ExamGecko
Home Home / Huawei / H12-224

Huawei H12-224 Practice Test - Questions Answers, Page 16

Question list
Search
Search

Which of the following attacks are prevented after an IP address and MAC address are bound on the Eudemon? (Choose two.)

A.
IP address spoofing
A.
IP address spoofing
Answers
B.
MAC address spoofing
B.
MAC address spoofing
Answers
C.
DoS attack
C.
DoS attack
Answers
D.
DDoS attack
D.
DDoS attack
Answers
Suggested answer: A, B

Different virtual firewall instances on an Eudemon must be configured with the same security policy.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

What are the types of DDoS attacks? (Choose three.)

A.
Attacks by special packets
A.
Attacks by special packets
Answers
B.
Scanning attack
B.
Scanning attack
Answers
C.
Sniff attack
C.
Sniff attack
Answers
D.
Application-layer attack
D.
Application-layer attack
Answers
Suggested answer: A, B, D

What is the function of the client IP address field in DHCP messages?

A.
It is used by the client in bound, renew, or rebinding state to respond to ARP request packets.
A.
It is used by the client in bound, renew, or rebinding state to respond to ARP request packets.
Answers
B.
It specifies the IP address allocated by the DHCP server to a client.
B.
It specifies the IP address allocated by the DHCP server to a client.
Answers
C.
It specifies the next server address used in the BootStrap and is contained in DHCP Offer or DHCP ACK messages.
C.
It specifies the next server address used in the BootStrap and is contained in DHCP Offer or DHCP ACK messages.
Answers
D.
It specifies the DHCP relay address.
D.
It specifies the DHCP relay address.
Answers
Suggested answer: A

How many default zones does the Eudemon supporting multi-instance have?

A.
Two
A.
Two
Answers
B.
Three
B.
Three
Answers
C.
Four
C.
Four
Answers
D.
Five
D.
Five
Answers
Suggested answer: D

The Eudemon that is working in transparent mode detects processes data at Layer 2. Its interfaces are not configured with IP addresses.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

The firewall can be working in routing mode, transparent mode, or composite mode. The default mode is the composite mode.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

Which encapsulation mode is used for DHCP messages?

A.
TCP encapsulation
A.
TCP encapsulation
Answers
B.
RTP encapsulation
B.
RTP encapsulation
Answers
C.
UDP encapsulation
C.
UDP encapsulation
Answers
D.
PPP encapsulation
D.
PPP encapsulation
Answers
Suggested answer: C

The blacklist function on the firewall can filter packets based on destination IP addresses. A destination IP address can be dynamically added to or deleted from the blacklist.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

What about all outgoing labels in the label forwarding table of a device for the same route with the same next hop?

A.
They must be different.
A.
They must be different.
Answers
B.
They must be the same.
B.
They must be the same.
Answers
C.
They may be the same.
C.
They may be the same.
Answers
Suggested answer: B
Total 803 questions
Go to page: of 81