Special Summer Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Huawei > HCIP-Datacom > H12-821_V1.0

H12-821_V1.0 HCIP-Datacom-Core Technology V1.0 Question and Answers

Question # 4

Four routers run ISIS and have established adjacencies. The area IDs and router levels are marked in the following figure. If route leaking is configured on R3, which of the following is the cost of the route from R4 to 10.0.2.2/32?

A.

80

B.

50

C.

40

D.

30

Full Access
Question # 5

A monitoring plane usually comprises the monitoring units of main control boards and interface boards. This plane can monitor the system environment independently. Which of the following environment monitoring functions can be provided by the monitoring plane?

A.

Voltage monitoring

B.

Temperature monitoring

C.

Fan control

D.

System power-on and power-off control

Full Access
Question # 6

IGMPV3 not only supports IGMPv1 General Query and IGMPv2 Group-Specific Query, and also IGMPv3 Source/Group-Specific Query.

A.

TRUE

B.

FALSE

Full Access
Question # 7

The typical characteristics of the AI era are that it focuses on data, explores data value, and improves AI efficiency. Therefore, the core requirement of AI for data center networks is speed, meaning low latency.

A.

TRUE

B.

FALSE

Full Access
Question # 8

On an OSPF network, if two indirectly connected routers with the same router ID run in the same area, Type 1 LSA calculation fails.

A.

TRUE

B.

FALSE

Full Access
Question # 9

After which of the following parameters are modified does an IS-IS neighbor relationship need to re-established?

A.

The cost of an IS-IS interface is changed.

B.

The IP address of an ISIS interface is changed.

C.

The level of an ISIS interface is changed.

D.

The interval at which an IS-IS interface sends IIH packets is changed.

Full Access
Question # 10

In BGP, Keepalive messages are used to maintain BGP peer relationships. When a BGP router receives a Keepalive message from a peer, the BGP router sets the state of the peer to Established and periodically sends Keepalive messages to maintain the connection. By default, the device sends Keepalive messages every seconds.

Full Access
Question # 11

When deploying a VRRP network, an enterprise administrator sets the virtual IP address to 192.168.1.254 and VRID to 1. Which of the following is the virtual MAC address after the network becomes stable?

A.

0000-5e01-0101

B.

0000-5e01-0254

C.

0000-5e00-0101

D.

0000-5e00-0254

Full Access
Question # 12

Which of the following statements regarding the firewall zone security level is false?

A.

The configured security level cannot be changed.

B.

Two zones cannot be configured with the same security level.

C.

The default security level of the new zone is 1.

D.

Only the security level of the user-defined zone can be configured.

Full Access
Question # 13

IPv6 defines multiple types of addresses. Which of the following statements is false about these addresses?

A.

Link-local addresses can be quickly generated using the EUI-64 method.

B.

Anycast addresses can be used only as destination addresses.

C.

Each interface can have multiple global unicast addresses with different network prefixes.

D.

Manually configured link-local addresses have a higher priority than automatically generated ones.

Full Access
Question # 14

An IP prefix list is a common matching tool used in routing policies. Which of the following cannot be configured as matching conditions in an IP prefix list on a Huawei router?

A.

Port number

B.

Mask

C.

Action

D.

Index

Full Access
Question # 15

A network entity title consists of an area address and a system ID. It is a special NSAP (the SEL has a fixed value of 00) and is mainly used for route calculation.

A.

TRUE

B.

FALSE

Full Access
Question # 16

Which of the following messages are sent when BGP establishes peer relationships?

A.

Keepalive

B.

Hello

C.

Update

D.

Open

Full Access
Question # 17

The figure shows the VRRP status switchover events. Match these events with their sequence numbers.

Full Access
Question # 18

Which of the following statements is false, based on the following IGMP information on an interface of RTA?XC

A.

The interval for sending group-specific Query messages is 60s.

B.

The maximum time for response to Query messages is 10s.

C.

The IP address of the interface is 192.168.1.1.

D.

The IGMP version is IGMPV2.

Full Access
Question # 19

On an OSPF network, if a router functions as an ABR, the router must also be a BR.

A.

TRUE

B.

FALSE

Full Access
Question # 20

By default, some security zones are created when Huawei firewalls are enabled. Which of the following security zones is created by users?

A.

DMZ

B.

ISP

C.

Trust

D.

Local

Full Access
Question # 21

On the OSPF network shown in the figure, R1, R2, and R3 run OSPF, and R1 advertises four VPN routes to OSPF. A filter-policy needs to achieve the following goal: R1's and R3's routing tables contain the routes to 192.168.3.0/24, but R2's routing table does not. Which of the following filter-policies cannot meet this requirement?

A.

A filter-policy on R2 for filtering received routes

B.

A filter-policy on R2 for filtering the routes to be advertised

C.

A filter-policy on R1 for filtering the routes to be imported

D.

A filter-policy on R1 for filtering the imported routes to be advertised

Full Access
Question # 22

On an IS-IS network, areas are divided by router, and a router can belong to only one area. Therefore, an IS-IS router only needs to maintain the LSDB of its area.

A.

TRUE

B.

FALSE

Full Access
Question # 23

On an OSPF network, interfaces are classified into four types based on link layer protocols. Which of the following types can interfaces on an IS-IS network be classified into based on physical links?

A.

P2P

B.

Broadcast

C.

P2MP

D.

NBMA

Full Access
Question # 24

There are two types of BGP peer relationships: EBGP and IBGP. When configuring EBGP, ensure that the peer IP address is routable and the UDP connection can be correctly established.

A.

TRUE

B.

FALSE

Full Access
Question # 25

Drag the following VRRP states to the corresponding working mechanisms.

Full Access
Question # 26

On a network, each router has a local core routing table and protocol routing tables. A routing entry in the local core routing table has multiple key fields. Which of the following are included?

A.

Destination address of a route

B.

Routing protocol preference of a route

C.

Inbound interface that learns a route

D.

Routing protocol that learns a route

Full Access
Question # 27

Which of the following statements regarding routing policy and policy-based routing are true?

A.

A routing policy is used to control import, advertisement, and receiving of routing information.

B.

Policy-based routing is used to control import, advertisement, and receiving of routing information.

C.

Policy-based routing is used to control packet forwarding without following routes in the routing table.

D.

A routing policy is used to control packet forwarding without following routes in the routing table.

Full Access
Question # 28

Which of the following statements about WLAN roaming are false?

A.

APs with which a STA is associated before and after roaming can work on different channels.

B.

During roaming, the STA sends a Reassociation Request frame containing home AP information to the foreign AP.

C.

During roaming, the STA sends an Association Request frame containing home AP information to the foreign AP.

D.

APs with which a STA is associated before and after roaming must work on the same channel.

Full Access
Question # 29

ON a stateful inspection Firewall where there is no session table, when the status detection mechanism is enabled and the second packet (CYN+ACK) of 3-way hadshakes reaches the firewall. Which of the following statements is true?

A.

If the firewall security policy permits packets to pass, the session table is created.

B.

By default, when status detection is disabled and the permit policy is configured packets can pass.

C.

Packets must pass the firewall, and a session table is established.

D.

If the firewall security policy permits packets to pass, the packets can pass the firewall.

Full Access
Question # 30

STP ensures a loop-free network but has a slow network topology convergence speed, affecting communication quality. RSTP has made some improvements based on STP. Which of the following improvements is not included?

A.

If a port does not receive configuration BPDUs from the upstream device within four Hello intervals, the switch considers that the negotiation with the neighbor fails.

B.

The non-root switch running RSTP sends configuration BPDUs at the interval specified by the Hello timer, which is performed independently by each device.

C.

RSTP reduces five port states to three port states based on user traffic forwarding and MAC address learning.

D.

RSTP deletes three port states and adds two port roles.

Full Access
Question # 31

Which of the following TLVs is used by ISIS to describe the IP address of an interface?

A.

129

B.

131

C.

128

D.

132

Full Access
Question # 32

A route-policy consists of one or more nodes. What is the maximum number of nodes in a route-policy?

A.

4096

B.

65535

C.

256

D.

1024

Full Access
Question # 33

The traffic limiting policy feature only supports the number of connections initiated by the specified IP or the number of connections received.

A.

TRUE

B.

FALSE

Full Access
Question # 34

Which of the following values is the Reserved/Circuit Type field in the IIH packets sent by a Level-1-2 router on an IS-IS network?

A.

00

B.

11

C.

01

D.

10

Full Access
Question # 35

After BGP initiates a TCP connection, the ConnectRetry timer is disabled if the TCP connection is successfully established. If the TCP connection fails to be established, the device tries to reestablish the TCP connection when the ConnectRetry timer expires.

A.

TRUE

B.

FALSE

Full Access
Question # 36

Which of the following attributes cannot be directly referenced in an apply clause of a route-policy?

A.

community

B.

IP-prefix

C.

tag

D.

origin

Full Access
Question # 37

A company has a stack consisting of three switches that are running properly. The master switch restarts due to a fault. Given this, which of the following statements are true?

A.

Before the restart of the original master switch is complete, the original slave switch is specified as the new standby switch.

B.

After the original master switch restarts, it becomes the new master switch.

C.

After the original master switch restarts, the original standby switch becomes a new slave switch.

D.

Before the restart of the original master switch is complete, the original standby switch becomes the new master switch.

Full Access
Question # 38

GRE is a Layer 2 VPN encapsulation technology that encapsulates packets of certain data link layer protocols so that the encapsulated packets can be transmitted over an IP network.

A.

TRUE

B.

FALSE

Full Access
Question # 39

BGP is a distance-vector protocol that implements route reachability between ASs and selects optimal routes. Which of the following statements are true about this protocol?

A.

BGP does not support authentication. Therefore, it cannot ensure network security.

B.

BGP uses TCP as the transport layer protocol.

C.

BGP provides various routing policies.

D.

BGP supports automatic peer discovery.

Full Access
Question # 40

During routine O&M, the administrator checks the IGMP configuration on a router interface. The configuration is as follows:

display igmp interface

Interface information of VPN-Instance: public net

GigabitEthernet0/0/1(192.168.1.1):

IGMP is enabled

Current IGMP version is 2

IGMP state: up

IGMP group policy: none

IGMP limit: -

Value of query interval for IGMP (negotiated): -

Value of query interval for IGMP (configured): 60 s

Value of other querier timeout for IGMP: 0 s

Value of maximum query response time for IGMP: 10 s

Querier for IGMP: 192.168.1.1 (this router)

Given this, which of the following statements are true?

A.

The IP address of the interface is 192.168.1.1.

B.

The IGMP version is IGMPv2.

C.

The maximum response time to Query messages is 10s.

D.

The interval for sending Group-Specific Query messages is 60s.

Full Access
Question # 41

By default, a router interface sends PIM Hello messages at an interval of __________ seconds.

Full Access
Question # 42

RSTP provides different functions in different scenarios. Which of the following statements Is false?

A.

After TC-BPDU attack defense function is enabled, you can set the number of times the switch processes TC BPDUs within a certain period

B.

The role of the designated port that is enabled with root protection cannot be changed

C.

If the edge port on the switch enabled with BPDU protection receives RST BPDU, the switch sets the edge port as a non-edge-port and triggers STP calculation

D.

When the designated port enabled with root protection receives optimal RST BPDUs, the port enters the Discarding state and does not forward packets. If the port does not receive optimal RST BPDUs within a certain period of time, the port will automatically restore to the Forwarding state

Full Access
Question # 43

In IP multicast transmission, packets are transmitted from a source to a group of receivers. Which of the following statements are true about IP multicast technologies?

A.

Compared with broadcast, IP multicast prevents information flooding.

B.

Compared with broadcast, IP multicast effectively conserves network bandwidth.

C.

Compared with unicast, IP multicast improves information transmission security.

D.

Compared with unicast, IP multicast increases the load of information sources.

Full Access
Question # 44

Which of the following statements regarding an IP prefix are true?

A.

An IP prefix filter is used to filter IP address prefixes and cannot match an IP prefix number and a prefix length at the same time.

B.

An IP prefix filter cannot be used to filter data packets.

C.

An IP prefix filter is used to filter IP address prefixes and can match an IP prefix number and a prefix length at the same time.

D.

An IP prefix filter can be used to filter data packets.

Full Access
Question # 45

Huawei modular devices have multiple hardware modules that provide different functions. Match the following hardware modules with their functions.

Full Access
Question # 46

The BFD Echo function checks the connectivity of the forwarding link by looping back packets. Which of the following statements are true about this function?

A.

If URPF is enabled on the peer end, BFD packets may be incorrectly discarded on the peer end.

B.

In the BFD Echo function, the device uses the IP address of the outbound interface as the source IP address by default.

C.

The BFD Echo function applies only to single-hop BFD sessions.

D.

When configuring a BFD session supporting the BFD echo function, you need to configure both the local and remote discriminators.

Full Access
Question # 47

A session is an entry used to record the connection status of a protocol and is fundamental for the firewall to forward packets. Which of the following protocol packets will the firewall create sessions for?

A.

Subsequent fragment

B.

ICMP error packet

C.

GRE

D.

TCP

Full Access
Question # 48

ASPF enables the firewall to support multi-channel protocols such as FTP and to define security policies for complex applications.

A.

TRUE

B.

FALSE

Full Access
Question # 49

Access control lists can be classified into which types as follows?

A.

Basic ACL

B.

User-defined ACL

C.

Advanced ACL

D.

Layer 2 ACL

Full Access
Question # 50

On an IS-IS network, the length and components of a NET are the same as those of an NSAP. Which of the following NET fields is used to uniquely identify a host or router in an area?

A.

System ID

B.

IDI

C.

SEL

D.

Area Address

Full Access
Question # 51

See the command output of a router below. Which of the following statements is true?

display ospf interface GigabitEthernet 0/0/0 verbose

OSPF Process 1 with Router ID 10.0.2.2

Interface: 10.0.12.2 (GigabitEthernet 0/0/0)

Cost: 1 State: BDR Type: Broadcast MTU: 1500

Priority: 1

Designated Router: 10.0.12.1

Backup Designated Router: 10.0.12.2

Timers: Hello 10 , Dead 40 , Poll 120 , Retransmit 5 , Transmit Delay 1

A.

The router ID is 10.0.12.2.

B.

The interface cost is 1500.

C.

This router is a BDR.

D.

The interface IP address is 10.1.12.1.

Full Access
Question # 52

On the OSPF network shown in the figure, an adjacency has been established between R1 and R2. An engineer configures the commands in the figure on R2. In this case, which of the following routing entries may exist in the routing table of R2?

A.

10.1.4.0/24

B.

10.1.3.0/24

C.

10.1.2.0/24

D.

10.1.1.0/24

Full Access
Question # 53

Which command is used to configure the VRRP preemption delay?

A.

vrrp vrid 1 timer delay 20

B.

vrrp vrid 1 preempt-delay 20

C.

vrrp vrid 1 preempt-mode timer delay 20

D.

vrrp vrid 1 preempt-timer 20

Full Access
Question # 54

On an OSPF network, an IR in area 0 must be a BR, but an ASBR may not be an ABR.

A.

TRUE

B.

FALSE

Full Access
Question # 55

Which of the following statements is true about BGP?

A.

If the export routing policy applied to a BGP peer changes, manual intervention is required so that the device resends Update messages to the peer.

B.

IGP routes can be converted into BGP routes only through the network command.

C.

A router cannot be configured with multiple BGP processes.

D.

Open messages carry only the BGP header.

Full Access
Question # 56

If a router ID is configured in both the system via and the BGP view, BGP uses the router ID configured in the BGP view because the BGP view takes precedence over the system view.

A.

TRUE

B.

FALSE

Full Access
Question # 57

On an IS-IS network, each device needs to be configured with a network entity title (NET), which consists of three parts, each containing different fields. Which of the following fields are contained in the Area Address part?

A.

High Order DSP

B.

AFI

C.

IDI

D.

System ID

Full Access
Question # 58

Which Of the following IEEE 802.11 standards is also known as Wi-Fi 6?

A.

802.11ac

B.

802.11n

C.

802.11ax

D.

802.11b

Full Access
Question # 59

See the network shown in the following figure.

R1 and R2 run IS-IS and establish an adjacency. IS-IS is enabled on Loopback0 of R2 but disabled on Loopback3 of R2. The configurations shown in the figure are performed in the IS-IS process of R2. Which of the following statements are true?

A.

The routing table of R1 contains the route 10.0.2.3/32.

B.

The routing table of R1 does not contain the route 10.0.2.3/32.

C.

The routing table of R1 does not contain the routes 10.0.2.2/32 and 10.0.2.3/32.

D.

The routing table of R1 contains the route 10.0.2.2/32.

Full Access
Question # 60

OSPF networks are classified into four types of networks by link layer protocol. Drag the following link layer protocols to the corresponding network types.(Token is reusable)

Full Access
Question # 61

Compress the 2001:0DBB:B8:0000:C030:0000:0000:09A0:CDEF address.___________(if the answer contains letters, capitalize them.)

Full Access
Question # 62

During BGP route summarization configuration, the keyword can be used to suppress all specific routes so that only the summary route is advertised. The summary route carries the Atomic-aggregate attribute rather than the community attributes of specific routes.

Full Access
Question # 63

ICMPv6 messages are classified as error or informational messages.

A.

TRUE

B.

FALSE

Full Access
Question # 64

What is the correct procedure for a VLAN pool to assign terminals to VLANs.

Full Access
Question # 65

A Huawei firewall by default creates security zones named untrust, dmz, _________ and local. (Use Lowercase letters.)

Full Access
Question # 66

On an enterprise network, the directly connected interfaces of two OSPF routers are on different network segments and have different masks. To establish an OSPF neighbor relationship between the two interfaces, you can change their network types to which of the following?

A.

Point-to-point

B.

NBMA

C.

P2MP

D.

Broadcast

Full Access
Question # 67

An enterprise administrator configures route summarization on ASBRs to reduce the number of inter-area Type 3 LSAs, which in turn reduces the routing table size and improves device resource utilization.

A.

TRUE

B.

FALSE

Full Access
Question # 68

On an STP network, only the designated port processes inferior BPDUs. On an RSTP network, a port with any role processes inferior BPDUs.

A.

TRUE

B.

FALSE

Full Access
Question # 69

Which of the following statements regarding the stateful inspection firewall is true?

A.

When the stateful inspection firewall checks packets, packets of one same connection are not correlated.

B.

Because UDP is a connectionless protocol, so the stateful inspection firewall cannot match UDP packets with the status table.

C.

The stateful inspection firewall only needs to match the first data packet against a rule, and the subsequent packets of the connection are matched directly in the state table.

D.

The stateful inspection firewall needs to match the rules for each incoming packet.

Full Access
Question # 70

What parameters can a DHCP6 server assign to a DHCPv6 client?

A.

Gateway address

B.

DNS server address

C.

IPV6 address/prefix

D.

SNTP server address

Full Access
Question # 71

On an enterprise WLAN where Portal authentication is deployed, an AC functions as an access device and communicates with a Portal server using the Portal protocol. Which of the following statements are true about the Portal protocol?

A.

The HTTP or HTTPS protocol can be used as the Portal access or authentication protocol.

B.

By default, the access device processes Portal protocol packets through port 2000.

C.

By default, the device uses the destination port number 50100 to proactively send packets to the Portal server.

D.

Portal protocol packets are transmitted over TCP.

Full Access
Question # 72

There are various types of VPNs, which can be applied to different layers. Which of the following network layers does SSL VPN belong to?

A.

Network layer

B.

Application layer

C.

Transport layer

D.

Data link layer

Full Access
Question # 73

Which of the following statements regarding Local-Preference in BGP is true?

A.

Local-Preference affects traffic that enters an AS.

B.

Local-Preference can be transmitted between ASs.

C.

The default Local-Preference value is 100.

D.

Local-Preference is a well-known mandatory attribute.

Full Access
Question # 74

Route attributes are specific descriptions of routes. BGP route attributes can be classified into four types. Which of the following are well-known discretionary attributes?

A.

Atomic_Aggregate

B.

Local-Preference

C.

Community

D.

MED

Full Access
Question # 75

As shown in the following figure, a new AP is deployed In dual link MSB networking (load balancing mode). Which AC will the connect to?

A.

AC1

B.

Random access

C.

None

D.

AC2

Full Access
Question # 76

What is the default sending interval of BFD packets?

A.

10s

B.

5s

C.

100ms

D.

1000ms

Full Access
Question # 77

On a WLAN, engineers can use the VLAN pool mechanism to assign access users to different VLANs, which helps reduce the number of broadcast domains and improve network performance. VLAN pools support two VLAN assignment algorithms: even and hash. Drag the advantages and disadvantages to the two algorithms.(Token is reusable)

Full Access
Question # 78

An engineer sets the CAPWAP heartbeat detection interval to 20 of the active link before an active/standby switchover occurs?

A.

75s

B.

20s

C.

60s

D.

90s

Full Access
Question # 79

Which of the following attacks is not the network layer attack?

A.

IP spoofing attack

B.

ICMP attack

C.

Smurf attack

D.

ARP spoofing attack

Full Access
Question # 80

On an IS-IS network, two directly connected routers establish a neighbor relationship through the three-way handshake mechanism by default, regardless of whether the network type is P2P or broadcast.

A.

TRUE

B.

FALSE

Full Access
Question # 81

To overcome the disadvantages of STP, RSTP changes the format of configuration BPDUs. Which of the following fields in STP BPDUs is used to specify the port role?

A.

Flags

B.

BPDU Type

C.

PID

D.

PVI

Full Access
Question # 82

GRE is a VPN encapsulation technology that is widely used to transmit packets across heterogeneous networks. Which of the following statements is false about GRE?

A.

GRE supports encryption and authentication.

B.

GRE supports multicast transmission.

C.

GRE is a Layer 3 VPN encapsulation technology.

D.

GRE can work with other VPN protocols to better ensure data security.

Full Access
Question # 83

An enterprise office network runs OSPF and is divided into multiple OSPF areas. Enterprise network engineers can configure route summarization on ASBRs to reduce the number of inter-area Type 3 LSAs, which in turn reduces the routing table size and improves device resource utilization.

A.

TRUE

B.

FALSE

Full Access
Question # 84

An enterprise uses Huawei routers to deploy an IS-IS network for network-wide communication. An engineer wants to change the interface cost to control route selection. By default, which of the following values is the maximum cost that can be configured?

A.

67

B.

63

C.

64

D.

68

Full Access
Question # 85

Depending on the type of algorithms used, routing protocols are classified into distance-vector protocols and link-state protocols. Which of the following routing protocols are link-state protocols?

A.

RIP

B.

OSPF

C.

IS-IS

D.

BGP

Full Access
Question # 86

After a BGP peer relationship is established between two ends, changing the router ID of one end resets the BGP peer relationship.

A.

TRUE

B.

FALSE

Full Access
Question # 87

The Next_Hop attribute in BGP records the next hop of a route. Similar to the next hop in an IGP, the Next_Hop attribute in BGP must be the IP address of a peer interface.

A.

TRUE

B.

FALSE

Full Access
Question # 88

Multicast applies to any point-to-multipoint data transmission. Which of the following types of application data can be forwarded in multicast mode?

A.

Real-time audio conferencing

B.

Livestreaming

C.

Network TV

D.

Data warehouse

Full Access
Question # 89

OSPF neighbors have multiple states, such as Down, Init, 2-way, Loading, or Full. In which of the following states do OSPF routers negotiate the master and slave roles?

A.

Exchange

B.

Init

C.

2-way

D.

ExStart

Full Access