Huawei H12-721 Exam
HCNP-Security-CISN (Huawei Certified Network Professional - Constructing Infrastructure of Security Network) (Page 4 )

Updated On: 9-Feb-2026

The DHCP Snooping binding table function needs to maintain its binding table of contents that include? (Choose three answers)

  1. MAC
  2. Vlan
  3. Interface
    IP D. DHCP Server's

Answer(s): A,B,C



Through the configuration of the Bypass interface, you can avoid network communication interruption caused by equipment failure and improve reliability. The power Bypass function can use any network interfaces to configure the Bypass GE parameters to achieve the Bypass function.

  1. TRUE
  2. FALSE

Answer(s): B



Which of the following statements about IPsec and IKE following are correct? (Choose three answers)

  1. With IPsec there are two ways to establish the security association, manual mode (manual) and IKE auto-negotiation (Isakmp) mode.
  2. IKE aggressive mode can be selected based on negotitations initiated by the tunnel endpoint IP address or ID, to find the corresponding authentication word and finalize negotiations.
  3. The NAT traversal function is used to delete the IKE negotiation verification process for UDP port numbers, while achieving a VPN tunnel to discover the NAT gateway function. If a NAT gateway device is used, then the data transfer after the IPsec uses UDP encapsulation.
  4. IKE security mechanisms include DH Diffie-Hellman key exchange and distribution; improve the security front (Perfect Forward Secrecy PFS), encryption, and SHA1 algorithms.

Answer(s): A,B,C



In the attack shown below, a victim host packet captures the traffic. According to the information shown, what kind of attack is this?

  1. SYN Flood
  2. SYN-ACK Flood
  3. ACK-Flood
  4. Connection Flood

Answer(s): C



In IPsec VPN with NAT traversal, you must use IKE aggressive mode.

  1. TRUE
  2. FALSE

Answer(s): B






Post your Comments and Discuss Huawei H12-721 exam prep with other Community members:

Join the H12-721 Discussion