ExamGecko
Home Home / Huawei / H12-811_V1.0

Huawei H12-811_V1.0 Practice Test - Questions Answers, Page 84

Question list
Search
Search

An ACL is essentially a packet filter. An ACL takes effect only after it is applied to a service module.

A.

TRUE

A.

TRUE

Answers
B.

FALSE

B.

FALSE

Answers
Suggested answer: A

Explanation:

Comprehensive An ACL (Access Control List) is used to define rules for permitting or denying packets based on criteria such as IP addresses, protocols, or ports. However, the ACL only takes effect when it is applied to a service module, such as an interface or a firewall rule. This ensures that traffic is filtered according to the ACL rules as it passes through the device. Without being applied, the ACL rules are inactive and do not influence traffic.

Following a failure of services in the network, an administrator discovered that the configuration in one of the enterprise routers had been changed. What actions can be taken by the administrator to prevent further changes?

A.

The administrator should configure an ACL to allow only the administrator to manage the router.

A.

The administrator should configure an ACL to allow only the administrator to manage the router.

Answers
B.

The administrator should configure port-security on the router.

B.

The administrator should configure port-security on the router.

Answers
C.

The administrator should limit access by setting the login privilege of users to level 0.

C.

The administrator should limit access by setting the login privilege of users to level 0.

Answers
D.

The administrator should configure AAA to manage user authorization on the router.

D.

The administrator should configure AAA to manage user authorization on the router.

Answers
Suggested answer: A, D

Explanation:

Comprehensive To prevent unauthorized changes to the router's configuration, the administrator can take several steps. Configuring an ACL to restrict management access ensures that only authorized users, such as the administrator, can log in to the router. Additionally, using AAA (Authentication, Authorization, and Accounting) allows the administrator to manage user permissions and control access to the router's functions based on user roles. Port-security is used for limiting MAC addresses on switch ports, and login privilege levels should be set appropriately but not limited to level 0, which restricts almost all actions.

Static NAT can only implement one-to-one mapping between private and public addresses.

A.

TRUE

A.

TRUE

Answers
B.

FALSE

B.

FALSE

Answers
Suggested answer: B

Explanation:

Comprehensive Static NAT (Network Address Translation) can implement both one-to-one and many-to-one mappings. In a one-to-one mapping, each private IP address is mapped to a unique public IP address. However, in some cases, static NAT can be configured to map multiple private addresses to a single public address, particularly for services that do not require incoming connections. This flexibility allows for more efficient use of limited public IP address space.

An ACL rule is as follows. Which of the following IP addresses can be matched by the permit rule?

rule 5 permit ip source 10.0.2.0 0.0.254.255

A.

10.0.6.7

A.

10.0.6.7

Answers
B.

10.0.5.6

B.

10.0.5.6

Answers
C.

10.0.4.5

C.

10.0.4.5

Answers
D.

10.0.2.1

D.

10.0.2.1

Answers
Suggested answer: C

Explanation:

Comprehensive The wildcard mask 0.0.254.255 corresponds to a range of IP addresses where the second octet can vary between 2 and 4, and the third octet can vary between 0 and 255. This means the ACL rule matches IP addresses in the range 10.0.2.0 to 10.0.4.255. The only option that falls within this range is 10.0.4.5, making it the correct answer.

You can run the user-interface maximum-vty command to configure the maximum number of users who can log in to the device through Telnet simultaneously.

A.

TRUE

A.

TRUE

Answers
B.

FALSE

B.

FALSE

Answers
Suggested answer: A

Explanation:

Comprehensive The user-interface maximum-vty command is used on Huawei devices to configure the maximum number of simultaneous VTY (Virtual Terminal Line) users who can log in via Telnet. By limiting the number of VTY sessions, the administrator can control how many users are able to access the device at the same time, preventing excessive connections that may overwhelm the device or reduce security.

The users who log on the router through Telnet are not permitted to configure an IP address. What is the possible reason?

A.

Privilege level of Telnet is set incorrectly.

A.

Privilege level of Telnet is set incorrectly.

Answers
B.

SNMP parameters are set incorrectly.

B.

SNMP parameters are set incorrectly.

Answers
C.

The authentication mode of Telnet is set incorrectly.

C.

The authentication mode of Telnet is set incorrectly.

Answers
D.

Communication failures occur between the user and the router.

D.

Communication failures occur between the user and the router.

Answers
Suggested answer: A

Explanation:

Comprehensive In Telnet sessions, different privilege levels determine what actions a user is allowed to perform. If users are not able to configure the IP address, it is likely that their privilege level is set incorrectly. The administrator must ensure that the Telnet users are assigned the correct privilege level (typically level 15 for full administrative rights) to allow configuration changes, including IP address modifications.

What packet types are included in DHCP?

A.

DHCP Discover packet

A.

DHCP Discover packet

Answers
B.

DHCP Request packet

B.

DHCP Request packet

Answers
C.

DHCP Rollover packet

C.

DHCP Rollover packet

Answers
D.

DHCP Offer packet

D.

DHCP Offer packet

Answers
Suggested answer: A, B, D

Explanation:

Comprehensive DHCP (Dynamic Host Configuration Protocol) involves several packet types used in the process of assigning IP addresses. These include:

DHCP Discover: The client broadcasts this packet to find available DHCP servers.

DHCP Offer: The DHCP server responds with an IP address offer to the client.

DHCP Request: The client requests the offered IP address from the server.

There is no such thing as a 'DHCP Rollover' packet. The process continues with the DHCP server sending an acknowledgment to finalize the IP address lease.

Which of the following IEEE 802.11 standards supports the 2.4 GHz frequency band only?

A.

802.11a

A.

802.11a

Answers
B.

802.11g

B.

802.11g

Answers
C.

802.11n

C.

802.11n

Answers
D.

802.11ax

D.

802.11ax

Answers
Suggested answer: B

Explanation:

Comprehensive The IEEE 802.11g standard operates exclusively in the 2.4 GHz frequency band, offering data rates up to 54 Mbps. Other standards, such as 802.11a, operate in the 5 GHz band, while 802.11n and 802.11ax support both 2.4 GHz and 5 GHz frequency bands, making 802.11g the only standard in this list that is limited to 2.4 GHz.

The country code configuration affects the actual transmission frequency and maximum transmission power.

A.

TRUE

A.

TRUE

Answers
B.

FALSE

B.

FALSE

Answers
Suggested answer: A

Explanation:

Comprehensive The country code setting on wireless devices like access points determines the allowable transmission frequencies and maximum transmission power based on the regulatory requirements of the specific region. For example, certain frequency channels or power levels may be restricted in different countries to avoid interference with other services, and the country code configuration ensures that the device operates within those legal limits.

Which of the following WLAN security policies support open link authentication?

A.

WPA

A.

WPA

Answers
B.

WEP

B.

WEP

Answers
C.

WPA2-PSK

C.

WPA2-PSK

Answers
D.

WPA2-802.1X

D.

WPA2-802.1X

Answers
Suggested answer: B

Explanation:

Comprehensive WEP (Wired Equivalent Privacy) is the only security policy in this list that supports open link authentication, which means no actual user credentials are required to associate with the network. WEP uses a shared key for encryption but offers minimal protection and is considered insecure. Other security methods like WPA, WPA2-PSK, and WPA2-802.1X use more secure forms of authentication, requiring credentials such as a password or centralized authentication server.

Total 869 questions
Go to page: of 87