performance
- Process delay
-
The NAT multi-instance function on the Eudemon independently maintains a NAT table for each instance to provide address translation services for instances.
- True
- False
-
Configuring a firewall to work in transparent mode does not change the network topology.
- True
- False
-
The data transmission rate depends on the bandwidth.
- True
- False
-
Which of the following information do you check to directly identify a fault in the firewall if the data transmission is interrupted?
- Session table
- Log
- Global statistics about the firewall
- Alarms
-
What about all outgoing labels in the label forwarding table of a device for different routes with the same next hop?
- They must be different.
- They must be the same.
- They may be the same.
-
The TCP SYN flood attack usually occurs during the TCP handshake process. How many handshakes are required to set up a TCP connection?
- 1
- 2
- 3
- 4
-
Congestion management provides means to manage and control traffic when traffic congestion occurs.
- True
- False
-
IP addresses added to the blacklist of the Eudemon cannot be deleted.
- True
- False
-
Two Eudemons in dual-system hot backup mode can be working in Active-Active mode or Active-Standby mode.
- True
- False
-
What are the functions of DHCP snooping? (Choose three.)
- Defend against DoS attacks initiated by changing the CHADDR field
- Defend against bogus DHCP server attacks
- Defend against Packet Sniffer Mitigation
- Defend against man-in-the-middle attacks and IP/MAC spoofing attacks
-
After an interface on a firewall is added to a zone, the interface belongs to the zone.
- True
- False
Subscribe
0 Comments
Newest