Free H12-351_V1.0 Exam Braindumps (page: 7)

Page 6 of 16

WPA3 has the following advantages over WPA and WPA2: supports WPA3-SAE, provides a more secure handshake protocol, enhances the algorithm strength, and supports Suite A cryptography.

  1. True
  2. False

Answer(s): A

Explanation:

WPA3 has the following advantages over WPA and WPA2:
Supports WPA3-SAE, which provides more secure authentication and key management than PSK.

Provides a more secure handshake protocol than 802.11i, which can resist offline dictionary attacks and protect forward secrecy.
Enhances the algorithm strength from AES-128 to AES-192 or AES-256. Supports Suite A cryptography, which provides higher security levels for government or military networks.


Reference:

https://support.huawei.com/enterprise/en/doc/EDOC1100058940/8a8f1c9b/wpa3



Which of the following statements about attack defense is true?

  1. Defense against flood attacks can be used to defend against Ping of Death attacks.
  2. Attack defense allows APs to analyze the contents and behaviors of incoming packets on ports to determine whether packets have attack characteristics. The APs then take defense measures on the packets that have attack characteristics.
  3. Attack defense can defend against spoofing packet attacks, malformed packet attacks, fragmentation attacks, and flood attacks.
  4. Fragmentation attack defense enables a device to detect packet fragments in real time and discard or rate-limit them to protect the device.

Answer(s): B

Explanation:

Attack defense is a feature that allows APs to analyze the contents and behaviors of incoming packets on ports to determine whether packets have attack characteristics. The APs then take defense measures on the packets that have attack characteristics, such as discarding them or limiting their rate. Attack defense can defend against spoofing packet attacks, malformed packet attacks, fragmentation attacks, and flood attacks.


Reference:

https://support.huawei.com/enterprise/en/doc/EDOC1100058940/8a8f1c9b/attack- defense



In 802. IX authentication using port-based access control, once a user is authenticated successfully on a port, subsequent users on this port can access the network without authentication.
When the authenticated user goes offline, all other users are denied access to the network.

  1. True
  2. False

Answer(s): A

Explanation:

According to the Huawei documents and resources, 802.1X authentication using port-based access control is a method that allows only one user to access the network through a port at a time. If a user is authenticated successfully on a port, subsequent users on this port can access the network without authentication.
When the authenticated user goes offline, all other users are denied access to the network1. Therefore, A is the correct answer.


Reference:

1:
https://support.huawei.com/enterprise/en/doc/EDOC1100086527



Which of the following are typical 802. IX authentication modes? (Select All that apply)

  1. EAP termination
  2. EAP relay
  3. EAP-TLS
  4. EAP-MD5

Answer(s): A,B

Explanation:

According to the Huawei documents and resources, EAP termination and EAP relay are typical 802.1X authentication modes between the access device and authentication server. In EAP termination mode, the access device terminates EAP packets and encapsulates them into RADIUS packets. In EAP relay mode, the access device directly encapsulates the received EAP packets into RADIUS using EAP over RADIUS (EAPoR) packets2. Therefore, A and B are the correct answers.


Reference:

2:
https://support.huawei.com/enterprise/en/doc/EDOC1100086527






Post your Comments and Discuss Huawei H12-351_V1.0 exam with other Community members:

H12-351_V1.0 Discussions & Posts