ExamGecko
Home Home / Huawei / H12-224

Huawei H12-224 Practice Test - Questions Answers, Page 12

Question list
Search
Search

Configuring a firewall to work in transparent mode does not change the network topology.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

The data transmission rate depends on the bandwidth.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which of the following information do you check to directly identify a fault in the firewall if the data transmission is interrupted?

A.
Session table
A.
Session table
Answers
B.
Log
B.
Log
Answers
C.
Global statistics about the firewall
C.
Global statistics about the firewall
Answers
D.
Alarms
D.
Alarms
Answers
Suggested answer: A

What about all outgoing labels in the label forwarding table of a device for different routes with the same next hop?

A.
They must be different.
A.
They must be different.
Answers
B.
They must be the same.
B.
They must be the same.
Answers
C.
They may be the same.
C.
They may be the same.
Answers
Suggested answer: A

The TCP SYN flood attack usually occurs during the TCP handshake process. How many handshakes are required to set up a TCP connection?

A.
1
A.
1
Answers
B.
2
B.
2
Answers
C.
3
C.
3
Answers
D.
4
D.
4
Answers
Suggested answer: C

Congestion management provides means to manage and control traffic when traffic congestion occurs.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

IP addresses added to the blacklist of the Eudemon cannot be deleted.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

Two Eudemons in dual-system hot backup mode can be working in Active-Active mode or Active-Standby mode.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

What are the functions of DHCP snooping? (Choose three.)

A.
Defend against DoS attacks initiated by changing the CHADDR field
A.
Defend against DoS attacks initiated by changing the CHADDR field
Answers
B.
Defend against bogus DHCP server attacks
B.
Defend against bogus DHCP server attacks
Answers
C.
Defend against Packet Sniffer Mitigation
C.
Defend against Packet Sniffer Mitigation
Answers
D.
Defend against man-in-the-middle attacks and IP/MAC spoofing attacks
D.
Defend against man-in-the-middle attacks and IP/MAC spoofing attacks
Answers
Suggested answer: A, B, D

After an interface on a firewall is added to a zone, the interface belongs to the zone.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A
Total 803 questions
Go to page: of 81