Special Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

H12-725_V4.0 Questions and Answers

Question # 6

Which of the following statements is false about Eth-Trunk?(Select All that Apply)

A.

The total bandwidth of an Eth-Trunk interface is the sum of the bandwidths of all its member interfaces. This increases the interface bandwidth.

B.

The physical interfaces that are bundled into an Eth-Trunk interface are its member interfaces.

C.

If a member interface of the Eth-Trunk interface is Down, traffic can still be transmitted through other member interfaces.

D.

The manual mode can detect not only link disconnections but also link faults and incorrect connections.

Full Access
Question # 7

When Eth-Trunk is deployed for the heartbeat links between firewalls, the Eth-Trunk interface can be configured as a Layer 2 interface as long as the total bandwidth of active links on the Eth-Trunk is greater than 30% of the bandwidth required by service traffic.

A.

TRUE

B.

FALSE

Full Access
Question # 8

In a Huawei network security environment, which of the following is a key advantage of using HWTACACS over RADIUS for device management authentication?

Options:

A.

HWTACACS encrypts only passwords, while RADIUS encrypts the entire payload.

B.

HWTACACS provides per-command authorization, allowing different privilege levels for different users.

C.

HWTACACS operates over UDP, ensuring faster communication than RADIUS.

D.

HWTACACS does not support accounting, while RADIUS does.

Full Access
Question # 9

Predefined URL categories on Huawei firewalls reside in the URL category database delivered with the device and do not need to be manually loaded.

A.

TRUE

B.

FALSE

Full Access
Question # 10

In the figure, enterprise A and enterprise B need to communicate securely, and an IPsec tunnel is established between firewall A and firewall B. Which of the following security protocols and encapsulation modes can meet the requirements of this scenario?

A.

AH+ESP; transport mode

B.

ESP; tunnel mode

C.

ESP; transport mode

D.

AH; tunnel mode

Full Access
Question # 11

Which of the following conditions can be matched by PBR?(Select All that Apply)

A.

Source IP address

B.

Source security zone

C.

Source MAC address

D.

Application

Full Access
Question # 12

In the figure, FW_A connects to FW_B through two links working in active/standby mode. When the active link of FW_A is faulty, the old IPsec tunnel 1 needs to be torn down, and IPsec tunnel 2 needs to be established with FW_B through the standby link to route traffic. In this case, configuring the IKE _____ detection mechanism on FW_A helps detect link faults and tear down the IPsec tunnel.(Enter lowercase letters.)

Full Access
Question # 13

In the figure, if 802.1X authentication is used for wired users on the network, the network admission device and terminals must be connected through a Layer 2 network.

Options:

A.

TRUE

B.

FALSE

Full Access
Question # 14

Which of the following is the function of Message 1 and Message 2 during IKEv1 phase-1 negotiation in main mode?

A.

Mutual identity authentication

B.

Negotiation of the IKE proposals used between peers

C.

IPsec SA negotiation

D.

Exchange of key-related information (materials used for key generation) using the DH algorithm and generation of keys

Full Access
Question # 15

In quota control policies, which of the following can be set for users?(Select All that Apply)

A.

Limiting the daily online duration

B.

Limiting the total monthly online traffic

C.

Limiting the total daily online traffic

D.

Limiting the total online duration per month

Full Access
Question # 16

Multiple links can be deployed at the egress of an enterprise network to improve network reliability.

A.

TRUE

B.

FALSE

Full Access
Question # 17

The figure shows the PBR-based injection scenario. Which of the following statements are true about this scenario?(Select All that Apply)

A.

Router1 is a traffic-diversion router.

B.

After the injected traffic reaches Router1, Router1 forwards the traffic to Router2 or Router3 based on its forwarding mechanism. Finally, the traffic reaches different Zones.

C.

The cleaning device injects traffic from different Zones to different interfaces (10GE1/0/2 and 10GE1/0/3) of Router1 based on PBR.

D.

A traffic-diversion channel is established between 10GE1/0/1 of Router1 and 10GE2/0/1 of the cleaning device.

Full Access
Question # 18

IPsec VPN does not support encapsulation of non-IP unicast packets.

A.

TRUE

B.

FALSE

Full Access