H12-224 : HCNP-R&S Fast Track (Huawei Certified Network Professional – Routing & Switching Fast Track) : Part 07

  1. QoS provides services of different qualities to meet various application requirements, including dedicated bandwidth, decreased packet loss ratio, short packet transmission delay, and decreased delay and jitter.

    • True 
    • False
  2. If the lease of a client IP address is not extended after 87.5% of the lease is reached, which message is used by the client to extend the IP address lease?

    • DHCP Release broadcast message
    • DHCP Release unicast message
    • DHCP Request broadcast message 
    • DHCP Request unicast message
  3. To enable an Eudemon in routing mode to work like a router, you need to assign IP addresses to interfaces and enable dynamic or static routing protocols on the Eudemon.

    • True 
    • False
  4. Which of the following statements about the security policies for the Eudemon are true? (Choose two.)

    • By default, a user in the Local zone can access other zones.
    • By default, a user in the Trust zone can access the DMZ.
    • By default, a user in the Untrust zone cannot access the Trust zone.
    • By default, a user in a zone of the firewall cannot access any other zone of the firewall.
  5. By which can an IP-based advanced ACL filter packets? (Choose five.)

    • Source IP address and its subnet mask
    • Destination IP address and its subnet mask
    • Protocol type
    • TCP or UDP port number
    • Priority of the data packet
    • Length of the data packet
  6. IP unnumbered is to borrow an IP address from an interface. If an interface has multiple IP addresses, all its IP addresses will be borrowed and the primary address will continue after these IP addresses are borrowed.

    • True
    • False 
  7. When two Eudemons are working in dual-system hot backup mode, their session tables are backed up in real time.

    • True
    • False
  8. Which of the following statements about the firewall technology are true? (Choose three.)

    • The network gateway of the application layer checks application-layer data carried in packets passing through the gateway.
    • The network gateway for session status detection checks session information carried in packets only at the session layer.
    • During packet filtering, the session status is checked and the whole data stream is analyzed.
    • Address proxy replaces IP addresses and port numbers of hosts within the network with the IP address and port number of the proxy device or router.
  9. The Eudemon can control traffic and connections based on IP addresses.

    • True 
    • False
  10. In the scenario where packets are sent and received along different paths, which of the following functions needs to be disabled on the firewall?

    • Status detection 
    • Attack defense
    • Packet filtering
    • Status backup
  11. The variation in packet delay is called jitter.

    • True 
    • False
  12. Which of the following firewalls is the most popular?

    • Packet filtering firewall
    • Stateful firewall 
    • Proxy firewall
    • Anti-virus firewall
  13. The multi-channel protocol is used to establish at least two channels (sessions) for communications or services.

    • True 
    • False
  14. Which messages are sent from the client to the server? (Choose three.)

    • DHCP NAK
    • DHCP REQUEST
    • DHCP DISCOVER
    • DHCP RELEASE
  15. In DiffServ mode, before the application program sends packets, it needs to confirm that the network has reserved resources for packet transmission.

    • True
    • False
  16. The Eudemon generates a blacklist upon detecting an attack.

    • True 
    • False
  17. Which encapsulation mode is used for the MPLS protocol on an Ethernet network?

    • Packet mode
    • Frame mode 
    • Transport mode
    • Channel mode
    • Pipe mode
  18. Which of the following DDoS attacks can the Eudemon 1000E defend against? (Choose three.)

    • SYN flood
    • UDP flood
    • ICMP flood
    • SQL flood
  19. Which of the following attacks are DDoS attacks? (Choose four.)

    • SYN flood
    • SYN/ACK flood
    • UDP flood
    • FTP attack
    • HTTP get flood 
  20. Which of the following statements about NAT are true? (Choose three.)

    • NAT is short for “network address translation”.
    • NAT, also called address proxy, is used for translation between private and public network addresses.
    • Hosts within the intranet can access the extranet without using NAT.
    • NAT can effectively resolve the problem of IP address shortage.