Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

Note! Following H12-222 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H12-222 Huawei Certified Network Professional-R&S-IENP Questions and Answers

Questions 4

Which of the following items can be used as the filtering conditions for historical alarm query on eSight?

(Multiple Choice)

Options:

A.

Alarm severity

B.

First occurrence time

C.

Alarm source

D.

Alarm name

Buy Now
Questions 5

NAT technology can only translate network layer information (IP address) in data packets.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 6

Which are lower-layer physical devices of NFV framework? (Multiple Choice)

Options:

A.

Storage device

B.

Network device

C.

Server

D.

Air conditioning system

Buy Now
Questions 7

Which packet information can be marked or re-marked?

Options:

A.

DSCP priority, IP precedence, 802.1p priority, and EXP priority

B.

Source and destination addresses, and EXP priority

C.

MAC address

D.

Any packet information

Buy Now
Questions 8

Which of the following statements regarding the access control application scenario of the Agile Controller is false?

Options:

A.

In MAC address authentication, user terminals are authenticated by the authentication server based on their MAC addresses. MAC address authentication is mainly used to authenticate dumb terminals, such as IP phones and printers.

B.

802.IX authentication uses the Extensible Authentication Protocol (EAP) to transmit authentication information between the client, access device, and authentication server.

C.

Portal authentication is also called web authentication. Users enter their account information on the web authentication page for identity authentication.

D.

In SACG authentication, the USG firewall is connected to a router or switch in bypass mode, and terminal access is controlled by manual monitoring.

Buy Now
Questions 9

NAT technology implements data security transmission through data encryption.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 10

LDP uses Discovery messages to discover neighbors through different neighbor discovery mechanisms. Which of the following statements regarding basic discovery mechanisms are true? (Multiple Choice)

Options:

A.

The destination IP address of the LDP Discovery message is the multicast IP address 224.0.0.2.

B.

The LDP Discovery message is sent to the specified LDP peer.

C.

The LSRdoes not send Hello messages any longer after TCP connections are established.

D.

The LDP Discovery message is encapsulated into a UDP packet and its destination port number is 646.

Buy Now
Questions 11

Information security technology problems are mainly technical problems. Information security work can be done well only by using latest technologies and deploying high-performance devices

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 12

Which command is used to enable association between BFD and static default route?

Options:

A.

ip route-static 0.0.0.0 0.0.0.0 10.0.12.2 bfd-session 1

B.

ip route-static 0.0.0.0 0.0.0.0 10.0.12.2 track bfd-session 1

C.

ip route-static 0.0.0.0 0.0.0.0 10.0.12.2 track 1

D.

ip route-static 0.0.0.0 0.0.0.0 10.0.12.2 track session 1

Buy Now
Questions 13

With the development of the ASIC technology, MPLS is no longer show obvious advantages in improving the forwarding speed. However, MPLS is still widely used causes for what? (Multiple Choice)

Options:

A.

MPLS supports multi-layer labels, and the connection-oriented.

B.

MPLS integrates the powerful Layer 3 routing function of the IP network and the highly effective forwarding mechanism of the traditional Layer 2 network.

C.

MPLS cannot easily implement seamless integration between IP and Layer 2 networks such as the ATM and frame relay.

D.

Support Applications like traffic engineering (TE), virtual private network (VPN), quality of service (QoS) provide better solutions.

Buy Now
Questions 14

Which of the following methods is used to control internal employees and guests access networks in the Agile Controller wireless access control scenario?

Options:

A.

Access control by user name

B.

According to whether the wireless terminal MAC address registration control access

C.

Access control by SSID (different SSIDs for internal employees and guests)

D.

Access control by wireless terminal type

Buy Now
Questions 15

What are differences between the DiffServ and IntServ models? (Multiple Choice)

Options:

A.

The DiffServ model provides different services destined for different destinations.

B.

The DiffServ model provides different services destined for different sources,

C.

The DiffServ model does not need to maintain the status of each flow.

D.

The DiffServ model applies to large-scale backbone networks.

Buy Now
Questions 16

Which of the following statements regarding MAC address spoofing attacks is false?

Options:

A.

Attackers initiate MAC address spoofing attacks using the MAC address learning mechanism.

B.

Attackers send data frames with forged MAC address to the switch to initiate MAC address spoofing attacks.

C.

When MAC address spoofing attacks occur, the switch may learn incorrect mapping between MAC addresses and IP addresses.

D.

When MAC address spoofing attacks occur, the switch may send packets to the attacker.

Buy Now
Questions 17

What are the prerequisites for eSight to receive and manage alarms reported by devices? (Multiple Choice)

Options:

A.

The devices are managed by eSight.

B.

Trap parameters have been correctly configured on the devices.

C.

The SNMP protocol and parameters are correctly configured for managed devices on eSight.

D.

There are reachable routes between eSight and devices.

Buy Now
Questions 18

When BFD detection intervals at both ends are 30ms and 40ms. Which of the following statement is true?

Options:

A.

A BFD session can be set up. After the negotiation, the detection interval of 40ms is used.

B.

A BFD session can be set up. After the negotiation, the detection interval of 30ms is used.

C.

A BFD session can be set up, and packets are sent at respective intervals at both ends.

D.

A BFD session cannot be established.

Buy Now
Questions 19

VPN models are classified into two types: overlay VPN and peer-to-peer VPN.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 20

LR can be used on a physical interface to limit the total rate of sent packets including packets of burst traffic.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 21

Which statement regarding relationship between 802.IX and RADIUS is true?

Options:

A.

802.IX and RADIUS are different names of the same technology.

B.

802.IX is a technological system, in which RADIUS is included.

C.

RADIUS is a technological system, in which 802.IX is included.

D.

802.IX and RADIUS are different technologies, but they are often used together for user access control.

Buy Now
Questions 22

A DDoS attack indicates that an attacker controls many botnet hosts to send a large number of constructed attack packets. As a result, the attacked device rejects request of authorized users.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 23

In the port mirroring, real and reliable data must be collected in real time.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 24

Which of the following protocols are multi-channel protocols? (Multiple Choice)

Options:

A.

FTP

B.

Telnet

C.

H.323

D.

SMTP

Buy Now
Questions 25

What are the mainly methods of data collection? (Multiple Choice)

Options:

A.

Collection by physical optical splitter

B.

Collection through port mirroring

C.

Centralized collection by NMS

D.

Automatic collection

Buy Now
Questions 26

Administrators can query the online user status on eSight to check whether unauthorized users exist, improving the security monitoring capabilities.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 27

MPLS uses LDP to provide different label distribution modes. Which of the following statements regarding LDP label distribution control modes are false? (Multiple Choice)

Options:

A.

LDP label distribution can be controlled in ordered mode.

B.

In ordered mode, when an LSR is the origin of a route, it can send label mapping messages to the upstream router initiatively and does not need to wait for label mapping messages from the next hop LSR.

C.

LDP label distribution cannot be controlled in independent mode.

D.

In independent mode, an LSR cannot send label mapping messages to the upstream router before it receives label mapping messages from the next hop LSR.

Buy Now
Questions 28

For interzone packet filtering, which of following traffic is not transmitted in the outbound direction?

Options:

A.

Traffic from the DMZ to the untrusted zone

B.

Traffic from the trusted zone to the DMZ

C.

Traffic from the trusted zone to the untrusted zone

D.

Traffic from the trusted zone to the local zone

Buy Now
Questions 29

A DHCP client needs to obtain an IP address from the DHCP server when accessing a network for

the first time. When the client accesses the network again, which of the following statements are true?

(Multiple Choice)

Options:

A.

The DHCP client broadcasts a DHCP Discover packet. The DHCP server replies to the packet.

B.

The DHCP client only needs to broadcast a DHCP Request packet containing the IP address obtained last time, but does not need to send a DHCP Discover packet again.

C.

After receiving the DHCP Discover packet, the DHCP server sends a DHCP Offer packet containing the leased IP address and other settings to the DHCP client.

D.

After receiving the DHCP Request packet, the DHCP server returns a DHCP ACK packet if the requested IP address is not allocated to another client.

Buy Now
Questions 30

Which of the following statements regarding the switch configuration are true? (Multiple Choice)

Options:

A.

By default, the DHCP service must be enabled when you configure the DHCP server and DHCP relay agent.

B.

VLANIF 100 receives DHCP packets and forwards the packets to the external DHCP server through a relay agent.

C.

Specify VLANIF 100 to the DHCP server group dhcpgroup1.

D.

Create a DHCP server group first and add a DHCP server to the group.

E.

By default, DHCP servers on the network are added to dhcpgroup1 automatically.

Buy Now
Questions 31

What is the BFD version number supported by VRP?

Options:

A.

Version 1

B.

Version 2

C.

Version 3

D.

Version 4

Buy Now
Questions 32

Congestion means that the service rate is reduced because of insufficient network resources Congestion avoidance technologies include RED and WRED.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 33

What is the characteristic of the packet filtering firewall?

Options:

A.

As the ACL complexity and length increase, the firewall filtering performance deteriorates exponentially.

B.

Static ACL rules cannot adapt to dynamic security filtering requirements.

C.

It is easy for hackers muddle through without check the session state and analyze the data.

D.

It can fully control network information exchange, and Session control is of high security.

Buy Now
Questions 34

Which of the following statements regarding packet marking is false?

Options:

A.

QoS information of packets can be marked.

B.

The DSCP priority or IP precedence of IP packets can be marked.

C.

The 802.1P priority of VLAN packets can be marked

D.

The MAC address of packets can be marked.

Buy Now
Questions 35

MPLS VPN is used to solve some limitations of traditional VPN technology. Which are the major limitation that MPLS VPN solves?

Options:

A.

Private routes cannot communicate with each other.

B.

Leased lines are expensive.

C.

Bandwidth resources cannot be fully used.

D.

The address space is overlapping.

Buy Now
Questions 36

On the USG series firewall, what is the security level of the DMZ?

Options:

A.

5

B.

50

C.

85

D.

100

Buy Now
Questions 37

Which of the following statements regarding the free mobility application scenario of the Agile Controller is false?

Options:

A.

The Agile Controller uniformly deploys permission policies for controlling server access from personnel in each department. The administrator needs to focus on access permissions between departments. A key device in the campus can function as the policy execution point. After the deployment is complete, users can obtain access permissions no matter where they are and what access mode is used.

B.

Policies are deployed automatically to control access between outsourcing personnel and

employees by policies and IP addresses, while ensuring correct the network access permissions of each user. It can also control data sharing among team members to guarantee enterprise data security.

C.

When gateway resources are limited, automatic gateway selection and preferential forwarding of packets from VIP users guarantee fine network experience of VIP users.

D.

The Agile Controller can automatically identify office requirements of working staff, without the need for manual configurations. Users can obtain network access permissions anytime, anywhere.

Buy Now
Questions 38

MPLS performs different actions on labels. What is the meaning of the pop action?

Options:

A.

The top label is removed from the MPLS label stack.

B.

The top label is added to the MPLS label stack.

C.

The top label is replaced with another value.

D.

The top label is replaced with the label of another group.

Buy Now
Questions 39

Which of the following statements regarding forwarding equivalence class (FEC) in MPLS are false?

(Multiple Choice)

Options:

A.

Packets with the same FEC are processed differently on a MPLS network.

B.

FECs can be divided flexibly by source IP address, destination IP address, source port, destination port, protocol type, VPN, or any combinations of them.

C.

MPLS classifies packets with the same forwarding processing mode into one FEC.

D.

One FEC has only one unique label marker.

Buy Now
Questions 40

The NAT address pool configuration command is as follows. What is the meaning of no-pat?

Options:

A.

The address is not translated.

B.

The interface is multiplexed.

C.

The source interface is not converted.

D.

The destination interface is not converted.

Buy Now
Questions 41

Which of the following statements regarding VRRP is false?

Options:

A.

VRRP determines the device role in the virtual router based on device priorities.

B.

If the backup router works in non-preemption mode, the backup router with a higher priority does not become the master router as long as the master router does not fail.

C.

Even if there is the master router, the backup router will preempt to be the master router.

D.

When two routers with the same priority preempt to be the master router, the IP addresses of interfaces are compared. The router with a larger IP address of the interface is selected as the master router.

Buy Now
Questions 42

If the DSCP priority (leftmost 6 bits of the ToS field) is used, how many types of packets can be classified?

Options:

A.

8

B.

16

C.

32

D.

64

Buy Now
Questions 43

Which of the following methods can be used to improve network QoS? (Multiple Choice)

Options:

A.

Increasing link bandwidth

B.

Using proper queue scheduling and congestion avoidance mechanisms

C.

Using high-performance devices

D.

Provide services at different times for different business

Buy Now
Exam Code: H12-222
Exam Name: Huawei Certified Network Professional-R&S-IENP
Last Update: Apr 14, 2023
Questions: 287