ExamGecko
Home Home / Huawei / H12-224

Huawei H12-224 Practice Test - Questions Answers, Page 13

Question list
Search
Search

List of questions

Search

QoS provides services of different qualities to meet various application requirements, including dedicated bandwidth, decreased packet loss ratio, short packet transmission delay, and decreased delay and jitter.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

If the lease of a client IP address is not extended after 87.5% of the lease is reached, which message is used by the client to extend the IP address lease?

A.
DHCP Release broadcast message
A.
DHCP Release broadcast message
Answers
B.
DHCP Release unicast message
B.
DHCP Release unicast message
Answers
C.
DHCP Request broadcast message
C.
DHCP Request broadcast message
Answers
D.
DHCP Request unicast message
D.
DHCP Request unicast message
Answers
Suggested answer: C

To enable an Eudemon in routing mode to work like a router, you need to assign IP addresses to interfaces and enable dynamic or static routing protocols on the

Eudemon.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which of the following statements about the security policies for the Eudemon are true? (Choose two.)

A.
By default, a user in the Local zone can access other zones.
A.
By default, a user in the Local zone can access other zones.
Answers
B.
By default, a user in the Trust zone can access the DMZ.
B.
By default, a user in the Trust zone can access the DMZ.
Answers
C.
By default, a user in the Untrust zone cannot access the Trust zone.
C.
By default, a user in the Untrust zone cannot access the Trust zone.
Answers
D.
By default, a user in a zone of the firewall cannot access any other zone of the firewall.
D.
By default, a user in a zone of the firewall cannot access any other zone of the firewall.
Answers
Suggested answer: C, D

By which can an IP-based advanced ACL filter packets? (Choose five.)

A.
Source IP address and its subnet mask
A.
Source IP address and its subnet mask
Answers
B.
Destination IP address and its subnet mask
B.
Destination IP address and its subnet mask
Answers
C.
Protocol type
C.
Protocol type
Answers
D.
TCP or UDP port number
D.
TCP or UDP port number
Answers
E.
Priority of the data packet
E.
Priority of the data packet
Answers
F.
Length of the data packet
F.
Length of the data packet
Answers
Suggested answer: A, B, C, D, E

IP unnumbered is to borrow an IP address from an interface. If an interface has multiple IP addresses, all its IP addresses will be borrowed and the primary address will continue after these IP addresses are borrowed.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

When two Eudemons are working in dual-system hot backup mode, their session tables are backed up in real time.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which of the following statements about the firewall technology are true? (Choose three.)

A.
The network gateway of the application layer checks application-layer data carried in packets passing through the gateway.
A.
The network gateway of the application layer checks application-layer data carried in packets passing through the gateway.
Answers
B.
The network gateway for session status detection checks session information carried in packets only at the session layer.
B.
The network gateway for session status detection checks session information carried in packets only at the session layer.
Answers
C.
During packet filtering, the session status is checked and the whole data stream is analyzed.
C.
During packet filtering, the session status is checked and the whole data stream is analyzed.
Answers
D.
Address proxy replaces IP addresses and port numbers of hosts within the network with the IP address and port number of the proxy device or router.
D.
Address proxy replaces IP addresses and port numbers of hosts within the network with the IP address and port number of the proxy device or router.
Answers
Suggested answer: A, B, D

The Eudemon can control traffic and connections based on IP addresses.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

In the scenario where packets are sent and received along different paths, which of the following functions needs to be disabled on the firewall?

A.
Status detection
A.
Status detection
Answers
B.
Attack defense
B.
Attack defense
Answers
C.
Packet filtering
C.
Packet filtering
Answers
D.
Status backup
D.
Status backup
Answers
Suggested answer: A
Total 803 questions
Go to page: of 81