Labour Day Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! H12-891_V1.0 HCIE-Datacom V1.0 is now Stable and With Pass Result

H12-891_V1.0 Practice Exam Questions and Answers

HCIE-Datacom V1.0

Last Update 3 days ago
Total Questions : 610

H12-891_V1.0 is stable now with all latest exam questions are added 3 days ago. Just download our Full package and start your journey with Huawei HCIE-Datacom V1.0 certification. All these Huawei H12-891_V1.0 practice exam questions are real and verified by our Experts in the related industry fields.

H12-891_V1.0 PDF

H12-891_V1.0 PDF (Printable)
$48
$119.99

H12-891_V1.0 Testing Engine

H12-891_V1.0 PDF (Printable)
$56
$139.99

H12-891_V1.0 PDF + Testing Engine

H12-891_V1.0 PDF (Printable)
$70.8
$176.99
Question # 1

Huawei's SDN controller using VXLAN technology is fixed?

Options:

A.  

Agile Controller-Campus

B.  

Agile Controller-WAN

C.  

Agile Controller-DCN

Discussion 0
Question # 2

The RSTP protocol provides a variety of protection functions, such as when the edge port is configured as a protection state, the edge port receives the BPDU packet processing method;

Options:

A.  

Directly discard the BPDU packet

B.  

Close the port

C.  

After parsing the BPDU message, the relevant information is obtained

D.  

Forward BPDU packets as required

Discussion 0
Question # 3

After you divide an interface of the firewall into the Untrust security domain, the interface belongs to the Untrust zone and no longer belongs to the Local zone.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 4

Regarding the FTP protocol, is it correct in the description below?

Options:

A.  

In ftP-style, the client completes the initialization of the TCP session for control and data

B.  

In ftP Activee, the server side tells the client which port it expects to send data on by commanding "PORT"

C.  

FTP always uses a TCP session to transmit control information and data information

D.  

FTP always uses the TCP port to establish a data session and ICP port 21 to establish a control session

E.  

FTP always uses TCP port 21 to establish a data session and TCP port 20 to establish a control session

Discussion 0
Question # 5

What are the following advanced features supported by BGP EVPN?

Options:

A.  

ARP broadcast suppression

B.  

VRRP overVXLAN

C.  

Multi-active gateway

D.  

WI-AN Qos

Discussion 0
Question # 6

When configuring the source NAT and having no pat configuration parameters, which of the following statements is true?( Radio) A Perform destination IP address and destination port translation

B.  

Only source P address translation occurs

C.  

Only destination IP address translation occurs

D.  

Simultaneous source P address and source port translation

Options:

Discussion 0
Question # 7

In the following topology diagram, R1 can access the Internet through R2 and R3, R1 and R2, R1 and R1 An EGP connection is established between R3 , and R2R3 belongs to the same AS, each via BGP Publishing a default route that requires R1 to visit lnternet's traffic preference R2, can the following practices be achieved?

Options:

A.  

R1 specifies that the peer R3 sets the MED property to 150 in the import direction

B.  

R2 specifies that the peer R1 sets the local priority to 150 in the export direction

C.  

R2 specifies that the peer R1 sets the MED property to 150 in the export direction

D.  

R1 specifies that the peer R2 beats the local priority in the import direction to 150

Discussion 0
Question # 8

You expect to deploy multicast video applications on your private, on-premises network. To achieve this, you need to have a private multicast IP address in your network . So which range of IP addresses can be used?( Single choice questions).

Options:

A.  

239000-239255255255

B.  

241.000-241.255255255

C.  

224000-224255255255

D.  

240000-254255255255

E.  

226000-226255255255

Discussion 0
Question # 9

A company's two-layer phase network architecture as shown in the figure, when the engineer is configured to find that the business between departments can not communicate, through the command to view the status of the equipment as follows, please determine the possible causes?

Question # 9

Options:

A.  

The BPDU interval between switches is not configured

B.  

The Transition VLAN mapping between the handover machines is not configured to be caused

C.  

The Revislon Level configuration is inconsistent between switches

D.  

Inconsistent Registry Name configuration between text exchange machines

Discussion 0
Question # 10

Huawei's two switches SWA and SWB are connected together by 7 Ethernet cables, and static link clustering is configured, and the corresponding port on the switch SWA is Ethernet 1/0/1 ?Ethernet1/0/2?Ethernet 1/0/3?Ethernet 1/0/4?Ethernet 1/0/5, Ethernet1/0/6, Ethernet 1/0/7, configured in order of port if the switch SWA, SWB supports only 6 ports per aggregation group

Options:

A.  

In the case of consistent configuration of each port, Ethernet 1/0/6 port is an aggregate group Unselected port

B.  

In the case of consistent configuration of each port, the Ethernet1/0/1 port is an aggregate group Unselected port

C.  

With the same configuration of each port, the Ethernet 1/0/7 port is the aggregate group Unselecte port

D.  

With the same configuration of each port, SWA randomly selects one of the 7 ports as the aggregate group Unselecte port

Discussion 0
Question # 11

The following description of MP-BGP is incorrect?( Single choice questions).

Options:

A.  

The MP_UNREACH_NLRl of the update message, excluding the path nationality.

B.  

MP-BGP can be used to assign tags.

C.  

MP_REACH_NLRI and MP_UNREACIH_NLRI are optional transition properties.

D.  

A complete MP_REACH_NLRI attribute structure contains address family, next hop, and prefix information.

Discussion 0
Question # 12

The topology diagram and configuration are as follows, and now we hope that there is no buttoned route entry of 10033/32 in the Rl route table

Question # 12

Options:

A.  

Configure route summarization on R3 to summarize the routes to 10000/16

B.  

Configure route rollup on R2 to summarize the route as 10000/16

C.  

Configure filter-pollcy on top of R1 with 10033/32 via ACLL. Also applied in the Import direction

D.  

Configure flter-policy on the above, match 10033/32 through ACL, and apply the answer in the expo direction

Discussion 0
Question # 13

By default, routers running IS-IS in broadcast networks have a period of seconds for DIS to send CSNP packets?

Options:

A.  

33

B.  

40

C.  

30

D.  

10

Discussion 0
Question # 14

What is the security level for untrust zones in the USG Series firewalls? ( Radio).

Options:

A.  

50

B.  

5

C.  

10

D.  

15

Discussion 0
Question # 15

In MPLSVPN, in order to distinguish between IPv4 prefixes that use the same address space, the RD value is added to the IPv4 address, and the following options are described correctly as ?

Options:

A.  

RD can be used to control the publication of VPN routing information

B.  

On a PE device, each VPN instance corresponds to an RD value, and the RD value must be unique on the same PE device

C.  

RD is encapsulated in the Update message as an extended community attribute of BGP during delivery

D.  

After the PE receives an IPv4 route from CE, it adds an RD to the route to IPv4 that translates to a globally unique VPN-IPv4 route and publishes it on the public network

Discussion 0
Question # 16

BGP EVPN does MAC address advertisement, ARP message advertisement, and IRB route advertisement for which BGP EVPN route is advertised?

Options:

A.  

Type3

B.  

Type2

C.  

Type4

D.  

Type1

Discussion 0
Question # 17

The following statement about the VXLAN gateway is incorrect?( Single choice questions).

Options:

A.  

Layer 2 gateway: Used to solve the problem of tenant access to the VXLAN virtual network, and can also be used for subnet communication of the same VXLAN virtual network.

B.  

Layer 3 gateway: Used for cross-subnet communication of the VXLAN virtual network and access to external networks.

C.  

VXLAN Layer 3 gateways can be divided into centralized gateways and distributed gateways.

D.  

Layer 2 gateway and VPN instance binding.

Discussion 0
Question # 18

XLAN uses BGP EVPN to establish a tunnel, what type of message is used? ( Single choice questions).

Options:

A.  

Typel

B.  

Type2

C.  

Type3

D.  

Type4

E.  

Type5

Discussion 0
Question # 19

When configuring ISIS zone authentication, which ISIS message will carry the authentication letter? ( Single choice questions).

Options:

A.  

ISIS ?Level-1 ?SNP ?LSP?

B.  

ISIS ?Level-2 ?SNP ?LSP?

C.  

Hello message of ISIS's Level-1.

D.  

Hello message of ISIS's Level-2

Discussion 0
Question # 20

What are the problems with manually creating static VXLAN tunnels in campus networks? Multi-select

Options:

A.  

Although the static VXLAN tunnel mode can support distributed gateway application scenarios, the configuration workload is large and the configuration adjustment is complex

B.  

N devices to establish static VXLAN tunnels, you need to manually configure up to N(N-1)/2 tunnels, the amount of configuration is large

C.  

VTEP can only learn remote MAC addresses in a way that relies on data flooding

D.  

Static VLAN tunnel also uses related protocols on the control plane, which will cause equipment resource loss

Discussion 0
Question # 21

The firewall has created some security zones by default, which of the following security zones does not exist by default on the firewall?( Radio).

Options:

A.  

Internet

B.  

Local

C.  

Trust

D.  

DMZ

Discussion 0
Question # 22

As shown in the figure, PC1 and PC2 are hosts that belong to the same network segment, below about between PC1 and PC2 What are the correct descriptions of IPv6 neighbor states?

Question # 22

Options:

A.  

If the MAC address information of PC2 can be queried on PC1, the neighbor relationship may be Stale

B.  

If pc2's MAC address information can be queried on PC1, the neighbor relationship may be Probe

C.  

There are five possible neighbor states between PC1 and PC2: Incomplete, Reachable, and Stale , Delay, Probe

D.  

If the MAC address information of PC2 can be queried on PC1, the neighbor relationship must be Reachable

Discussion 0
Question # 23

The correct description of the extended features of ISIS is ?

Options:

A.  

When the amount of information in the Link State Protocol data packet PDU to be released by ISIS is too large, the ISIS router will generate multiple LSP shards to carry more ISIS information.

B.  

ISIS can choose whether to authenticate incoming SNP and LSP packets

C.  

If there are other vendors' devices on the network and do not support the LSP sharding function, the sharding expansion mode must be configured as Model-1, otherwise the message will not be recognized by other vendors' devices.

D.  

After you enable the LSP shard extension feature of your router, you can use it without restarting the ISIS process.

Discussion 0
Question # 24

Because BGP is an EGP routing protocol, BGP routing policies can only be deployed between EBGP neighbors, and routing policies between IBGP neighbors are not valid.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 25

Which of the following options can affect the establishment of IBGP neighbors?

Options:

A.  

iBGP-Multi-hop is not configured

B.  

Authentication is unsuccessful

C.  

IGP routing is not passable

D.  

BGP protocol version inconsistencies

Discussion 0
Question # 26

Comparisons for primary switch elections in the stack include ?

Options:

A.  

MAC address

B.  

Health status

C.  

Stack priority

D.  

Stack ID

Discussion 0
Question # 27

Which of the following are used in Ethernet?

Options:

A.  

A MAC address in a non-canonical format

B.  

CSMA/CD in multiplexed interviews

C.  

Mac address in canonical format

D.  

D.  

8025 encapsulated frames

E.  

8023 Encapsulated Frame

Discussion 0
Question # 28

If the receive cache of a switch's gigabit Ethernet interface is full, what protocol does the switch use to know that the remote interface delays sending data frames for a period of time?

Options:

A.  

8023af

B.  

8021U

C.  

8021D

D.  

8023

E.  

8023Z

Discussion 0
Question # 29

D Class IP address range 239000-239255255,What does 255 do? Radio

Options:

A.  

SSM multicast address, the multicast address segment is valid for the whole network

B.  

Any legitimate multicast traffic and multicast application can adopt this address

C.  

Locally managed multicast address, which is valid only locally

C.  

Link-local multicast address, where traffic that uses that address includes network control messages and that address range is only the multicast address segment used by the

E.  

routing protocol

Discussion 0
Question # 30

The following description of CBWFQ is correct?

Options:

A.  

CBwFQ can be configured with MQC and service-policy is applied to the exit direction

B.  

CBwFQ can be used for both egress and inbound interfaces

C.  

CBwFQ is delayed, jittered and bandwidth guaranteed for traffic catch

D.  

CBWFQ can only be configured in hierarchical policies-maps. The parent policy-map performs supervision and the child policy-map performs

Discussion 0
Question # 31

The data results of a router are as follows, and the analysis conclusion is correct (single choice).

Question # 31

Options:

A.  

The GEO/0/0 port of the

A.  

R3 is in a different region than the neighbor

B.  

The

B.  

R3 router's Eth0/0/1 enables both IPv4 and IPv6 ISIS

C.  

R3 is on the link where Eth0/0/0 is Eth0/ 1 of the LEVEL-1 and Level-2 DISC

D.  

R3 routers Circuit-level is Level-1-2

Discussion 0
Question # 32

Both the CSNP packet of ISlS and the DD packet of OSPF have a role in the MA network, describing the role of the link state database summary, which is correct compared to the following statements of these two types of messages

Options:

A.  

Both packets need to be confirmed to the terminal router after being sent, otherwise they need to be retransmitted

B.  

Once the adjacency relationship is established, the CSRP packet and the D message will stop sending

C.  

The two packets do not need to be confirmed to the router after they are sent the master-slave relationship in the DD message interaction of

D.  

OSPF is not identity bound to dr/BDR; the CSN message is generated only by DIS

Discussion 0
Question # 33

Router HW enables OSPF and router HW has the role of ABR and is configured with abr-summary, then which class LSA Will it be aggregated?

Options:

A.  

1 Class LSA

B.  

2 kind LSA

C.  

3 kind LSA

D.  

4 kind LSA

E.  

5 Class LSA

Discussion 0
Question # 34

SSH uses asymmetric encryption algorithms AES and DES to achieve security for data transmission, and uses HMAC to ensure the complete integrity of integer data

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 35

Regarding IPv6 over IP4(19) road, the following statement is correct

Options:

A.  

The 6to4 automatic tunnel requires the use of a specific IP6 address segment, and the assigned address segment is preceded by 3ffe::/16

B.  

When configuring manual tunneling on the VRP platform, a Tunnel interface is generally created; When configuring automatic tunneling, a Vrua-Template interface is usually created

C.  

The ISATAP tunnel determines the destination IPV4 address of the tunnel based on the destination IP6 address.

D.  

All automatic tunnels encapsulate data in the same way.

E.  

Automatic tunneling has great advantages over manual tunneling, and manual tunneling will be phased out

Discussion 0
Question # 36

Which of the following attacks are DoS (Denial of servioe) attacks?( Multiple choice question)

Options:

A.  

Single packet attack

B.  

Source P address spoofing attack

C.  

Man-in-the-middle attack

D.  

Flood Attack

Discussion 0
Question # 37

For Layer 2 VPN technology, the following statement is correct? Multi-select

Options:

A.  

VPLS is a widely used technology in the live network, which can provide transparent transmission of three-layer messages and achieve multi-point access.

B.  

The VPLS configuration is complex and the Layer 2 network transmits BUM packets.

C.  

BGPEVPN supports features such as tenant isolation, Multi-homing, and broadcast suppression.

D.  

BGPEVPN addresses mac address drift and multi-tenancy that VPLS cannot support.

Discussion 0
Question # 38

The following description of the characteristics of multi-instance CE is ?

Options:

A.  

Since the MCE device is already bound to the VPN, there is no need to bind the VPN on the PE connected to the MCE device

B.  

The MCE device can determine the source of the routing information according to the interface that receives the routing information, and maintain it in the route forwarding table of the corresponding VP.

C.  

MCE is implemented by creating their own routing forwarding tables for different VPNs on the MCE device and binding to the corresponding interface o

D.  

Configuring MCE enables a CE to connect to multiple VPNs at the same time, which can not only completely isolate the service between different VPN users, but also reduce the input cost of network equipment.

Discussion 0
Question # 39

Regarding BGP's recognized arbitrary attributes, which of the following descriptions is correct?

Options:

A.  

must be passed between BGP neighbors

B.  

All BGP routers must be recognized

C.  

There is no requirement to be present in the Update message, and you can decide whether to add it to the Update message on a case-by-case basis

D.  

The BGP router cannot recognize the

Discussion 0
Question # 40

What is the field that the IPv6 header has similar to the IPv4 header "Type of Service" field?

Options:

A.  

Version

B.  

Flow Label

C.  

Next Header

D.  

Traffic Class

Discussion 0
Question # 41

The following description of 8021S deployment characteristics is correct?( Multiple choice question)

Options:

A.  

All VLANs share a spanning tree instance

B.  

Multiple bridges share a spanning tree instance

C.  

Each VLAN has one spanning tree instance

D.  

Multiple VLANs share a spanning tree instance

Discussion 0
Question # 42

Regarding the OSPFv3 protocol, the following description is incorrect?

Options:

A.  

In the case of sharing a single router, each OSPFV3 process runs independently

B.  

In the same OSPFv3 process under the same interface, you can run multiple instances of

C.  

You can support running multiple instances on a single link

D.  

OSPFv3 message header will contain the Instance ID field

Discussion 0
Question # 43

Based on the configuration shown in the figure below, it can be known that R4 has () interfaces advertised into IS-IS?

Question # 43

Options:

A.  

2

B.  

3

C.  

1

D.  

0

Discussion 0
Question # 44

The following statement about IPSG technology is correct (single choice).

Options:

A.  

The ip source checkuser-bind check-item command is used to configure VLAN- or interface-based IP packet checks, which take effect for both dynamic and static table entries.

B.  

If an interface is configured as the OKCP Scooing Tust interface, the interface can normally receive DHCP ACK and DHCPNAK responded to by the OHHNP server and DHCPOffer packets, other untrusted ports cannot receive these packets properly.

C.  

On Huawei routers, ipSG functions can be configured in Vlanif.

D.  

The IPSG can perform binding table match checks on IP packets entering and leaving the interface.

Discussion 0
Question # 45

You are now troubleshooting a LAN, and you suspect that the error is due to a mismatch in the work mode. Which switch interface error indicates that the 10/100/100O IEE gigabit interface operating mode does not match?( Multiple choice questions).

Options:

A.  

Alignment error

B.  

FCS error

C.  

Super Small Frame

D.  

Excess Conflict

E.  

Lag conflicts

Discussion 0
Question # 46

What are the following correct statements about MUX VLANs?( Multiple select).

Options:

A.  

The Principal VLAN can communicate with all VLANs within the MUX VLAN

B.  

Each Separate VLAN must be bound to a Principal VLAN

C.  

Separate VLANs can communicate with all VLANs within a MUX VLAN

D.  

Each Group VLAN must be bound to a Principal VLAN

Discussion 0
Question # 47

If you run PIM-SM in a multicast network, you need to build a multicast forwarding tree between the multicast source and the receiver to enable the receiver to receive the multicast effect, so what are the following options for the correct tree sketch for the build?

Options:

A.  

What is built between the multicast source and the RP is the SPT tree

B.  

RP and the receiver is built between the RPT tree

C.  

Built between the RPT tree

D.  

RP and the swap is the SPT tree

Discussion 0
Question # 48

What information does this contain in a basic layer packet? (Multiple choice) A Data link layer header

B.  

Upper-level data

C.  

The network layer header

D.  

path records

E.  

Network Layer Tail

Options:

Discussion 0
Question # 49

What categories can ACLs be divided into?

A.  

Advanced ACLs

B.  

Two-layer ACL

C.  

User-defined ACLs

D.  

Basic ACL

Options:

Discussion 0
Question # 50

A company deployed SSM multicast, in order to save the bandwidth consumption of multicast data in the LAN, the network administrator made the following configuration on the switch

Options:

A.  

True

B.  

False

Discussion 0
Question # 51

The following description of BGP load sharing is wrong with ?( Multiple choice question)

Options:

A.  

The AS_Path properties of the equivalent routes that form load sharing must be different.

B.  

The destination CIDR blocks are the same, and load sharing can be formed between BGP routes with different sources.

C.  

If BGP load sharing is implemented , the local device needs to configure the peer next-hop-local command to change the next hop address to its own address when issuing a route to an IBGP peer group .

D.  

IBGP routes and EBGP routes that reach the same destination in the public network can form a load sharing

Discussion 0
Question # 52

Mainstream Layer 2 tunneling technologies include VXLAN TRILL, NVGB and MPLS.

Options:

A.  

FALSE

B.  

TRUE

Discussion 0
Question # 53

The following description of BGP ring protection is correct

Options:

A.  

The BGP router does not announce any updates from the EBGP peer to other EBGP peers

B.  

BGP routers that are not RR do not announce any updates from the IBGP peer to other IBGP peers

C.  

Any routing information from the IBGP peer is advertised to the other IBGP peers

D.  

, through the AS-path attribute, discard any update information received from the EBGP peer that contains its own AS number in the AS-path attribute

Discussion 0
Question # 54

The following statement about IPv6 Over VXLAN is wrong as ?( Single choice questions).

Options:

A.  

The tunnel between VXLAN Layer 2 and Layer 3 gateways is an IPv4 network.

B.  

IPv6 over VXLAN solves the problem of insufficient IP address resources for end tenants.

C.  

IPv6 Over VLANs do not generate ND table entries.

D.  

IPv6 over VXLAN means that the Overlay network of the VXLAN is an IPv6 network.

Discussion 0
Question # 55

Huawei's two switch SWA, SWB is connected together through 7 Ethernets, and static route aggregation is configured, and the corresponding ports on the switch SWA are E1/0/1, E1/02, E1/0/3, E1/0/4, E1/ 0/5, E1/0/6, E1/0/7, configured sequentially as if switch SWA, SWB Each aggregation group supports only 6 ports.

Options:

A.  

With the same configuration across ports, the Ethemet 1/0/7 port is the aggregate group Unselected port

B.  

With the same configuration of each port, the Ethemet 1/0/6 port is the aggregate group Unselected port

C.  

With the same configuration of each port, SWA randomly selects one of the 7 ports as the aggregate group Unselected port

D.  

With the same configuration of each port, the Ethemet1/0/1 port is the aggregation group Unselected port

Discussion 0
Question # 56

In route-policy, what are the BGP attributes that can be used for the apply clause?

Options:

A.  

AS-Path

B.  

MED

C.  

Local-Preference

D.  

Day

Discussion 0
Question # 57

In a multicast network, what causes multicast traffic to not forward properly?

Options:

A.  

The router does not have an RPF route

B.  

PIM is not enabled on the RPF interface

C.  

The upstream router will receive the PIM Join message dropped

D.  

Multi-router egress network, this router is not DR

Discussion 0
Question # 58

If the Interface Sticky MAC function is enabled, what is the number of MAC addresses that the interface learns by default?

Options:

A.  

15

B.  

10

C.  

5

D.  

1

Discussion 0
Question # 59

Which is the correct description of optimal routing election for each protocol in the following options?( Radio).

Options:

A.  

Route entries in BGP that are unreachable for the next hop are also placed in the IP routing table.

In the

B.  

BGP protocol, the best route to reach the same destination circumference is selected by comparing the cost values of the route entries.

C.  

The OSPF protocol puts all the routing information in the LSDB into the IP routing table.

D.  

From BGP and OSPF, different route entries to reach the same destination segment are learned, and the optimal route is selected to join the IP route table by comparing the protocol's preference value .

Discussion 0
Question # 60

An existing router running BGP, HW1, has both IBGP neighbors and EBGP neighbors configured on the router. Are the IP Neighbors and EBGP Neighbors described below correctly?

Options:

A.  

The router will be connected directly from its EBGP IBGP neighbor, otherwise, IBGP-Multi-hop must be configured

B.  

The router sends BGP updates learned from its EBGP neighbors to its other IBGP neighbors and EBGP neighbors

C.  

IBGP neighbors can establish neighbor relationships through Loopback engagements

D.  

The router sends BGP updates learned from its IBGP neighbors to its other IBGP neighbors and EPGP neighbors

E.  

EBGP neighbors must be directly connected, otherwise, EBGP-Multi-hop must configure

Discussion 0
Question # 61

In an HWIP multicast network, where multiple sources exist and each source has several receivers, which protocol allows source-to-RP traffic and RP-to-receiver traffic to share the same tree 2?

Options:

A.  

MOSPF

B.  

PIM SM

C.  

DVMRP

D.  

56768GZliuji

E.  

PIM-DM

Discussion 0
Question # 62

The BSR/RP mechanism described below describes the correct determination ?( Multiple choice questions).

There can be multiple C-BSRs in the

Options:

A.  

PIM-SM domain, but only one BSR can be elected.

B.  

BSR collects C-RP information by receiving packets of C-RP

C.  

BSR advertises BSR and C-RP information to all routers in the PIM-SM domain via flood bootstrap messages

D.  

A C-BSR can also collect C-RP information by receiving C-RP packets

Discussion 0
Question # 63

In an intra-domain MPLSVPN network, when a packet enters the public network and is forwarded, it is encapsulated with two layers of MPLS tags, and the description of the two layers of tags in the following options is incorrect

Options:

A.  

The outer label of mpls VPN is assigned by the LDP protocol or statically, and the inner label is assigned by the MP-BGP neighbor of the peer

B.  

The outer label of MPLS VPN is called a private network label, and the inner label is called a public network label

C.  

The outer label is used to correctly send packets to the appropriate VPN in

D.  

on the PE device By default, the outer label is ejected before the packet is forwarded to the last hop device

Discussion 0
Question # 64

Is the following description of the OSPFv3 message correct?

Options:

A.  

The interface ID of the sending interface must be included in the A Hello packet

B.  

The LSACK message contains LSA header information to confirm the receipt of LSU packets

C.  

The LSR message contains the complete LSA header information for requesting an update to the LSA

D.  

Hello messages and the Option field for DD messages extends to 24-bit

Discussion 0
Question # 65

The following description of the attributes of BGP is correct?( Single choice questions).

Options:

A.  

The AS deficit of the adjacent AS is ranked at the far right of the list of AS_Path in the BGP route entry.

B.  

When the

B.  

BGP Speaker publishes a route learned from an EBGP peer to an IBGP peer, it does not change the next hop attribute of that routing information.

C.  

Local_Pref is valid only between EBGP peers and is not advertised to third-party AS.

D.  

A route can have only one community attribute value.

Discussion 0
Question # 66

In the description of the MAC address spoofing attack, the error is ? Radio

Options:

A.  

Mac address spoofing attacks cause the switch to learn the wrong mapping of Mac addresses to IP addresses

B.  

A MAC address spoofing attack causes the data that the switch is sending to the correct destination to be sent to the attacker

C.  

MAC address spoofing attacks primarily exploit the switch Mac address learning mechanism

D.  

An attacker can perform a MAC address spoofing attack by sending a forged source Mac address data frame to the switch

Discussion 0
Question # 67

Regarding route introduction, what is the following description of the error?

Options:

A.  

BGP supports both import and network when generating routes, and the network mode is more precise.

B.  

By default, OSPF introduces an external route with a default metric of 1, and the level-2 network of the ingested external route type type, Type2

C.  

ISIS, routes to Level After the 1 makes a route ingestion, if you do not manually configure the ingestion policy, a bad route will be formed.

D.  

Introducing IBGP routing in OSPF may cause routing loops

Discussion 0
Question # 68

In a network, the same gigabit running S and OSPF anti-tampering and fluttering as shown in the figure, on the two border routers RTB and RTC are introduced into the wine route, the device question is to use gigabit one port strobe, , 222 The network is introduced into the OSE via impotrote direct on the RTD, assuming that all other configurations are dead default configurations, then the description of this network is wrong ?

Question # 68

Options:

A.  

Adjusting the ISIS priority to 160 on the RTB avoids suboptimal routing problems in the network.

B.  

On the RTC, the following configuration is adopted, only the routes of the 2222/32 cinder segment can be filtered out when routing is introduced, IRTClip ip-prefix 10 index 1 deny2000 8 less-equal 32

C.  

RTB learns that the routing next hop for the 2222/32 network segment is RTA

D.  

The following configuration can filter out the routes of the 2222/32 CIDR block of the white RTD when RTC introduces OSPF routes.

Discussion 0
Question # 69

As shown in the figure, the neighbor relationship between R1 and R2 has just been established, and the database synchronization process between R1 and R2 is correct.

Question # 69

Options:

A.  

The message sent by R1 to R2 is a PSNP message

B.  

R1 sends the packet of R2 as the CSNP packet. The message sent by

C.  

R1 to R2 is an LSP packet. The message sent by

D.  

R1 to R2 is the Hello message.

Discussion 0
Question # 70

If a DR needs to be elected between multicast routers running PIM-SM to be responsible for the sending and receiving of source or member multicast data, which one is described correctly below for the DR election rule?

Options:

A.  

PIM routers with long interface masks are elected dr.

B.  

Compare the DR priority first; With the same priority, you need to compare the interface IP addresses of the PIM routers to elect dr

C.  

PIM routers with small IP addresses are elected DR. PIM routers with low

D.  

DR priority values are elected DR.

Discussion 0
Question # 71

In RSTP , which port provides a backup path to reach the root node of the spanning tree? What state is the port in?

Options:

A.  

Root Port and Listening Status

B.  

Alternate Port and Forwarding Status

C.  

Alternate Port and Learning Status

D.  

Designated port and Listening status

E.  

Alternate port and Discarding status

Discussion 0
Question # 72

Which of the following does the digital certificate not contain?

Options:

A.  

Digital envelopes

B.  

Issued by

C.  

Digital signature

D.  

Public key information

Discussion 0
Question # 73

A switch joins a running stacking system after powering up, a behavior known as heap overlay.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Question # 74

Regarding the description of the security level of the configured firewall security zone, the error is ?

Options:

A.  

Two security zones are not allowed to configure the same security level in the same system

B.  

Once the security level is set, it is not allowed to change

C.  

You can only set the security level for a custom security zone

D.  

For newly created security zones, the system defaults to a security level of 1

Discussion 0
Question # 75

Compared to IPV4 multicast, which of the following descriptions is the characteristic of IP6 multicast?

Options:

A.  

IPv6 multicast does not contain MSDP and dense mode

B.  

The first 8bit IPV6 multicast address is always FF(11111111).

C.  

IPv6 multicast clients use IGMPv3 to join multicast groups

D.  

IPv6 multicast load sharing extends the multicast routing rules and is completely independent of RPF check

Discussion 0
Question # 76

The switch uses IPSG technology to verify the source address of the IP packet, and the verification matrix used by the IPSG is obtained through the ARP resolution process in the listening network

Options:

A.  

True

B.  

False

Discussion 0
Question # 77

As shown in the figure, the use of redundant links between the branch and the headquarters to establish IPsecVPN, while turning on URLPF on the Router_B for traffic from branch l, which of the following options is correct?

Question # 77

Options:

A.  

When using IPsec active-standby link redundant backups to enable the URPF function under the physical interface , it is recommended to use URPF loose mode.

B.  

When using IPsec multilink redundant backup, the URPF function can be used under the physical interface, and URPF strict mode can be used

C.  

When using IPsec multilink redundant backups, urPF can be enabled under the tunnel interface, and URPF strict mode can be used

D.  

When using lPsec active-standby link redundancy backup, the URPF function is enabled under the physical interface, and URPF strict mode can be used.

Discussion 0
Question # 78

s the following description of THE MUX VLA N in huawei switches correct?

Options:

A.  

MUX VLAN ??Principal VI-AN ?Subordinate VI-AN ???Separate VLAN ? Isolate VLAN

B.  

Each Separate VLAN can bind multiple Principal VLANs

C.  

Under the same VLAN, muX VLANs can be mixed with SuperVLANs

D.  

The Principal port can pass the answer to all ends within the MUX VLAN

Discussion 0
Question # 79

In EPIM-SM, the following description of the PIM Join message is correct?

APIM Join messages are sent every 3 minutes, and status

B.  

PIM Join messages for the multicast tree are only sent when the multicast tree is first established

C.  

The PIM Join message is sent every 60 seconds to refresh the status of the upstream router mroute for the multicast tree

D.  

The upstream router sends a PIM Join acknowledgment in response to each PIM Join message received from the downstream router

Options:

Discussion 0
Question # 80

OSPFV is the GP running on the P4 network) OSPF3 is the KGP running on the IP6 network. OsPFV works the same basic way as OSPF2, such as elections for DR and BDR. As shown in the figure, an engineer uses three routers for IP6 service testing, and he wants to interconnect the IPv6 network by running OSPFv3 Which of the following statements is correct regarding the election of the network DR?

Question # 80

Options:

A.  

After the network converges, R1 is DR

B.  

After the network converges, the engineer modifies the priority of R1 to 100, the priority of R2 to 10, and R3 to the default value. When the network converges again, Rl is DR and R2 is BDR

C.  

After the network converges, the broadcast link adds a device, R4, with a priority of 150 When the network converges again, R4 is DR

D.  

After the network converges, R1 is powered off and restarted, and when the network converges again, R3 is DR

Discussion 0
Question # 81

?BGP4+?,Update ????M IP_R EACH_NLRI ?????next hop network address ????? ?

Options:

A.  

It can be just link-local address

B.  

Can only be a link-local address

C.  

You can carry a link-local address and a global unicast address

D.  

at the same time Can only be a global unicast address

Discussion 0
Question # 82

In cross-domain VPN-OptionB packet forwarding, two ASBRs exchange the same LSP tags once.

Options:

A.  

True

B.  

False

Discussion 0
Question # 83

As shown in the figure, R1, R2, and R3 run OSPP at the same time and declare their respective ring ports, as described below is the error.

Options:

A.  

R2, you can use the filter po y export command to filter R3's loopback route

B.  

R2 you can make Ëfilter in Area 0 The import command to filter the loopback route for R3 on

C.  

RI can make Ëfilter-policy import filter the loopback route for R3

D.  

RI, you can use the Make Ëfilter export command in Area 1 to filter loopback routes for R3

Discussion 0
Question # 84

When judging the old and new LSA, the serial number parameter and the age parameter are used , and the following two parameters are correct for ?( Multiple choice questions).

A When the router receives two LSAs, where the sequence number is the same and the checksum is the same, the smaller the age, the better

B.  

When the router receives—The age of the LSA is set to 3600S, the LSA is unavailable

C.  

If the serial number of the LSA reaches the end value of Ox7FFFFFFF, the current router advertises an LSA with an age of 3600S

D.  

Both the serial number and age parameters can determine whether the LSA is old or new, and the router prioritizes the sequence to participate in the teaching, and the larger the better

Options:

Discussion 0
Question # 85

If the OSPP protocol is running in the network , after configuring the non-backbone area in the OSPP area as the Totally Stub region, the ABR router sends a message to Totally. The Stub region issues an LSA with an LS ID of 0000, and what type of LSA is the LAS to?

Options:

A.  

LSA5

B.  

LSA2

C.  

LSA1

D.  

LSA3

Discussion 0
Question # 86

Users hope to be able to make the router forward and select messages according to their own defined policies on the basis of traditional route forwarding, and can adopt policy routing, and the following description of policy routing is incorrect

Options:

A.  

Policy Routing can set the next hop IP address

B.  

Policy Routing cannot be set in the next statement DSCP

C.  

Policy Routing cannot be used to set IP precedence

D.  

Policy-based routing can be used to match message lengths

Discussion 0
Question # 87

In a shared network, what mechanism does PIM-SM use to prevent duplicate traffic?( Single choice questions).

Options:

A.  

Register mechanism

B.  

BSR/RP mechanism

C.  

Assert mechanism

D.  

Join/Prune mechanism

Discussion 0
Question # 88

S-4S supports multi-instance and multi-process, that is, on an IS-IS router, multiple VPN instances can be configured to associate with multiple IS-S processes, the following description of IS-IS multi-instance and multi-process, which are correct ?

Options:

A.  

If an IS-IS router creates multiple IS-IS processes, each process is independent of each other

B.  

1 IS-IS processes can only be associated with 1 VPN instance

C.  

1 IS-IS processes can be associated with several different VPN instances

D.  

1 VPN instances can be associated with several different IS-IS processes

Discussion 0
Question # 89

BGP EVPN advertises external routes, which of the following routes?

Options:

A.  

Type1

B.  

Type2

C.  

Type3

D.  

Type4

E.  

Type5

Discussion 0
Question # 90

Regarding the LDP protocol session establishment process, the description is correct?

Options:

A.  

When both parties receive a keepalive message from the peer, the LDP session is successfully established

B.  

Hello messages discovered by LDP neighbors use TCP messages with a destination address of multicast address 224002

C.  

After the TCP connection is successfully established, the active party sends an initialization message to negotiate the relevant parameters of the LDP session,

D.  

The party with the larger transmission address initiates the establishment of a TCP connection as the active party

Discussion 0
Question # 91

In order to study the working mechanism of the OSPFv3 protocol, a project to build a network topology is as follows, the configuration of R1 and R2 is as follows, please ask the LSA switched between R1 and R2 What are the types?

Options:

A.  

network-LSA

B.  

Router-LSA

C.  

Link-LSA

D.  

Inter-area-prefix-LSA

Discussion 0
Get H12-891_V1.0 dumps and pass your exam in 24 hours!

Free Exams Sample Questions