ExamGecko
Home Home / Huawei / H12-224

Huawei H12-224 Practice Test - Questions Answers, Page 20

Question list
Search
Search

Which statements about DHCP snooping are true? (Choose three.)

A.
The DHCP snooping binding table contains dynamic binding entries and static binding entries.
A.
The DHCP snooping binding table contains dynamic binding entries and static binding entries.
Answers
B.
DHCP snooping distinguishes the trusted interface and untrusted interfaces and discards DHCP Reply messages from untrusted interfaces.
B.
DHCP snooping distinguishes the trusted interface and untrusted interfaces and discards DHCP Reply messages from untrusted interfaces.
Answers
C.
The static binding table is manually configured on the inbound interface and the aging time can also be manually set.
C.
The static binding table is manually configured on the inbound interface and the aging time can also be manually set.
Answers
D.
When DHCP snooping is used at Layer 2, the interface information can be obtained for the binding table even if the Option 82 function is not configured.
D.
When DHCP snooping is used at Layer 2, the interface information can be obtained for the binding table even if the Option 82 function is not configured.
Answers
Suggested answer: A, B, D

Which of the following commands is used to display the detailed information about the Eudemon?

A.
Display firewall statistic system
A.
Display firewall statistic system
Answers
B.
Display firewall session table raw both-direction
B.
Display firewall session table raw both-direction
Answers
C.
Display firewall session table verbose
C.
Display firewall session table verbose
Answers
D.
Display firewall session table detail
D.
Display firewall session table detail
Answers
Suggested answer: C

The NAT function enabled on the Eudemon does not greatly affect system performance.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

When a client applies for an IP address through DHCP, which message is the unicast message?

A.
DHCP OFFER
A.
DHCP OFFER
Answers
B.
DHCP REQUEST
B.
DHCP REQUEST
Answers
C.
DHCP DISCOVER
C.
DHCP DISCOVER
Answers
D.
None of the above
D.
None of the above
Answers
Suggested answer: D

What is the maximum number of security zones supported by the Eudemon?

A.
256
A.
256
Answers
B.
128
B.
128
Answers
C.
32
C.
32
Answers
D.
16
D.
16
Answers
Suggested answer: D

If you have run the dot1x port-method command with the port parameter specified (port-based 802.1x authentication), the maximum number of users on an interface changes to 1. In this case, which statements are true? (Choose two.)

A.
You can run the dot1x max-user command to change the maximum number of access users.
A.
You can run the dot1x max-user command to change the maximum number of access users.
Answers
B.
You cannot run the dot1x max-user command to set the maximum number of access users.
B.
You cannot run the dot1x max-user command to set the maximum number of access users.
Answers
C.
You need to run the undo dot1x port-method command, and then set the maximum number of access users.
C.
You need to run the undo dot1x port-method command, and then set the maximum number of access users.
Answers
D.
All of the above
D.
All of the above
Answers
Suggested answer: B, C

What is the sequence of applying for an IP address in DHCP?

A.
The host sends a DHCP Request message to apply for an IP address.
A.
The host sends a DHCP Request message to apply for an IP address.
Answers
B.
The DHCP server replies with a DHCP Offer message.
B.
The DHCP server replies with a DHCP Offer message.
Answers
C.
The host sends a DHCP Discovery message to search for the DHCP server.
C.
The host sends a DHCP Discovery message to search for the DHCP server.
Answers
D.
The DHCP server replies with a DHCP ACK message after receiving the DHCP Request message.
D.
The DHCP server replies with a DHCP ACK message after receiving the DHCP Request message.
Answers
E.
1-2-3-4
E.
1-2-3-4
Answers
F.
1-4-3-2
F.
1-4-3-2
Answers
G.
3-2-1-4
G.
3-2-1-4
Answers
H.
3-4-1-2
H.
3-4-1-2
Answers
Suggested answer: C

The IPSec function on the Eudemon supports NAT traversal.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

To process fragmented service packets on an NAT-enabled firewall, which of the following functions needs to be enabled?

A.
Transparent fragment transmission
A.
Transparent fragment transmission
Answers
B.
Fragment cache
B.
Fragment cache
Answers
C.
Fragment reassembly
C.
Fragment reassembly
Answers
D.
MTU check
D.
MTU check
Answers
Suggested answer: B

Based on specific rules, traffic classification identifies packets having the same characteristics. Traffic classification is the prerequisite and basis for differentiated services.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A
Total 803 questions
Go to page: of 81