Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

H12-222 Questions and Answers

Note! Following H12-222 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H12-222 Questions and Answers

Question # 6

Which of the following statements regarding MPLS label encapsulation format are true? (Multiple Choice)

A.

The total length of an MPLS label is 4 bytes (32 bits).

B.

The TTL field in an MPLS label has the same meaning as that in an IP packet, and can prevent loops.

C.

The S field in an MPLS label has 1 bit and is used to identify whether the label is the bottom-of-stack label. If the value is 1, the label is a penultimate-layer label.

D.

For Ethernet and PPP packets, a label stack is located between the Layer 2 packet header and data. If a VLAN tag is available, the label stack is placed before the VLAN tag.

Full Access
Question # 7

Which of the following statements regarding Network Address and Port Translation (NAFT) and No Port Translation (No-PAT) is true?

A.

After NAFT translation, all packets are from the same IP address for external users.

B.

In No-PAT mode, only the transport layer protocol port number can be converted.

C.

In NAFT mode, only the network layer protocol address can be converted.

D.

In No-PAT mode, the network layer protocol address can be converted.

Full Access
Question # 8

MPLS is a label forwarding technology, Which of the following MPLS statements is false?

A.

MPLS uses the connection-oriented control plane and connectionless data plane.

B.

The control plane transmits route information and distributes labels. The data plane transmits packets along the created label switched path (ISP).

C.

Switches in an MPLS domain only need to forward packets based on the label added before the IP header.

D.

Compared with traditional IP forwarding, MPLS label forwarding greatly improves the data forwarding efficiency.

Full Access
Question # 9

For interzone packet filtering, which of following traffic is not transmitted in the outbound direction?

A.

Traffic from the DMZ to the untrusted zone

B.

Traffic from the trusted zone to the DMZ

C.

Traffic from the trusted zone to the untrusted zone

D.

Traffic from the trusted zone to the local zone

Full Access
Question # 10

A 32-bit MPLS header consists of a 20-bit label used for packet forwarding; A 3-bit EXP field that identifies the IP packet priority; A 1-bit bottom-of-stack flag that identifies the last label; And an 8-bitTTL field. Which statement regarding the TTL field is true?

A.

This field is used to prevent packet forwarding loops, similar to the TTL field in an IP header.

B.

This field is used for label management.

C.

This field used to control the upstream device in label distribution.

D.

This field limitation the LSR.

Full Access
Question # 11

On the traditional IP network, the BE mode cannot distinguish communication types or meet requirements of applications. The emergence of QoS technology is committed to solving this problem.

A.

TRUE

B.

FALSE

Full Access
Question # 12

With the development of the ASIC technology, MPLS is no longer show obvious advantages in improving the forwarding speed. However, MPLS is still widely used causes for what? (Multiple Choice)

A.

MPLS supports multi-layer labels, and the connection-oriented.

B.

MPLS integrates the powerful Layer 3 routing function of the IP network and the highly effective forwarding mechanism of the traditional Layer 2 network.

C.

MPLS cannot easily implement seamless integration between IP and Layer 2 networks such as the ATM and frame relay.

D.

Support Applications like traffic engineering (TE), virtual private network (VPN), quality of service (QoS) provide better solutions.

Full Access
Question # 13

In the SDN network architecture, which device is used to calculate the path and deliver the flow table?

A.

Application server

B.

Controller

C.

Orchestrator

D.

Device

Full Access
Question # 14

A DDoS attack indicates that an attacker controls many botnet hosts to send a large number of constructed attack packets. As a result, the attacked device rejects request of authorized users.

A.

TRUE

B.

FALSE

Full Access
Question # 15

When hosts and servers in the same zone communicate with each other, NAT is not required.

A.

TRUE

B.

FALSE

Full Access
Question # 16

DHCP snooping is a security feature that can be used to defend against various attacks, including: (Multiple Choice)

A.

Starvation attacks by changing the CHADDR field value

B.

Bogus DHCP server attacks

C.

TCP flag attacks

D.

Man-in-the-middle attacks and IP/MAC spoofing attacks

Full Access
Question # 17

Which of the following is not the limitation of traditional networks?

A.

The network protocol implementation is complex, and the O&M is difficult.

B.

The traffic path cannot be adjusted flexibly.

C.

The upgrade of new network services is slow.

D.

Different vendors' devices provide similar implementation, there is less difference in operation commands, and operations are easy.

Full Access
Question # 18

What are the common queue scheduling technologies? (Multiple Choice)

A.

FIFO

B.

LR

C.

WRR

D.

CIR

E.

CQ

F.

WFQ

Full Access
Question # 19

BFD (bidirectional forwarding detection) is a fast detection technology but is complex, It needs to be supported by special devices.

A.

TRUE

B.

FALSE

Full Access
Question # 20

The following figure shows a network running MPLS and LDP session information displayed on SWA. Which of the following statements is false? (Multiple Choice)

A.

In 2.2.2.2:0, 2.2.2.2 indicates the LSR ID of the neighbor.

B.

In 2.2.2.2:0, 0 indicates the global label space.

C.

The value Operational indicates that the LDP process is running and the LDP session has not been set up.

D.

The value Passive indicates that SWA is the responder.

E.

The value Passive indicates that SWB is the responder.

Full Access
Question # 21

When the IP address of an interface on a firewall is pinged/ ping packets are processed by the internal module of the firewall but are not forwarded,

A.

TRUE

B.

FALSE

Full Access
Question # 22

Which of the following statements regarding the firewall interzone security policy is true?

A.

The interzone security policies are arranged in the order of the match, the listed first is matched preferentially.

B.

The interzone security policy with the smaller ID is matched preferentially.

C.

The interzone security policy with the larger ID is matched preferentially.

D.

The interzone security policies are listed automatically based on sequence numbers. When the order is changed, the number is changed.

Full Access
Question # 23

During QoS deployment, you can use PBR to perform traffic classification and marking. The ACL rule (source IP address, destination IP address, protocol type, and port number) and packet length can be used for classification. The DSCP priority or IP precedence of data packets can be modified.

A.

TRUE

B.

FALSE

Full Access
Question # 24

NFV and SDN depend on each other and must be used together.

A.

TRUE

B.

FALSE

Full Access
Question # 25

MPLS is short for Multiprotocol Label Switching, so the core technology of MPLS is label switching.

A.

TRUE

B.

FALSE

Full Access
Question # 26

MPLS forwards data packets based on labels. How is IP packets passing through the MPLS domain forwarded if they do not carry any label?

A.

Common IP forwarding

B.

ATM forwarding

C.

Multi-label MPLS forwarding

D.

Single-label MPLS forwarding

Full Access
Question # 27

A flow mirroring port can transmit the specified service flows on the mirroring port to the monitoring device for analysis and monitoring.

A.

TRUE

B.

FALSE

Full Access
Question # 28

Which of the following are label distribution control modes in the MPLS system? (Multiple Choice)

A.

Liberal

B.

Independent

C.

Conservative

D.

Ordered

Full Access
Question # 29

FIFO can allocates different weights to different services and has good control of delay and jitter.

A.

TRUE

B.

FALSE

Full Access
Question # 30

The LDP session establishment process will go through the opensent status. Which state will the opensent state change to after the device receives an Initialization message and sends a Keepalive message?

A.

initialized

B.

openrec

C.

operational

D.

non-existent

Full Access
Question # 31

Which of the following statements regarding different types of firewalls is false?

A.

The packet filtering firewall checks each data packet against ACL rules.

B.

The stateful inspection firewall uses security policies to check only the first packet of non-matched sessions.

C.

The security policies in two directions need to be configured on the stateful inspection firewall.

D.

The proxy firewall processes services of users on internal and external networks.

Full Access
Question # 32

The SDN architecture mainly includes NBIs and SBIs.

A.

TRUE

B.

FALSE

Full Access
Question # 33

When configuring source NAT with no-pat configuration parameters, which of the following statements is true?

A.

Only the source IP address is translated.

B.

Only the destination IP address is translated.

C.

The source IP address and source port number are both translated.

D.

The destination IP address and destination port number are both translated.

Full Access
Question # 34

Information security technology problems are mainly technical problems. Information security work can be done well only by using latest technologies and deploying high-performance devices

A.

TRUE

B.

FALSE

Full Access
Question # 35

Which of the following statements regarding the DiffServ model is false?

A.

Signaling is required. Before transmitting packets, an application does not need to notify a router and the network does not need to maintain the status for each flow.

B.

Different methods can be used to specify QoS of packets, for example, IP precedence, source IP address, and destination IP address of IP packets.

C.

The DiffServ model provides the E2E QoS guarantee for important applications.

D.

It can be implemented through technologies such as CAR or queue scheduling technologies.

Full Access
Question # 36

Which remote alarm notification modes are supported by eSight? (Multiple Choice)

A.

Email

B.

Voice

C.

SMS message

D.

WeChat

Full Access
Question # 37

Which of the following statements regarding Huawei eSight network management software is false?

A.

Multiple users can be created for network management.

B.

Users may be asked to log in to eSight from specified IP addresses in specific time ranges.

C.

The administrator can force unauthorized login users to log out.

D.

The login time of the administrator role also can be limited.

Full Access
Question # 38

Which of the following statements regarding buffer overflow attacks is false?

A.

The buffer overflow attack indicates that an attacker uses defects of memory operations of the software system and runs attack codes with high operation rights.

B.

The buffer overflow attack is irrelevant to the OS vulnerabilities and architecture.

C.

The buffer overflow attack is the most common attack of the software system.

D.

The buffer overflow attack is an application-layer attack.

Full Access
Question # 39

SDN technology advocate layered open architecture, then which organization advocate and defines the centralized architecture and OpenFlow?

A.

ONF

B.

IETF

C.

ETSI

D.

ITU

Full Access
Question # 40

Which of the following statements regarding United Security of the Agile Controller are true? (Multiple Choice)

A.

Network devices, security devices, policy servers, and third-party systems can report network information and security logs.

B.

Network information and security logs are generated by customer devices.

C.

A switch can function as the policy execution device to respond to security events by executing security policies to restrict or block insecure access.

D.

The United Security component of the Agile Controller is responsible for log collection, processing, event association, security trend display, and security response.

Full Access
Question # 41

Separation technology of the control plane and forwarding plane is SDN.

A.

TRUE

B.

FALSE

Full Access
Question # 42

In most cases, an IP address that is dynamically assigned by a DHCP server has a lease. Which of the following statements regarding the IP address lease is false?

A.

The lease renewal timer is 50% of the total lease. When the lease renewal timer expires, the DHCP server must renew the IP address lease.

B.

The rebinding timer is 87.5% of the total lease.

C.

If the rebinding timer expires but the DHCP client does not receive any responses from the DHCP server, the DHCP client keeps sending DHCP Request packets to the DHCP server which assigned an IP address to it before, until the total lease expires.

D.

If the DHCP client receives a DHCP NAK packet within the lease, the client stops using the current IP address immediately and returns to the initialization state. The DHCP client then applies for a new IP address.

Full Access
Question # 43

Which of the following statements regarding the commands used by a PC to obtain an IP address from the DHCP server are true? (Multiple Choice)

A.

You can run the ipconfig/release command on a PC running Windows 7/Windows XPto actively release the IP address. In this case, the PC sends a DHCP Request packet to the DHCP server.

B.

You can run the ipconfig/release command on a PC running Windows 7/Windows XP to actively release the IP address. In this case, the PC sends a DHCP Release packet to the DHCP server.

C.

You can run the ipconfig/renew command on a PC running Windows 7/Windows XP to apply for a new IP address. In this case, the PC sends a DHCP Renew packet to the DHCP server.

D.

You can run the ipconfig/renew command on a PC running Windows 7/Windows XP to apply for a new IP address. In this case, the PC sends a DHCP Discover packet to the DHCP server.

Full Access