Free H12-721 Exam Braindumps (page: 5)

Page 4 of 62

Which of the following statements about IPsec and IKE following are correct? (Choose three answers)

  1. With IPsec there are two ways to establish the security association, manual mode (manual) and IKE auto-negotiation (Isakmp) mode.
  2. IKE aggressive mode can be selected based on negotitations initiated by the tunnel endpoint IP address or ID, to find the corresponding authentication word and finalize negotiations.
  3. The NAT traversal function is used to delete the IKE negotiation verification process for UDP port numbers, while achieving a VPN tunnel to discover the NAT gateway function. If a NAT gateway device is used, then the data transfer after the IPsec uses UDP encapsulation.
  4. IKE security mechanisms include DH Diffie-Hellman key exchange and distribution; improve the security front (Perfect Forward Secrecy PFS), encryption, and SHA1 algorithms.

Answer(s): A,B,C



In the attack shown below, a victim host packet captures the traffic. According to the information shown, what kind of attack is this?

  1. SYN Flood
  2. SYN-ACK Flood
  3. ACK-Flood
  4. Connection Flood

Answer(s): C



In IPsec VPN with NAT traversal, you must use IKE aggressive mode.

  1. TRUE
  2. FALSE

Answer(s): B



A man in the middle attack refers to an intermediate that sees the data exchange between server and client. To the server, all messages appear to be sent to or received from the client; and to the client all the packets appear to have been sent to or received from the server. If a hacker is using the man-in-the-middle attack, the hacker will send at least two data packets as shown to achieve this attack.

Which of the following packet 1 and packet 2 Field Description is correct? (Choose two answers)

  1. Packet 1:
    Source IP 1.1.1.1 Source MAC C-C-C
    The purpose of IP 1.1.1.2 The purpose of Mac B-B-B
  2. Packet 1: Source IP 1.1.1.3
    Source MAC C-C-C
    The purpose of IP 1.1.1.2 The purpose of Mac B-B-B
  3. Packet 2:
    Source IP 1.1.1.2 Source MAC C-C-C
    The purpose of IP 1.1.1.1 The purpose of Mac A-A-A
  4. Packet 2:
    Source IP 1.1.1.3 Source MAC C-C-C
    The purpose of IP 1.1.1.1 The purpose of Mac A-A-A

Answer(s): A,C






Post your Comments and Discuss Huawei H12-721 exam with other Community members:

H12-721 Exam Discussions & Posts