Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

H12-821_V1.0 HCIP-Datacom-Core Technology V1.0 Questions and Answers

Questions 4

Which of the following routing protocols support the default route through command configuration?

Options:

A.

BGP

B.

IS-IS

C.

OSPF

D.

ICMP

Buy Now
Questions 5

OSPF supports area authentication and interface authentication. If both authentication modes are configured, Interface authentication takes preference over area authentication.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 6

Based on IGMP snooping, IGMP snooping proxy enables a switch to act as a substitute for an upstream Layer 3 device to send IGMP Query messages to downstream hosts, and also to act as a substitute for downstream hosts to send IGMP Report/Leave messages to an upstream device. As such, this function conserves bandwidth between the upstream device and the local device.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 7

A BGP device receives a route carrying an unknown attribute from a peer but does not know whether other devices need the attribute. In this case, the BGP device retains this attribute when advertising the route to other peers. Which of the following attributes is of this type?

Options:

A.

Community

B.

AS.Path

C.

MED

D.

OriginatorID

Buy Now
Questions 8

Compress the 2001:0DBB:B8:0000:C030:0000:0000:09A0:CDEF address.___________(if the answer contains letters, capitalize them.)

Options:

Buy Now
Questions 9

On a broadcast IS-IS network shown in the following figure, a DIS needs to be elected to create and update pseudonodes. Which of the following routers is elected as the DIS?

Options:

A.

R1

B.

R3

C.

R4

D.

R2

Buy Now
Questions 10

BGP confederations are widely used because they can reduce the number of IBGP connections in an AS. Which of the following statements is false about confederations?

Options:

A.

The ASs outside a confederation still consider the confederation as one AS.

B.

After a confederation is configured, the original IBGP attributes can be retained.

C.

After a confederation is configured, the original AS number is used as the confederation ID of each router.

D.

A confederation divides an AS into several sub-ASs, and EBGP full-mesh connections are established in each sub-AS.

Buy Now
Questions 11

Which of the following statements regarding the MED value in BGP are true?

Options:

A.

According to BGP route selection rules, the MED value has a lower priority than AS_Path, Preferred-Value, Local-Preference, and Origin.

B.

The default MED value of BGP routes is 0.

C.

By default, BGP can compare the MED values of routes from different ASs.

D.

By default, if there is no MED value in routes, the value 0 is used. If the bestroute med-none-as-maximum command is configured, the maximum MED value 4294967295 is used.

Buy Now
Questions 12

Which of the following statements about the forwarding plane of a switch is false?

Options:

A.

Provides high-speed and non-blocking data channels.

B.

Can encapsulate and decapsulate packets.

C.

Can collect packet statistics.

D.

Consists of main control boards and interface boards.

Buy Now
Questions 13

During BGP route summarization configuration, the keyword can be used to suppress all specific routes so that only the summary route is advertised. The summary route carries the Atomic-aggregate attribute rather than the community attributes of specific routes.

Options:

Buy Now
Questions 14

GRE is a VPN technology that can implement packet transmission over heterogeneous networks. Which of the following statements are true about GRE?

Options:

A.

GRE is a Layer 2 VPN encapsulation technology.

B.

GRE enables encapsulated data packets to be transmitted over another network layer protocol, but cannot encapsulate multicast data.

C.

GRE tunnels can work with IPsec to ensure the security of multicast services such as voice and video.

D.

GRE tunnels can extend the working range of network protocols with hop limits.

Buy Now
Questions 15

On an IS-IS network, areas are divided by router, and a router can belong to only one area. Therefore, an IS-IS router only needs to maintain the LSDB of its area.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 16

In inter-AC roaming scenarios, an AC can function as the mobility server of multiple mobility groups, but can be added only to one mobility group.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 17

Huawei modular devices have multiple hardware modules that provide different functions. Match the following hardware modules with their functions.

Options:

Buy Now
Questions 18

Which three transmission modes are supported for IPv4 packets?

Options:

A.

Anycast

B.

Broadcast

C.

Unicast

D.

Multicast

Buy Now
Questions 19

An enterprise administrator configures route summarization on ASBRs to reduce the number of inter-area Type 3 LSAs, which in turn reduces the routing table size and improves device resource utilization.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 20

BFD can quickly detect faults in channels at multiple network layers, ensuring high reliability. To which of the following layers does BFD belong?

Options:

A.

Application layer

B.

Data link layer

C.

Physical layer

D.

Network layer

Buy Now
Questions 21

Four routers run ISIS and have established adjacencies. The area IDs and router levels are marked in the following figure. If route leaking is configured on R3, which of the following is the cost of the route from R4 to 10.0.2.2/32?

Options:

A.

80

B.

50

C.

40

D.

30

Buy Now
Questions 22

Which of the following statements regarding OSPF route summarization is false?

Options:

A.

OSPF supports two route summarization modes: ABR summarization and ASBR summarization.

B.

Any router in OSPF can summarize routes.

C.

Route summarization is the process of summarizing routes with the same prefix into one route and then advertising only the summarized route to other areas.

D.

Route summarization can reduce routing information, decrease the routing table size, and improve router performance.

Buy Now
Questions 23

When receiving a packet that does not match any session table entry, the firewall discards the packet to prevent external attacks and ensure internal information security.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 24

In the OSPF protocol, intra-area route calculation involves only Router LSA, Network LSA, and Summary LSA.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 25

Compress the 2001:0DB8:0000:C030:0000:0000:09A0 address.

Options:

Buy Now
Questions 26

VRF, also called VPN instance, is a network virtualization technology that helps VPN technology to isolate users. In normal cases, multiple VPN instances can be created on a physical device, and each VPN instance has independent entries. Which of the following resources can be independently owned by a VPN instance?

Options:

A.

Interface

B.

Routing table

C.

MAC address table

D.

Routing protocol process

Buy Now
Questions 27

A session is an entry used to record the connection status of a protocol and is fundamental for the firewall to forward packets. Which of the following protocol packets will the firewall create sessions for?

Options:

A.

Subsequent fragment

B.

ICMP error packet

C.

GRE

D.

TCP

Buy Now
Questions 28

The native AC function allows an agile switch to integrate AC capabilities, achieving wired and wireless convergence. The agile switch centrally manages wired and wireless service traffic.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 29

L2TP does not provide security encryption. Therefore, other security measures, such as IPsec, are required to ensure the security of the entire tunnel for data transmission.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 30

IGMP has three versions. Different versions support different features. Which of the following features is supported by all versions?

Options:

A.

Group-Specific Query message

B.

Leave message

C.

Report message

D.

Specifying a multicast source

Buy Now
Questions 31

Route attributes are specific descriptions of routes. BGP route attributes can be classified into four types. Which of the following are well-known discretionary attributes?

Options:

A.

Atomic_Aggregate

B.

Local-Preference

C.

Community

D.

MED

Buy Now
Questions 32

In IPv6, interface IDs can be manually configured, automatically generated by the system, or generated based on the IEEE EUI-64 standard.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 33

After which of the following parameters are modified does an IS-IS neighbor relationship need to re-established?

Options:

A.

The cost of an IS-IS interface is changed.

B.

The IP address of an ISIS interface is changed.

C.

The level of an ISIS interface is changed.

D.

The interval at which an IS-IS interface sends IIH packets is changed.

Buy Now
Questions 34

ACLs are a common tool for matching routes. ACLs are classified into multiple types based on ACL rule functions. An ACL can be identified by a number, and the number range for each type of ACLs is different. Which of the following type of ACLs are numbered from 4000 to 4999?

Options:

A.

User-defined ACL

B.

Basic ACL

C.

Layer 2 ACL

D.

Advance ACL

Buy Now
Questions 35

Which of the following statements regarding routing policy and policy-based routing are true?

Options:

A.

A routing policy is used to control import, advertisement, and receiving of routing information.

B.

Policy-based routing is used to control import, advertisement, and receiving of routing information.

C.

Policy-based routing is used to control packet forwarding without following routes in the routing table.

D.

A routing policy is used to control packet forwarding without following routes in the routing table.

Buy Now
Questions 36

In VRRP networking, devices assume the Master and Backup roles after election. Match the two roles with their working mechanisms.(Token is reusable)

Options:

Buy Now
Questions 37

Which of the following attacks is not the network layer attack?

Options:

A.

IP spoofing attack

B.

ICMP attack

C.

Smurf attack

D.

ARP spoofing attack

Buy Now
Questions 38

On an OSPF network, if two routers with the same router ID run in different areas and one of the routers is an ASBR, LSA flapping occurs.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 39

What parameters can a DHCP6 server assign to a DHCPv6 client?

Options:

A.

Gateway address

B.

DNS server address

C.

IPV6 address/prefix

D.

SNTP server address

Buy Now
Questions 40

Depending on the type of algorithms used, routing protocols are classified into distance-vector protocols and link-state protocols. Which of the following routing protocols are link-state protocols?

Options:

A.

RIP

B.

OSPF

C.

IS-IS

D.

BGP

Buy Now
Questions 41

Which of the following statements are true about the packet filtering firewall?

Options:

A.

The packet filtering firewall can analyze associated packets to improve security.

B.

The packet filtering firewall supports per-packet detection.

C.

The packet filtering firewall can check application-layer data.

D.

The packet filtering firewall filters data packets based on ACLs.

Buy Now
Questions 42

Which of the following statements about stack split is false?

Options:

A.

After a stack splits, the MAC addresses of the two stacks change immediately.

B.

If the master and standby switches are still in the same stack after the stack splits, the slave switches separated from the original master and standby switches re-elect the master and standby switches due to protocol packet timeout.

C.

If the master and standby switches are in two stacks after the split, the stack where the original master switch resides updates the topology and selects a new standby switch. The original standby switch becomes the master switch in the new stack and a new standby switch is elected.

D.

After a stack splits, multiple stacks have the same IP address and MAC address. To prevent network faults, the stacks perform MAD detection. The stack that fails the MAD detection shuts down all physical ports except reserved ports.

Buy Now
Questions 43

On a network, some switches are enabled with RSTP and some switches are enabled with STP. What will happen?

Options:

A.

A Huawei switch changes from RSTP to STP. After the STP-enabled switch is removed from the network, the RSTP-enabled switch can be moved back to the RSTP mode.

B.

A Huawei switch changes its mode from STP to RSTP. After the RSTP-enabled switch is removed from the network, the STP-enabled switch can be moved back to the RSTP mode.

C.

STP and RSTP are compatible with each other, but the rapid convergence of RSTP is unavailable.

D.

STP and RSTP calculation are performed independently.

Buy Now
Questions 44

What is the correct procedure for a VLAN pool to assign terminals to VLANs.

Options:

Buy Now
Questions 45

Compared with STP, RSTP defines the different port states. Which of the following statements regarding discarding and learning states are true?

Options:

A.

The port In discarding or learning state does not forward data frames.

B.

The port in discarding state does not learn MAC addresses table.

C.

The port in discarding or learning state does not learn MAC addresses

D.

The port In learning stole docs not learn MAC addresses table.

Buy Now
Questions 46

See the following figure. All routers on the network run IS-IS and are in area 49.0001. By referring to the LSDB of R1, the Level-2 DIS is. (Enter the device name, for example, R1.)

Options:

Buy Now
Questions 47

A local router runs IS-IS and its command output is shown in the following figure. Which of the following statements is true?

Options:

A.

The circuit level of S4/0/0 is Level-1.

B.

S4/0/0 supports IPv6.

C.

S4/0/0 sends IIH packets at the interval of 30s.

D.

The cost of S4/0/0 is 20.

Buy Now
Questions 48

As shown in the figure, the stateful inspection firewall forwards the packet because the packet matches the session status of the firewall.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 49

When a BGP device sends an Open message to establish a peer connection, which of the following information is carried?

Options:

A.

Local AS number

B.

Router ID

C.

NLRI

D.

Hold time

Buy Now
Questions 50

GRE is a Layer 2 VPN encapsulation technology that encapsulates packets of certain data link layer protocols so that the encapsulated packets can be transmitted over an IP network.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 51

If a router ID is configured in both the system via and the BGP view, BGP uses the router ID configured in the BGP view because the BGP view takes precedence over the system view.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 52

The filter-policy 2000 export command is run in an ISIS process. Which of the following statements about the functions of a filter policy is false?

Options:

A.

Is used together with the route import function to advertise some imported external routes to neighbors.

B.

If this command is not run, the device by default advertises all routes that ISIS Imports form external routing protocols.

C.

Controls the advertisement of routes generated by the device.

D.

Filters LSPs to be advertised.

Buy Now
Questions 53

Link aggregation is a common network technology. Which of the following are advantages of link aggregation?

Options:

A.

Load balancing

B.

Improved reliability

C.

Increased link bandwidth

D.

Route backup

Buy Now
Questions 54

On an enterprise network, the directly connected interfaces of two OSPF routers are on different network segments and have different masks. To establish an OSPF neighbor relationship between the two interfaces, you can change their network types to which of the following?

Options:

A.

Point-to-point

B.

NBMA

C.

P2MP

D.

Broadcast

Buy Now
Questions 55

Which Of the following IEEE 802.11 standards is also known as Wi-Fi 6?

Options:

A.

802.11ac

B.

802.11n

C.

802.11ax

D.

802.11b

Buy Now
Questions 56

As shown in the figure, VRRP is associated with a BFD session. When a backup device detects a fault through BFD, the backup device immediately assumes the master role after the Master_Down_Timer timer expires.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 57

Both MQC and PBR can be applied on device interfaces to filter received and sent packets or control packet forwarding paths.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 58

An IP prefix list is a common matching tool used in routing policies. Which of the following cannot be configured as matching conditions in an IP prefix list on a Huawei router?

Options:

A.

Port number

B.

Mask

C.

Action

D.

Index

Buy Now
Questions 59

Which of the following statements regarding OSPF is true?

Options:

A.

OSPF does not have an acknowledgement mechanism. Therefore, OSPF relies on the upper-layer protocol, TCP, for acknowledgement.

B.

OSPF performs LSDB update every 30 minutes.

C.

OSPF uses the Bellman-Ford algorithm, and each router independently runs this algorithm.

D.

OSPF floods a LSU packet at an interval of 5s.

Buy Now
Questions 60

By default, some security zones are created when Huawei firewalls are enabled. Which of the following security zones is created by users?

Options:

A.

DMZ

B.

ISP

C.

Trust

D.

Local

Buy Now
Questions 61

On an RSTP network, if a port receives an RST BPDU and finds that its buffered RST BPDU is superior to the received RST BPDU, the port discards the received RST BPDU without responding.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 62

In an OSPF routing domain, two routers must be specified as one DR and one BDR in a broadcast or NBMA network with at least two routers.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 63

On an STP network, the root bridge, root port, and designated port are elected in sequence. The election rules of these ports are different. List the steps for electing the root port in sequence.

Options:

Buy Now
Questions 64

An enterprise uses OSPF to implement network communication. To ensure data validity and security, all authentication modes supported by OSPF are enabled on routers. In this case, interface authentication is preferentially used by the routers.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 65

As shown in the figure, SWA, SWB, SWC, and SWD run the Rapid Spanning Tree Protocol (RSTP). Which of the following statements are true?

Options:

A.

Once receiving OPOUs, the edge port re-partlci pates in the calculation of the spanning tree.

B.

After a port is Configured as an edge port, the port can quickly enter the Forwarding state.

C.

You can enable the edge port on SWD's GEO/0/2 connected to the terminal so that this port can quickly enter the Forwarding state.

D.

You can enable the edge port on SWC's GE0/0/2 connected to the terminal so that this port can quickly enter the forwarding state.

Buy Now
Questions 66

An enterprise administrator views the following details about a BGP route during routine O&M:

yaml

CopyEdit

display bgp routing-table 192.168.1.1

BGP local router ID: 10.1.1.1

Local AS number: 100

Paths: 2 available, 0 best, 0 select

BGP routing table entry information of 192.168.1.1/32:

From: 10.1.1.2 (10.1.1.2)

Route Duration: 00h01m31s

Relay IP Nexthop: 0.0.0.0

Relay IP Out-Interface: --

Original nexthop: 172.16.1.2

AS-path: 200, origin incomplete, MED 0, localpref 100, pref-val 0, internal, pre 255, invalid for IP unreachable

Not advertised to any peer yet

Which of the following statements are true about the BGP route?

Options:

A.

The original next hop of the route is 172.16.1.2.

B.

The local BGP router ID is 10.1.1.1.

C.

The local AS number is 100.

D.

The route is preferentially selected because its Local_Pref has a higher priority.

Buy Now
Questions 67

A network entity title consists of an area address and a system ID. It is a special NSAP (the SEL has a fixed value of 00) and is mainly used for route calculation.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 68

Which of the following LSAs are advertised only within a single area?

Options:

A.

Network LSA

B.

Router LSA

C.

Summary LSA

D.

AS External LSA

Buy Now
Questions 69

On an OSPF network, one router with P2P as the network type is directly connected to another router with P2MP as the network type. If the Hello intervals on the two routers are changed to be the same, neighbor relationship establishment and LSDB synchronization are not affected.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 70

Which of the following statements regarding the LSA age field are true?

Options:

A.

The unit of this field is seconds. In a LSDB, the LS age of a LSA increases with time.

B.

If the LS age of a LSA has reached the LSRefreshTime (30 minutes), any router can regenerate an instance of this LSA again.

C.

The unit of this field is seconds. In a LSDB, the LS age of a LSA decreases with time.

D.

If the LS age of a LSA has reached the LSRefreshTime (30 minutes), the originator of this LSA needs to regenerate an instance of this LSA again.

Buy Now
Questions 71

Which of the following statements regarding an IP prefix are true?

Options:

A.

An IP prefix filter is used to filter IP address prefixes and cannot match an IP prefix number and a prefix length at the same time.

B.

An IP prefix filter cannot be used to filter data packets.

C.

An IP prefix filter is used to filter IP address prefixes and can match an IP prefix number and a prefix length at the same time.

D.

An IP prefix filter can be used to filter data packets.

Buy Now
Questions 72

By default, a router interface sends PIM Hello messages at an interval of __________ seconds.

Options:

Buy Now
Questions 73

After HSB is configured, the HSB channel fails to be established and cannot back up information on the active device to the standby device. What are the possible causes for this HSB function failure?

Options:

A.

The TCP channel is not established.

B.

The retransmission count and interval for HSB service packets are different on the two devices.

C.

The two ACs have the same priority.

D.

The source IP address and port number of the local end are different from the destination IP address and port number of the remote end.

Buy Now
Questions 74

A large number of routes typically exist in a BGP routing table, and transmitting such extensive routing information brings a heavy burden to a device. In order to address this problem, it is necessary to filter those routes to be advertised. You can configure a device to advertise only necessary routes or those that its peers require.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 75

A router performs a lookup in its FIB table for a packet. If the tunnel ID in the matching entry is 0, the packet needs to be forwarded through a tunnel, such as an MPLS tunnel.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 76

In VRRP networking, if VRRP is not configured to track an uplink interface and the uplink interface or link of the master device in a VRRP group fails, no switchover will be triggered. As a result, a traffic blackhole occurs.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 77

A company has a stack consisting of three switches that are running properly. The master switch restarts due to a fault. Given this, which of the following statements are true?

Options:

A.

Before the restart of the original master switch is complete, the original slave switch is specified as the new standby switch.

B.

After the original master switch restarts, it becomes the new master switch.

C.

After the original master switch restarts, the original standby switch becomes a new slave switch.

D.

Before the restart of the original master switch is complete, the original standby switch becomes the new master switch.

Buy Now
Questions 78

As shown in the following figure, a new AP is deployed In dual link MSB networking (load balancing mode). Which AC will the connect to?

Options:

A.

AC1

B.

Random access

C.

None

D.

AC2

Buy Now
Questions 79

On an IS-IS network, two directly connected routers establish a neighbor relationship through the three-way handshake mechanism by default, regardless of whether the network type is P2P or broadcast.

Options:

A.

TRUE

B.

FALSE

Buy Now
Exam Code: H12-821_V1.0
Exam Name: HCIP-Datacom-Core Technology V1.0
Last Update: Feb 27, 2025
Questions: 264
H12-821_V1.0 pdf

H12-821_V1.0 PDF

$29.75  $84.99
H12-821_V1.0 Engine

H12-821_V1.0 Testing Engine

$35  $99.99
H12-821_V1.0 PDF + Engine

H12-821_V1.0 PDF + Testing Engine

$47.25  $134.99