Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Huawei > HCIP-Datacom > H12-821_V1.0

H12-821_V1.0 HCIP-Datacom-Core Technology V1.0 Question and Answers

Question # 4

When multiple access channels are set for the same access requirement, the insecure access channels are not used and secure access channels are selected in normal cases. Which of the following are secure access channels?

A.

HTTPS

B.

Telnet

C.

SNMPv2

D.

SFTP

Full Access
Question # 5

When two BGP peers support different Hold Time, they will negotiate to support the shortest Hold Time interval they can support.

A.

TRUE

B.

FALSE

Full Access
Question # 6

Which of the following statements regarding DR/BDR are false?

A.

In a broadcast network, DR and BDR must be elected. A broadcast network without a DR or BDR cannot operate normally.

B.

DR others listen on the multicast address 224.0.0.5.

C.

All DR others establish neighbor relationships with DR and BDR only.

D.

DR others listen on the network address 224.0.0.6.

Full Access
Question # 7

What parameters can a DHCP6 server assign to a DHCPv6 client?

A.

Gateway address

B.

DNS server address

C.

IPV6 address/prefix

D.

SNTP server address

Full Access
Question # 8

Which of the following statements regarding the stateful inspection firewall is true?

A.

When the stateful inspection firewall checks packets, packets of one same connection are not correlated.

B.

Because UDP is a connectionless protocol, so the stateful inspection firewall cannot match UDP packets with the status table.

C.

The stateful inspection firewall only needs to match the first data packet against a rule, and the subsequent packets of the connection are matched directly in the state table.

D.

The stateful inspection firewall needs to match the rules for each incoming packet.

Full Access
Question # 9

In inter-AC roaming scenarios, an AC can function as the mobility server of multiple mobility groups, but can be added only to one mobility group.

A.

TRUE

B.

FALSE

Full Access
Question # 10

Which of the following statements regarding an IP prefix are true?

A.

An IP prefix filter is used to filter IP address prefixes and cannot match an IP prefix number and a prefix length at the same time.

B.

An IP prefix filter cannot be used to filter data packets.

C.

An IP prefix filter is used to filter IP address prefixes and can match an IP prefix number and a prefix length at the same time.

D.

An IP prefix filter can be used to filter data packets.

Full Access
Question # 11

What is the default sending interval of BFD packets?

A.

10s

B.

5s

C.

100ms

D.

1000ms

Full Access
Question # 12

Which of the following statements about stack split is false?

A.

After a stack splits, the MAC addresses of the two stacks change immediately.

B.

If the master and standby switches are still in the same stack after the stack splits, the slave switches separated from the original master and standby switches re-elect the master and standby switches due to protocol packet timeout.

C.

If the master and standby switches are in two stacks after the split, the stack where the original master switch resides updates the topology and selects a new standby switch. The original standby switch becomes the master switch in the new stack and a new standby switch is elected.

D.

After a stack splits, multiple stacks have the same IP address and MAC address. To prevent network faults, the stacks perform MAD detection. The stack that fails the MAD detection shuts down all physical ports except reserved ports.

Full Access
Question # 13

GRE is a VPN encapsulation technology that is widely used to transmit packets across heterogeneous networks. Which of the following statements is false about GRE?

A.

GRE supports encryption and authentication.

B.

GRE supports multicast transmission.

C.

GRE is a Layer 3 VPN encapsulation technology.

D.

GRE can work with other VPN protocols to better ensure data security.

Full Access
Question # 14

An IP prefix list is a common matching tool used in routing policies. Which of the following cannot be configured as matching conditions in an IP prefix list on a Huawei router?

A.

Port number

B.

Mask

C.

Action

D.

Index

Full Access
Question # 15

The traffic limiting policy feature only supports the number of connections initiated by the specified IP or the number of connections received.

A.

TRUE

B.

FALSE

Full Access
Question # 16

Which of the following statements regarding the BGP error display of a router is false?

A.

The error occurred at 11:40:39 on March 22, 2010.

B.

The neighbor address of this router is 10.1.1.2.

C.

The error may be caused by the incorrect peer AS number.

D.

Error Type indicates that the BGP error is caused by the neighbor relationship error.

Full Access
Question # 17

Without a prior version check, an engineer configures IGMP snooping on a device and the version of IGMP snooping is earlier than the IGMP versions on user hosts. In this case, which of the following situations will occur?

A.

Users cannot receive multicast data because the device forwards received IGMP Report messages only to router ports and does not generate group member ports or forwarding entries.

B.

Users cannot receive multicast data, but the device generates forwarding entries after receiving IGMP Report messages.

C.

The IGMP snooping version of the device is automatically degraded, and users can receive multicast data properly.

D.

The IGMP versions of the hosts are automatically upgraded, and users can receive multicast data properly.

Full Access
Question # 18

As shown in the figure, the stateful inspection firewall forwards the packet because the packet matches the session status of the firewall.

A.

TRUE

B.

FALSE

Full Access
Question # 19

Similar to the OSPF DR, the IS-IS DIS needs to be elected on a broadcast network. However, the OSPF DR is preemptive by default, whereas the IS-IS DIS is not preemptive by default.

A.

TRUE

B.

FALSE

Full Access
Question # 20

On an IS-IS network, routers send LSPs to exchange link state information. LSPs are classified into Level-1 LSPs and Level-2 LSPs and have the same format. Which of the following parts constitute the LSP ID in an LSP?

A.

LSP Number

B.

Pseudonode ID

C.

System ID

D.

IS Type

Full Access
Question # 21

The Interface \P address and VRRP virtual IP address can be the same.

A.

TRUE

B.

FALSE

Full Access
Question # 22

A forwarding information database (FIB) can directly guide packet forwarding on a router.

A.

TRUE

B.

FALSE

Full Access
Question # 23

If a router ID is configured in both the system via and the BGP view, BGP uses the router ID configured in the BGP view because the BGP view takes precedence over the system view.

A.

TRUE

B.

FALSE

Full Access
Question # 24

Which of the following statements regarding the display bgp routing-table command output is true?

A.

The route to the destination address 192.168.1.0 is learned through AS 200.

B.

The MED value of the route to the destination address 192.168.1.0 is 100.

C.

The route to the destination address 192.168.1.0 is not the optimal route in the BGP routing table.

D.

The route to the destination address 192.168.1.0 is injected into the BGP routing table using the network command.

Full Access
Question # 25

A router performs a lookup in its FIB table for a packet. If the tunnel ID in the matching entry is 0, the packet needs to be forwarded through a tunnel, such as an MPLS tunnel.

A.

TRUE

B.

FALSE

Full Access
Question # 26

A BGP device receives a route carrying an unknown attribute from a peer but does not know whether other devices need the attribute. In this case, the BGP device retains this attribute when advertising the route to other peers. Which of the following attributes is of this type?

A.

Community

B.

AS.Path

C.

MED

D.

OriginatorID

Full Access
Question # 27

In the OSPF protocol, inter-area route calculation involves only Router LSA, Network LSA, and Summary LSA.

A.

TRUE

B.

FLASE

Full Access
Question # 28

In an IPv4 address space, Class D addresses are used for multicast. Among Class D addresses, which of the following is the permanent group address range reserved for routing protocols?

A.

232.0.0.0 to 232.255.255.255

B.

239.0.0.0 to 239.255.255.255

C.

224.0.0.0 to 224.0.0.255

D.

224.0.1.0 to 231.255.255.255

Full Access
Question # 29

To enable PC1 to access PC2 using the IP address of the firewall's GE0/0/2, you need to configure NAPT for source address translation. In the following figure, fill in the blank to complete the command.

Full Access
Question # 30

A firewall receives a packet that PC1 sends to PC2. Which of the following statements are true?

A.

The packet does not match any security policy.

B.

The packet matches security policy rule 1, and the firewall forwards the packet.

C.

No source or destination security zone is specified in security policy rule 2, indicating that any security zone is a match.

D.

The packet matches security policy rule 1, and the firewall discards the packet.

Full Access
Question # 31

Compress the 2001:0DB8:0000:C030:0000:0000:09A0 address.

Full Access
Question # 32

By default, some security zones are created when Huawei firewalls are enabled. Which of the following security zones is created by users?

A.

DMZ

B.

ISP

C.

Trust

D.

Local

Full Access
Question # 33

Which of the following statements regarding the LSA age field are true?

A.

The unit of this field is seconds. In a LSDB, the LS age of a LSA increases with time.

B.

If the LS age of a LSA has reached the LSRefreshTime (30 minutes), any router can regenerate an instance of this LSA again.

C.

The unit of this field is seconds. In a LSDB, the LS age of a LSA decreases with time.

D.

If the LS age of a LSA has reached the LSRefreshTime (30 minutes), the originator of this LSA needs to regenerate an instance of this LSA again.

Full Access
Question # 34

BFD for OSPF is deployed on a directly connected link. If the physical link is disconnected, drag the following BFD processes to the corresponding sequence numbers.

Full Access
Question # 35

In the SNMP management model, which of the following elements defines the attributes of a managed device?

A.

MIB

B.

Agent

C.

Managed Object

D.

NMS

Full Access
Question # 36

On an enterprise network, the directly connected interfaces of two OSPF routers are on different network segments and have different masks. To establish an OSPF neighbor relationship between the two interfaces, you can change their network types to which of the following?

A.

Point-to-point

B.

NBMA

C.

P2MP

D.

Broadcast

Full Access
Question # 37

Huawei modular devices have multiple hardware modules that provide different functions. Match the following hardware modules with their functions.

Full Access
Question # 38

As shown in the figure, VRRP is associated with a BFD session. When a backup device detects a fault through BFD, the backup device immediately assumes the master role after the Master_Down_Timer timer expires.

A.

TRUE

B.

FALSE

Full Access
Question # 39

After HSB is configured, the HSB channel fails to be established and cannot back up information on the active device to the standby device. What are the possible causes for this HSB function failure?

A.

The TCP channel is not established.

B.

The retransmission count and interval for HSB service packets are different on the two devices.

C.

The two ACs have the same priority.

D.

The source IP address and port number of the local end are different from the destination IP address and port number of the remote end.

Full Access
Question # 40

When receiving a packet, a Huawei router matches the packet against ACL rules. The default ACL matching order used by the Huawei router is.

Full Access
Question # 41

Which of the following LSAs are advertised only within a single area?

A.

Network LSA

B.

Router LSA

C.

Summary LSA

D.

AS External LSA

Full Access
Question # 42

As shown in the following figure, a new AP is deployed In dual link MSB networking (load balancing mode). Which AC will the connect to?

A.

AC1

B.

Random access

C.

None

D.

AC2

Full Access
Question # 43

Which of the following attributes cannot be directly referenced in an apply clause of a route-policy?

A.

community

B.

IP-prefix

C.

tag

D.

origin

Full Access
Question # 44

As shown in the figure, data traffic is forwarded in tunnel mode along the path of STA -> HAP -> HAC -> upper-layer network before roaming. What is the flow direction of data traffic after Layer 3 roaming?

A.

STA -> FAP -> FAC -> HAC -> HAP -> HAC -> Upper-layer network

B.

STA -> FAP -> FAC -> HAC -> Upper-layer network

C.

STA -> FAP -> FAC -> Upper-layer network

D.

STA -> FAP -> FAC -> HAC -> HAP -> Upper-layer network

Full Access
Question # 45

Which of the following statements regarding OSPF route summarization is false?

A.

OSPF supports two route summarization modes: ABR summarization and ASBR summarization.

B.

Any router in OSPF can summarize routes.

C.

Route summarization is the process of summarizing routes with the same prefix into one route and then advertising only the summarized route to other areas.

D.

Route summarization can reduce routing information, decrease the routing table size, and improve router performance.

Full Access
Question # 46

On an OSPF network, if a router receives an update of an LSA that exists in the local LSDB, the router updates the LSDB and floods the LSA.

A.

TRUE

B.

FALSE

Full Access
Question # 47

What is the correct procedure for a VLAN pool to assign terminals to VLANs.

Full Access
Question # 48

When configuring an ACL on a router, you can specify a unique number or name to identify the ACL. Once a named ACL is created, it cannot be modified. You can only delete the named ACL and reconfigure it.

A.

TRUE

B.

FALSE

Full Access
Question # 49

Which of the following protocols are multi-channel protocols?

A.

H.323

B.

FTP

C.

Telnet

D.

SMTP

Full Access
Question # 50

During BGP route summarization configuration, the keyword can be used to suppress all specific routes so that only the summary route is advertised. The summary route carries the Atomic-aggregate attribute rather than the community attributes of specific routes.

Full Access
Question # 51

Which of the following statements regarding OSPF multi-instance is false?

A.

Route exchange between different OSPF processes is similar to route exchange between different routing protocols.

B.

An interface of a router belongs to only a certain OSPF process.

C.

The OSPF process IDs must be the same when OSPF neighbor relationships are established between different routers.

D.

Multiple OSPF processes can run on the same router, and they are independent of each other.

Full Access
Question # 52

See the command output of a router below. Which of the following statements is true?

display ospf interface GigabitEthernet 0/0/0 verbose

OSPF Process 1 with Router ID 10.0.2.2

Interface: 10.0.12.2 (GigabitEthernet 0/0/0)

Cost: 1 State: BDR Type: Broadcast MTU: 1500

Priority: 1

Designated Router: 10.0.12.1

Backup Designated Router: 10.0.12.2

Timers: Hello 10 , Dead 40 , Poll 120 , Retransmit 5 , Transmit Delay 1

A.

The router ID is 10.0.12.2.

B.

The interface cost is 1500.

C.

This router is a BDR.

D.

The interface IP address is 10.1.12.1.

Full Access