Huawei H12-821_V1.0 Practice Test - Questions Answers, Page 5
List of questions
Question 41

Without a prior version check, an engineer configures IGMP snooping on a device and the version of IGMP snooping is earlier than the IGMP versions on user hosts. In this case, which of the following situations will occur?
Users cannot receive multicast data because the device forwards received IGMP Report messages only to router ports and does not generate group member ports or forwarding entries.
Users cannot receive multicast data, but the device generates forwarding entries after receiving IGMP Report messages.
The IGMP snooping version of the device is automatically degraded, and users can receive multicast data properly.
The IGMP versions of the hosts are automatically upgraded, and users can receive multicast data properly.
IGMP Version Mismatch
If the IGMP snooping version on the device is earlier than the IGMP version on user hosts, the device may fail to parse IGMP Report messages correctly. As a result, the device forwards these messages only to router ports without generating group member ports or forwarding entries.
Consequently, users cannot receive multicast data.
HCIP-Datacom-Core Reference
Multicast and IGMP snooping behaviors under mismatched conditions are described in the multicast configuration chapters.
Question 42

The Neighbor Discovery Protocol (NDP) is an important basic protocol in the IPv6 protocol suite and plays an important role. Which of the following functions and features does it support?
Address resolution
Neighbor state tracing
Duplicate address detection
Redirection
Neighbor Discovery Protocol (NDP):
NDP is a key protocol in the IPv6 protocol suite, replacing ARP (Address Resolution Protocol) in IPv4.
It operates using ICMPv6 (Internet Control Message Protocol for IPv6) and is critical for managing interactions between IPv6 nodes on the same link.
NDP Features and Functions:
A . Address resolution:
NDP resolves IPv6 addresses into MAC addresses, similar to ARP in IPv4. It uses Neighbor Solicitation (NS) and Neighbor Advertisement (NA) messages for this purpose.
B . Neighbor state tracing:
NDP tracks the state of neighbors to determine their reachability. It maintains a neighbor cache and uses NS/NA messages to verify whether neighbors are reachable.
C . Duplicate address detection (DAD):
NDP ensures that IPv6 addresses are unique within a network. Before assigning an address to an interface, DAD is used to verify that no other node is using the same address. This is done via NS messages.
D . Redirection:
NDP provides redirection functionality to inform hosts of a better first-hop router for reaching a particular destination. It uses ICMPv6 Redirect messages for this purpose.
Conclusion:
NDP supports all the mentioned functions and features: Address resolution, Neighbor state tracing, Duplicate address detection, and Redirection, making it indispensable for IPv6 networks.
Question 43

IPv6 defines multiple types of addresses. Which of the following statements is false about these addresses?
Link-local addresses can be quickly generated using the EUI-64 method.
Anycast addresses can be used only as destination addresses.
Each interface can have multiple global unicast addresses with different network prefixes.
Manually configured link-local addresses have a higher priority than automatically generated ones.
IPv6 Address Behavior
Manually configured link-local addresses do not have a higher priority than automatically generated ones; they coexist and are equally preferred for local communication.
The other statements are true:
A . Link-local addresses can use the EUI-64 method for quick generation.
B . Anycast addresses are only used as destination addresses.
C . An interface can have multiple global unicast addresses with different prefixes.
HCIP-Datacom-Core Reference
IPv6 address types and priority behaviors are detailed in the IPv6 addressing sections.
Question 44

There are various types of VPNs, which can be applied to different layers. Which of the following network layers does SSL VPN belong to?
Network layer
Application layer
Transport layer
Data link layer
SSL VPN and Its Functionality:
SSL VPN (Secure Sockets Layer Virtual Private Network) provides secure remote access to a network using SSL/TLS protocols.
SSL VPN operates at the Application Layer of the OSI model. It enables secure communication for applications like web browsers, email clients, and file sharing.
Unlike IPsec VPN, which operates at the Network Layer, SSL VPN focuses on application-specific encryption and authentication.
Question 45

GRE is a VPN encapsulation technology that is widely used to transmit packets across heterogeneous networks. Which of the following statements is false about GRE?
GRE supports encryption and authentication.
GRE supports multicast transmission.
GRE is a Layer 3 VPN encapsulation technology.
GRE can work with other VPN protocols to better ensure data security.
GRE Characteristics
GRE does not inherently support encryption or authentication. It is a tunneling protocol for encapsulating packets, and data security features must be implemented using other protocols such as IPsec.
Other correct attributes of GRE include:
B . Supports multicast transmission.
C . Acts as a Layer 3 VPN encapsulation technology.
D . Can work with VPN protocols like IPsec for better security.
HCIP-Datacom-Core Reference
GRE features and limitations are discussed in VPN encapsulation technology chapters.
Question 46

By default, some security zones are created when Huawei firewalls are enabled. Which of the following security zones is created by users?
DMZ
ISP
Trust
Local
By default, Huawei firewalls create security zones such as Trust, Untrust, and Local. The DMZ (Demilitarized Zone) is a security zone explicitly created by users. A DMZ is used to isolate an internal network from the external one, providing an additional layer of security by placing public-facing services (e.g., web servers) in this intermediary zone. This setup ensures that if a public-facing service is compromised, the internal network remains secure. Huawei Firewall configuration steps confirm this zoning principle, making DMZ creation an explicit user-driven action .
Question 47

When receiving a packet that does not match any session table entry, the firewall discards the packet to prevent external attacks and ensure internal information security.
TRUE
FALSE
When a Huawei firewall receives a packet that does not match any existing session table entry, it discards the packet. This is part of the default firewall policy, which ensures that unrecognized traffic is treated as a potential security risk and blocked. This behavior is vital for preventing unauthorized access and mitigating external attacks. The feature aligns with Huawei's default security strategies as detailed in their firewall operation manuals .
Question 48

GRE is a Layer 2 VPN encapsulation technology that encapsulates packets of certain data link layer protocols so that the encapsulated packets can be transmitted over an IP network.
TRUE
FALSE
GRE (Generic Routing Encapsulation) is not a Layer 2 VPN technology. Instead, it is a Layer 3 tunneling protocol used to encapsulate a wide variety of network layer protocols inside point-to-point connections. GRE is commonly used for creating VPN tunnels across IP networks, allowing for the transport of various types of payloads. This misunderstanding about GRE being a Layer 2 technology contradicts its definition and typical application .
Question 49

When multiple access channels are set for the same access requirement, the insecure access channels are not used and secure access channels are selected in normal cases. Which of the following are secure access channels?
HTTPS
Telnet
SNMPv2
SFTP
Secure access channels include protocols that encrypt the transmitted data to protect against interception or unauthorized access. HTTPS (HyperText Transfer Protocol Secure) ensures data encryption over web communications, while SFTP (Secure File Transfer Protocol) provides secure file transfer by utilizing SSH for data encryption. Telnet and SNMPv2, on the other hand, lack robust encryption and are considered insecure. Huawei security standards highlight the importance of encrypted communication to prevent data leaks .
Question 50

An enterprise administrator wants to configure single-hop BFD to implement fast detection of direct links. Which of the following configurations are mandatory?
Configure the remote discriminator of a BFD session.
Configure the local discriminator of a BFD session.
Configure a multicast IP address for BFD.
Enable BFD globally.
For single-hop BFD (Bidirectional Forwarding Detection), the configuration must include the local and remote discriminators to uniquely identify the session endpoints. Additionally, enabling BFD globally is a prerequisite for initiating BFD sessions. Configuring multicast IP addresses is unnecessary for single-hop BFD, as it operates over direct links. Huawei's configuration guidelines specify these requirements to ensure effective deployment and operation of BFD.
* Understanding BFD (Bidirectional Forwarding Detection):
BFD is a protocol used to detect link faults quickly between two routers.
Single-hop BFD operates on directly connected links and is commonly used for fast fault detection in routing protocols like OSPF and BGP.
* Mandatory Configurations for Single-Hop BFD:
A . Configure the remote discriminator of a BFD session:
The remote discriminator is used to uniquely identify the BFD session at the remote end. This is essential for session establishment.
B . Configure the local discriminator of a BFD session:
The local discriminator uniquely identifies the BFD session at the local end. This is required to establish a BFD session.
D . Enable BFD globally:
BFD must be enabled globally on the router for the protocol to operate and for session configurations to take effect.
* Optional Configuration:
C . Configure a multicast IP address for BFD:
This is not required for single-hop BFD, as it operates over direct links using unicast communication. Multicast is used in other scenarios, like multi-hop BFD.
* Conclusion:
The correct configurations for single-hop BFD are A, B, and D.
Question