ExamGecko
Home / Huawei / H12-821_V1.0 / List of questions
Ask Question

Huawei H12-821_V1.0 Practice Test - Questions Answers, Page 5

List of questions

Question 41

Report Export Collapse

Without a prior version check, an engineer configures IGMP snooping on a device and the version of IGMP snooping is earlier than the IGMP versions on user hosts. In this case, which of the following situations will occur?

Users cannot receive multicast data because the device forwards received IGMP Report messages only to router ports and does not generate group member ports or forwarding entries.

Users cannot receive multicast data because the device forwards received IGMP Report messages only to router ports and does not generate group member ports or forwarding entries.

Users cannot receive multicast data, but the device generates forwarding entries after receiving IGMP Report messages.

Users cannot receive multicast data, but the device generates forwarding entries after receiving IGMP Report messages.

The IGMP snooping version of the device is automatically degraded, and users can receive multicast data properly.

The IGMP snooping version of the device is automatically degraded, and users can receive multicast data properly.

The IGMP versions of the hosts are automatically upgraded, and users can receive multicast data properly.

The IGMP versions of the hosts are automatically upgraded, and users can receive multicast data properly.

Suggested answer: A
Explanation:

IGMP Version Mismatch

If the IGMP snooping version on the device is earlier than the IGMP version on user hosts, the device may fail to parse IGMP Report messages correctly. As a result, the device forwards these messages only to router ports without generating group member ports or forwarding entries.

Consequently, users cannot receive multicast data.

HCIP-Datacom-Core Reference

Multicast and IGMP snooping behaviors under mismatched conditions are described in the multicast configuration chapters.

asked 02/12/2024
Vincent Meuldijk
46 questions

Question 42

Report Export Collapse

The Neighbor Discovery Protocol (NDP) is an important basic protocol in the IPv6 protocol suite and plays an important role. Which of the following functions and features does it support?

Address resolution

Address resolution

Neighbor state tracing

Neighbor state tracing

Duplicate address detection

Duplicate address detection

Redirection

Redirection

Suggested answer: A, B, C, D
Explanation:

Neighbor Discovery Protocol (NDP):

NDP is a key protocol in the IPv6 protocol suite, replacing ARP (Address Resolution Protocol) in IPv4.

It operates using ICMPv6 (Internet Control Message Protocol for IPv6) and is critical for managing interactions between IPv6 nodes on the same link.

NDP Features and Functions:

A . Address resolution:

NDP resolves IPv6 addresses into MAC addresses, similar to ARP in IPv4. It uses Neighbor Solicitation (NS) and Neighbor Advertisement (NA) messages for this purpose.

B . Neighbor state tracing:

NDP tracks the state of neighbors to determine their reachability. It maintains a neighbor cache and uses NS/NA messages to verify whether neighbors are reachable.

C . Duplicate address detection (DAD):

NDP ensures that IPv6 addresses are unique within a network. Before assigning an address to an interface, DAD is used to verify that no other node is using the same address. This is done via NS messages.

D . Redirection:

NDP provides redirection functionality to inform hosts of a better first-hop router for reaching a particular destination. It uses ICMPv6 Redirect messages for this purpose.

Conclusion:

NDP supports all the mentioned functions and features: Address resolution, Neighbor state tracing, Duplicate address detection, and Redirection, making it indispensable for IPv6 networks.

asked 02/12/2024
Andre van Mierlo
43 questions

Question 43

Report Export Collapse

IPv6 defines multiple types of addresses. Which of the following statements is false about these addresses?

Link-local addresses can be quickly generated using the EUI-64 method.

Link-local addresses can be quickly generated using the EUI-64 method.

Anycast addresses can be used only as destination addresses.

Anycast addresses can be used only as destination addresses.

Each interface can have multiple global unicast addresses with different network prefixes.

Each interface can have multiple global unicast addresses with different network prefixes.

Manually configured link-local addresses have a higher priority than automatically generated ones.

Manually configured link-local addresses have a higher priority than automatically generated ones.

Suggested answer: D
Explanation:

IPv6 Address Behavior

Manually configured link-local addresses do not have a higher priority than automatically generated ones; they coexist and are equally preferred for local communication.

The other statements are true:

A . Link-local addresses can use the EUI-64 method for quick generation.

B . Anycast addresses are only used as destination addresses.

C . An interface can have multiple global unicast addresses with different prefixes.

HCIP-Datacom-Core Reference

IPv6 address types and priority behaviors are detailed in the IPv6 addressing sections.

asked 02/12/2024
Vladimir Kornfeld
47 questions

Question 44

Report Export Collapse

There are various types of VPNs, which can be applied to different layers. Which of the following network layers does SSL VPN belong to?

Network layer

Network layer

Application layer

Application layer

Transport layer

Transport layer

Data link layer

Data link layer

Suggested answer: B
Explanation:

SSL VPN and Its Functionality:

SSL VPN (Secure Sockets Layer Virtual Private Network) provides secure remote access to a network using SSL/TLS protocols.

SSL VPN operates at the Application Layer of the OSI model. It enables secure communication for applications like web browsers, email clients, and file sharing.

Unlike IPsec VPN, which operates at the Network Layer, SSL VPN focuses on application-specific encryption and authentication.

asked 02/12/2024
aakriti grover
59 questions

Question 45

Report Export Collapse

GRE is a VPN encapsulation technology that is widely used to transmit packets across heterogeneous networks. Which of the following statements is false about GRE?

GRE supports encryption and authentication.

GRE supports encryption and authentication.

GRE supports multicast transmission.

GRE supports multicast transmission.

GRE is a Layer 3 VPN encapsulation technology.

GRE is a Layer 3 VPN encapsulation technology.

GRE can work with other VPN protocols to better ensure data security.

GRE can work with other VPN protocols to better ensure data security.

Suggested answer: A
Explanation:

GRE Characteristics

GRE does not inherently support encryption or authentication. It is a tunneling protocol for encapsulating packets, and data security features must be implemented using other protocols such as IPsec.

Other correct attributes of GRE include:

B . Supports multicast transmission.

C . Acts as a Layer 3 VPN encapsulation technology.

D . Can work with VPN protocols like IPsec for better security.

HCIP-Datacom-Core Reference

GRE features and limitations are discussed in VPN encapsulation technology chapters.

asked 02/12/2024
Joseph Bauer
43 questions

Question 46

Report Export Collapse

By default, some security zones are created when Huawei firewalls are enabled. Which of the following security zones is created by users?

DMZ

DMZ

ISP

ISP

Trust

Trust

Local

Local

Suggested answer: A
Explanation:

By default, Huawei firewalls create security zones such as Trust, Untrust, and Local. The DMZ (Demilitarized Zone) is a security zone explicitly created by users. A DMZ is used to isolate an internal network from the external one, providing an additional layer of security by placing public-facing services (e.g., web servers) in this intermediary zone. This setup ensures that if a public-facing service is compromised, the internal network remains secure. Huawei Firewall configuration steps confirm this zoning principle, making DMZ creation an explicit user-driven action .

asked 02/12/2024
Nadja Burkart
36 questions

Question 47

Report Export Collapse

When receiving a packet that does not match any session table entry, the firewall discards the packet to prevent external attacks and ensure internal information security.

TRUE

TRUE

FALSE

FALSE

Suggested answer: A
Explanation:

When a Huawei firewall receives a packet that does not match any existing session table entry, it discards the packet. This is part of the default firewall policy, which ensures that unrecognized traffic is treated as a potential security risk and blocked. This behavior is vital for preventing unauthorized access and mitigating external attacks. The feature aligns with Huawei's default security strategies as detailed in their firewall operation manuals .

asked 02/12/2024
Nathan Davies
42 questions

Question 48

Report Export Collapse

GRE is a Layer 2 VPN encapsulation technology that encapsulates packets of certain data link layer protocols so that the encapsulated packets can be transmitted over an IP network.

TRUE

TRUE

FALSE

FALSE

Suggested answer: B
Explanation:

GRE (Generic Routing Encapsulation) is not a Layer 2 VPN technology. Instead, it is a Layer 3 tunneling protocol used to encapsulate a wide variety of network layer protocols inside point-to-point connections. GRE is commonly used for creating VPN tunnels across IP networks, allowing for the transport of various types of payloads. This misunderstanding about GRE being a Layer 2 technology contradicts its definition and typical application .

asked 02/12/2024
Syed Azar
44 questions

Question 49

Report Export Collapse

When multiple access channels are set for the same access requirement, the insecure access channels are not used and secure access channels are selected in normal cases. Which of the following are secure access channels?

HTTPS

HTTPS

Telnet

Telnet

SNMPv2

SNMPv2

SFTP

SFTP

Suggested answer: A, D
Explanation:

Secure access channels include protocols that encrypt the transmitted data to protect against interception or unauthorized access. HTTPS (HyperText Transfer Protocol Secure) ensures data encryption over web communications, while SFTP (Secure File Transfer Protocol) provides secure file transfer by utilizing SSH for data encryption. Telnet and SNMPv2, on the other hand, lack robust encryption and are considered insecure. Huawei security standards highlight the importance of encrypted communication to prevent data leaks .

asked 02/12/2024
San Min Oo
49 questions

Question 50

Report Export Collapse

An enterprise administrator wants to configure single-hop BFD to implement fast detection of direct links. Which of the following configurations are mandatory?

Configure the remote discriminator of a BFD session.

Configure the remote discriminator of a BFD session.

Configure the local discriminator of a BFD session.

Configure the local discriminator of a BFD session.

Configure a multicast IP address for BFD.

Configure a multicast IP address for BFD.

Enable BFD globally.

Enable BFD globally.

Suggested answer: A, B, D
Explanation:

For single-hop BFD (Bidirectional Forwarding Detection), the configuration must include the local and remote discriminators to uniquely identify the session endpoints. Additionally, enabling BFD globally is a prerequisite for initiating BFD sessions. Configuring multicast IP addresses is unnecessary for single-hop BFD, as it operates over direct links. Huawei's configuration guidelines specify these requirements to ensure effective deployment and operation of BFD.

* Understanding BFD (Bidirectional Forwarding Detection):

BFD is a protocol used to detect link faults quickly between two routers.

Single-hop BFD operates on directly connected links and is commonly used for fast fault detection in routing protocols like OSPF and BGP.

* Mandatory Configurations for Single-Hop BFD:

A . Configure the remote discriminator of a BFD session:

The remote discriminator is used to uniquely identify the BFD session at the remote end. This is essential for session establishment.

B . Configure the local discriminator of a BFD session:

The local discriminator uniquely identifies the BFD session at the local end. This is required to establish a BFD session.

D . Enable BFD globally:

BFD must be enabled globally on the router for the protocol to operate and for session configurations to take effect.

* Optional Configuration:

C . Configure a multicast IP address for BFD:

This is not required for single-hop BFD, as it operates over direct links using unicast communication. Multicast is used in other scenarios, like multi-hop BFD.

* Conclusion:

The correct configurations for single-hop BFD are A, B, and D.

asked 02/12/2024
Himanshu Sachdeva
43 questions
Total 219 questions
Go to page: of 22
Search

Related questions