ExamGecko
Home / Huawei / H12-351_V1.0 / List of questions
Ask Question

Huawei H12-351_V1.0 Practice Test - Questions Answers, Page 3

Add to Whishlist

List of questions

Question 21

Report Export Collapse

WPA3 has the following advantages over WPA and WPA2: supports WPA3-SAE, provides a more secure handshake protocol, enhances the algorithm strength, and supports Suite A cryptography.

True
True
False
False
Suggested answer: A
Explanation:

WPA3 has the following advantages over WPA and WPA2:

Supports WPA3-SAE, which provides more secure authentication and key management than PSK.

Provides a more secure handshake protocol than 802.11i, which can resist offline dictionary attacks and protect forward secrecy.

Enhances the algorithm strength from AES-128 to AES-192 or AES-256.

Supports Suite A cryptography, which provides higher security levels for government or military networks.

Reference: https://support.huawei.com/enterprise/en/doc/EDOC1100058940/8a8f1c9b/wpa3

asked 18/09/2024
Tony Hardyanto
36 questions

Question 22

Report Export Collapse

Which of the following statements about attack defense is true?

Defense against flood attacks can be used to defend against Ping of Death attacks.
Defense against flood attacks can be used to defend against Ping of Death attacks.
Attack defense allows APs to analyze the contents and behaviors of incoming packets on ports to determine whether packets have attack characteristics. The APs then take defense measures on the packets that have attack characteristics.
Attack defense allows APs to analyze the contents and behaviors of incoming packets on ports to determine whether packets have attack characteristics. The APs then take defense measures on the packets that have attack characteristics.
Attack defense can defend against spoofing packet attacks, malformed packet attacks, fragmentation attacks, and flood attacks.
Attack defense can defend against spoofing packet attacks, malformed packet attacks, fragmentation attacks, and flood attacks.
Fragmentation attack defense enables a device to detect packet fragments in real time and discard or rate-limit them to protect the device.
Fragmentation attack defense enables a device to detect packet fragments in real time and discard or rate-limit them to protect the device.
Suggested answer: B
Explanation:

Attack defense is a feature that allows APs to analyze the contents and behaviors of incoming packets on ports to determine whether packets have attack characteristics. The APs then take defense measures on the packets that have attack characteristics, such as discarding them or limiting their rate. Attack defense can defend against spoofing packet attacks, malformed packet attacks, fragmentation attacks, and flood attacks.

Reference: https://support.huawei.com/enterprise/en/doc/EDOC1100058940/8a8f1c9b/attackdefense

asked 18/09/2024
Brian Bell
48 questions

Question 23

Report Export Collapse

In 802. IX authentication using port-based access control, once a user is authenticated successfully on a port, subsequent users on this port can access the network without authentication. When the authenticated user goes offline, all other users are denied access to the network.

True
True
False
False
Suggested answer: A
Explanation:

According to the Huawei documents and resources, 802.1X authentication using port-based access control is a method that allows only one user to access the network through a port at a time. If a user is authenticated successfully on a port, subsequent users on this port can access the network without authentication. When the authenticated user goes offline, all other users are denied access to the network1. Therefore, A is the correct answer.

Reference: 1: https://support.huawei.com/enterprise/en/doc/EDOC1100086527

asked 18/09/2024
Luca Bombelli
40 questions

Question 24

Report Export Collapse

Which of the following are typical 802. IX authentication modes? (Select All that apply)

EAP termination
EAP termination
EAP relay
EAP relay
EAP-TLS
EAP-TLS
EAP-MD5
EAP-MD5
Suggested answer: A, B
Explanation:

According to the Huawei documents and resources, EAP termination and EAP relay are typical 802.1X authentication modes between the access device and authentication server. In EAP termination mode, the access device terminates EAP packets and encapsulates them into RADIUS packets. In EAP relay mode, the access device directly encapsulates the received EAP packets into RADIUS using EAP over RADIUS (EAPoR) packets2. Therefore, A and B are the correct answers. Reference: 2:

https://support.huawei.com/enterprise/en/doc/EDOC1100086527

asked 18/09/2024
Said Jabri
44 questions

Question 25

Report Export Collapse

Huawei Agile Cloud Authentication (HACA) supports only IMaster NCE-Campus as the HACA server.

True
True
False
False
Suggested answer: B
Explanation:

According to the Huawei documents and resources, Huawei Agile Cloud Authentication (HACA) supports iMaster NCE-Campus as well as Agile Controller-Campus as the HACA server. HACA is an authentication method that allows users to access a network without entering user names or passwords3. Therefore, B is the correct answer. Reference: 3:

https://support.huawei.com/enterprise/en/doc/EDOC1100086527

asked 18/09/2024
Mohamed Ramez Hamad
38 questions

Question 26

Report Export Collapse

Which of the following statements about EAP relay and EAP termination are false? (Select All that apply)

In EAP termination mode, an access device encapsulates EAP packets sent by an 802. IX client Into RADIUS packets, without processing the data in the EAP packets.
In EAP termination mode, an access device encapsulates EAP packets sent by an 802. IX client Into RADIUS packets, without processing the data in the EAP packets.
In EAP relay mode, an access device extracts information from EAP packets, encapsulates the information into RADIUS packets, and sends the RADIUS packets to an authentication server.
In EAP relay mode, an access device extracts information from EAP packets, encapsulates the information into RADIUS packets, and sends the RADIUS packets to an authentication server.
In EAP termination mode, an access device extracts client authentication information from the EAP packets sent by a client and encapsulates the information using the standard RADIUS protocol.The access device supports only the EAP MD5-Challenge authentication method.
In EAP termination mode, an access device extracts client authentication information from the EAP packets sent by a client and encapsulates the information using the standard RADIUS protocol.The access device supports only the EAP MD5-Challenge authentication method.
The EAP termination mode simplifies the processing on an access device and supports various authentication methods. However, this mode requires an authentication server to support EAP and have high processing capability.
The EAP termination mode simplifies the processing on an access device and supports various authentication methods. However, this mode requires an authentication server to support EAP and have high processing capability.
Suggested answer: A, D
Explanation:

A. In EAP termination mode, an access device encapsulates EAP packets sent by an 802. IX client Into RADIUS packets, without processing the data in the EAP packets. This statement is false because in EAP termination mode, an access device extracts information from EAP packets, encapsulates the information into RADIUS packets, and sends the RADIUS packets to an authentication server2.

D. The EAP termination mode simplifies the processing on an access device and supports various authentication methods. However, this mode requires an authentication server to support EAP and have high processing capability. This statement is false because it describes the EAP relay mode, not the EAP termination mode2.

Therefore, A and D are the correct answers. Reference: 2:

https://support.huawei.com/enterprise/en/doc/EDOC1100086527

asked 18/09/2024
Bruce Tablada
40 questions

Question 27

Report Export Collapse

Which of the following encapsulation formats are used for EAP termination in 802.1X authentication? (Select All that apply)

EAP-TLS
EAP-TLS
EAPoL
EAPoL
EAPoR
EAPoR
EAP
EAP
Suggested answer: B, C
Explanation:

According to the Huawei documents and resources, the encapsulation formats used for EAP termination in 802.1X authentication are as follows:

B. EAPoL: The client and access device exchange information using EAPoL packets across the LAN2.

C. EAPoR: The access device directly encapsulates the received EAP packets into RADIUS using EAP over RADIUS (EAPoR) packets2.

Therefore, B and C are the correct answers.

Reference: 2: https://support.huawei.com/enterprise/en/doc/EDOC1100086527

asked 18/09/2024
PRADESH MATHEW
43 questions

Question 28

Report Export Collapse

DRAG DROP

Drag the short-range wireless IoT technologies on the left to their corresponding descriptions on the right.


Huawei H12-351_V1.0 image Question 28 32348 09182024072212000
Correct answer: Huawei H12-351_V1.0 image answer Question 28 32348 09182024072212000
Explanation:

According to the Huawei documents and resources, the definitions of the short-range wireless IoT technologies are as follows:

ZigBee: IEEE 802.15.4-based wireless communication technology is a short-range, and low-power wireless communication technology that supports star, mesh, and hybrid networking.

Bluetooth: With the emergence of IoT industries such as smart wearables, smart home, and Internet of Vehicles, short-range communication technologies are attracting more and more developers.

REID: Its basic principle is to automatically identify objects based on the transmission characteristics of radio signals and space coupling (inductance or electromagnetic coupling) or radar reflection.

Wi-Fi: Wireless networking technology based on IEEE 802.11 is the most popular WLAN technology.

Therefore, ZigBee - 1, Bluetooth - 3, REID - 2, Wi-Fi - 4 is the correct answer.

Reference: https://support.huawei.com/enterprise/en/doc/EDOC1100158948/9a0d5c37/zigbee

https://support.huawei.com/enterprise/en/doc/EDOC1100158948/9a0d5c37/bluetooth

https://support.huawei.com/enterprise/en/doc/EDOC1100158948/9a0d5c37/rfid

https://support.huawei.com/enterprise/en/doc/EDOC1100158948/9a0d5c37/wi-fi

asked 18/09/2024
Shameez Mohammed
44 questions

Question 29

Report Export Collapse

DRAG DROP

Differentiated network planning needs to be performed to meet requirements of different IoT services in Huawei's CloudCampus loT solutions. Drag the solutions on the left to their corresponding network planning suggestions on the right.


Huawei H12-351_V1.0 image Question 29 32349 09182024072212000
Correct answer: Huawei H12-351_V1.0 image answer Question 29 32349 09182024072212000
Explanation:

According to the Huawei documents and resources, the network planning suggestions for the solutions are as follows:

Asset management: The RFID signal coverage distance is 25 m. Therefore, RFID signal coverage must be considered during AP deployment planning. Attach RFID tags on the surface or top of assets to prevent signals from being blocked.

ESL: Shelves may be blocked in application scenarios. Therefore, shelf blocking must be considered during network planning. The shelves can be deployed in aisles to minimize obstacles toward integrated base stations.

Smart healthcare: For applications that support regional positioning, positioning devices need to be deployed at key entrances and exits based on service requirements.

Therefore, Asset management - 2, ESL - 1, Smart healthcare - 3 is the correct answer.

Reference: https://support.huawei.com/enterprise/en/doc/EDOC1100158948/9a0d5c37/asset-management https://support.huawei.com/enterprise/en/doc/EDOC1100158948/9a0d5c37/esl https://support.huawei.com/enterprise/en/doc/EDOC1100158948/9a0d5c37/smart-healthcare

asked 18/09/2024
ben ebrahimi
43 questions

Question 30

Report Export Collapse

Which of the following components is not included In a typical RFID system?

Information processing platform
Information processing platform
RFID tag
RFID tag
Router
Router
RFID reader
RFID reader
Suggested answer: C
Explanation:

A router is not included in a typical RFID system. A typical RFID system consists of three components:

RFID tag, RFID reader, and information processing platform. The RFID tag is attached to the object to be identified, the RFID reader communicates with the tag and reads its information, and the information processing platform processes and stores the data collected by the reader.

Reference: https://support.huawei.com/enterprise/en/doc/EDOC1100058940/8a8f1c9b/rfid

asked 18/09/2024
Abdulilah Alhousainy
45 questions
Total 60 questions
Go to page: of 6