Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

H12-891_V1.0 HCIE-Datacom V1.0 Questions and Answers

Questions 4

If the PIM-SM protocol is running in a multicast network , you need to configure RP, and the configuration equation of RP is divided into dynamic RP and static RP. The following configuration description of the RP is correct (radio).

Options:

A.

When you configure Dynamic RP , you need to configure BSR as a backup of the RP.

B.

When you configure a static RP , you need to configure the BSR to advertise the RP information.

C.

When configuring a static RP, you need to specify the information for the RP on all PIM routers.

D.

When you configure Dynamic RP, you do not need to configure BSR.

Buy Now
Questions 5

The following statement about the NSSA area is correct (multiple choice).

Options:

A.

In the NSSA area where the OSPF neighbor sends hello packets, the N position 0, E within the option field Position 1

B.

The NSSA zone must automatically generate a default LSA to access the external network

C.

The NSSA zone generates a Category VII LSA to advertise external routing, and the FA address in the Category VII LSA acts to prevent loops

D.

In the OSPF neighbor in the NSSA region sends hello packets, position 1 within the option field , position E

Buy Now
Questions 6

As shown in the figure,

in the context of IPv4 and IPv6, the SEL field in the NET address of the ISIS is always valued as 00?

Options:

A.

True

B.

False

Buy Now
Questions 7

Regarding the description of the security level of the configured firewall security zone, the error is ?

Options:

A.

Two security zones are not allowed to configure the same security level in the same system

B.

Once the security level is set, it is not allowed to change

C.

You can only set the security level for a custom security zone

D.

For newly created security zones, the system defaults to a security level of 1

Buy Now
Questions 8

Regarding BGP route filtering, the following description is wrong?

Options:

A.

The filtering relationship between Route-Policy's noodes is "or." ", that is, as long as a node filter is passed, it can pass through the Route-policyo

B.

For routes published locally, configure a routing policy that takes effect before the route is added to the BGP route table.

C.

In the same node of Route-Policy, multiple if-match clauses for different attributes are "or" relationships.

D.

When a route to a BGP peer is received, a routing policy is enforced to filter unwanted BGP routes that are not added to the local BGP routing table.

Buy Now
Questions 9

WRED is configured on the newly deployed router HW. What is the correct description of the WRED features below? (Multiple choice questions).

Options:

A.

WRED can set different drop thresholds and packet loss rates for packets of different priority

B.

When the flow exceeds the minimum threshold, WRED begins to discard all inlet flow (tail drop)

C.

Avoid global synchronization by selectively dropping multiple TCP streams

D.

Low-bandwidth traffic is easier to drop than high-bandwidth traffic

Buy Now
Questions 10

What does RT do in MPLS VPN? Multiple choice questions).

Options:

A.

Allows the peer PE to decide which VPNv4 routes to import into a particular VRF

B.

Allows peer PE to decide which VPNv4 routes not to import into a particular VRF

C.

Allows the peer CE to decide which VPNv4 routes to import into a particular VRF

D.

Allows the peer CE to decide which VPNv4 routes not to import into a particular VRF

Buy Now
Questions 11

Between two directly attached devices that have established an IBGP neighbor, execute the shutdown command to close the interface of one of the devices. The BGP connection is not immediately disconnected.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 12

What of the following actions can enable fast failure detection on multicast networks?

Options:

A.

Shorten the Holdtime of Join/Prune messages

B.

Reduce the interval at which the interface sends Hello messages

C.

A PIM BFD session is established between neighbors

D.

Reduce the interval between sending Join/Prune messages

Buy Now
Questions 13

The Serial Number field of LS is used to detect expired and duplicate LSAs. The field is a 32bt signed integer, so the small serial number is Ox8000000

Options:

A.

True

B.

False

Buy Now
Questions 14

In the use of the CP protocol, the following description is correct?

Options:

A.

The Eth-Trunk interface can be avoided by frequent oscillation interfaceeth-trunkllacppreemptenablelacppreemptdelaydelay-time by following command

B.

Source A address can be configured for load sharing in an enabled link aggregation group with the following command: interface eth-trunk 110ad-balance src-dst-ip

C.

A member interface can be removed from an enabled link aggregation group with the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 undo eth-trunk 1 interfaceGigabitEthernet0/0/1undoshutdown

D.

The member interface can be joined in the link aggregation group by enabling the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 trunkport

Buy Now
Questions 15

As shown in the figure, SWA, SWB runs the PSTP protocol, and Cost of Path remains the default without modification, so the following statement is correct

Options:

A.

GEO/0/1 on ASWB is Alternative port

B.

GE0/0/2 on SWB is Alternative port

C.

SWA On GEO/0/1 for backup port

D.

SWB will become the root bridge

Buy Now
Questions 16

Which of the following VPN technologies may have two IP message headers in one message?

Options:

A.

GOES

B.

SSL VPN

C.

IPsec VPN

D.

L2TP

Buy Now
Questions 17

Which of the following is the benefit of VLAN aggregation?

Options:

A.

Implements isolation of broadcast domains between Sub-VLANs

B.

Reduce the waste of IP addresses

C.

Increased number of available VLANs

D.

Increased flexibility in addressing

Buy Now
Questions 18

Configuration under a certain interface: isis timer hello 5 level-2, the following statement is correct?

Options:

A.

The hello packets sent at level-1 and Leve1-2 are both 5s

B.

The hello packets sent at level-1 are sent at 5s interval

C.

The level-2 hello packet send interval is 5s

D.

The CSNP packet sending interval for this interface Level-2 is 5S

Buy Now
Questions 19

In order to configure M4, you first need to define a RADIUS server, which is defined as follows:

Huawei]radius-server template EXAM

[Huawei-radius-EXAM]radius-servershared-key cipher HUAwei123(Huawei-radius-EXAM]radus-server authentication 10766661812(Huawei-radius-

EXAM]radius-server authorization 1076666

1812[Huawei-radius-EXAM]radius-server accounting 10766661813 (Huawei-radius EXAM]radius-server retransmit 2

Options:

A.

True

B.

False

Buy Now
Questions 20

Which of the following IEEE standards is specific to Gigabit Ethernet?

Options:

A.

8023z

B.

8023ab

C.

8023ad

D.

8023af

Buy Now
Questions 21

Regarding BGP MED, which of the following descriptions is correct?

Options:

A.

In the BGP routing rules, MED has a lower priority than AS Path, Praferred-value, Local-Preference, etc Origin

B.

The default value for the B. BGP routing MED is 0

C.

By default, if there is no MED value in the route attribute, it is processed by 0 If the bestroute med-none-as-maximum command is configured, MED is processed as the maximum 4294967295

D.

By default, BGP routing rules can MED comparison of routes from different autonomous systems

Buy Now
Questions 22

What parameters can the DHCPv6 server assign to DHCPv6 clients?

Options:

A.

SNTP server address

B.

IPv6 address/prefix

C.

Gateway address

D.

DNS server address

Buy Now
Questions 23

Regarding the site in the BGP/MPLSIP VPN network architecture, the following description is correct?

Options:

A.

Under no circumstances can different sites that belong to the same VPN use overlapping address spaces

B.

Two geographically separated networks must belong to different sites

C.

Terminals connected to the carrier network through the same CE may belong to different sites

D.

A site is a set of IP systems, and a network of hosts cannot be called site

Buy Now
Questions 24

Which of the following tools cannot be referenced directly by the If-match clause in Route-policy?

Options:

A.

Regular expression

B.

IP-prefix

C.

AS-path-filter

D.

Community-filt

Buy Now
Questions 25

In an HWIP multicast network, where multiple sources exist and each source has several receivers, which protocol allows source-to-RP traffic and RP-to-receiver traffic to share the same tree 2?

Options:

A.

MOSPF

B.

PIM SM

C.

DVMRP

D.

56768GZliuji

E.

PIM-DM

Buy Now
Questions 26

The duplicate address detection feature for NDP in the following description is incorrect?

Options:

A.

IPv6 unicast address is called a tentative address after it is assigned to an interface and before it is detected by duplicate addresses

B.

Duplicate address detection is implemented via RS and RA messages

C.

IPv6 duplicate address detection technology is similar to free ARP in IPv4

D.

The interface needs to perform duplicate address detection before enabling any of the unicast IPv6 addresses

Buy Now
Questions 27

When there are multiple rule rules for ACLs in VRP, which of the following statements is true regarding the order of matching? Single choice questions).

Options:

A.

By default, matching is based on the principle of "depth first"

B.

By default, matching occurs in the order in which the permit is matched first and denim later.

C.

By default, matching is made from smallest to largest according to the Rule-ID.

D.

There is only one matching order and cannot be modified.

Buy Now
Questions 28

Because BGP is an EGP routing protocol, BGP routing policies can only be deployed between EBGP neighbors, and routing policies between IBGP neighbors are not valid.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 29

Huawei's SDN controller using VXLAN technology is fixed?

Options:

A.

Agile Controller-Campus

B.

Agile Controller-WAN

C.

Agile Controller-DCN

Buy Now
Questions 30

What kind of scenario can use AS one path and one filter?

Options:

A.

Filter routes received from BGP neighbors based on the AS PATH attribute that the route carries. For example, the command peer x.X.x.x as path-filter import

B.

The apply clause in Routepolicy

C.

Filter routes sent to BGP neighbors based on the AS PATH attribute that the route carries. For example, the command peerx. X.x.x as path-filter export

D.

If-natch clause answer in Route-policy.

Buy Now
Questions 31

The following statement about the security alliance SA in IPSec is incorrect

Options:

A.

SA is uniquely identified by a triple that includes the security parametric reference SPI (Security Parameter Inder), the source IP address, and the security protocol number (AH or ESP)

B.

Use the display ipsec command to view the encryption algorithm used with another IPSec peer, the traffic of interest, and so on.

C.

IPSec only supports encrypting data using symmetric encryption algorithms.

D.

A two-way SA must exist between IPSec peers to establish an IPSec VPN connection

Buy Now
Questions 32

View the details of all VPN instances on a network device and the results are as follows, which of the following statements is wrong?( Multiple choice questions).

Options:

A.

The total number of instances that enable the IPv6 address family in the VPN configured on this side is 1 .

C:\Users\wk\Desktop\mudassar\Untitled.png

B.

VPN-Instance vpna does not receive VPN routes with an RT of 2:1.

C.

The GigabitEthernet 1/0/0 interface is tied to the VPN-Instance vpna

D.

The device assigns a label to each route of the VPN-Instance vpna.

Buy Now
Questions 33

During the LDPsession setup process, the active party first sends the Illitalization information to negotiate the parameters, and if the passive party does not accept the negotiation parameters, which of the following messages will be sent? <(Single select).)

Options:

A.

Hello Message

B.

Error Notification Message

C.

Keepalive Message

D.

Initialization Message

Buy Now
Questions 34

What messages does an NMS (Network Management Station) running SNMPv1 send to the agent?

Options:

A.

Trap,Get ? Set

B.

Get,Set ? Getnext

C.

Get,Set,Getnext ? GetBulk

D.

Get,Set ? GetBulk

E.

Get Trap

Buy Now
Questions 35

As shown in the figure, the PPP link between R1 and R2 is not in the same network segment, but the R1 and R2 direct connectors can communicate, and the Ethernet link cannot communicate under the same planning, why?

Options:

A.

The interconnect POS ports of R1 and R2 learn the 24-bit subnet route of each other's direct connection ports through IPCP

B.

The interconnect POS ports of R1 and R2 learn the 32-bit host route for each other's direct connections through IPCP

C.

The interconnect POS port of RI and R2, through LCP learns the MAC address of the opposite termination , does not need to use ARP to request the MAC address

D.

The data packets of the interconnect POS ports of R1 and R2 do not need to encapsulate ethernet headers and do not need to use ARP to request MAC addresses

Buy Now
Questions 36

Which of the following descriptions of MPLS header TTL are correct?

Options:

A.

Copy IPTIL value is handled in such a way that the LSR of the MPLS domain is hidden, which plays a certain security role

B.

Can prevent wireless circular forwarding of messages

C.

MPLS has two ways of handling TTL, one is that the IP packet copies the PTTL of the MPLS header hen it enters the MPLS network Value; Another is to set the TTL of the MPLS header to 255 at the entrance LER

D.

When copying TTL is disabled, tracert can see the LSR of the passing MPLS domain

Buy Now
Questions 37

MQC, like PBRā€”can only be called under the device's Layer 3 interface.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 38

The following description of the CHAP authentication function in the PPP protocol is correct?( Multiple choice questions).

Options:

A.

The user name must be configured under the authenticated party interface for CHAP authentication

B.

If the authenticator does not have a username configured, password

C.

can also be configured without the authenticated party interface Using the authentication sequence ID, random number, and key, a Hash value

D.

is calculated using the MD5 algorithm Three message interactions are required for authentication, and only the user name is transmitted on the network without the password

Buy Now
Questions 39

The RSTP protocol provides a variety of protection functions, such as when the edge port is configured as a protection state, the edge port receives the BPDU packet processing method;

Options:

A.

Directly discard the BPDU packet

B.

Close the port

C.

After parsing the BPDU message, the relevant information is obtained

D.

Forward BPDU packets as required

Buy Now
Questions 40

What check frames can IPSG set?

Options:

A.

Out of the interface

B.

MAC address

C.

IP address

D.

VLAN ID

Buy Now
Questions 41

In a shared network, what mechanism does PIM-SM use to prevent duplicate traffic?( Single choice questions).

Options:

A.

Register mechanism

B.

BSR/RP mechanism

C.

Assert mechanism

D.

Join/Prune mechanism

Buy Now
Questions 42

Protocols with TCP ports 443, 179, 137, 110, and 23 are, in order: radio

Options:

A.

Finger,DHCP Server,NetBios Name Server,POP3,TelnetB

B.

LDAP,SNMP,TFTP,POP3,Telnet

C.

HTTPS,SNMP,POP3,DNS ,Telnet

D.

HiPS,BGP, NetBios Name Server ,POP3,TelnetE. BGP,POP3,SNMP,TFTP,Teinet

Buy Now
Questions 43

As shown in the figure,

RI, R2 establishes an EBGP neighbor and turns on the BFD detection function, the following statement is correct

Options:

A.

Detection time for BFD packets for AR2 800ms

B.

R1 Detection time for BFD packets for 1280ms

C.

R1 Detection time for BFD packets The detection time for BFD packets for 660ms

D.

R2 is 600ms

Buy Now
Questions 44

You expect to deploy multicast video applications on your private, on-premises network. To achieve this, you need to have a private multicast IP address in your network . So which range of IP addresses can be used?( Single choice questions).

Options:

A.

239000-239255255255

B.

241.000-241.255255255

C.

224000-224255255255

D.

240000-254255255255 E. 226000-226255255255

Buy Now
Questions 45

NO: 322

The following description of MED, correct:

Options:

A.

MED default value is 100

B.

MED can only be passed within this AS

C.

MED is an optional non-transitional attribute

D.

MED The default value is 0

Buy Now
Questions 46

What information does the BGP Open message carry as follows?

Options:

A.

BGP Router ID

B.

Route attributes

C.

Local Autonomous System (AS) number

D.

Hold time

Buy Now
Questions 47

If the OSPP protocol is running in the network , after configuring the non-backbone area in the OSPP area as the Totally Stub region, the ABR router sends a message to Totally. The Stub region issues an LSA with an LS ID of 0000, and what type of LSA is the LAS to?

Options:

A.

LSA5

B.

LSA2

C.

LSA1

D.

LSA3

Buy Now
Questions 48

In VXLAN scenarios, what features can be turned on to reduce flooding of ARP messages between VTEPs?( Multiple select).

Options:

A.

Host Information Collection

B.

Local ARP agent

C.

port isolation

D.

ARP broadcast suppression

Buy Now
Questions 49

The following about BGP routing, describing the error, is ?

A, non-aggregate routes take precedence over aggregate routes

B. In PrefVal, Local_ Preference is equal to the case if the route is generated locally, IBGP Routing, the BGP preference for EBGP routing, is generated effectively referring to route priority.

C. See the following entry in the BGP routing table:* 172161.11/32 000010 0? Indicates that the route is available non-optimal

D. For next_hop unreachable routes when invalid routes, do not participate in the preferred.

Options:

Buy Now
Questions 50

What is the correct description of the scene shown in the following figure?

Options:

A.

R1 simultaneously exists level-1 and Level-2 LSDB

B.

R1 can ping the interface address of R2 loopback 0

C.

R1 has a route to R2 loopback 010022/32

D.

There is no neighbor relationship between R1 and R2

Buy Now
Questions 51

??? aggregate ipv4-address { mask/masklength }[as-set lattribute-policy route-policy-namel ldetail-suppressedlorigin-policy route-

in policy-name2[suppress3policy route-policy-name3], multiple parameters can be used to influence summary routes and their results. The correct description about the command is ?( Multiple choice questions).

Options:

A.

If As-set is configured, the A S_PATH of the aggregate route contains ass path information for all specific routes in case the route loop is blocked

B.

If Suppress-policy is configured, aggregate routes are also generated, and the if-match clause in Route-policy is used to pick suppressed detail routes. Detail routes that match Route-policy are still advertised to other BGP neighbors

C.

If Origin-policy is configured, only detail routes that match Route-policy can participate in aggregation

D.

If You configure The Interface-policy, you can change the properties of the aggregate route

Buy Now
Questions 52

The following statement about static VXLAN tunnel configuration is correct?

Options:

A.

A BD needs to create an NVE country, and when there are multiple BDs, multiple NVE interfaces must be created

B.

An NVE interface can be associated with multiple VNls, so you can create only one NVE interface when there are multiple BDs

C.

For a VXLAN tunnel, you need to create a corresponding NVE interface, in which you explicitly specify the source IP address and the destination IP address , so there are multiple VXLAN tunnels on the VTEP that must be vE interfaces

The destination address of the VXLAN tunnel is specified in the

D.

NVE interface, and multiple VXLAN tunnels can create only one NVE interface

Buy Now
Questions 53

Regarding the Stub region in the OSPF protocol , the following statement is correct.

Options:

A.

ASBR cannot exist in the Stub zone

B.

Virtual connections cannot traverse the Stub region.

C.

Injecting typeT LSA

D.

backbone areas that are not allowed in Stub regions cannot be configured as Stub regions.

Buy Now
Questions 54

What is the following correct for the process of registering the source-side DR with RP in PIM-SM?

Options:

A.

Encapsulated in the registered message is multicast service data

B.

RP sends a registration stop message as soon as it receives the registration message.

C.

Registered messages are used to build the RPT tree between source DR and RP

D.

Registered packets are multicast packets.

Buy Now
Questions 55

In an IPv6 network, two nodes A and B are neighbors to each other if Node A sends NS messages to Node B if node B is B After receiving the message, reply to the NA message, then view it on node A, what will the neighbor status be marked? (Single Choice Questions).

Options:

A.

Reachable

B.

Incomplete

C.

Stale

D.

Probe

Buy Now
Questions 56

A company network runs the OSPF protocol, an engineer in order to understand the OSPF mechanism in the network to perform packet capture operations, the following ospf message description is correct?

Options:

A.

LSUpdate message is sent only when an adjacency relationship is established

B.

LSUpdate messages synchronize the link state database by sending detailed LSA information

C.

The interface sends Hello packets as soon as it joins the OSPF area

D.

When an LS Update packet is received, the router must send an LSAck to acknowledge

Buy Now
Questions 57

Which of the following are single-packet attacks?

Options:

A.

Special control message attacks

B.

Scan Probe Attack

C.

DDos Attack

D.

Malformed Message Attack

Buy Now
Questions 58

As shown in the following figure, R1 and R2 establish a neighbor relationship with LeveL2, and the key configuration is as follows, so is the following route entry for R2 correct?

Options:

A.

0::/64 The router will appear in the IP routing table

B.

2022::/64 Routers appear in the IP routing table

C.

2019::/64 Routers appear in the IP routing table

D.

2021::/64 Routers appear in the IP routing table

Buy Now
Questions 59

s the following description of THE MUX VLA N in huawei switches correct?

Options:

A.

MUX VLAN ??Principal VI-AN ?Subordinate VI-AN ???Separate VLAN ? Isolate VLAN

B.

Each Separate VLAN can bind multiple Principal VLANs

C.

Under the same VLAN, muX VLANs can be mixed with SuperVLANs

D.

The Principal port can pass the answer to all ends within the MUX VLAN

Buy Now
Questions 60

You need to configure smart policy routing on the router to specify that specific traffic is forwarded through an interface. When policy-based routing is applied, what are the two most typical types of information that can be used to forward traffic along a particular path?

Options:

A.

The TTL and source IP address of the packet

B.

Source A address and the Layer 2 source address

C.

Source IP address and specific protocol (such as FTP, HTTP, etc.)

D.

Service type header and message length

Buy Now
Questions 61

There is an As-path-filter.ip as-path-filter 1 permit*(100l400) $, which As-path-filter can match which of the following AS_PATH Attribute?( Confirmed).

Options:

A.

300 4200

B.

1234 1400

C.

3100

D.

100

Buy Now
Questions 62

The following description of the characteristics of multi-instance CE is ?

Options:

A.

Since the MCE device is already bound to the VPN, there is no need to bind the VPN on the PE connected to the MCE device

B.

The MCE device can determine the source of the routing information according to the interface that receives the routing information, and maintain it in the route forwarding table of the corresponding VP.

C.

MCE is implemented by creating their own routing forwarding tables for different VPNs on the MCE device and binding to the corresponding interface o

D.

Configuring MCE enables a CE to connect to multiple VPNs at the same time, which can not only completely isolate the service between different VPN users, but also reduce the input cost of network equipment.

Buy Now
Questions 63

The following statement about the five types of LSAs in OSPF is used to pass external routes, and the following statement about the five types of LSAs is incorrect and flooding in

Options:

A.

OSPF networks in non-Stub/NSSA regions

B.

Routers in the same zone as ASBR can calculate external routes by chanting the LSA and the five types of ISAs in the region

C.

The FA address is included in the five types of LSAs, and the FA address is 000 only as reserved for no practical purpose

D.

Configuring the appropriate filtering policy on the ABR or ASBR can filter five types of LSAs

Buy Now
Questions 64

Is the following description of ospf virtual links correct?

Options:

A.

A virtual connection can be established in any area, after which it itself belongs to the region

B.

The virtual connection ip is used as the link address

C.

Virtual links can be used to solve the problem of zone 0 being segmented

D.

The cost of a virtual connection is zero and is the optimal link

Buy Now
Questions 65

BGP authentication can prevent illegal routers from establishing neighbors with BGP routers, BGP authentication can be divided into MD5 authentication and Keychain authentication, please ask which BGP messages will be carried below BGPKeychain authentication information?( Multiple select).

Options:

A.

Update

B.

Notification

C.

Keeplive

D.

Open

Buy Now
Questions 66

As shown in the topology diagram, all interfaces of the router in the figure are enabled with the ISIS protocol, and the following statement is correct.

Options:

A.

If the RI's Ethernet0/0/0 interface goes down, R2 becomes the master device

B.

If the Ri's Ethernet0/0/1 interface goes down, R2 becomes the master device

C.

If R3's G E0/0/0 interface goes down, R2 becomes the master device

D.

If R3's Ethernet0/0/0 interface goes down, then R2 becomes the master device

Buy Now
Questions 67

What is the field that the IPv6 header has similar to the IPv4 header "Type of Service" field?

Options:

A.

Version

B.

Flow Label

C.

Next Header

D.

Traffic Class

Buy Now
Questions 68

As shown in the figure, Department A of Branch 1 has access to the Internet, but Department B can only use an encrypted VP to access headquarters resources, and NAT can be configured on the egress device The policy enables Department A to access the Internet, while the PSecVPN (ESP Protocol) + Tunnel mode method configured for Department B gives it access to headquarters.

B. Right

C. Wrong

Options:

Buy Now
Questions 69

The following is a description of how BFD sessions are established, which is the wrong one

Options:

A.

The system distinguishes between static BFD sessions and dynamic BPD sessions by dividing the identifier area Dynamically assign this landmark identifier

B.

BFD sessions can only be established dynamically

C.

Static configuration of BFD session refers to manual configuration of BFD session parameters through the command line, including local identifiers and remote identifiers

Buy Now
Questions 70

Regular expressions can be used for Community-filter and AS-path-filter definition attribute types for route filtering.

Options:

A.

True

B.

False

Buy Now
Questions 71

The following statement about IS-IS (IPv6) is correct?

Options:

A.

In order to support the processing and calculation of IPv6 routes, IS-IS has added TLV232 and 236

B.

By default, IS-IS has the multi-topology feature turned on

C.

IS-IS works at the data link layer and only needs to add a new TLV to support IPv6

D.

In order to support the processing and calculation of IPv6 routes, IS-IS has added NLPID to the 129 TLV

Buy Now
Questions 72

The correct statement about the VRRP protocol version is ?

Options:

A.

VRRPv2 is only available for IPv4

B.

VRRPv3 does not support authentication

C.

VRRPv2 supports authentication

D.

VRRPv3 is only available for IPv6

Buy Now
Questions 73

If multiple candidate RPs are configured in a multicast group, which of the following parameters does the RP that elect the group from multiple candidate RPs need to be compared?

Options:

A.

The mask length of the group range for the C-RP service that matches the group address that the user joined

B.

C-RP priority

C.

The IP address of the C. C-RP interface Number of

D.

C-RP interface

Buy Now
Questions 74

Is the following correct statement for the VXLAN message?

Options:

A.

The outer destination IP address is the IP address of the VTEP at the far end of the VXLAN tunnel

B.

The source UDP port number is 4789

C.

The destination UDP port number is 4789

D.

VNI has 24 T bits to distinguish the VIAN segment

Buy Now
Questions 75

The router is running both OSPFv3 and ISIS, and the OSPFv3 route needs to be introduced to ISIS, which of the following ingestion configurations is correct:( Multiple choice questions).

Options:

A.

Huawel ias 1 ltuawei-i- isHeveleve!. l Huave-s-1 networkenity 47001.0000020 Hawe -sis-1 ipv6enabletopolog standard Htuawer is-] pob impot.

B.

(Huawei isis l Huawei-si-1 s-levelve!-l Huavei- ti.-1] networkentiy

4 .001.00001. Huawei sis pob enable topogy s andard Hhuawelitis ]l p6 importroute ospfv3 1 [Hu

C.

[Huawei] sis 1 [Huawel-isis-1] networkentity47001.000000200 Huawe-ss 1 ipb6enable topologist standard Huawei is l p6 importroue esgp.31lese! [Huaweisis-1] quit [Huawei

D.

HuaweJ IsIS

[Huaweij isis 1 Huavei-isis-1]networkentity470001.000000020Huawei-sis- 1limpotroueosph31 ltuowe.is- ut tuawl sph 1 fhuwf spol Jronea d2222 [Huawei) isis 1 Huawe-sis-1] is level level-1 [Huavei-sis-1 etworkentity 47001.0000020 Huawel-d.-1[impotroteosph-1 le e. [tuawelts a ut ltunweospfv3 1 [Huawei

Buy Now
Questions 76

There is a concept of FEC-Forwarding Equivalence Class in MPLS, so what criteria can FEC not allocate based on?

Options:

A.

Application Protocol

B.

Class of Service

C.

Destination Address

D.

Fragment offset

Buy Now
Questions 77

As shown in the figure, all routing diagrams declare the loopback address in OSPF, where R2 does not return the address is 10022/32, it is advisable to tell AraD. The R3 loopback address is 10033/321001.1.0/24 external routing, in order to reduce the burden on the RI router, the configuration command is as follows:( Multiple choice questions)[Rlip ip-prefix 1 permit 001.1.024 [RLIJospfl [RL-ospf-1]filter-policy ip-prefix l import please ask the following description is correct?

Options:

A.

In the P route table of router R1, there is no external route to 1001.1.0/24

B.

In the IP routing table of router R1, there is an external route to 1001.1.0/24

C.

In the IP routing table of router R1, there is no loopback route to R2

D.

In the IP routing table of router RI, there is no loopback route to R3

Buy Now
Questions 78

Off-stem cross-domain VPN-Option B scenario, the following description is incorrect?

Options:

A.

During the packet forwarding process, it is necessary to exchange the VPN's private network LSP on the

B.

two ASBRs IP-EBGP neighbor relationships.

C.

The cross-domain VPN-Option B scheme is not limited by the number of interconnection links between ASBRs

D.

The outer layer tag is exchanged between two ASBRs to vpnV4 routes.

Buy Now
Questions 79

If a Huawei switch runs the RSTP protocol, when will the BPDUs on a port on the switch be aged?

Options:

A.

On the interface, RSTP does not age BPDU

B.

After more than 6 seconds

C.

After Ma ge times out

D.

After Hello time times out

E.

after the Forward Delay timeout

Buy Now
Questions 80

Command IP as-path-filter1 permit^12,*74$ can match to which AS_PSTH?

Options:

A.

AS_PATH(321122374)

B.

AS PATH Q236217 ? 2374)

C.

AS_PATH(125 328 74 23)

D.

AS_PATH(32127423)

Buy Now
Questions 81

Router RL runs the OSPF protocol and uses the display ip routing-tabe command to view the router RL's routing table , the following information about OSPF in the routing table is described correctly as ?

Options:

A.

In the routing table, the routing table entries identified by the OSPF identifier can only be learned through the 3 types of LSAs to

B.

In the routing table, used The 'OSPF' identifier identifies a route table entry that can only pass a Type 1 LSA

C.

In the routing table, the routing table entries identified with the 'OSPF identifier' can be learned through the 1/2/3/5 LSA to

D.

In the routing table, Route table entries identified with the "O_ASE identifier can only be learned through routing introduction

Buy Now
Questions 82

As shown in the figure, all routers declare the loopback address in OSPF where the R storage does not return address is 1022 [2 declares 10033[ at the Ael.R3 ring E port[ 92101102A External routing in order to win light R win L away from the negative cut.

The noodle command is as follows: (multi-select) [BIppprefixt permlt 1001.1.024 [R1] ospf1

Options:

A.

router RI of the IP routing table, there is no external route to 1001.1.0/24 of

B.

router R1 In the IP route table, there is an external route to 1001.1.0/24

C.

In the IP routing table of Router R1, there is no loopback route to

D.

In the IP routing table of Router R1, there is no loopback route to R3

Buy Now
Questions 83

To implement the traffic filtering function, you can use trapp-filter or MQC, which can be called in more views than traffic-filter

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 84

Which timer for spanning tree protocol dictates how often to see the root bridge send configuration BPDUs?

Options:

A.

forwarding delay timer

B.

STP timer

C.

HOLD timer

D.

Maxage timer

E.

Hello timer

Buy Now
Questions 85

To build a loopless Layer 2 network, which of the following schemes is optimal?( Single Choice)

Options:

A.

Stacking + Link Aggregation

B.

TRILL+MSTP

C.

??+MSTP

D.

Link Collection + MSTP

Buy Now
Questions 86

What messages can Huawei equipment suppress traffic for?

Options:

A.

Multicast

B.

Known unicast

C.

Broadcast

D.

Unknown unicast

Buy Now
Questions 87

When you troubleshoot a local area network with Huawei equipment deployed, you find that there are a large number of unicast frames with unknown source AC addresses in the local area network . A large number of unknown source MAC addresses single-plug frames can cause the switch the biggest danger is ?

Options:

A.

Memory that occupies the cache ton

B.

Increases the power consumption of the power supply

C.

Consumes a TCAM table entry

D.

Consume the available bandwidth

E.

Consume the MAC address table entry available in the system

Buy Now
Questions 88

The following statement about RSTP root protection is correct?

Options:

A.

Turning on root protection on the root port takes effect

B.

The port that turns on the root protection receives the RST BDPU with a higher priority and will enter the error-down state

C.

It is recommended that you turn it on on a switch that is at the edge of the network

D.

After opening the root-protected port and receiving the RSTBPDU with a higher priority, if it does not continue to receive the RSTBPDU with a higher priority for a period of time, it will return to the normal forwarding state

Buy Now
Questions 89

Which SNMP message type sent to NMS reports events that are reliable? ( Single choice questions).

Options:

A.

Inform

B.

Get

C.

Response

D.

Trap

E.

Get Bulk

Buy Now
Questions 90

ICMPv6 has two types: Error Messages and Information Messages.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 91

As a network administrator, which of the following protocols can I use for network device configuration?

Options:

A.

SSH

B.

NETCONF

C.

LLDP

D.

SNMP

Buy Now
Exam Code: H12-891_V1.0
Exam Name: HCIE-Datacom V1.0
Last Update: Nov 24, 2024
Questions: 610
H12-891_V1.0 pdf

H12-891_V1.0 PDF

$25.5  $84.99
H12-891_V1.0 Engine

H12-891_V1.0 Testing Engine

$30  $99.99
H12-891_V1.0 PDF + Engine

H12-891_V1.0 PDF + Testing Engine

$40.5  $134.99