All4Certs Exam Archive [Newest Version] Free CertBus Huawei H12-224 PDF and Exam Questions Download 100% Pass Exam

[Newest Version] Free CertBus Huawei H12-224 PDF and Exam Questions Download 100% Pass Exam

Categories :

Do not worry about your Huawei Certified H12-224 exam preparation? Hand over your problems to CertBus in change of the Huawei Certified H12-224 HCNP-R and S Fast Track (Huawei Certified Network Professional – Routing and Switching) Fast Track Exam certifications! CertBus provides the latest Huawei Huawei Certified H12-224 exam preparation materials with PDF and VCEs. We CertBus guarantees you passing Huawei Certified H12-224 exam for sure.

We CertBus has our own expert team. They selected and published the latest H12-224 preparation materials from Huawei Official Exam-Center: http://www.certgod.com/h12-224.html

QUESTION NO: 1

On the MSTP network as shown in the figure, what is the role of the switch in MSTI 1 according to the

configuration?

A. Root switch

B. Slave switch

C. Non-root switch

D. None of the above

Correct Answer: A

QUESTION 2

As shown in the figure, which switch is the root switch according to the configuration?

A. SWA

B. SWB

C. SWC

D. None of the above

Correct Answer: A

QUESTION 3

If an MSTP switch detects that the neighboring switch works in RSTP mode, which mode does the MSTP

switch work?

A. STP mode

B. RSTP mode

C. MSTP mode

D. All of the above

Correct Answer: B

QUESTION 4

Which problems on a single spanning tree network can be solved by MSTP? (Select 3 Answers)

A. Traffic forwarding paths in some VLANs are faulty.

B. Traffic cannot be load balanced.

C. The second best path problem may occur.

D. The network reliability cannot be improved.

Correct Answer: ABC

QUESTION 5

According to the figure, what is the status of Ethernet1/0/13 in MSTI 1?

A. Forwarding

B. Discarding

C. Learning

D. None of the above

Correct Answer: B

QUESTION 6

In RSTP, which statements about the alternate port and backup port are true? (Select 2 Answers)

A. The alternate port is a backup of the root port.

B. The backup port is a backup of the designated port.

C. The switch that the backup port belongs to is not the designated switch on the network segment

connected to the interface.

D. The switch that the alternate port belongs to is the designated switch on the network segment

connected to the interface.

Correct Answer: AB

QUESTION 7

According to the MSTP protocol, each MST instance calculates an independent spanning tree by using the

RSTP algorithm.

A. True

B. False

Correct Answer: A

QUESTION 8

The following is the command output on a root switch of an MSTP region. How many switches are located

in the MSTP region?

A. Less than 10

B. Less than 20

C. Less than 30

D. Less than 40

Correct Answer: C

QUESTION 9

On the RSTP network with STP devices, which packets does an RSTP switch use to notify the STP

switches of the topology change?

A. RSTP BPDUs with the TC flag

B. STP BPDUs with the TCN flag

C. RSTP BPDUs with the TCA flag

D. STP BPDUs with the TCA flag

Correct Answer: B

QUESTION 10

What are the same fields in RSTP BPDUs and STP BPDUs? (Select 2 Answers)

A. TCN

B. TC

C. TCA

D. All of the above

Correct Answer: BC

QUESTION 11

On the RSTP network as shown in the figure, what RSTP operations will occur after the E1 port of SWB

fails? (Select 3 Answers)

A. SWB deletes the MAC address entries with the E1 port as the destination interface.

B. The spanning tree is recalculated and the E2 port is elected as the new root port.

C. All the interfaces in forwarding state send topology change notifications (TCNs) to notify other switches

of the topology change.

D. All the non-edge ports in forwarding state send TCNs to notify other switches of the topology change.

Correct Answer: ABD

QUESTION 12

Which is the port state defined in RSTP?

A. Discarding

B. Learning

C. Forwarding

D. All of the above

Correct Answer: D

QUESTION 13

RSTP has all functions that STP has and it is backward compatible with STP.

A. True

B. False

Correct Answer: A

QUESTION 14

RSTP adopts fast convergence mechanism. So, there is no Forward Delay interval in RSTP.

A. True

B. False

Correct Answer: B

QUESTION 15

Two switches are directly connected to each other and they are working in full duplex mode. By default,

RSTP will consider the link between the switches as point-to-point link.

A. True

B. False

Correct Answer: A

QUESTION 16

In RSTP network environment, a port can be set as edge port when it is directly connected with terminal.

A. True

B. False

Correct Answer: A

QUESTION 17

Which of the following statements about RSTP and STP is true?

A. STP has more port states than RSTP.

B. The port roles used in RSTP is less than the port roles used in STP.

C. Since RSTP adopts fast convergence mechanism, it does not have Learning state which is available in

STP.

D. Same as STP, the ports will enter into Listening state once the RSTP has been enabled. Then, the

ports can receive BPDU and calculate the spanning tree.

Correct Answer: A

QUESTION 18

In a switching network that runs RSTP, the topology change notification message will not be sent when the

switch detects that the Alternate Port is failed.

A. True

B. False

Correct Answer: A

QUESTION 19

When the topology of a network running RSTP changes, what happens after the change?

A. Flooding on the entire network.

B. The aging time of MAC address entries is changed.

C. Some MAC address entries are deleted.

D. All of the above

Correct Answer: C

QUESTION 20

Which ports defined by RSTP cannot work in Forwarding state? (Select 2 Answers)

A. Root Port

B. Designated Port

C. Backup Port

D. Alternate Port

Correct Answer: CD

QUESTION 21

On an RSTP network, when an edge port is in protected state, what operation is performed after the edge

port receives BPDUs?

A. The edge port forwards BPDUs.

B. The edge port discards BPDUs.

C. The edge port is shut down.

D. The edge port obtains required information from BPDUs.

Correct Answer: C

QUESTION 22

In RSTP, the port status can be discarding and learning. Which statements about the port status are true?

(Select 2 Answers)

A. The port in discarding or learning state does not forward data frames.

B. The port in discarding state does not learn MAC addresses.

C. The port in learning state does not learn MAC addresses.

D. All of the above

Correct Answer: AB

QUESTION 23

On the RSTP network as shown in the figure, what is the port role of SWC E0/1 according to the

configuration? (Select 2 Answers)

A. Designated port

B. Root port

C. Alternate port

D. Edge port

Correct Answer: AD

QUESTION 24

As shown in the figure, when the link between SWC and LAND is faulty, through which path are TCA

BPDUs sent?

A. From SWA to SWB

B. From SWB to SWC

C. From SWB to SWA

D. From SWC to SWB

Correct Answer: B

QUESTION 25

As shown in the figure, when the STP network runs properly, which device does the designated port of

LANC reside?

A. SWA

B. SWB

C. SWC

D. None of the above

Correct Answer: B

QUESTION 26

In STP configuration, which statement about BPDUs is true?

A. BPDUs cannot be sent from the designated port.

B. BPDUs can be sent only from the designated port.

C. BPDUs can be sent from any port.

D. None of the above.

Correct Answer: B

QUESTION 27

On an STP network, after the network topology changes, which BPDUs are sent during flooding of

topology change information on the entire network?

A. BPDUs with the TCN flag

B. BPDUs with the TCA flag

C. BPDUs with the TC flag

D. All of the above

Correct Answer: D

QUESTION 28

After an STP switch starts, it considers itself as the root switch. Which statements about BDPU parameter

setting are true? (Select 3 Answers)

A. The switch is the designated root.

B. The designated cost is 0.

C. The switch is the designated bridge.

D. The designated port is 0.

Correct Answer: ABC

QUESTION 29

On the STP network as shown in the figure, which device may be the blocked port belong to?

A. SWA

B. SWB

C. SWC

D. None of the above

Correct Answer: C

QUESTION 30

QinQ provides a simplified Layer 2 VPN tunnel.

A. True

B. False

Correct Answer: A

QUESTION 31

Which statements about QinQ are true? (Select 2 Answers)

A. QinQ saves VLANs on the public network.

B. To avoid VLAN conflict, the customer must negotiate with the service provider before modifying the

VLANs on its private network.

C. When the service provider upgrades the network, the configurations on the user network do not need to

be modified.

D. All of the above

Correct Answer: AC

QUESTION 32

Some vendors set the TPID value in the outer VLAN tag of QinQ packets to the non-protocol value.

To be compatible with these vendors\’ devices, the TPID value on Huawei switches is adjustable.

Which is the default value of the TPID value on Huawei switches?

A. 0x9200

B. 0x9100

C. 0x8200

D. 0x8100

Correct Answer: D

QUESTION 33

Which types of interfaces can be configured with selective QinQ? (Select 2 Answers)

A. Access interface

B. Trunk interface

C. Hybrid interface

D. dot1q-tunnel interface

Correct Answer: BC

QUESTION 34

The STP protocol can prevent broadcast storms caused by loops on the Layer 2 network.

A. True

B. False

Correct Answer: A

QUESTION 35

The STP protocol cannot prevent MAC address table flapping caused by loops on the Layer 2 network.

A. True

B. False

Correct Answer: B

QUESTION 36

Which are the port roles defined in STP?

A. Root Port

B. Designated Port

C. Alternate Port

D. All of the above

Correct Answer: D

QUESTION 37

How many port states are defined by STP?

A. 3

B. 4

C. 5

D. 6

Correct Answer: C

QUESTION 38

Each STP switch has a unique switch ID. Which two entries does the switch ID contain?

A. Two-byte switch priority

B. Six-byte MAC address

C. Two-byte switch priority and six-byte MAC address

D. Six-byte switch priority and six-byte MAC address

Correct Answer: C

QUESTION 39

On an STP network, before the interface status transits from non-forwarding to forwarding, how many

Forward Delay intervals does the interface wait for?

A. 2

B. 3

C. 4

D. 5

Correct Answer: A

QUESTION 40

If loop exists and STP is not enabled, the switch will not operate normally.

A. True

B. False

Correct Answer: A

QUESTION 41

Which of the following statements about STP Designated Port is true?

A. Each of the bridge can have one Designated Port only.

B. Designated Port is responsible for forwarding packets to its connected network segments.

C. The only path leading to the Root Bridge is through Designated Port.

D. Designated Port forwards the data packet from its corresponding switch to the Root Switch.

Correct Answer: B

QUESTION 42

Which of the following statements about STP Designated Port is true?

A. Each of the bridge can have one Designated Port only.

B. Designated Port is responsible for forwarding packets to its connected network segments.

C. The only path leading to the Root Bridge is through Designated Port.

D. Designated Port forwards the data packet from its corresponding switch to the Root Switch.

Correct Answer: B

QUESTION 43

Which of the following statements is not the advantage of STP?

A. STP can manage the redundant links. When the working link is down, network connectivity can be

restored.

B. STP can prevent loops

C. STP can prevent broadcast storm

D. STP can save network bandwidth

Correct Answer: D

QUESTION 44

Which of the following standards defines STP?

A. 802.1J

B. 802.1X

C. 802.1D

D. 802.1P

Correct Answer: C

QUESTION 45

STP elects ( )

A. One bridge as the Root Bridge and another one as the Backup Root Bridge

B. One bridge as the Root Bridge

C. Two bridges as the Root Bridge

D. One Designated Bridge

Correct Answer: B

QUESTION 46

STP distributes configuration message by sending BPDU packet to each other.

A. True

B. False

Correct Answer: A

QUESTION 47

In STP, BPDU packet is carried by ( ).

A. IP packet

B. TCP packet

C. Ethernet frame

D. UDP packet

Correct Answer: C

QUESTION 48

In a switching network that has been enabled with STP protocol, the priorities of all the switches are the

same. The MAC address of switch1 is 00-e0-fc-00-00-40, MAC address of switch2 is 00- e0-fc-00-00-10,

MAC address of switch3 is 00-e0-fc-00-00-20, and MAC address of switch4 is 00-e0-fc-00-00-80. Which of

the switches will be elected as the Root Bridge?

A. Switch1

B. Switch2

C. Switch3

D. Switch4

Correct Answer: B

QUESTION 49

A switching network has been enabled with STP protocol. To provide fast access speed to the file server

for most of the users, the switch that is directly connected with file server is configured as the root bridge.

A. True

B. False

Correct Answer: A

QUESTION 50

Which of the following statements about the link failure detection in STP protocol is not true?

A. When network topology is stable, the Designated Port sends BPDU packet at every Hello Time interval.

B. When network topology is stable, BPDU packets will be transmitted periodically.

C. When the port does not receive new BPDU within a certain interval, the old configuration BPDU will

time out and the link failure can be detected.

D. The port sends Configuration BPDU at every Hello Time interval. When the link fails, Configuration

BPDU cannot be sent out. As a result, this port can detect the link failure.

Correct Answer: D

QUESTION 51

Which of the following statements about STP is not true?

A. STP can manage redundant links.

B. STP can block redundant links to eliminate loops

C. STP can prevent temporary loss of connectivity

D. STP can make LAN switch operate normally in a network with loops

Correct Answer: C

QUESTION 52

According to OSI reference model, Layer 2 LAN switch operates at ( ).

A. Physical layer

B. Data link layer

C. IP layer

D. Application layer

Correct Answer: B

QUESTION 53

According to the STP protocol, a certain field in the BPDU identifies the root switch. That is, if the BPDU

sent by a switch contains this field, this switch is considered as the root switch. What is this field?

A. Root Identifier

B. Root Path Cost

C. Bridge Identifier

D. Port Identifier

Correct Answer: A

QUESTION 54

Which are the two parts in the port identifier of the uplink interface on a non-root switch?

A. 1-bit port priority and 1-bit port number

B. 1-bit port priority and 2-bit port number

C. 2-bit port priority and 1-bit port number

D. 2-bit port priority and 2-bit port number

Correct Answer: A

QUESTION 55

In the network diagram, which switch will be selected as the root switch?

A. SWA

B. SWB

C. SWC

D. None of the above

Correct Answer: A

QUESTION 56

Which statements about the PVID on the access interface are true? (Select 3 Answers)

A. When receiving a packet without the VLAN tag, the interface adds the VLAN tag to the packet and sets

the VID in the tag to the default VLAN ID.

B. When receiving a packet with a VLAN tag, the interface compares the VLAN ID in the tag with the

default VLAN ID. If they are the same, the interface forwards the packets; otherwise, the interface

discards the packets.

C. When the interface sends a packet with a VLAN tag that contains the default VLAN ID, the system

removes the VLAN tag of the packet, and then forwards the packet.

D. None of the above.

Correct Answer: ABC

QUESTION 57

Which statement about the hybrid interface is true?

A. A hybrid interface can only be connected to network device.

B. A hybrid interface can only be connected to host.

C. A hybrid interface can be connected to host or network device.

D. A hybrid interface cannot be configured with VLAN ID.

Correct Answer: C

QUESTION 58

Which statement about MUX VLAN is false?

A. Principal VLAN

B. Subordinate VLAN

C. Subordinate group VLAN

D. Guest VLAN

Correct Answer: D

QUESTION 59

Which statements about the MUX VLAN configuration are true? (Select 2 Answers)

[Quidway]vlan 10

[Quidway-vlan10]mux-vlan

[Quidway-vlan10]subordinate group 11

[Quidway-vlan10]subordinate separate 12

A. VLAN 10 is the principal VLAN

B. VLAN 11 is the principal VLAN

C. VLAN 12 is the subordinate separate VLAN

Correct Answer: AC

QUESTION 60

When configuring VLAN mapping, you must set the priority of outer VLAN ID.

A. True

B. False

Correct Answer: B

QUESTION 61

The port isolation function can isolate the ports on the same switch.

A. True

B. False

Correct Answer: A

QUESTION 62

Which statements are false?

A. The VLAN mapping function is usually configured on the edge node of a public network.

B. The VLAN mapping function can save VLAN resources on a public network.

C. VLAN mapping allows private networks on different VLANs to communicate with each other over the

ISP network.

D. VLAN mapping allows only the private networks on the same VLAN to communicate with each other.

Correct Answer: D

QUESTION 63

Which statements about VLAN are true? (Select 3 Answers)

A. The VLAN improves network security. Users on different VLANs cannot communicate with each other.

B. The VLAN improves network processing efficiency. Users on different VLANs are separated from each

other. Therefore, the size of a broadcast domain is reduced.

C. Layer 2 forwarding is only based on destination MAC addresses, and is irrelevant to VLAN

configuration.

D. The VLAN technology is a management method that controls the communication between terminals.

Correct Answer: ABD

QUESTION 64

Which statements about the VLAN on S series switches are true? (Select 2 Answers)

A. The VLAN IDs on the switch range from 1 to 4090.

B. The switch has a default VLAN.

C. The priority value in the VLAN tag can be changed on the switch.

D. A VLAN tag contains one byte.

Correct Answer: BC

QUESTION 65

If the customer requires high mobility and easy management, the staff of different departments can be

added to different VLANs. In addition, these VLANs are located on different IP subnets. Which VLAN

allocation mode can meet these requirements?

A. VLAN allocation based on source IP addresses

B. VLAN allocation based on destination IP addresses

C. VLAN allocation based on source IP addresses and source MAC addresses

D. VLAN allocation based on destination MAC addresses and destination IP addresses

Correct Answer: A

QUESTION 66

Which statements about the access interface are true? (Select 3 Answers)

A. Only the VLAN whose ID is the same as the PVID of the access interface are allowed on the access

interface.

B. When receiving an untagged frame, the access interface adds its own PVID to the frame.

C. The access interface sends only untagged frames to the peer device.

D. None of the above.

Correct Answer: ABC

QUESTION 67

Which statement about the trunk interface is true?

A. A trunk interface is always connected to hosts.

B. “multiple” VLAN IDs can be set on a trunk interface. The VLAN IDs can be the same as or different

from the PVID.

C. The trunk interface cannot have a PVID.

D. If the trunk interface receives a packet with a VLAN not in the allowed VLAN list, the trunk interface

broadcast the packet in the VLAN.

Correct Answer: B

QUESTION 68

Which statements about MUX VLAN are true? (Select 2 Answers)

A. MUX VLAN contains a principal VLAN and subordinate VLANs. The principal VLAN and subordinate

VLANs cannot communicate.

B. MUX VLAN contains a principal VLAN and subordinate VLANs. The subordinate VLANs are classified

into subordinate separate VLANs and subordinate group VLANs. The interfaces in the subordinate

group VLAN can communicate with each other.

C. The principal VLAN and subordinate VLANs can communicate.

D. The interfaces of different subordinate separate VLANs can communicate with each other, but cannot

communicate with the interfaces in the principal VLAN.

Correct Answer: BC

QUESTION 69

Which statement is true?

A. The principal VLAN must be configured before subordinate VLANs.

B. The MUX VLAN function takes effect without being enabled on an interface.

C. In MUX VLAN, a VLAN can function as both principal VLAN and subordinate VLAN.

D. The MUX VLAN can contain only one subordinate separate VLAN.

Correct Answer: A

QUESTION 70

Which statement about ARP proxy is false?

A. The ARP proxy, namely, the gateway, sends ARP request for the host. The MAC address in the ARP

request packet is the MAC address of the host.

B. The ARP proxy, namely, the gateway, sends ARP request for the host. The MAC address in the ARP

request packet is the MAC address of its own interface.

C. ARP proxy is also called promiscuous ARP or ARP hack.

D. The ARP proxy allows the hosts on the networks with the same network ID to communicate with each

other.

Correct Answer: A

QUESTION 71

Which statement is false?

A. The switch supports 1:1 VLAN mapping.

B. The switch does not support N:1 VLAN mapping on an interface.

C. The switch can perform VLAN mapping for double-tagged packets.

D. The switch can map the outer VLAN ID of packets to another VLAN ID.

Correct Answer: B

QUESTION 72

Which statement about VLAN is false?

A. A VLAN tag contains a 3-bit priority field. The priority value ranges from 0 to 7. It is used for

differentiated service forwarding.

B. The priority in the VLAN tag can be mapped to the internal priority of the switch, for differentiated

service forwarding.

C. The priority in the VLAN tag can be changed on the switch.

D. The priority in the VLAN tag cannot be changed.

Correct Answer: D

QUESTION 73

Which statements are true? (Select 3 Answers)

A. The routing ARP proxy allows the hosts on different physical networks of the same network segment to

communicate with each other.

B. The intra-VLAN ARP proxy allows isolated users on a VLAN to communicate with each other.

C. The inter-VLAN ARP proxy allows hosts on different VLANs to communicate with each other through

Layer 3.

D. The inter-VLAN ARP proxy function can\’t be enabled on the VLANIF interface of the super VLAN to

implement communication between sub-VLANs.

Correct Answer: ABC

QUESTION 74

Which statement about VLAN mapping is true?

A. The interface configured with VLAN mapping must be a hybrid interface.

B. The same VLANs on different interfaces cannot be mapped to different VLANs.

C. Different VLANs on the same interface can be mapped to the same VLAN.

D. Any types of interfaces can be configured with VLAN mapping.

Correct Answer: C

QUESTION 75

Which statement about port isolation configuration is false?

A. Port isolation can be used for Layer 2 isolation.

B. In port isolation mode, ports are isolated at Layer 2 but can communicate at Layer 3 by default.

C. Before the port isolation function takes effect on an interface, the port isolation function must be

enabled first.

D. The port-isolate enable command can run in the system view.

Correct Answer: D

QUESTION 76

Which VLAN assignment methods are supported by the Huawei S9300? (Select 3 Answers)

A. Assigning VLANs based on Layer 7 protocols

B. Assigning VLANs based on protocols

C. Assigning VLANs based on IP subnets

D. Assigning VLANs based on MAC addresses

Correct Answer: BCD

QUESTION 77

Which statements about VLAN aggregation are true? (Select 3 Answers)

A. “multiple” VLANs (broadcast domains) are on the same physical network; therefore, different VLANs

belong to the same subnet.

B. VLAN aggregation can save IP addresses.

C. Only the super VLAN requires an IP address, but sub-VLANs do not need.

D. The VLAN that is used to separate broadcast domains is called super VLAN.

Correct Answer: ABC

QUESTION 78

Which statement about VLAN mapping is false?

A. VLAN mapping is also called VLAN translation.

B. VLAN mapping can implement translation between C-VLAN IDs and S-VLAN IDs.

C. VLAN mapping can be configured.

D. VLAN mapping means that a VLAN tag is added to packets.

Correct Answer: D

QUESTION 79

Which statement about the VLAN on a Layer 2 switch is true?

A. The CFI in the VLAN tag specifies whether the priority in the VLAN tag is valid.

B. The VLAN tag is located in the Layer 2 header of a packet.

C. The CFI in the VLAN tag contains two bits.

D. A VLAN on the switch is a broadcast domain. The broadcast domains are separated.

Correct Answer: A

QUESTION 80

Which statements about VLAN configuration are true? (Select 2 Answers)

A. You can enter the VLAN view at the same time you create a VLAN.

B. If you run undo vlan, the VLAN is invalid, but still exists. You do not need to create the VLAN when you

use it next time.

C. You can configure a character string of VLAN description. The length of the character string is not

limited.

D. If you do not enter the VLAN ID when running the display vlan command, information about all VLANs

will be displayed.

Correct Answer: AD

QUESTION 81

Which statement about the following configuration is true?

port link-type hybrid

port hybrid pvidvlan 2

port hybrid untagged vlan 2

port hybrid tagged vlan 3

A. The default VLAN of the interface is VLAN 2.

B. The port hybrid tagged vlan 3 command configures the VLAN for a hybrid interface. Frames in the

VLAN then pass through the hybrid interface in untagged mode.

C. The port hybrid untagged vlan 2 command configures the VLAN for a hybrid interface.

Frames in the VLAN then pass through the hybrid interface in tagged mode.

D. All of the above.

Correct Answer: A

QUESTION 82

Which statements about VLAN mapping are true? (Select 2 Answers)

A. When sending a frame from the local VLAN, the switch replaces the VLAN tag in the frame with

another VLAN tag.

B. When receiving a frame from another VLAN, the switch replaces the VLAN tag of the frame with the

local VLAN tag.

C. When an interface receives a frame from another VLAN, it does not replace the VLAN tag of the frame.

The interface replaces the VLAN tag of the frame with another VLAN tag only when it sends a frame.

D. The interface replaces the VLAN tag of only the frame received from another VLAN, but does not

change the VLAN tag of the frame it sends out.

Correct Answer: AB

QUESTION 83

Which statements are true? (Select 3 Answers)

A. Port isolation is a mechanism that controls the access between switch interfaces.

B. Port isolation is an isolation mechanism at the physical layer.

C. Port isolation prevents the computers connected to different ports from accessing each other.

D. Port isolation can be configured based on VLANs.

Correct Answer: ABC

QUESTION 84

Which statements are true? (Select 3 Answers)

A. The sub-VLANs are configured in the super VLAN view.

B. VLANs 1 to 4094 can be configured as a super VLAN.

C. The aggregate-vlan command is used to configure the super VLAN.

D. A VLAN to be configured as a super VLAN cannot contain any interface.

Correct Answer: ACD

QUESTION 85

Which statements about VLAN allocation are true? (Select 3 Answers)

A. The IP subnet VLAN is used to send the packets from the specified network segment or IP address

over the specified VLAN.

B. The MAC address- or IP subnet-based VLAN is valid for only the untagged packets.

C. The protocol-based VLAN has a higher priority than the IP subnet-based VLAN.

D. The protocol-based VLAN indicates that service types on the network are bound to VLANs.

Correct Answer: ABD

QUESTION 86

Which is contained in the GVRP VLAN deregistration message?

A. Specified VLAN ID

B. Specified IP address

C. Specified MAC address

D. Known port number

Correct Answer: C

QUESTION 87

On a switch running GVRP, each interface is considered as a participant. The participants can exchange

information.

A. True

B. False

Correct Answer: A

QUESTION 88

When the GVRP registration mode is FORBIDDEN, no VLAN can be created or registered on the

interface. In addition, which VLANs are deregistered on the interface?

A. All VLANs except VLAN 1

B. All VLANs except VLAN 4095

C. All VLANs

D. All VLANs except the VLAN specified by the user

Correct Answer: A

QUESTION 89

Which are contained in a GARP participant? (Select 2 Answers)

A. GARP Application

B. GARP Information Propagation (GIP)

C. GARP Information Declaration (GID)

D. Interface LLC

Correct Answer: AC

QUESTION 90

When the GVRP registration mode is FIXED, which statement is true?

A. VLANs can be manually created and registered on the interface, and can also be dynamically

registered and deregistered on the interface.

B. VLANs cannot be manually created and registered on the interface, but can be dynamically registered

and deregistered on the interface.

C. VLANs can be manually created and registered on the interface, but cannot be dynamically registered

or deregistered on the interface.

D. VLANs cannot be manually created and registered on the interface, and cannot be dynamically

registered or deregistered on the interface.

Correct Answer: C

QUESTION 91

Which statements about the relationship between GVRP and GARP are true? (Select 2 Answers)

A. GVRP, GARP, and GMRP are the standards of the same type.

B. GVRP and GARP are defined by IEEE 802.1p.

C. GVRP is based on GARP, and is an application of GARP.

D. GVRP is a new definition of GARP.

Correct Answer: BC

QUESTION 92

GARP involves various messages. Besides JoinIn message and Leave message, which are also the

GARP messages? (Select 3 Answers)

A. Notice

B. Empty

C. JoinEmpty

D. LeaveAll

Correct Answer: BCD

QUESTION 93

As shown in the figure, port 1 of switch A is configured with the Fixed mode, and other ports are configured

with the Normal mode. The trunk interfaces allow all VLANs. Which VLANs are registered on port 1 of

switch C? (Select 3 Answers)

A. VLAN 1

B. VLAN 5 to VLAN 10

C. VLAN 15 to VLAN 20

D. VLAN 25 to VLAN 30

Correct Answer: ABC

QUESTION 94

If 802.1x authentication is enabled on an interface, MAC address authentication (enabled by the mac-

authen enable command) and direct authentication (enabled by the direct-authen enable command)

cannot be enabled on the interface.

A. True

B. False

Correct Answer: A

QUESTION 95

Which are 802.1x authentication modes? (Select 2 Answers)

A. EAP relay mode

B. Proxy mode

C. EAP termination mode

D. Remote mode

Correct Answer: AC

QUESTION 96

Before configuring 802.1x services, you need to determine the configuration roadmap and prepare data.

Which are general steps in the configuration roadmap? (Select 3 Answers)

A. Configure a Tftp server.

B. Configure an AAA authentication template.

C. Configure a domain.

D. Configure 802.1x authentication.

Correct Answer: BCD

QUESTION 97

After detecting a user with a new MAC address, the switch initiates an EAP authentication request. If the

client does not respond and the MAC address bypass authentication is not configured, which statement is

false?

A. If the client does not respond after the number of authentication requests reaches a specified value, the

switch considers that the client software is not installed.

B. All permissions of the user are prohibited.

C. The user is allowed to access only the isolated zone.

D. Detection is initiated again after a period of time.

Correct Answer: B

QUESTION 98

The Layer 2 packet header in EAPoL packets is | DMAC | SMAC | TYPE | EAPOL | FCS |.

Which statements are true? (Select 3 Answers)

A. The destination address of packets is a specified MAC address.

B. The destination address of packets is a unicast MAC address.

C. EAPoL packets cannot be forwarded by switches.

D. The source MAC address of packets is the MAC address of the interface that sends packets.

Correct Answer: ACD

QUESTION 99

The dot1x command is used to enable 802.1x authentication globally or on an interface. Which statements

about the undo dot1x command are true? (Select 3 Answers)

A. It is used to disable 802.1x authentication globally.

B. It will disconnect online users from the interface; therefore, use the command with caution.

C. It is used to disable 802.1x authentication on an interface.

D. Ensure that there are no online users before you run the undo dot1x command. Otherwise, running the

undo dot1x command fails.

Correct Answer: ACD

QUESTION 100

The dot1x authentication-method command is used to set the 802.1x authentication mode. Which is the

most secure authentication mode?

A. PAP

B. EAP

C. CHAP

D. EAP-TTLS

Correct Answer: C

QUESTION 101

Which statements about guest VLAN configuration are true? (Select 3 Answers)

A. The guest VLAN must be created before you configure the guest VLAN.

B. The default VLAN of the interface cannot be configured as the guest VLAN.

C. Different interfaces can be configured with different guest VLANs.

D. An interface can be configured with up to eight guest VLANs.

Correct Answer: ABC

QUESTION 102

If you have run the dot1x port-method command with the port parameter specified (port-based 802.1x

authentication), the maximum number of users on an interface changes to 1. In this case, which

statements are true? (Select 2 Answers)

A. You can run the dot1x max-user command to change the maximum number of access users.

B. You cannot run the dot1x max-user command to set the maximum number of access users.

C. You need to run the undo dot1x port-method command, and then set the maximum number of access

users.

D. All of the above

Correct Answer: BC

QUESTION 103

What is the function of DHCP Offer messages?

A. DHCP Offer messages are broadcast by the client to detect the available server.

B. DHCP Offer messages are sent by the server to respond to the DHCP Discover messages sent by the

client. Certain configuration parameters are specified in the Offer messages.

C. DHCP Offer messages are sent by the client to apply to the server for configuration parameters,

configuration confirmation, or extension of the IP address lease.

D. DHCP Offer messages are sent from the server to the client. They contain configuration parameters

such as including the IP address.

Correct Answer: B

QUESTION 104

The option field in DHCP messages uses the CLV mode.

A. True

B. False

Correct Answer: A

QUESTION 105

Which encapsulation mode is used for DHCP messages?

A. TCP encapsulation

B. RTP encapsulation

C. UDP encapsulation

D. PPP encapsulation

Correct Answer: C

QUESTION 106

The option field in DHCP messages has a fixed length of four bytes.

A. True

B. False

Correct Answer: B

QUESTION 107

What is the function of the client IP address field in DHCP messages?

A. It is used by the client in bound, renew, or rebinding state to respond to ARP request packets.

B. It specifies the IP address allocated by the DHCP server to a client.

C. It specifies the next server address used in the BootStrap and is contained in DHCP Offer or DHCP

ACK messages.

D. It specifies the DHCP relay address.

Correct Answer: A

QUESTION 108

Which fields does the DHCP binding table contain? (Select 3 Answers)

A. MAC address

B. route table

C. IP address lease time

D. Interface and VLAN

Correct Answer: ACD

QUESTION 109

An address needs to be allocated to a host connected to the network temporarily or a group of IP

addresses need to be allocated to the hosts that do not require permanent IP addresses. Which address

allocation mode does the DHCP server use?

A. Automatic allocation

B. Dynamic allocation

C. Manual allocation

D. All of the above

Correct Answer: B

QUESTION 110

What are the similarities of DHCP and BOOTP? (Select 2 Answers)

A. They work in client/server model.

B. They work in static address allocation mode.

C. They can dynamically obtain DNS addresses.

D. They use the same packet structure.

Correct Answer: AD

QUESTION 111

Which messages are sent from the client to the server? (Select 3 Answers)

A. DHCP NAK

B. DHCP REQUEST

C. DHCP DISCOVER

D. DHCP RELEASE

Correct Answer: BCD

QUESTION 112

When a client applies for an IP address through DHCP, which message is the unicast message?

A. DHCP OFFER

B. DHCP REQUEST

C. DHCP DISCOVER

D. None of the above

Correct Answer: D

QUESTION 113

What are the functions of DHCP snooping? (Select 3 Answers)

A. Defend against DoS attacks initiated by changing the CHADDR field

B. Defend against bogus DHCP server attacks

C. Defend against Packet Sniffer Mitigation

D. Defend against man-in-the-middle attacks and IP/MAC spoofing attacks

Correct Answer: ABD

QUESTION 114

Which statements about DHCP snooping are true? (Select 3 Answers)

A. The DHCP snooping binding table contains dynamic binding entries and static binding entries.

B. DHCP snooping distinguishes the trusted interface and untrusted interfaces and discards DHCP Reply

messages from untrusted interfaces.

C. The static binding table is manually configured on the inbound interface and the aging time can also be

manually set.

D. When DHCP snooping is used at Layer 2, the interface information can be obtained for the binding

table even if the Option 82 function is not configured.

Correct Answer: ABD

QUESTION 115

When the DHCP relay receives a DHCP request message in which the giaddr (gateway IP address) field is

0, how does the DHCP relay process the DHCP request message?

A. The DHCP relay fills its IP address in the giaddr field and transmits the DHCP request message to the

DHCP server in unicast mode.

B. The DHCP relay fills its IP address in the giaddr field and transmits the DHCP request message in

broadcast mode.

C. The DHCP relay retains the value of the giaddr field and transmits the DHCP request message to the

DHCP server in unicast mode.

D. The DHCP relay retains the value of the giaddr field and transmits the DHCP request message in

broadcast mode.

Correct Answer: A

QUESTION 116

What is the sequence of applying for an IP address in DHCP?

1. The host sends a DHCP Request message to apply for an IP address.

2. The DHCP server replies with a DHCP Offer message.

3. The host sends a DHCP Discovery message to search for the DHCP server.

4. The DHCP server replies with a DHCP ACK message after receiving the DHCP Request message.

A. 1-2-3-4

B. 1-4-3-2

C. 3-2-1-4

D. 3-4-1-2

Correct Answer: C

QUESTION 117

If the lease of a client IP address is not extended after 87.5% of the lease is reached, which message is

used by the client to extend the IP address lease?

A. DHCP Release broadcast message

B. DHCP Release unicast message

C. DHCP Request broadcast message

D. DHCP Request unicast message

Correct Answer: C

QUESTION 118

If only some devices on a network run MPLS (MPLS domain is encapsulated in the IP packet header),

labels are generated only for direct routes of devices running MPLS. Labels are not generated for the

routes originated from other devices running IP protocols.

A. True

B. False

Correct Answer: A

QUESTION 119

The core of the MPLS technology is label switching.

A. True

B. False

Correct Answer: A

QUESTION 120

What about all outgoing labels in the label forwarding table of a device for the same route with the same

next hop?

A. They must be different.

B. They must be the same.

C. They may be the same.

Correct Answer: B

QUESTION 121

What about all outgoing labels in the label forwarding table of a device for different routes with the same

next hop?

A. They must be different.

B. They must be the same.

C. They may be the same.

Correct Answer: A

QUESTION 122

What is the POP action in MPLS?

A. The top label is removed from the MPLS label stack.

B. The top label is added to the MPLS label stack.

C. The top label is replaced with another value.

D. The top label is replaced with the label of another group.

Correct Answer: A

QUESTION 123

MPLS is a switching standard defined by the IETF. Which devices exist on the MPLS network? (Select 2

Answers)

A. LSR

B. LER

C. Label distribution router

D. Label transmit router

Correct Answer: AB

QUESTION 124

MPLS is a switching standard defined by the IETF. Which device adds or deletes labels?

A. Label distribution router

B. LER

C. LSR

D. Label transmit router

Correct Answer: B

QUESTION 125

Which encapsulation mode is used for the MPLS protocol on an Ethernet network?

A. Packet mode

B. Frame mode

C. Transport mode

D. Channel mode

E. Pipe mode

Correct Answer: B

QUESTION 126

Where is the MPLS label in a data frame?

A. Behind the Layer 3 header and before the Layer 2 header

B. Behind the Layer 2 header and before the Layer 3 header

C. In the Layer 3 header

D. Before the Layer 2 header

Correct Answer: B

QUESTION 127

In which of the following modes can the Eudemon be working? (Select 3 Answers)

A. Routing mode

B. Transparent mode

C. Composite mode

D. Transfer mode

Correct Answer: ABC

QUESTION 128

The firewall can be working in routing mode, transparent mode, or composite mode. The default mode is

the composite mode.

A. True

B. False

Correct Answer: B

QUESTION 129

Configuring a firewall to work in transparent mode does not change the network topology.

A. True

B. False

Correct Answer: A

QUESTION 130

The firewall does not use security rules to filter packets exchanged between interfaces in the same zone.

A. True

B. False

Correct Answer: A

QUESTION 131

Network address translation (NAT) translates only IP address information.

A. True

B. False

Correct Answer: B

QUESTION 132

IP unnumbered is to borrow an IP address from an interface. If an interface has multiple IP addresses, all

its IP addresses will be borrowed and the primary address will continue after these IP addresses are

borrowed.

A. True

B. False

Correct Answer: B

QUESTION 133

When two Eudemons are working in dual-system hot backup mode, their session tables are backed up in

real time.

A. True

B. False

Correct Answer: A

QUESTION 134

How many default zones does the Eudemon supporting multi-instance have?

A. Two

B. Three

C. Four

D. Five

Correct Answer: D

QUESTION 135

Which of the following is the priority value of the DMZ on the Eudemon?

A. 10

B. 50

C. 75

D. 85

Correct Answer: B

QUESTION 136

Users can change the priorities of default zones on the firewall as required.

A. True

B. False

Correct Answer: B

QUESTION 137

What are the types of firewalls developed so far? (Select 3 Answers)

A. Packet filtering firewall

B. Proxy firewall

C. Anti-virus firewall

D. Stateful firewall

Correct Answer: ABD

QUESTION 138

Which of the following firewalls is the most popular?

A. Packet filtering firewall

B. Stateful firewall

C. Proxy firewall

D. Anti-virus firewall

Correct Answer: B

QUESTION 139

To enable an Eudemon in routing mode to work like a router, you need to assign IP addresses to

interfaces and enable dynamic or static routing protocols on the Eudemon.

A. True

B. False

Correct Answer: A

QUESTION 140

The Eudemon that is working in transparent mode detects processes data at Layer 2. Its interfaces are not

configured with IP addresses.

A. True

B. False

Correct Answer: A

QUESTION 141

When an Eudemon is working in composite mode, some of its interfaces are configured with IP addresses

(Layer 3 interfaces) and the other interfaces are not configured with IP addresses (Layer 2 interfaces). To

enable dual-system hot backup on an Eudemon, you can configure the Eudemon to work in composite

mode.

A. True

B. False

Correct Answer: A

QUESTION 142

Two Eudemons in dual-system hot backup can be working in Active-Active mode or Active- Standby mode.

A. True

B. False

Correct Answer: A

QUESTION 143

The Eudemon supports load balancing between multiple uplinks.

A. True

B. False

Correct Answer: A

QUESTION 144

How many user-defined security zones at most are configured on an Eudemon?

A. 3

B. 4

C. 5

D. 6

Correct Answer: A

QUESTION 145

Different virtual firewall instances on an Eudemon must be configured with the same security policy.

A. True

B. False

Correct Answer: B

QUESTION 146

Virtual firewalls on the Eudemon are not allowed to access each other by default unless a security policy is

specified.

A. True

B. False

Correct Answer: A

QUESTION 147

IP addresses added to the blacklist of the Eudemon cannot be deleted.

A. True

B. False

Correct Answer: B

QUESTION 148

You cannot set an aging time for the blacklist of the Eudemon.

A. True

B. False

Correct Answer: B

QUESTION 149

The Eudemon generates a blacklist upon detecting an attack.

A. True

B. False

Correct Answer: A

QUESTION 150

The TCP SYN flood attack usually occurs during the TCP handshake process. How many handshakes are

required to set up a TCP connection?

A. 1

B. 2

C. 3

D. 4

Correct Answer: C

QUESTION 151

The Eudemon can control traffic and connections based on IP addresses.

A. True

B. False

Correct Answer: A

QUESTION 152

What is the maximum number of security zones supported by the Eudemon?

A. 256

B. 128

C. 32

D. 16

Correct Answer: D

QUESTION 153

Which of the following data traffic is incoming data traffic on the Eudemon? (Select 2 Answers)

A. Data traffic from a Trust zone to a demilitarized zone (DMZ)

B. Data traffic from an Untrust zone to a DMZ

C. Data traffic from a Local zone to a Trust zone

D. Data traffic from an Untrust zone to a Local zone

Correct Answer: BD

QUESTION 154

Security policies for the firewall are applied to interzones but not to interfaces.

A. True

B. False

Correct Answer: A

QUESTION 155

The multi-channel protocol is used to establish at least two channels (sessions) for communications or

services.

A. True

B. False

Correct Answer: A

QUESTION 156

ICMP packets are sent in a Smurf attack and UDP packets are sent in a Fraggle attack.

A. True

B. False

Correct Answer: A

QUESTION 157

The urgent pointer in the flag field of an IPv4 packet header is generally used for OOB data transmission.

A. True

B. False

Correct Answer: A

QUESTION 158

A firewall filters packets exchanged between zones but does not filter packets exchanged between

interfaces in the same zone.

A. True

B. False

Correct Answer: A

QUESTION 159

Two Eudemons in dual-system hot backup mode can be working in Active-Active mode or Active-Standby

mode.

A. True

B. False

Correct Answer: A

QUESTION 160

Two Eudemons in dual-system hot backup mode use Huawei Redundancy Protocol (HRP) to back up key

information (such as configuration commands and session status) between the active and standby

devices.

A. True

B. False

Correct Answer: A

QUESTION 161

After an interface on a firewall is added to a zone, the interface belongs to the zone.

A. True

B. False

Correct Answer: A

QUESTION 162

Which of the following statements about the security policies for the Eudemon are true? (Select 2 Answers)

A. By default, a user in the Local zone can access other zones.

B. By default, a user in the Trust zone can access the DMZ.

C. By default, a user in the Untrust zone cannot access the Trust zone.

D. By default, a user in a zone of the firewall cannot access any other zone of the firewall.

Correct Answer: CD

QUESTION 163

Which of the following statements about the zone priorities of the Eudemon are true? (Select 3 Answers)

A. The priority of the Local zone is 100.

B. The priority of the Trust zone is 80.

C. The priority of the Untrust zone is 5.

D. The priority of the DMZ is 50.

Correct Answer: ACD

QUESTION 164

Status detection is an advanced communication filtering mechanism. It checks the application layer

protocol and monitors the status of the connection-based application layer protocol. For all connections,

the status information about each connection is maintained by ASPF and is used to dynamically determine

whether to permit or deny data packets to firewalls.

A. True

B. False

Correct Answer: A

QUESTION 165

Which of the following statements about the firewall technology are true? (Select 3 Answers)

A. The network gateway of the application layer checks application-layer data carried in packets passing

through the gateway.

B. The network gateway for session status detection checks session information carried in packets only at

the session layer.

C. During packet filtering, the session status is checked and the whole data stream is analyzed.

D. Address proxy replaces IP addresses and port numbers of hosts within the network with the IP address

and port number of the proxy device or router.

Correct Answer: ABD

QUESTION 166

The NAT multi-instance function on the Eudemon independently maintains a NAT table for each instance

to provide address translation services for instances.

A. True

B. False

Correct Answer: A

QUESTION 167

The IPSec function on the Eudemon supports NAT traversal.

A. True

B. False

Correct Answer: A

QUESTION 168

The NAT function enabled on the Eudemon does not greatly affect system performance.

A. True

B. False

Correct Answer: A

QUESTION 169

The Eudemon does not support port mapping.

A. True

B. False

Correct Answer: B

QUESTION 170

The blacklist function on the firewall can filter packets based on destination IP addresses. A destination IP

address can be dynamically added to or deleted from the blacklist.

A. True

B. False

Correct Answer: B

QUESTION 171

In a Land attack, the source address and destination address of an SYN packet are both the IP address of

the attacked object or a loopback address.

A. True

B. False

Correct Answer: A

QUESTION 172

Which of the following attacks are prevented after an IP address and MAC address are bound on the

Eudemon? (Select 2 Answers)

A. IP address spoofing

B. MAC address spoofing

C. DoS attack

D. DDoS attack

Correct Answer: AB

QUESTION 173

Which of the following solutions effectively defend against ARP attacks? (Select 3 Answers)

A. Binding a MAC address and an IP address

B. Enabling the ARP attack protection function on a Huawei switching device

C. Adding network segments to different VLANs on a switch

D. Enabling IP packet filtering

Correct Answer: ABC

QUESTION 174

Which of the following NAT functions are supported by the Eudemon? (Select 3 Answers)

A. NAT/PAT

B. IPv4 to IPv6 NAT

C. Bidirectional NAT

D. NAT server

Correct Answer: ACD

QUESTION 175

Which of the following attacks can Eudemon defend against? (Select 3 Answers)

A. SYN-Flood

B. SQL inject

C. Port Scan

D. Ping-Death

Correct Answer: ACD

QUESTION 176

Which of the following are performance parameters of the firewall? (Select 3 Answers)

A. Throughput

B. Maximum number of interface

C. Number of new connections per second

D. Process delay

Correct Answer: ACD

QUESTION 177

By which can an IP-based advanced ACL filter packets? (Select 5 Answers)

A. Source IP address and its subnet mask

B. Destination IP address and its subnet mask

C. Protocol type

D. TCP or UDP port number

E. Priority of the data packet

F. Length of the data packet

Correct Answer: ABCDE

QUESTION 178

Which of the following statements about NAT are true? (Select 3 Answers)

A. NAT is short for “network address translation”.

B. NAT, also called address proxy, is used for translation between private and public network addresses.

C. Hosts within the intranet can access the extranet without using NAT.

D. NAT can effectively resolve the problem of IP address shortage.

Correct Answer: ABD

QUESTION 179

Which of the following DDoS attacks can the Eudemon 1000E defend against? (Select 3 Answers)

A. SYN flood

B. UDP flood

C. ICMP flood

D. SQL flood

Correct Answer: ABC

QUESTION 180

Which of the following high availability (HA) features are supported by the Eudemon 1000E? (Select 2

Answers)

A. Dual-system hot backup

B. Multi-system hot backup

C. Dual-system load balancing

D. Multi-system load balancing

Correct Answer: AC

QUESTION 181

Which of the following indicators are performance indicators of the Eudemon? (Select 3 Answers)

A. Throughput of large-sized or small-sized packets

B. Number of the interface

C. VPN performance

D. Process delay

Correct Answer: ABD

QUESTION 182

To process fragmented service packets on an NAT-enabled firewall, which of the following functions needs

to be enabled?

A. Transparent fragment transmission

B. Fragment cache

C. Fragment reassembly

D. MTU check

Correct Answer: B

QUESTION 183

In the scenario where packets are sent and received along different paths, which of the following functions

needs to be disabled on the firewall?

A. Status detection

B. Attack defense

C. Packet filtering

D. Status backup

Correct Answer: A

QUESTION 184

Which of the following information do you check to directly identify a fault in the firewall if the data

transmission is interrupted?

A. Session table

B. Log

C. Global statistics about the firewall

D. Alarms

Correct Answer: A

QUESTION 185

Assume that the traceroute test is used to detect the packet forwarding path and tracert packets have

passed through the firewall. Which of the following attack protection functions needs to be disabled to

normally display the tracert result?

A. ICMP-redirect

B. ICMP-unreachable

C. Tracert

D. Smurf

Correct Answer: C

QUESTION 186

What is the recommended minimum delay for HRP preemption on the Eudemon?

A. 120s

B. 60s

C. 10s

D. 5s

Correct Answer: B

QUESTION 187

Which of the following commands is used to display the detailed information about the Eudemon?

A. Display firewall statistic system

B. Display firewall session table raw both-direction

C. Display firewall session table verbose

D. Display firewall session table detail

Correct Answer: C

QUESTION 188

Which of the following technologies does the Eudemon use to defense against Anti-DDoS attacks? (Select

5 Answers)

A. TCP agent

B. Source authentication and detection

C. Crc check

D. Fingerprint identification (characteristics detection)

E. Abnormal session detection

F. Traffic control

Correct Answer: ABDEF

QUESTION 189

What are the types of DDoS attacks? (Select 3 Answers)

A. Attacks by special packets

B. Scanning attack

C. Sniff attack

D. Application-layer attack

Correct Answer: ABD

QUESTION 190

Which of the following attacks are DDoS attacks? (Select 4 Answers)

A. SYN flood

B. SYN/ACK flood

C. UDP flood

D. FTP attack

E. HTTP get flood

Correct Answer: ABCE

QUESTION 191

QoS provides services of different qualities to meet various application requirements, including dedicated

bandwidth, decreased packet loss ratio, short packet transmission delay, and decreased del


CertBus exam braindumps are pass guaranteed. We guarantee your pass for the H12-224 exam successfully with our Huawei materials. CertBus HCNP-R and S Fast Track (Huawei Certified Network Professional – Routing and Switching) Fast Track Exam exam PDF and VCE are the latest and most accurate. We have the best Huawei in our team to make sure CertBus HCNP-R and S Fast Track (Huawei Certified Network Professional – Routing and Switching) Fast Track Exam exam questions and answers are the most valid. CertBus exam HCNP-R and S Fast Track (Huawei Certified Network Professional – Routing and Switching) Fast Track Exam exam dumps will help you to be the Huawei specialist, clear your H12-224 exam and get the final success.

H12-224 Latest questions and answers on Google Drive(100% Free Download): https://drive.google.com/file/d/0B_3QX8HGRR1maGV3Y21Yc0xiWmc/view?usp=sharing

H12-224 Huawei exam dumps (100% Pass Guaranteed) from CertBus: http://www.certgod.com/h12-224.html [100% Exam Pass Guaranteed]

Why select/choose CertBus?

Millions of interested professionals can touch the destination of success in exams by certgod.com. products which would be available, affordable, updated and of really best quality to overcome the difficulties of any course outlines. Questions and Answers material is updated in highly outclass manner on regular basis and material is released periodically and is available in testing centers with whom we are maintaining our relationship to get latest material.

BrandCertbusTestkingPass4sureActualtestsOthers
Price$45.99$124.99$125.99$189$69.99-99.99
Up-to-Date Dumps
Free 365 Days Update
Real Questions
Printable PDF
Test Engine
One Time Purchase
Instant Download
Unlimited Install
100% Pass Guarantee
100% Money Back
Secure Payment
Privacy Protection