H12-224 : HCNP-R&S Fast Track (Huawei Certified Network Professional – Routing & Switching Fast Track) : Part 10

  1. MPLS is a switching standard defined by the IETF. Which device adds or deletes labels?

    • Label distribution router
    • LER 
    • LSR
    • Label transmit router
  2. Which of the following is the priority value of the DMZ on the Eudemon?

    • 10
    • 50
    • 75
    • 85
  3. Which of the following NAT functions are supported by the Eudemon? (Choose three.)

    • NAT/PAT 
    • IPv4 to IPv6 NAT
    • Bidirectional NAT 
    • NAT server 
  4. What are the types of firewalls developed so far? (Choose three.)

    • Packet filtering firewall
    • Proxy firewall
    • Anti-virus firewall
    • Stateful firewall 
  5. Which of the following statements about the zone priorities of the Eudemon are true? (Choose three.)

    • The priority of the Local zone is 100. 
    • The priority of the Trust zone is 80.
    • The priority of the Untrust zone is 5. 
    • The priority of the DMZ is 50. 
  6. The traditional packet loss policy uses the Tail-Drop method.

    • True 
    • False
  7. What are the similarities of DHCP and BOOTP? (Choose two.)

    • They work in client/server model. 
    • They work in static address allocation mode.
    • They can dynamically obtain DNS addresses.
    • They use the same packet structure. 
  8. Users can change the priorities of default zones on the firewall as required.

    • True
    • False 
  9. Which of the following attacks can Eudemon defend against? (Choose three.)

    • SYN-Flood 
    • SQL inject
    • Port Scan
    • Ping-Death
  10. How many user-defined security zones at most are configured on an Eudemon?

    • 3
    • 4
    • 5
    • 6
  11. Which statements about DHCP snooping are true? (Choose three.)

    • The DHCP snooping binding table contains dynamic binding entries and static binding entries.
    • DHCP snooping distinguishes the trusted interface and untrusted interfaces and discards DHCP Reply messages from untrusted interfaces.
    • The static binding table is manually configured on the inbound interface and the aging time can also be manually set.
    • When DHCP snooping is used at Layer 2, the interface information can be obtained for the binding table even if the Option 82 function is not configured. 
  12. Which of the following commands is used to display the detailed information about the Eudemon?

    • Display firewall statistic system
    • Display firewall session table raw both-direction
    • Display firewall session table verbose 
    • Display firewall session table detail
  13. The NAT function enabled on the Eudemon does not greatly affect system performance.

    • True 
    • False
  14. When a client applies for an IP address through DHCP, which message is the unicast message?

    • DHCP OFFER
    • DHCP REQUEST
    • DHCP DISCOVER
    • None of the above 
  15. What is the maximum number of security zones supported by the Eudemon?

    • 256
    • 128
    • 32
    • 16
  16. If you have run the dot1x port-method command with the port parameter specified (port-based 802.1x authentication), the maximum number of users on an interface changes to 1. In this case, which statements are true? (Choose two.)

    • You can run the dot1x max-user command to change the maximum number of access users.
    • You cannot run the dot1x max-user command to set the maximum number of access users.
    • You need to run the undo dot1x port-method command, and then set the maximum number of access users.
    • All of the above
  17. What is the sequence of applying for an IP address in DHCP?

    1. The host sends a DHCP Request message to apply for an IP address.
    2. The DHCP server replies with a DHCP Offer message.
    3. The host sends a DHCP Discovery message to search for the DHCP server.
    4. The DHCP server replies with a DHCP ACK message after receiving the DHCP Request message.

    • 1-2-3-4
    • 1-4-3-2
    • 3-2-1-4 
    • 3-4-1-2
  18. The IPSec function on the Eudemon supports NAT traversal.

    • True 
    • False
  19. To process fragmented service packets on an NAT-enabled firewall, which of the following functions needs to be enabled?

    • Transparent fragment transmission
    • Fragment cache 
    • Fragment reassembly
    • MTU check
  20. Based on specific rules, traffic classification identifies packets having the same characteristics. Traffic classification is the prerequisite and basis for differentiated services.

    • True
    • False
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments