Huawei H12-721 HCIP-Security-CISN V3.0 HCIP-Security-CISN Exam Practice Test

Page: 1 / 14
Total 217 questions
Question 1

In the L2TP over IPSec application scenario, the USG device encrypts the original data packet with IPSec and then encapsulates the packet with L2TP.



Answer : B

Note: In L2TP over IPSec, packets are encapsulated with L2TP and then encrypted with IPSec. Authentication--L2TP is completed, encryption--IPSec is completed, and there is no direct relationship between authentication and encryption.


Question 2

According to the dual-system hot backup network diagram, what are the correct descriptions in the following dual-system hot backup preemption function?



Answer : A, B, D


Question 3

When using the Radius server to authenticate users, (the topology is as shown below), not only must the username and password be stored on the Radius server, but the username and password must also be configured on the firewall.



Answer : A


Question 4

IP address scanning attack defense not only prevents ICMP packet detection target addresses, but also prevents TCP/UDP scanning detection target addresses.



Answer : A


Question 5

IPSec VPN uses digital certificates for authentication. It has the following steps: 1. verify the certificate signature; 2. find the certificate serial number in the CRL; 3. share the entity certificate between the two devices; 4. verify the validity period of the certificate; . Establish a VPN tunnel. Which of the following is correct?



Answer : C


Question 6

The NAT/ASPF log in the session log and the DPI traffic monitoring log provide a ''binary'' output technology for this type of log. The use of binary input output can greatly reduce the impact on system performance, but The binary form output needs to be configured with the elog log management system.



Answer : A


Question 7

Which of the following technologies can enhance the security of mobile users accessing the company's intranet VPN solution?



Answer : A


Page:    1 / 14   
Total 217 questions