Huawei H12-222_V2.5-ENU HCIP-Routing & Switching-IENP V2.5 Online Training
Huawei H12-222_V2.5-ENU Online Training
The questions for H12-222_V2.5-ENU were last updated at Nov 23,2024.
- Exam Code: H12-222_V2.5-ENU
- Exam Name: HCIP-Routing & Switching-IENP V2.5
- Certification Provider: Huawei
- Latest update: Nov 23,2024
Regarding the description of Network Address Port Translation (NAPT) and Only Translating Network Address (NO-PAT), which of the following statements is correct?
- A . After NAPT conversion, for external users, all messages will only come from the same IP address.
- B . NO-PAT only supports protocol port conversion at the transport layer.
- C . NAT only supports protocol address translation at the network layer.
- D . NO-PAT supports protocol address translation at the network layer.
Among the following options, which describes the Agile Controller’s business orchestration concept correctly? (Multiple Choice)
- A . In business orchestration, the User Control List refers to user-level ACL control, using rules defined by the source security group, destination security group, and port number of the data packet.
- B . Orchestration equipment refers to equipment that guides business flows in an orderly manner, generally refers to switches.
- C . Business equipment refers to equipment that performs secure business processing on the business flow introduced by the orchestration equipment, which mainly includes firewall equipment, anti-virus equipment, and Internet behavior control equipment.
- D . The business chain refers to the business data processed by the GRE tunnel.
Which of the following attacks is not a thousand network layer attacks?
- A . IP spoofing attack
- B . Smurf attack
- C . ARP spoofing attack
- D . ICMP attack
LDP is a protocol specially formulated for label distribution. It has many types of messages, among which the messages used to generate, change and delete FEC label mapping are:
- A . Discovery message
- B . Session message
- C . Advertisement message
- D . Notification message
Regarding the default security zones Trustt and untrust of firewalls, which of the following statement is correct? (Multiple Choice)
- A . The direction of access from the Trust zone to the untrust zone is the outboud direction.
- B . Access the outboud direction from the trust zone.
- C . The security level of Trust is 85.
- D . The security level of Untrust is 50.
In the Diff-Serv network, the maximum number of values that can be defined with DSCP is:
- A . 3
- B . 6
- C . 8
- D . 64
If DSCP (the first 6 bits of the Tos field) is used, how many categories can the message be divided into at most?
- A . 8
- B . 16
- C . 32
- D . 64
What kind of information of message can be used for simple flow classification for tags?
- A . DSCP information
- B . IP Precedence Information
- C . MPLS EXP information
- D . 802.1P information
In the TCP/IP v4 version, which of the following security risks exist? (Multiple Choice)
- A . Lack of data source verification mechanism
- B . Lack of confirmation mechanism for data packets
- C . Lack of a verification mechanism for data integrity
- D . Lack and password guarantee mechanism
Jitter is caused by unequal end-to-end delay of packets belonging to the same stream.
- A . True
- B . False