Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

H12-891_V1.0 HCIE-Datacom V1.0 Questions and Answers

Questions 4

During the configuration of L3VPNv4 over SRv6 BE, if an RR is deployed in the SR domain, which command must be run on the RR to ensure that the PEs at both ends can correctly learn VPNv4 routes?

Options:

Buy Now
Questions 5

Which of the following statements does not cause the flapping of a VRRP group?

Options:

A.

Too small interval between Advertisement packet transmissions

B.

Inconsistent preemption delay settings

C.

Packet loss on an interface of the backup device

D.

Flapping on the link transmitting VRRP Advertisement packets

Buy Now
Questions 6

As shown in the figure, PE1 establishes an EVPN peer relationship with each of PE2 and PE3. When the network is initialized, CE1 sends an ARP request packet.

Which of the following statements are correct about how a PE processes the packet?

Options:

A.

When forwarding the packet to PE3, PE1 needs to add the BUM traffic label allocated by PE3 to the packet.

B.

PE1 sends a MAC/IP advertisement route carrying the MAC address of CE1.

C.

PE2 forwards the packet to CE1.

D.

PE3 forwards the packet to CE1.

Buy Now
Questions 7

Which of the following user logout modes are supported by 802.1X authentication?

Options:

A.

An authentication server forces a user to log out.

B.

A user logs out manually.

C.

An access device forces a user to log out.

D.

An accounting server forces a user to log out.

Buy Now
Questions 8

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, run the command on the VTEP to view BGP EVPN routes. The route entries shown in the following figure are displayed. Which of the following statements about these routing entries are correct?

Network (EthTagId/IP Prefix/IP PrefixLen)

NextHop

*>i 0:172.16.2.0:24 1.1.1.2

*>i 0:172.16.13.0:24 1.1.1.2

*>i 0:192.168.122.0:30 1.1.1.2

Options:

A.

These routes are Type 5 routes and carry network segment or mask information.

B.

These routes are Type 2 routes and carry host IP addresses.

C.

These routes carry the L2VNI.

D.

These routes carry the L3VNI.

Buy Now
Questions 9

Network Admission Control (NAC) needs to be deployed on the network shown in the figure. Drag a proper authentication mode to each authentication point.

Options:

Buy Now
Questions 10

An engineer often remotely logs in to the device to check the device status. The engineer can use the Python Paramiko and telnetlib libraries to implement automatic remote login through Python scripts. The remote login implemented using telnetlib is more secure.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 11

In the firewall hot standby scenario, in which of the following conditions will the local device proactively send VGMP packets?

Options:

A.

Hot standby being disabled

B.

Priority increase

C.

Link detection packet timeout

D.

Hot standby being enabled

Buy Now
Questions 12

In the Huawei SD-WAN Solution, which of the following routing protocols is used to advertise VPN routes between CPEs?

Options:

A.

RIP

B.

OSPF

C.

IS-IS

D.

BGP

Buy Now
Questions 13

An SRLB is a set of user-specified local labels reserved for SR-MPLS. These labels are locally configured and have only local significance. Therefore, they are not advertised through the IGP.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 14

What can be determined from the following figure?

display ipv6 routing-table protocol isis

Public Routing Table : ISIS

Summary Count: 6

ISIS Routing Table's Status : < Active >

Summary Count: 6

Destination : 3000:FDEA::4

NextHop : FE80::2E0:FCFF:FE98:2577

Cost : 20

Interface : GigabitEthernet0/0/1

PrefixLength : 128

Preference : 15

Protocol : ISIS-L2

Flags : D

Options:

A.

R1 has six IS-IS IPv6 routes.

B.

R1 does not have IS-IS IPv6 routes.

C.

IS-IS IPv6 must have been enabled on GigabitEthernet0/0/1 of R1.

D.

R1 is not a Level-1 device.

Buy Now
Questions 15

The ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is _____ IRB forwarding. (Capitalize the first letter.)

Options:

Buy Now
Questions 16

During the evolution from OSPFv2 to OSPFv3, LSA formats and functions remain unchanged, except that the network layer addresses in LSAs are changed from IPv4 to IPv6.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 17

Python Paramiko implements the SSH protocol. In the Python Paramiko module, which of the following classes is used to create SFTP sessions and perform remote file operations?

Options:

A.

Packetizer class

B.

SFTPClient class

C.

Channel class

D.

Transport class

Buy Now
Questions 18

Which of the following statements about static VXLAN tunnel configuration are correct?

Options:

A.

On an NVE interface, the destination address of a VXLAN tunnel is specified based on the address in the ingress replication list. You can create one NVE interface for multiple VXLAN tunnels.

B.

An NVE interface can be associated with multiple VNIs. Therefore, you can create one NVE interface when there are multiple BDs.

C.

One NVE interface must be created for each VXLAN tunnel, and the source and destination IP addresses must be specified for the NVE interface. Therefore, the number of NVE interfaces is the same as the number of VXLAN tunnels on the VTEP.

D.

One NVE interface must be created for each BD. If there are multiple BDs, multiple NVE interfaces must be created.

Buy Now
Questions 19

K company has two types of network services: UDP-based real-time video streaming services and TCP-based FTP download services. The company's network administrator often receives complaints that the FTP download speed is slow or unstable. What are the possible causes?

Options:

A.

The device uses the tail drop technology. As a result, global TCP synchronization affects the FTP rate.

B.

The device performs PQ scheduling for FTP services and WFQ scheduling for video services. As a result, the FTP service bandwidth is preempted.

C.

The device limits the FTP traffic rate to a small value.

D.

The video service has a higher priority and preempts the bandwidth of the FTP service.

Buy Now
Questions 20

What can be determined from the following figure?

Options:

A.

R3 must be a Level-2 device.

B.

The device role of R3 cannot be determined.

C.

R3 must be a Level-1-2 device.

D.

R3 must be a Level-1 device.

Buy Now
Questions 21

To obtain the token ID of iMaster NCE, you need to send an HTTP request using the following Python code to invoke an iMaster NCE RESTful API:

Which of the following statements is incorrect?

Options:

A.

You can run print(r.json()) to display the response message sent from the server.

B.

Token resources are located at https://139.9.213.72:18002/controller/v2/tokens.

C.

The HTTP request uses the GET method to query the token value.

D.

The request body is in JSON format.

Buy Now
Questions 22

In the figure, SR-MPLS is enabled on R1, R2, and R3. The SRGB (Segment Routing Global Block) range on R3 is from 20000 to 21000, and the prefix SID index configured on the loopback1 interface of R3 is 30.

In this case, the MPLS label corresponding to the loopback1 interface of R3 is _____.

(Enter an Arabic numeral without symbols.)

Options:

Buy Now
Questions 23

At the NETCONF content layer, the <config> operation may contain an operation attribute, which is used to specify an operation type for configuration data. Which of the following operation attributes are supported?

Options:

A.

create: The configuration data identified by the element that contains this attribute is added to the configuration datastore only if the configuration data does not already exist in the configuration datastore. If it already exists in the configuration datastore, with the value being data-exists is returned.

B.

delete: The configuration data identified by the element that contains this attribute is deleted from the configuration datastore. If the configuration data does not exist in the configuration datastore, a deletion success message is returned.

C.

merge: The configuration data identified by the element that contains this attribute is modified if the configuration data already exists in the configuration datastore. If not, the configuration data is created in the datastore.

D.

remove: The configuration data identified by the element that contains this attribute is deleted from the configuration datastore. If the configuration data does not exist in the configuration datastore, a deletion success message is returned.

Buy Now
Questions 24

Which of the following statements is incorrect about Authentication Header (AH)?

Options:

A.

AH provides packet encryption.

B.

AH provides data origin authentication.

C.

AH provides anti-replay protection.

D.

AH provides data integrity authentication.

Buy Now
Questions 25

In Huawei SD-WAN Solution, which of the following tunneling technologies is used to establish data channels?

Options:

A.

WLAN

B.

IPsec

C.

MPLS

D.

GRE over IPsec

Buy Now
Questions 26

OSPF is a mature protocol and is unlikely to have route computation errors in a regular networking environment under correct configurations. Which of the following statements are correct about the possible causes preventing an OSPF neighbor relationship from entering Full state?

Options:

A.

A link works abnormally.

B.

The OSPF network types on both ends of the link are inconsistent.

C.

The router IDs of neighbors are the same.

D.

The OSPF MTU values of interfaces on both ends of the link are different.

Buy Now
Questions 27

To allow only authorized users (users who obtain IP addresses through authorized DHCP servers or use specified static IP addresses) to access the network shown in the figure, which of the following solutions can be used?

Options:

A.

DAI + Port Security

B.

DHCP Snooping + IPSG

C.

DHCP Snooping + DAI

D.

DAI + IPSG

Buy Now
Questions 28

MPLS supports forwarding equivalence class (FEC). Which of the following cannot be used as an FEC allocation standard?

Options:

A.

Fragment offset

B.

Application protocol

C.

Destination address

D.

Class of Service (CoS)

Buy Now
Questions 29

The NETCONF content layer contains device configuration data.

Which of the following statements are correct about the following NETCONF configuration?

merge

rollback-on-error

10

0

Options:

A.

The NETCONF operation is performed to load the configuration data to the startup configuration datastore.

B.

The Huawei-YANG model is used.

C.

VLAN 10 is created on the target device.

D.

The operation contains an operation attribute so that the modified data is merged.

Buy Now
Questions 30

Which of the following commands is used to adjust the cost of an IS-IS interface?

Options:

A.

isis circuit-type

B.

isis timer hello

C.

isis circuit-level

D.

isis cost

Buy Now
Questions 31

NAFTIR policing can only be applied to the inbound direction. Its purpose is to monitor the traffic entering the device and ensure that the upstream device does not unnecessarily consume network resources.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 32

An HTTP request line consists of three fields. Select the fields to form a complete HTTP request message.

Options:

Buy Now
Questions 33

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following fields is not carried in BGP EVPN Type 2 routes?

Options:

A.

IP Prefix

B.

IP Address

C.

L3VNI

D.

L2VNI

Buy Now
Questions 34

In DU label advertisement mode, if the liberal label retention mode is used, the device reserves labels received from all the LDP peers regardless of whether the LDP peer is the optimal next hop for reaching the destination network.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 35

In SRv6, each time a packet passes through an SRv6 endpoint node, the Segments Left field value decrements by 1, and the IPv6 DA changes.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 36

An O&M platform mainly provides unified monitoring and performance management for network devices. Which of the following is NOT device monitoring data?

Options:

A.

Management-plane data

B.

Data-plane data

C.

Control-plane data

D.

Monitoring-plane data

Buy Now
Questions 37

IPsec SAs can be established in either manual mode or IKE auto-negotiation mode. Which of the following statements about the two modes is incorrect?

Options:

A.

The lifetime of an SA established in IKE auto-negotiation mode is controlled by the lifetime parameters configured on both ends of the tunnel.

B.

In manual mode, all parameters (including encryption and authentication keys) required for establishing an IPsec SA need to be manually configured.

C.

In IKE auto-negotiation mode, the encryption and authentication keys required for establishing an SA are generated using the DH algorithm.

D.

SAs established in both manual and IKE auto-negotiation modes can be dynamically updated.

Buy Now
Questions 38

An LSR (Label Switching Router) supports various label retention modes. Which of the following statements regarding the liberal mode are correct?

Options:

A.

An LSR retains labels from a neighboring LSR only when the neighbor is its next hop.

B.

This label retention mode saves memory and label space.

C.

An LSR reserves all labels distributed by its neighbor.

D.

The liberal mode requires more memory and label space.

Buy Now
Questions 39

In Huawei SD-WAN Solution, which of the following tunneling technologies is used to establish data channels?

Options:

A.

IPsec

B.

GRE over IPsec

C.

VXLAN

D.

MPLS

Buy Now
Questions 40

When a client invokes the iMaster NCE-Campus RESTful API, it sends an HTTP request. The server then returns the status code 401.

Which of the following errors has occurred?

Options:

A.

The service is unavailable.

B.

Access denied.

C.

The requested resource does not exist.

D.

Unauthorized.

Buy Now
Questions 41

On a campus network, iMaster NCE-Campus is used to deploy two VNs (Virtual Networks): R&D VN and Marketing VN. Users in these two VNs belong to two separate security groups.

The campus network requires R&D personnel and sales personnel to communicate with each other. To meet this requirement, which of the following tasks does a network administrator need to perform?

Options:

A.

Deploy network service resources.

B.

Deploy a policy control matrix.

C.

Configure inter-VN communication.

D.

Deploy an external network.

Buy Now
Questions 42

MPLS implements data forwarding based on two different planes. Which of the following statements regarding the forwarding mechanism are correct?

Options:

A.

After an IP packet enters an MPLS domain, the MPLS device forwards the packet based on FIB table queries.

B.

If the tunnel ID is 0x0, the MPLS forwarding process starts.

C.

The system automatically assigns an ID to the upper-layer application that uses a tunnel. This ID is also called the tunnel ID.

D.

If the tunnel ID is not 0x0, the normal IP forwarding process starts.

Buy Now
Questions 43

Flavors are additional behaviors defined to enhance the End series instructions in SRv6. Which of the following End instructions can the PSP flavor be attached to?

Options:

A.

End.X

B.

End.BM

C.

End.T

D.

End

Buy Now
Questions 44

There are multiple SR-MPLS TE tunnel protection mechanisms. FRR (Fast Reroute) constructs a virtual node to convert multiple identical route advertisement nodes into a single route advertisement node, and then computes the backup next hop of the virtual node based on the TI-LFA algorithm. In this way, traffic can be quickly switched when a fault occurs.

What is the name of this protection mechanism?

Options:

Buy Now
Questions 45

A network administrator runs the display telemetry subscription command on a device to check telemetry subscription information. The command output is as follows:

[~CE]display telemetry subscription

Sub-name : Sub1

Sensor group:

Sensor-name Sample-interval(ms) State

Sensor1 1000 RESOLVED

Destination group:

Dest-name Dest-IP Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20000 RESOLVED - GRPC

Sub-state : PASSIVE

Total subscription number is : 1

Which of the following statements is incorrect?

Options:

A.

The subscription name is Sub1.

B.

The IP address of the device is 192.168.56.1.

C.

The subscription mode is static subscription.

D.

The device sends sampled data every second.

Buy Now
Questions 46

Which of the following is the type of northbound API used by iMaster NCE-WAN?

Options:

A.

NETCONF

B.

RESTful

C.

CLI

D.

SNMP

Buy Now
Questions 47

The on-premise mode is recommended for controller deployment on small and midsize campus networks.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 48

In a scenario where SR Policies are dynamically established through the controller, which of the following statements about the SR Policy solution architecture is incorrect?

Options:

A.

The controller uses NETCONF to deliver configurations such as service interfaces and routing policies.

B.

The controller uses BGP-LS to collect tunnel topology information and computes SR Policy paths.

C.

The controller uses telemetry to deliver information such as SRv6 SIDs to construct SID entries.

D.

The controller uses BGP IPv6 SR Policy to deliver SR Policy information, such as the color, headend, and endpoint information.

Buy Now
Questions 49

Which of the following inter-AS MPLS L3VPN solutions needs ASBRs to transmit VPNv4 routes?

Options:

A.

Option C

B.

Option B

C.

Option A

D.

Option D

Buy Now
Questions 50

When static IPsec VPN is used for WAN interconnection in the Huawei CloudCampus Solution, the AP, Router, and ____ can be used as egress devices.

Options:

Buy Now
Questions 51

If an engineer wants to remotely log in to a Huawei device, the engineer uses the Paramiko library to compile the following code when compiling the SSH Python script:

cli = ssh.invoke_shell()

cli.send("screen-length 0 temporary\n")

What is the function of screen-length 0 temporary?

Options:

A.

Performing automatic word wrap

B.

Performing split-screen display

C.

Canceling split-screen display

D.

Canceling automatic word wrap

Buy Now
Questions 52

In an MPLS VPN network, two-layer MPLS labels are added into data packets before they are transmitted over the public network. Which of the following statements regarding data packet processing are correct?

Options:

A.

The egress PE sends the data packet to the correct VPN based on the inner label.

B.

The penultimate hop removes the outer label before forwarding the data packet to a peer egress PE.

C.

The IP data packet received by egress LSR is without labels.

D.

The penultimate-hop device receives a packet with an outer label.

Buy Now
Questions 53

In OSPFv3, which of the following types of LSAs can be flooded in the entire AS?

Options:

A.

Link-LSA

B.

AS-external-LSA

C.

Inter-Area-Prefix-LSA

D.

Intra-Area-Prefix-LSA

Buy Now
Exam Code: H12-891_V1.0
Exam Name: HCIE-Datacom V1.0
Last Update: Apr 2, 2025
Questions: 177
H12-891_V1.0 pdf

H12-891_V1.0 PDF

$25.5  $84.99
H12-891_V1.0 Engine

H12-891_V1.0 Testing Engine

$30  $99.99
H12-891_V1.0 PDF + Engine

H12-891_V1.0 PDF + Testing Engine

$40.5  $134.99