Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

H12-821_V1.0 HCIP-Datacom-Core Technology V1.0 Questions and Answers

Questions 4

In BGP, Notification messages are used to request peers to resend routing information after routing policies are changed.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 5

On an IS-IS network, areas are divided by router, and a router can belong to only one area. Therefore, an IS-IS router only needs to maintain the LSDB of its area.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 6

On a broadcast IS-IS network shown in the following figure, a DIS needs to be elected to create and update pseudonodes. Which of the following routers is elected as the DIS?

Options:

A.

R1

B.

R3

C.

R4

D.

R2

Buy Now
Questions 7

Compress the 2001:0DB8:0000:C030:0000:0000:09A0 address.

Options:

Buy Now
Questions 8

An enterprise network runs OSPF to implement network communication. Which of the following types of LSAs may be generated by an ABR?

Options:

A.

NSSA LSA

B.

AS External LSA

C.

Network Summary LSA

D.

ASBR Summary LSA

Buy Now
Questions 9

There are two BFD operating modes. In_______mode, the local end sends BFD Control packets at specified intervals, and the remote end checks whether the local end periodically sends BFD Control packets. (Use lowercase letters.)

Options:

Buy Now
Questions 10

An enterprise administrator wants to configure single-hop BFD to implement fast detection of direct links. Which of the following configurations are mandatory?

Options:

A.

Configure the remote discriminator of a BFD session.

B.

Configure the local discriminator of a BFD session.

C.

Configure a multicast IP address for BFD.

D.

Enable BFD globally.

Buy Now
Questions 11

On an OSPF network, an algorithm is used to prevent loops within an area, but loops may occur between areas. Therefore, OSPF defines a loop prevention mechanism for inter-area routes. Which of the following statements are true about the loop prevention mechanism?

Options:

A.

Inter-area routes cannot be directly transmitted between non-backbone areas.

B.

All non-backbone areas must be directly connected to area 0.

C.

Inter-area routes need to be forwarded through area 0.

D.

An ABR cannot inject Type 3 LSAs that describe routes to a network segment in an area back to the same area.

Buy Now
Questions 12

When a routing policy is used to filter routes, which of the following route prefixes will be denied by the IP prefix below?

Options:

A.

1.1.1.1/26

B.

1.1.1.2/16

C.

1.1.1.1/32

D.

1.1.1.1/24

Buy Now
Questions 13

An enterprise administrator configures route summarization on ASBRs to reduce the number of inter-area Type 3 LSAs, which in turn reduces the routing table size and improves device resource utilization.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 14

As a next-generation wireless technology, Wi-Fi 6 greatly improves bandwidth rate and performance. Which of the following statements is false about the features of Wi-Fi 6?

Options:

A.

Uses OFDMA technology to achieve high concurrency.

B.

Realizes zero latency, ensuring efficient service running.

C.

Provides high bandwidth, up to 9.6 Gbps.

D.

Uses TWT technology to reduce terminal power consumption.

Buy Now
Questions 15

On a broadcast IS-IS network, a DIS needs to be elected to create and update pseudonodes. Which of the following values is the default DIS priority of an IS-IS interface?

Options:

A.

200

B.

64

C.

1

D.

100

Buy Now
Questions 16

A router performs a lookup in its FIB table for a packet. If the tunnel ID in the matching entry is 0, the packet needs to be forwarded through a tunnel, such as an MPLS tunnel.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 17

BFD for OSPF is deployed on a directly connected link. If the physical link is disconnected, drag the following BFD processes to the corresponding sequence numbers.

Options:

Buy Now
Questions 18

Route attributes are specific descriptions of routes. BGP route attributes can be classified into four types. Which of the following are well-known discretionary attributes?

Options:

A.

Atomic_Aggregate

B.

Local-Preference

C.

Community

D.

MED

Buy Now
Questions 19

When a BGP device sends an Open message to establish a peer connection, which of the following information is carried?

Options:

A.

Local AS number

B.

Router ID

C.

NLRI

D.

Hold time

Buy Now
Questions 20

Drag the following VRRP states to the corresponding working mechanisms.

Options:

Buy Now
Questions 21

Which of the following statements are true about the packet filtering firewall?

Options:

A.

The packet filtering firewall can analyze associated packets to improve security.

B.

The packet filtering firewall supports per-packet detection.

C.

The packet filtering firewall can check application-layer data.

D.

The packet filtering firewall filters data packets based on ACLs.

Buy Now
Questions 22

The AS_Path attribute is an important BGP attribute used for route selection. Which of the following statements are true about this attribute?

Options:

A.

When a route is advertised to an IBGP peer, the AS_Path remains unchanged.

B.

This attribute can be used to prevent BGP routing loops.

C.

This attribute is a well-known discretionary attribute that must be identified by all BGP routers.

D.

BGP ignores AS_Confed_Sequence and AS_Confed_Set when calculating the AS_Path length.

Buy Now
Questions 23

An IP prefix list is configured on a router using the following command:

ip ip-prefix huawei index 10 permit 10.1.1.0 24 greater-equal 26

In this case, the value of greater-equal-value is ____, and the value of less-equal-value is ____.

Options:

Buy Now
Questions 24

IGMP has three versions. Different versions support different features. Which of the following features is supported by all versions?

Options:

A.

Group-Specific Query message

B.

Leave message

C.

Report message

D.

Specifying a multicast source

Buy Now
Questions 25

When configuring an ACL on a router, you can specify a unique number or name to identify the ACL. Once a named ACL is created, it cannot be modified. You can only delete the named ACL and reconfigure it.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 26

GRE is a VPN encapsulation technology that is widely used to transmit packets across heterogeneous networks. Which of the following statements is false about GRE?

Options:

A.

GRE supports encryption and authentication.

B.

GRE supports multicast transmission.

C.

GRE is a Layer 3 VPN encapsulation technology.

D.

GRE can work with other VPN protocols to better ensure data security.

Buy Now
Questions 27

The figure shows the VRRP status switchover events. Match these events with their sequence numbers.

Options:

Buy Now
Questions 28

On an IS-IS network, routers send LSPs to exchange link state information. LSPs are classified into Level-1 LSPs and Level-2 LSPs and have the same format. Which of the following parts constitute the LSP ID in an LSP?

Options:

A.

LSP Number

B.

Pseudonode ID

C.

System ID

D.

IS Type

Buy Now
Questions 29

In the SNMP management model, which of the following elements defines the attributes of a managed device?

Options:

A.

MIB

B.

Agent

C.

Managed Object

D.

NMS

Buy Now
Questions 30

Which of the following statements is false about the session table mechanism on firewalls?

Options:

A.

Generally, the default session aging time of the system can be used. To change the aging time, you need to estimate and determine the traffic type and number of connections on the network.

B.

The fast session aging function also takes effect for persistent connection sessions.

C.

A created session entry needs to be matched by packets constantly.

D.

When stateful inspection is disabled, the firewall still creates session tables for non-first packets. This allows services to run properly without the need to enable the persistent connection function.

Buy Now
Questions 31

The IP prefix list configuration on a Huawei router is shown below. Which of the following routes can match this IP prefix list?

bash

Copy

[huawei] ip ip-prefix test index 10 permit 10.0.0.0 8 less-equal 32

Options:

A.

10.1.1.1/32

B.

10.1.1.0/6

C.

10.1.1.0/24

D.

10.0.0.0/16

Buy Now
Questions 32

See the following figure. RTA, RTB, RTC, and RTD are in the same AS and establish IBGP peer relationships through direct links. RTB an RTC are route reflectors (RRs), RTA and RTC are the RR clients of RTB, and RTB and RTD are the RR clients of RTC. If RTA advertises the route 10.1.1.0/24 to the BGP process, the Originator ID of the BGP route received by RTD is------------------.

Options:

Buy Now
Questions 33

Both MQC and PBR can be applied on device interfaces to filter received and sent packets or control packet forwarding paths.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 34

A router forwards traffic based on a FIB table. Which of the following values of the Flag field in a routing entry indicates that the next hop of the route is the gateway?

Options:

A.

G

B.

S

C.

H

D.

D

Buy Now
Questions 35

Which of the following is the default interval at which the DIS on a broadcast IS_IS network sends CSNPs.

Options:

A.

30

B.

3.3

C.

10

D.

40

Buy Now
Questions 36

In an OSPF routing domain, two routers must be specified as one DR and one BDR in a broadcast or NBMA network with at least two routers.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 37

On the campus OSPF network shown in the following figure, the interfaces connecting the five routers are GE interfaces, and their costs are not changed. The import-route command is run on R1. After the network converges, the route to the server at 192.168.1.0/24 is queried on R2. Which of the following is the cost of this route?

Options:

A.

2

B.

4

C.

3

D.

1

Buy Now
Questions 38

As shown in the figure, the stateful inspection firewall forwards the packet because the packet matches the session status of the firewall.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 39

A large number of routes typically exist in a BGP routing table, and transmitting such extensive routing information brings a heavy burden to a device. In order to address this problem, it is necessary to filter those routes to be advertised. You can configure a device to advertise only necessary routes or those that its peers require.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 40

On a network, some switches are enabled with RSTP and some switches are enabled with STP. What will happen?

Options:

A.

A Huawei switch changes from RSTP to STP. After the STP-enabled switch is removed from the network, the RSTP-enabled switch can be moved back to the RSTP mode.

B.

A Huawei switch changes its mode from STP to RSTP. After the RSTP-enabled switch is removed from the network, the STP-enabled switch can be moved back to the RSTP mode.

C.

STP and RSTP are compatible with each other, but the rapid convergence of RSTP is unavailable.

D.

STP and RSTP calculation are performed independently.

Buy Now
Questions 41

A route-policy consists of one or more nodes. What is the maximum number of nodes in a route-policy?

Options:

A.

4096

B.

65535

C.

256

D.

1024

Buy Now
Questions 42

On an OSPF network, all OSPF routers generate Router LSAs. If the E bit in a Router LSA is set to 1, the router that generates this LSA is a/an ______.

Options:

A.

ABR

B.

IR

C.

ASBR

D.

DR

Buy Now
Questions 43

Compared with RSTP, which of the following port roles are added to MSTP?

Options:

A.

Backup port

B.

Master port

C.

Edge port

D.

Regional edge port

Buy Now
Questions 44

During routine operation and maintenance, an engineer checks the IGMP configuration on RTA. The configuration is as follows:

Interface information of VPN-Instance: public net

GigabitEthernet0/0/1 (192.168.1.1):

IGMP is enabled

Current IGMP version is 2

IGMP state: up

IGMP group policy: none

IGMP limit: -

Value of query interval for IGMP (negotiated): -

Value of query interval for IGMP (configured): 60 s

Value of other querier timeout for IGMP: 0 s

Value of maximum query response time for IGMP: 10 s

Querier for IGMP: 192.168.1.1 (this router)

Given this, which of the following statements is false?

Options:

A.

The IP address of the interface is 192.168.1.1.

B.

The maximum response time to Query messages is 10s.

C.

The interval for sending Group-Specific Query messages is 60s.

D.

The IGMP version is IGMPv2.

Buy Now
Questions 45

Which of the following attributes must be carried when BGP sends route update messages?

Options:

A.

MED

B.

Next_Hop

C.

AS_Path

D.

Local_Preference

Buy Now
Questions 46

On an OSPF network, if two routers with the same router ID run in different areas and one of the routers is an ASBR, LSA flapping occurs.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 47

On an OSPF or IS-IS network, the filter-policy import command can be run on a router to filter out the LSAs forwarded by its neighbors.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 48

On an OSPF network, an IR in area 0 must be a BR, but an ASBR may not be an ABR.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 49

Security policy is the core feature of firewalls. Only valid traffic that complies with security policies can be forwarded by firewalls. Which of the following statements are true about security policy matching rules?

Options:

A.

Multiple values can be configured for a single matching condition, and the values are logically ANDed.

B.

If a security policy contains multiple matching conditions, the relationship between them is AND.

C.

The system has a default security policy named default, where all matching conditions are any and the default action is permit.

D.

When multiple security policy rules are configured, they are sorted in a list by configuration sequence by default. A security policy rule configured earlier is placed higher in the list and has a higher priority.

Buy Now
Questions 50

An enterprise office network runs OSPF and is divided into multiple OSPF areas. Enterprise network engineers can configure route summarization on ASBRs to reduce the number of inter-area Type 3 LSAs, which in turn reduces the routing table size and improves device resource utilization.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 51

Which of the following statements regarding Local-Preference in BGP is true?

Options:

A.

Local-Preference affects traffic that enters an AS.

B.

Local-Preference can be transmitted between ASs.

C.

The default Local-Preference value is 100.

D.

Local-Preference is a well-known mandatory attribute.

Buy Now
Questions 52

On an OSPF network, if a router functions as an ABR, the router must also be a BR.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 53

ON a stateful inspection Firewall where there is no session table, when the status detection mechanism is enabled and the second packet (CYN+ACK) of 3-way hadshakes reaches the firewall. Which of the following statements is true?

Options:

A.

If the firewall security policy permits packets to pass, the session table is created.

B.

By default, when status detection is disabled and the permit policy is configured packets can pass.

C.

Packets must pass the firewall, and a session table is established.

D.

If the firewall security policy permits packets to pass, the packets can pass the firewall.

Buy Now
Questions 54

iMaster NCE-Campus can be used as an authentication server on a WLAN to authenticate STAs.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 55

L2TP does not provide security encryption. Therefore, other security measures, such as IPsec, are required to ensure the security of the entire tunnel for data transmission.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 56

A Layer 2 switch supports multiple types of Ethernet interfaces. Similar to a trunk interface, a hybrid interface allows data frames from multiple VLANs to pass through. In addition, you can determine whether data frames from a VLAN sent out from a hybrid interface are tagged or untagged.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 57

The BFD Echo function checks the connectivity of the forwarding link by looping back packets. Which of the following statements are true about this function?

Options:

A.

If URPF is enabled on the peer end, BFD packets may be incorrectly discarded on the peer end.

B.

In the BFD Echo function, the device uses the IP address of the outbound interface as the source IP address by default.

C.

The BFD Echo function applies only to single-hop BFD sessions.

D.

When configuring a BFD session supporting the BFD echo function, you need to configure both the local and remote discriminators.

Buy Now
Questions 58

NETCONF is a network configuration protocol that automates network configuration in a programmable manner, simplifying and accelerating network service deployment. Which of the following operations can be performed by using this protocol?

Options:

A.

Modifying configurations

B.

Deleting configurations

C.

Restoring configurations

D.

Backing up configurations

Buy Now
Questions 59

Which of the following statements regarding OSPF route summarization is false?

Options:

A.

OSPF supports two route summarization modes: ABR summarization and ASBR summarization.

B.

Any router in OSPF can summarize routes.

C.

Route summarization is the process of summarizing routes with the same prefix into one route and then advertising only the summarized route to other areas.

D.

Route summarization can reduce routing information, decrease the routing table size, and improve router performance.

Buy Now
Questions 60

GRE is a Layer 2 VPN encapsulation technology that encapsulates packets of certain data link layer protocols so that the encapsulated packets can be transmitted over an IP network.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 61

Which of the following statements about stack split is false?

Options:

A.

After a stack splits, the MAC addresses of the two stacks change immediately.

B.

If the master and standby switches are still in the same stack after the stack splits, the slave switches separated from the original master and standby switches re-elect the master and standby switches due to protocol packet timeout.

C.

If the master and standby switches are in two stacks after the split, the stack where the original master switch resides updates the topology and selects a new standby switch. The original standby switch becomes the master switch in the new stack and a new standby switch is elected.

D.

After a stack splits, multiple stacks have the same IP address and MAC address. To prevent network faults, the stacks perform MAD detection. The stack that fails the MAD detection shuts down all physical ports except reserved ports.

Buy Now
Questions 62

A wide area network (WAN) is a remote network that connects local area networks (LANs) or metropolitan area networks (MANs) in different areas for communication purposes. It is typically used to interconnect campus networks or data center networks.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 63

Which of the following methods is usually used by a network administrator to configure a newly purchased device for the first time?

Options:

A.

Telnet

B.

SNMP

C.

Login through the Console port

D.

FTP

Buy Now
Questions 64

Which of the following statement regarding the display ospf peer command output is true?

Options:

A.

Address: 10.1,1.1 Indicates that the local interface address is 10.1.1.1.

B.

Through negotiation during DD packet exchange, the local end becomes the slave.

C.

Router ID indicates that the local router ID Is 10.1.1.1.

D.

The DR address is 10.1.1.1

Buy Now
Questions 65

IGMPV3 not only supports IGMPv1 General Query and IGMPv2 Group-Specific Query, and also IGMPv3 Source/Group-Specific Query.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 66

Roaming technology is typically used on a large WLAN to ensure that STA (station) services are not interrupted when STAs move between coverage areas of different APs.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 67

Which of the following is used as the destination port for single-hop BFD?

Options:

A.

UDP port 3784

B.

UDP port 4784

C.

TCP port 3784

D.

TCP port 4784

Buy Now
Questions 68

Which of the following statements regarding the OSPF protocol is false?

Options:

A.

Each OSPF router uses only one Router-LSA to describe the local active connection status of an area.

B.

Routing information can be advertised only between backbone and non-backbone areas and cannot be advertised directly between non-backbone areas.

C.

Router-LSA describes four connection types: P2P, TransNet, SubNet, and virtual link.

D.

Link State ID in a Type 3 LSA indicates the router ID of an ABR.

Buy Now
Questions 69

Which of the following attributes cannot be directly referenced in an apply clause of a route-policy?

Options:

A.

community

B.

IP-prefix

C.

tag

D.

origin

Buy Now
Questions 70

Multicast applies to any point-to-multipoint data transmission. Which of the following types of application data can be forwarded in multicast mode?

Options:

A.

Real-time audio conferencing

B.

Livestreaming

C.

Network TV

D.

Data warehouse

Buy Now
Questions 71

When an SSH client accesses an SSH server for the first time and the SSH server's public key is not configured on the SSH client, you can enable first-time authentication on the SSH client. This allows the SSH client to access the SSH server and saves the SSH server's public key on the SSH client. In this way, the next time the SSH client accesses the SSH server, the SSH client can use the saved public key to authenticate the SSH server.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 72

In PIM-DM, which of the following processes are involved in SPT establishment?

Options:

A.

Prune

B.

Graft

C.

Flooding

D.

State-refresh

Buy Now
Questions 73

The Interface \P address and VRRP virtual IP address can be the same.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 74

In the OSPF protocol, intra-area route calculation involves only Router LSA, Network LSA, and Summary LSA.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 75

On an RSTP network, port roles are optimized to overcome the disadvantages of STP. Which of the following port roles are supported in RSTP?

Options:

A.

Root port

B.

Designated port

C.

Backup port

D.

Alternate port

Buy Now
Questions 76

ASPF enables the firewall to support multi-channel protocols such as FTP and to define security policies for complex applications.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 77

Which of the following statements regarding OSPF is true?

Options:

A.

OSPF does not have an acknowledgement mechanism. Therefore, OSPF relies on the upper-layer protocol, TCP, for acknowledgement.

B.

OSPF performs LSDB update every 30 minutes.

C.

OSPF uses the Bellman-Ford algorithm, and each router independently runs this algorithm.

D.

OSPF floods a LSU packet at an interval of 5s.

Buy Now
Questions 78

When multiple access channels are set for the same access requirement, the insecure access channels are not used and secure access channels are selected in normal cases. Which of the following are secure access channels?

Options:

A.

HTTPS

B.

Telnet

C.

SNMPv2

D.

SFTP

Buy Now
Questions 79

Which of the following statements regarding the firewall zone security level is false?

Options:

A.

The configured security level cannot be changed.

B.

Two zones cannot be configured with the same security level.

C.

The default security level of the new zone is 1.

D.

Only the security level of the user-defined zone can be configured.

Buy Now
Questions 80

To overcome the disadvantages of STP, RSTP changes the format of configuration BPDUs. Which of the following fields in STP BPDUs is used to specify the port role?

Options:

A.

Flags

B.

BPDU Type

C.

PID

D.

PVI

Buy Now
Questions 81

When deploying a VRRP network, an enterprise administrator sets the virtual IP address to 192.168.1.254 and VRID to 1. Which of the following is the virtual MAC address after the network becomes stable?

Options:

A.

0000-5e01-0101

B.

0000-5e01-0254

C.

0000-5e00-0101

D.

0000-5e00-0254

Buy Now
Questions 82

Which of the following statements regarding the MED value in BGP are true?

Options:

A.

According to BGP route selection rules, the MED value has a lower priority than AS_Path, Preferred-Value, Local-Preference, and Origin.

B.

The default MED value of BGP routes is 0.

C.

By default, BGP can compare the MED values of routes from different ASs.

D.

By default, if there is no MED value in routes, the value 0 is used. If the bestroute med-none-as-maximum command is configured, the maximum MED value 4294967295 is used.

Buy Now
Questions 83

The VRID of the VRRP virtual router is 3 and the virtual IP address is 100.1.1.10. What is the virtual MAC address?

Options:

A.

01-00-5E-00-01-64

B.

01-00-5E-00-01-03

C.

00-00-5E-00-01-64

D.

00-00-5E-00-01-03

Buy Now
Questions 84

IPv6 defines multiple types of addresses. Which of the following statements is false about these addresses?

Options:

A.

Link-local addresses can be quickly generated using the EUI-64 method.

B.

Anycast addresses can be used only as destination addresses.

C.

Each interface can have multiple global unicast addresses with different network prefixes.

D.

Manually configured link-local addresses have a higher priority than automatically generated ones.

Buy Now
Questions 85

Which of the following configurations are not mandatory when an administrator configures VRRP?

Options:

A.

Preemption mode

B.

Preemption delay

C.

Virtual router priority

D.

Virtual IP address

Buy Now
Questions 86

The following figure shows the OSPF network of an enterprise and the OSPF configurations of R1. Which of the following statements is false about the network?

Options:

A.

R2 can access the server.

B.

GE 0/0/1 of R1 cannot send OSPF packets.

C.

The network segment to which GE 0/0/1 of R1 belongs cannot be advertised.

D.

GE 0/0/1 of R1 cannot accept OSPF packets.

Buy Now
Questions 87

VRF, also called VPN instance, is a network virtualization technology that helps VPN technology to isolate users. In normal cases, multiple VPN instances can be created on a physical device, and each VPN instance has independent entries. Which of the following resources can be independently owned by a VPN instance?

Options:

A.

Interface

B.

Routing table

C.

MAC address table

D.

Routing protocol process

Buy Now
Questions 88

Which of the following messages are sent when BGP establishes peer relationships?

Options:

A.

Keepalive

B.

Hello

C.

Update

D.

Open

Buy Now
Questions 89

Which of the following LSAs are advertised only within a single area?

Options:

A.

Network LSA

B.

Router LSA

C.

Summary LSA

D.

AS External LSA

Buy Now
Exam Code: H12-821_V1.0
Exam Name: HCIP-Datacom-Core Technology V1.0
Last Update: Apr 2, 2025
Questions: 299
H12-821_V1.0 pdf

H12-821_V1.0 PDF

$25.5  $84.99
H12-821_V1.0 Engine

H12-821_V1.0 Testing Engine

$30  $99.99
H12-821_V1.0 PDF + Engine

H12-821_V1.0 PDF + Testing Engine

$40.5  $134.99