Huawei h12-721 practice test

HCIP-Security-CISN V3.0 Exam


Question 1

USG A and USG B are configured with a static BFD session. The following is true about the process of
establishing and tearing down a BFD session.

  • A. USG A and USG B each start the BFD state machine. The initial state is Down and the BFD packet is Down. The value of Your Discriminator is 0.
  • B. After the local BFD status of B USG B is Init, if you continue to receive packets with the status Down, you can re-process and update its local status.
  • C. After receiving the BFD packet in the init state, C USG B switches the local state to Up.
  • D. After the state transition of "DOWN-->INIT" occurs on D USG A and USG B, a timeout timer is started. If the BFD packet is in the Init or Up state, the local state is automatically switched back to Down.
Answer:

C, D

Explanation:
Note: 1. USG A and USG B each start the BFD state machine. The initial state is Down and the BFD
packet is Down. For a static BFD session, the value of the Your Discriminator is specified by the user.
For the dynamic BFD session, the value of the Your Discriminator is 0. 2. After receiving the BFD
packet whose status is Down, the USG B switches to Init. And send a BFD packet with the status of
Init. 3. If the local BFD state of USG B is Init, the packets of the received state are Down. 4. The BFD
state of USG A is the same as that of USG B. 5. After receiving the BFD packet in the Init state, the
local state is switched to Up. 6. The BFD status of USG A changes with USG B. 7. After the state
transition of "DOWN-->INIT" occurs on USG A and USG B, a timeout timer is started. If the BFD packet
is in the Init or Up state, the local state is automatically switched back to Down.

Discussions

Question 2

An administrator can view the status of the device components by the following command: The
status of the Slot3 board is Abnormal. What are the possible causes of the following faults?

  • A. This slot is not supported in this slot of device A.
  • B. interface card is damaged
  • C. The pin on the backplane or motherboard is damaged. If the incorrect board is installed, the pin is tilted.
  • D. ADSL telephone line failure
Answer:

A B, C

Discussions

Question 3

The constraints of the policy in the traffic limiting policy include quintuple, time period, user identity,
and application protocol.

  • A. TRUE
  • B. FALSE
Answer:

A

Discussions

Question 4

When using the optical bypass interface, the Bypass link has two working modes, automatic mode
and forced mode.

  • A. TRUE
  • B. FALSE
Answer:

A

Discussions

Question 5

In the application scenario of the virtual firewall technology, the more common service is to provide
rental services to the outside. If the virtual firewall VFW1 is leased to enterprise A and the virtual
firewall VFW2 is leased to enterprise B, what is the following statement incorrect?

  • A. The A system provides independent system resources for the virtual firewalls VFW1 and VFW2, and does not affect each other.
  • B. is transparent to users, and the business between enterprise A and enterprise B is completely isolated, just like using firewalls separately.
  • C. Enterprise A and Enterprise B can overlap addresses and use VLANs to separate different VLANs.
  • D. Enterprise A and Enterprise B cannot manage their own virtual firewalls independently and must be managed by the administrator of the lessor.
Answer:

D

Discussions

Question 6

What are the scenarios in which the USG series firewall service port sends gratuitous ARPs when the
following configurations are performed?

  • A. routing mode + switch
  • B. routing mode + router
  • C. exchange mode + switch
  • D. exchange mode + router
Answer:

C

Discussions

Question 7

In the application scenario of IPSec traversal by NAT, the active initiator of the firewall must configure
NAT traversal, and the firewall at the other end can be configured without NAT traversal.

  • A. TRUE
  • B. FALSE
Answer:

B

Discussions

Question 8

The NAT/ASPF log in the session log and the DPI traffic monitoring log provide a binary output
technology for this type of log. The use of binary input output can greatly reduce the impact on
system performance, but The binary form output needs to be configured with the elog log
management system.

  • A. TRUE
  • B. FALSE
Answer:

A

Discussions

Question 9

The network administrator of a company discards traffic that exceeds the throughput of the device.
The USG discards the traffic that exceeds the device throughput. The USG discards the traffic that
exceeds the device throughput. The following command can achieve this function?

  • A. utm bypass enable
  • B. undo utm bypass enable
  • C. ips bypass enable
  • D. undo ips bypass enable
Answer:

B

Discussions

Question 10

Which of the following is not a message sent during ip-link detection?

  • A. ARP packet
  • B. IGMP message
  • C. ICMP message
  • D. Hello message
Answer:

B, D

Explanation:
Answer : BD Note: ip-link will periodically improve icmp and arp detection messages to
Explanation: the target host.

Discussions
To page 2