Summer Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 28522818

Home > Huawei > HCIE-Datacom > H12-891_V1.0

H12-891_V1.0 HCIE-Datacom V1.0 Question and Answers

Question # 4

Regarding the BGP ring protection mechanism, the following description is correct?

A.

A AS_PATH attribute is used between autonomous systems to prevent ring cats.

B.

The Cluster List property is used for reflector cluster inner ring defense, and the router finds that the Cluster List of route entries contains its own Client lD The route is rejected

C.

Routes learned from IBGP are not advertised to IBGP neighbors and are used to prevent routing loops inside the AS

D.

You can use the AS_CONFED_SET attribute to prevent loops within a consortium:

Full Access
Question # 5

As shown in the figure, the use of redundant links between the branch and the headquarters to establish IPsecVPN, while turning on URLPF on the Router_B for traffic from branch l, which of the following options is correct?

A.

When using IPsec active-standby link redundant backups to enable the URPF function under the physical interface , it is recommended to use URPF loose mode.

B.

When using IPsec multilink redundant backup, the URPF function can be used under the physical interface, and URPF strict mode can be used

C.

When using IPsec multilink redundant backups, urPF can be enabled under the tunnel interface, and URPF strict mode can be used

D.

When using lPsec active-standby link redundancy backup, the URPF function is enabled under the physical interface, and URPF strict mode can be used.

Full Access
Question # 6

What's wrong about vrrp timers is ?

A.

MASTER DOWN = (3*ADVER_ INTERVAL) + Skew_ time

B.

Skew Time= (255-Priority)/255

C.

By default, the time period for VRRP advertisement messages is 2 seconds

D.

By default, the VRRP preemption delay is I seconds

Full Access
Question # 7

As shown in the figure, SWA, SWB, SWC all run RSTP, GED/O/2 on SWB Ports and GEO/0/1 ports on SWC have a port role of ? Radio

A.

Alternative port, Backup port

B.

Backup port, root port

C.

Root port, Designated port

D.

Backup port, Alternative port

Full Access
Question # 8

The following statement about the IS-IS protocol is incorrect?

A.

The IS-IS protocol is a link-state protocol that runs between AS

B.

The IS-IS protocol supports CLNP networks

C.

Messages for the IS-IS protocol are encapsulated directly by the data link layer

D.

The IS-IS protocol supports IP network ad

Full Access
Question # 9

When the ABR is a type 5/7 LSA switch router for the NSSA zone, then the ABR can be paired to Category 7 LSA is a derivative of 5 LSAs for aggregation.

A.

True

B.

False

Full Access
Question # 10

In VXLAN scenarios, what features can be turned on to reduce flooding of ARP messages between VTEPs?( Multiple select).

A.

Host Information Collection

B.

Local ARP agent

C.

port isolation

D.

ARP broadcast suppression

Full Access
Question # 11

The authentication types of ISIS include interface authentication, zone authentication, and routed domain authentication

A.

True

B.

False

Full Access
Question # 12

What is correct about the multicast message forwarding?

A.

RPF check failure indicates that the multicast data packets are received from a suboptimal interface, but the interface still receives multicast traffic and forwards it downstream

B.

IGMP snooping function can not control the range of multicast traffic in the Ethernet flood

C.

In the multicast transmission mode, the destination address of the message can specify the location of the receiver

D.

The source address of the multicast message is the unicast address

Full Access
Question # 13

What are the reasons why the BGP connection is down after it is successfully established ? ( Single choice questions) Single choice

A.

The wrong BGP packet was received.

B.

The mandatory attribute in the route update packet is missing.

C.

Open message negotiation failed.

D.

After the BGP connection is established, the keepalive message is not received within the negotiated holdtime time.

Full Access
Question # 14

In Huawei devices, when SIS introduces external routes and sets external route tags for route information, the Metric type of ISIS does not need to be modified and remains default.

A.

True

B.

False

Full Access
Question # 15

Regarding BGP/MPLS IP VPN routing interactions, the following description is incorrect?

A.

The ingress PE changes the IPv4 route received by the CE to the VPNv4 route, and the storage

B.

PE is carried out according to different VPN instances What interacts with the CE is IPv 4 routing information

C.

After receiving the VPNv4 route issued by the ingress PE, the egress PE filters the VPNv4 route according to the RT attribute carried by the route

D.

The egress PE can send an IPv4 route to the remote CE via BGP, IGP, or static routing

Full Access
Question # 16

What does RT do in MPLS VPN? Multiple choice questions).

A.

Allows the peer PE to decide which VPNv4 routes to import into a particular VRF

B.

Allows peer PE to decide which VPNv4 routes not to import into a particular VRF

C.

Allows the peer CE to decide which VPNv4 routes to import into a particular VRF

D.

Allows the peer CE to decide which VPNv4 routes not to import into a particular VRF

Full Access
Question # 17

The following statement about IPv6 Over VXLAN is wrong as ?( Single choice questions).

A.

The tunnel between VXLAN Layer 2 and Layer 3 gateways is an IPv4 network.

B.

IPv6 over VXLAN solves the problem of insufficient IP address resources for end tenants.

C.

IPv6 Over VLANs do not generate ND table entries.

D.

IPv6 over VXLAN means that the Overlay network of the VXLAN is an IPv6 network.

Full Access
Question # 18

An advanced access control list is a sequence of rules consisting of permit |deny statements that can match IP messages based on which attributes ?(). Multiple select).

A.

Destination port number

B.

Source address

C.

Destination address

D.

Source port number

Full Access
Question # 19

If a Huawei S series switch needs to designate a member switch as the primary switch of the stack, it can power on this switch first, and then power on other member switches after 20s.

A.

True

B.

False

Full Access
Question # 20

Which of the following descriptions of MPLS header TTL are correct?

A.

Copy IPTIL value is handled in such a way that the LSR of the MPLS domain is hidden, which plays a certain security role

B.

Can prevent wireless circular forwarding of messages

C.

MPLS has two ways of handling TTL, one is that the IP packet copies the PTTL of the MPLS header hen it enters the MPLS network Value; Another is to set the TTL of the MPLS header to 255 at the entrance LER

D.

When copying TTL is disabled, tracert can see the LSR of the passing MPLS domain

Full Access
Question # 21

In the description of the MAC address spoofing attack, the error is ? Radio

A.

Mac address spoofing attacks cause the switch to learn the wrong mapping of Mac addresses to IP addresses

B.

A MAC address spoofing attack causes the data that the switch is sending to the correct destination to be sent to the attacker

C.

MAC address spoofing attacks primarily exploit the switch Mac address learning mechanism

D.

An attacker can perform a MAC address spoofing attack by sending a forged source Mac address data frame to the switch

Full Access
Question # 22

An engineer uses 2 routers to test Pv6 services and runs OSPFV3 to achieve interconnection and interoperability of IPV6 networks The RI has access to the loopback address of R2 The engineer looks at ri's OSPF3 routing table entry and finds that there is no route reaching the R2 loopback address It can't be caused by which of the following?

A.

R2 does not enable OSPFv3 on the loopback port

B.

R2 does not advertise the loopback address

C.

R2 in area 0 to advertise the loopback into a different OSPFv3 process

D.

R2 does not configure the Router ID used in the OSPFv3 process

Full Access
Question # 23

CMPv6 uses the Type field to identify the message type, and according to the value of the type field, we can divide the ICMPv6 message into two categories, one is the error message and the other is the information message

A.

True

B.

False

Full Access
Question # 24

The existing router HWl running BGP is configured with both IBGP neighbors and EBGP tenants. The following descriptions about IBGP Neighbors and EBGP Neighbors are correct?

A.

The router will have an EBGP BGP neighbor from it must be connected directly, otherwise, IBGP-Multi-hop must be configured

B.

The router sends BGP updates learned from its EBGP neighbors to its other IBGP neighbors and EBGP neighbors

C.

IBGP neighbors can establish neighbor relationships through the Loopback interface

D.

The router sends BGP updates learned from its IBGP neighbors to its other IBGP neighbors and EPGP neighbors

E.

EBGP neighbors must be directly connected, otherwise, EBGP-Multi-hop must be configured with

Full Access
Question # 25

In the use of the LACP protocol, the following description is correct ?( Multiple select).

A.

You can avoid the Eth-Trunk interface from frequently shaking interface eth-trunk 1l lacp preempt enable lacp preempt delay delay-time with the following command

B.

Source IP address load sharing, interface eth-trunk1Load-balance src-dst-ip, can be configured in an enabled link aggregation group with the following command

C.

The member interface can be removed from an enabled link aggregation group with the following command: interface GigabitEthemeto/0/1 Shutdown nterface Gigabithemet/O/1undo eth-trunklinterface GigabitEthemet0/0/1 undo shutdown

D.

A chain cluster that can be initiated through an order Join the member interface :interface GigabitEthemeto/0/1 shutdown interface igabitEthemetO/0/1 tunkportGigabitEthermet0/0/1 interface GigabitEthermet0/0/1 Undo shutdown

Full Access
Question # 26

In the following topology diagram, R1 can access the Internet through R2 and R3, R1 and R2, R1 and R1 An EGP connection is established between R3 , and R2R3 belongs to the same AS, each via BGP Publishing a default route that requires R1 to visit lnternet's traffic preference R2, can the following practices be achieved?

A.

R1 specifies that the peer R3 sets the MED property to 150 in the import direction

B.

R2 specifies that the peer R1 sets the local priority to 150 in the export direction

C.

R2 specifies that the peer R1 sets the MED property to 150 in the export direction

D.

R1 specifies that the peer R2 beats the local priority in the import direction to 150

Full Access
Question # 27

As shown in the figure, an engineer uses four routers to test the interoperability of branch networks, where R1, R2, and R3 in branch 1 deploy OSPF Network interoperability is implemented, and R, R3, R4 in Branch 2 is deployed is-IS to achieve network interoperability. Now that the engineer wants to implement R1 access to R4's loopback address, which of the following actions will meet this requirement?

A.

No configuration is required

B.

Publish default routes only in the OSPF process for R2

C.

In the OSPF process of R2 and the IS-IS process, the default routes are published separately

D.

Publish the default route only in the IS-IS process of R2

Full Access
Question # 28

Traditional BGP-4 can only manage IP4 unicast routing information, and MP-BGP extends BGP-4 to provide support for multiple network layer protocols. Among them, MP-BGP's support feature for IPv6 unicast networks is called BGP4+, BGP4+ via NextHop The route next hop address information is carried by the attribute.

A.

TRUE

B.

FALSE

Full Access
Question # 29

With an existing network running OSPF, what types of LSAs cause ISPF operations?

A.

2 ?LSA

B.

3 ?LSA

C.

1 ?LSA

D.

5 ?LSA

E.

4 ?LSA

Full Access
Question # 30

What are the benefits of using WRED?( Multi-select)

A.

Provides some low latency

B.

Avoid TCP global synchronization

C.

Avoid congestion completely

D.

Provides a small bandwidth guarantee

E.

Can avoid UDP occupying most of the bandwidth when congested

Full Access
Question # 31

The switch SWA and SWB are connected together by 2 Ethernet links, where the switch SWA has the following interface configuration:

A.

Without changing the current configuration, GigabitEthernet1/0/1 and GigabitEthernet1/0/2 can join the same aggregation group

B.

Because of the different VLANs allowed, GigabitEthernet1/0/1 and GigabitEthernet1/0/2 cannot join the same aggregation group

C.

After link clustering is configured on both SWA and SWB, if MSTP is enabled on the switches SWA and SWB Both GigabitEthernetl1/0/1 and GigabitEthernetl/O/2 are the forwarding status of MSTP

D.

Only if the configuration of GigabitEthernet 1/0/2 is changed to match GigabitEthernet 1/0/1 can the two join the same aggregation group

Full Access
Question # 32

Regarding the characteristics of CE double attribution, the description is wrong with ?

A.

CE accesses the backbone through two links that can be used as both load sharing and primary and standby links.

B.

CE and PE form a CE dual-home network, which can ensure high network availability.

C.

VRFs of two PEs connected to the same CE can belong to different VPNs.

D.

In the CE dual home network, it is possible to generate loops, and you can use route-tag to solve the loop problem.

Full Access
Question # 33

IS-IS supports the processing and computation of IPv6 routes by adding ATLPs to carry IPv6 addresses and reachability information.

A.

TRUE

B.

FALSE

Full Access
Question # 34

The following description of the BGP route reflector is ?( Multiple choice questions).

A.

Cluster_List is an optional non-staging property for ring protection within the cluster.

B.

The route learned from the client, all non-clients and clients published to this RR.

C.

A network of bones is divided into multiple reflection clusters, each of which configures the other RRs as non-clients, and establishes an IBGP full connection between the RRs.

D.

The Originator_ID attribute is generated by the Route Reflector (RR) for inter-cluster ring protection.

Full Access
Question # 35

As shown in the figure, SWA, SWB runs the PSTP protocol, and Cost of Path remains the default without modification, so the following statement is correct

A.

GEO/0/1 on ASWB is Alternative port

B.

GE0/0/2 on SWB is Alternative port

C.

SWA On GEO/0/1 for backup port

D.

SWB will become the root bridge

Full Access
Question # 36

What are the following correct statements about MUX VLANs?( Multiple select).

A.

The Principal VLAN can communicate with all VLANs within the MUX VLAN

B.

Each Separate VLAN must be bound to a Principal VLAN

C.

Separate VLANs can communicate with all VLANs within a MUX VLAN

D.

Each Group VLAN must be bound to a Principal VLAN

Full Access
Question # 37

An engineer performed the ingestion operation on an OSPF router in a network of the company, is the following statement about the introduction of the routing LSA correct?

A.

The A. Advertising Router report is set to as the Router ID of ASBR

B.

Net Mask is set to all 0

C.

Link State lD is set as the destination network segment address

D.

Using the Link State ID and Advertising Router, you can uniquely identify an LSA

Full Access
Question # 38

Which of the following options can affect the establishment of IBGP neighbors?

A.

iBGP-Multi-hop is not configured

B.

Authentication is unsuccessful

C.

IGP routing is not passable

D.

BGP protocol version inconsistencies

Full Access
Question # 39

The following message about OSPFV3 is correct?

A.

The Option field of the Hello and DD packets extends to 24-bit

B.

LSR packets containing the full LSA header information for requesting an update to the LSA

C.

The LSACK message contains LSA header information to confirm receipt of the LSU message

D.

The Hello message must contain the interface ID of the sending interface

Full Access
Question # 40

Because BGP is an EGP routing protocol, BGP routing policies can only be deployed between EBGP neighbors, and routing policies between IBGP neighbors are not valid.

A.

TRUE

B.

FALSE

Full Access
Question # 41

What is wrong with the following statement about digital certificates?

A.

Digital signatures guarantee the integrity of digital certificates.

B.

Digital certificates contain public key information.

C.

Authentication fails when the peer certificate is received within the validity period, but the device itself is in the wrong time if it is not within the validity period of the certificate.

D.

Even if two PRI entities are not in the same CA system, authentication can be completed as long as both parties can recognize each other's CA.

Full Access
Question # 42

Unlike STP, RSTP has only one BPDU type, its value is 2, and there is no TCN BPDU.

A.

TRUE

B.

FALSE

Full Access
Question # 43

The following statement about RSTP root protection is correct?

A.

Turning on root protection on the root port takes effect

B.

The port that turns on the root protection receives the RST BDPU with a higher priority and will enter the error-down state

C.

It is recommended that you turn it on on a switch that is at the edge of the network

D.

After opening the root-protected port and receiving the RSTBPDU with a higher priority, if it does not continue to receive the RSTBPDU with a higher priority for a period of time, it will return to the normal forwarding state

Full Access
Question # 44

The following is the correct statement about the LSA of OSPFv3?

A.

Inter-AreaPrefix-SA's LinkStatelD contains the prefix

B.

Router-LSA and Network-LSA does not contain routing information

C.

When the Intra-AreaPrefixLSA's ReferencedLinkStateType-2, referencedLinkStatelD contains the interface to DR ID

D.

Inter-AreaPrefirLSA also contains LinkLocal information file

Full Access
Question # 45

Compared to IPV4 multicast, which of the following descriptions is the characteristic of IP6 multicast?

A.

IPv6 multicast does not contain MSDP and dense mode

B.

The first 8bit IPV6 multicast address is always FF(11111111).

C.

IPv6 multicast clients use IGMPv3 to join multicast groups

D.

IPv6 multicast load sharing extends the multicast routing rules and is completely independent of RPF check

Full Access
Question # 46

As shown in the topology diagram, all interfaces of the router in the figure are enabled with the ISIS protocol, and the following statement is correct.

A.

If the RI's Ethernet0/0/0 interface goes down, R2 becomes the master device

B.

If the Ri's Ethernet0/0/1 interface goes down, R2 becomes the master device

C.

If R3's G E0/0/0 interface goes down, R2 becomes the master device

D.

If R3's Ethernet0/0/0 interface goes down, then R2 becomes the master device

Full Access
Question # 47

NO: 322

The following description of MED, correct:

A.

MED default value is 100

B.

MED can only be passed within this AS

C.

MED is an optional non-transitional attribute

D.

MED The default value is 0

Full Access
Question # 48

The following is a description of how BFD sessions are established, which is the wrong one

A.

The system distinguishes between static BFD sessions and dynamic BPD sessions by dividing the identifier area Dynamically assign this landmark identifier

B.

BFD sessions can only be established dynamically

C.

Static configuration of BFD session refers to manual configuration of BFD session parameters through the command line, including local identifiers and remote identifiers

Full Access
Question # 49

MQC, like PBR—can only be called under the device's Layer 3 interface.

A.

TRUE

B.

FALSE

Full Access
Question # 50

When you deploy LLQ, you need to configure bandwidth parameters, what is the significance of bandwidth parameters?( Single choice questions).

A.

Provides a built-in policer to limit the maximum available bandwidth of a low-latency queue during congestion

B.

The parameter should be as small as possible. It means that the bandwidth is always preserved, and even if the LLQ is set, changing the parameters will reduce the available bandwidth of the interface

C.

It represents a reference CIR to calculate the burst size D of the built-in tactician token bucket Changing parameters is an option because LLQ always takes precedence over other queues

Full Access
Question # 51

Configuring filter-policy 2000 export in the IS-IS process, the wrong statement about the function of the command is ?

A.

which needs to be used in conjunction with route ingestion, acts as an external route sender neighbor that only partially introduces.

B.

If you do not configure this command, the device will by default introduce the external routing protocol to the IS-IS route all outgoing

C.

Restricts the external publication of route entries generated by the device itself

D.

This command will filter the link status information released to the outside world

Full Access
Question # 52

The following is correct about the LSA of OSPFv3

A.

The Link State ID of inter-area prefix-SA, which contains prefix information

B.

Router-LSA and Network-LSA do not contain routing information

C.

When the Referenced Link State Type-2 of the Intra-AreaPrefixLSA, referenced Link State ID Contains the interface ID of the DR

D.

Inter-Area PrefirLSA also contains LinkLocal Information

Full Access
Question # 53

What are the characteristics of Syslog information?

A.

The transmission of Syslog messages is not secure

B.

The transmission of Sysiog messages is reliable

C.

The transmission of Syslog messages is confirmable

D.

The transmission of Syslog messages is secure

E.

The transmission of Syslog messages is not acknowledgable

F.

The transmission of Syslog messages is unreliable

Full Access
Question # 54

You are now troubleshooting a LAN, and you suspect that the error is due to a mismatch in the work mode. Which switch interface error indicates that the 10/100/100O IEE gigabit interface operating mode does not match?( Multiple choice questions).

A.

Alignment error

B.

FCS error

C.

Super Small Frame

D.

Excess Conflict

E.

Lag conflicts

Full Access
Question # 55

The following description of MP-BGP is incorrect?( Single choice questions).

A.

The MP_UNREACH_NLRl of the update message, excluding the path nationality.

B.

MP-BGP can be used to assign tags.

C.

MP_REACH_NLRI and MP_UNREACIH_NLRI are optional transition properties.

D.

A complete MP_REACH_NLRI attribute structure contains address family, next hop, and prefix information.

Full Access
Question # 56

The duplicate address detection feature for NDP in the following description is incorrect?

A.

IPv6 unicast address is called a tentative address after it is assigned to an interface and before it is detected by duplicate addresses

B.

Duplicate address detection is implemented via RS and RA messages

C.

IPv6 duplicate address detection technology is similar to free ARP in IPv4

D.

The interface needs to perform duplicate address detection before enabling any of the unicast IPv6 addresses

Full Access
Question # 57

In PIM-SM, the description of RP is incorrectly ?

A.

All members of the group and the multicast sources that send multicast data to the group converge to the unique RP

B.

The initial multicast streams for all groups in the shared tree are forwarded to the receiver via RP

C.

An RP can serve multiple multicast groups at the same time, a multicast group can correspond to multiple RPs

D.

RPs can be responsible for the forwarding of several or all multicast groups, and there can be an RP in the network

Full Access
Question # 58

The following description of the link state protocol is plausible?

A.

CPU utilization is high and loops are easy to generate

B.

Slow convergence and low CPU utilization

C.

Fast convergence and low CPU utilization

D.

Fast convergence and high CPU utilization

Full Access
Question # 59

What type of prefix does a router running BGP advertise to its IBGP neighbor (assuming the router is not configured as a route reflector)? (radio).

A.

Prefixes are learned through other IBGP neighbors, or prefixes are learned from EBGP neighbors, or prefixes are learned through routing introduction

B.

A prefix that exists in the routing table

C.

Prefixes are learned through other BGP neighbors, or prefixes are learned locally through network or routing introduction

D.

Prefixes are learned through EBGP neighbors, or prefixes are learned locally through network or routing introduction

E.

The prefix is learned through an EBGP neighbor, or the prefix is learned from an from RR

Full Access
Question # 60

As shown in the figure,

in the context of IPv4 and IPv6, the SEL field in the NET address of the ISIS is always valued as 00?

A.

True

B.

False

Full Access
Question # 61

IPSGs can statically configure binding tables or form binding tables by using them with DHCP-Snooping

A.

True

B.

False

Full Access
Question # 62

As shown in the figure, there are two IP6 networks that can access the IPv4 network, and the IPsec tunnel needs to be established between the two IPv6 networks to communicate, which of the following requirements?(). Single choice questions).

A.

ESP + tunnel mode

B.

AH + transmission mode

C.

AH + tunnel mode

D.

None of the above options are correct

Full Access
Question # 63

Regarding the Stub region and the NSSA region of the OSPF protocol , the following statement is incorrect with a single choice

A.

Neither the Stub region nor the NSSA region allows injection of Type4 LSA

B.

Type5 LSA injection is not allowed in the Stub region, while Type5LSA injection is allowed in the NSSA region

C.

Type7LSA injection is not allowed in the Stub region, while Type7LSA injection is allowed in the NSSA region

D.

Both the Stub region and the NSSA region allow injection of Type3 LSA

Full Access
Question # 64

Is the following statement about the multicast address used by 0SPFv3 correct?

A.

RD routers use FF02: :6

B.

The DR router uses FF08::6

C.

All OSPF routers use FF02::5

Full Access
Question # 65

There is no routing protocol running on the router HW and only one default route reaches the remote network. On the router job with the extension Ping remote file server address 105401. The result of Ping on the router job is presented as "Request time." out”? Based on the above description, the error in the following analysis is ?

A.

Router HW's next hop router does not have a path to the destination address

B.

Ping is successful, but congestion occurs on the path to the destination address

C.

ICMP packets can reach the destination address But the destination device failed to reply

D.

Router HW does not have a legitimate route to the destination address

E.

There is a firewall in the remote destination network, and no ICMP traffic is allowed

Full Access
Question # 66

Comparisons for primary switch elections in the stack include ?

A.

MAC address

B.

Health status

C.

Stack priority

D.

Stack ID

Full Access
Question # 67

When you troubleshoot a local area network with Huawei equipment deployed, you find that there are a large number of unicast frames with unknown source AC addresses in the local area network . A large number of unknown source MAC addresses single-plug frames can cause the switch the biggest danger is ?

A.

Memory that occupies the cache ton

B.

Increases the power consumption of the power supply

C.

Consumes a TCAM table entry

D.

Consume the available bandwidth

E.

Consume the MAC address table entry available in the system

Full Access
Question # 68

When configuring ISIS zone authentication, which ISIS message will carry the authentication letter? ( Single choice questions).

A.

ISIS ?Level-1 ?SNP ?LSP?

B.

ISIS ?Level-2 ?SNP ?LSP?

C.

Hello message of ISIS's Level-1.

D.

Hello message of ISIS's Level-2

Full Access
Question # 69

In order to configure M4, you first need to define a RADIUS server, which is defined as follows:

Huawei]radius-server template EXAM

[Huawei-radius-EXAM]radius-servershared-key cipher HUAwei123(Huawei-radius-EXAM]radus-server authentication 10766661812(Huawei-radius-

EXAM]radius-server authorization 1076666

1812[Huawei-radius-EXAM]radius-server accounting 10766661813 (Huawei-radius EXAM]radius-server retransmit 2

A.

True

B.

False

Full Access
Question # 70

A company's two-layer phase network architecture as shown in the figure, when the engineer is configured to find that the business between departments can not communicate, through the command to view the status of the equipment as follows, please determine the possible causes?

A.

The BPDU interval between switches is not configured

B.

The Transition VLAN mapping between the handover machines is not configured to be caused

C.

The Revislon Level configuration is inconsistent between switches

D.

Inconsistent Registry Name configuration between text exchange machines

Full Access
Question # 71

In 0SPFv3 , Router-LSA is generated by each router, which describes the interface address and cost of each link of the router, and also includes the RouterlD of the neighbor router

A.

True

B.

False

Full Access
Question # 72

If the topology of the entire network does not change, but the allocation of IP segments in the router changes, ISIS only uses PRC to calculate the changed routing information, and does not recalculate all SPT

A.

True

B.

False

Full Access
Question # 73

Regarding the DSCP field, the following statement is incorrect: single selection

A.

The DSCP value can be 0, and packets use the default forwarding mechanism when 0

B.

When the value of DSCP is EF, it indicates that the data belongs to the accelerated forwarding class.

C.

In addition to indicating the priority of the data, DSCP can also indicate the probability of data being discarded. The CS class in D. DSCP divides data into 8 priorities.

Full Access
Question # 74

During isis ' broadcast network database synchronization, is the following statement correct?

A.

R2, as DIS, sends CSNP periodically.

B.

R2 As DIS, Hello time is 3 times that of a normal router . C. R2 as DIS does not receive PSNP nouns for other routes.

C.

RI and R3 maintain database consistency by periodically sending PSNP requests.

Full Access
Question # 75

Regarding the OSPFv3 protocol, the following description is incorrect?

A.

In the case of sharing a single router, each OSPFV3 process runs independently

B.

In the same OSPFv3 process under the same interface, you can run multiple instances of

C.

You can support running multiple instances on a single link

D.

OSPFv3 message header will contain the Instance ID field

Full Access
Question # 76

In MPLSVPN, in order to distinguish between IPv4 prefixes that use the same address space, the RD value is added to the IPv4 address, and the following options are described correctly as ?

A.

RD can be used to control the publication of VPN routing information

B.

On a PE device, each VPN instance corresponds to an RD value, and the RD value must be unique on the same PE device

C.

RD is encapsulated in the Update message as an extended community attribute of BGP during delivery

D.

After the PE receives an IPv4 route from CE, it adds an RD to the route to IPv4 that translates to a globally unique VPN-IPv4 route and publishes it on the public network

Full Access
Question # 77

BGP can only automatically aggregate routes whose source is Incomplete.

A.

True

B.

False

Full Access
Question # 78

There is an As-path-filter.ip as-path-filter 1 permit*(100l400) $, which As-path-filter can match which of the following AS_PATH Attribute?( Confirmed).

A.

300 4200

B.

1234 1400

C.

3100

D.

100

Full Access
Question # 79

Regarding the Stub region in the OSPF protocol, the following statement is correct.

A.

Virtual connections cannot traverse the Stub region

B.

Backbone zones cannot be configured as Stub zones

C.

ASBR cannot exist in the Stub zone

D.

Type7 LSA injection is not allowed in the Stub zone

Full Access
Question # 80

Is the following description of the OSPFv3 message correct?

A.

The interface ID of the sending interface must be included in the A Hello packet

B.

The LSACK message contains LSA header information to confirm the receipt of LSU packets

C.

The LSR message contains the complete LSA header information for requesting an update to the LSA

D.

Hello messages and the Option field for DD messages extends to 24-bit

Full Access
Question # 81

BGP4+ is running between two routers, and the neighbor relationship is normal, but the BGP routing table of the router on this side does not have a neighbor route entry.

A.

The route entry in the peer BGP route table is non-optimal.

B.

The next hop address of the

C.

BGP route entry is unreachable

D.

Peer ignore is configured on the peer

E.

The peer is configured with active-route-advertise

Full Access
Question # 82

Man-in-the-middle attacks or IP/MAC spoofing attacks can lead to information leakage and other hazards, and are more common in the intranet, in order to prevent man-in-the-middle attacks or IP/MAC spoofing attacks, you can take the configuration method

A.

Enable DHCP snooping to check the chaddr field in a DHCP request message

B.

Configure the trusted/untrusted interface

C.

Configure DHCP snooping on the switch to interbolde with DAI or IPSG

D.

Limit the maximum number of MAC addresses allowed to be learned on the switch interface

Full Access
Question # 83

Regarding the site in the BGP/MPLSIP VPN network architecture, the following description is correct?

A.

Under no circumstances can different sites that belong to the same VPN use overlapping address spaces

B.

Two geographically separated networks must belong to different sites

C.

Terminals connected to the carrier network through the same CE may belong to different sites

D.

A site is a set of IP systems, and a network of hosts cannot be called site

Full Access
Question # 84

The following description of the LDPLSP establishment process is correct?

A.

By default, LSRs are for the same FEC, and the received tag mappings can only come from the optimal next hop, not from the non-optimal next hop.

B.

When a network topology change causes the next hop neighbor to change, the free label keep method is used. LSR can quickly rebuild the LSP by directly using the labels sent by the original non-optimal next-hop neighbor. Liberal needs more memory and tag space.

C.

In the DoD mode of label publishing, for a specific FEC, the LSR does not need to obtain a label request message from upstream to distribute the label.

D.

The process of establishing a D. LSP is actually to bind the FEC to the tag and advertise this binding to the LSP upstream LSR process.

Full Access
Question # 85

The following about the Router-LSA of OSPFv3 is correct?( Single choice questions).

A.

The router-LSA data area contains the Link-Local address

B.

The router-LSA data area contains the Interface ID of the neighbor on this side

C.

Similar to OSPFv2, the Option field exists in the header of LSA, not in the data area of Router-LSA

D.

When LS type= Ox0001 in the head of LSA, the data area representing LSA is Router-LSA

Full Access
Question # 86

The following description of BGP loop protection is correct: multi-select

A.

Any routing information from an IBGP peer is advertised to the other IBGP peers

B.

Any update information received from the EBGP peer that contains its own AS number in the AS-PATH attribute is discarded via the AS-PATH attribute

C.

Non-RR BGP routers do not announce any updates from IBGP peers to other IBGP peers

D.

BGP routers do not announce any slaves The EBGP peer comes to update the information to its EBGP peer

Full Access
Question # 87

Regarding the LDP protocol session establishment process, the description is correct?

A.

When both parties receive a keepalive message from the peer, the LDP session is successfully established

B.

Hello messages discovered by LDP neighbors use TCP messages with a destination address of multicast address 224002

C.

After the TCP connection is successfully established, the active party sends an initialization message to negotiate the relevant parameters of the LDP session,

D.

The party with the larger transmission address initiates the establishment of a TCP connection as the active party

Full Access
Question # 88

The DHCP protocol assigns to clients—some TCPIP-related parameter information—in the process DHCP defines a variety of messages that are encapsulated at the transport layer :(sortic).

A.

PPP package

B.

IP encapsulation

C.

TCP Encapsulation

D.

UDP Encapsulation

Full Access
Question # 89

What designs in the router can improve the reliability of the router?

A.

Dual power supply design

B.

Module hot-swappable design

C.

Issu Design

D.

Dual-engine design

Full Access
Question # 90

When running OSPFv3 on a Huawei router, the OSPFv3 process automatically selects an interface address as the process router id

A.

True

B.

False

Full Access
Question # 91

Router A has an IP route entry with a purposeful CIDR block of 10001/32 and an outgoing interface of GigabitEthernetO/0/1. Now add the following configuration: acd number 2000 rule 10 permit source1001.10#traffic classifier test if-match acl 2000 # traffic behavior test remarkdscp cs3#traffic policy test classifier test behavior test#

interfaceGigabitftherneto/0/1 ip address 1001212552552550 traffic-policy test outbound#assuming router A received a destination IP of 10001 Of packets, the following statements are correct:

A.

If the data packet source lIP address is 1001.2, it can be forwarded with the DSCP field marked CS3

B.

If the packet source IP address is 1001.1, it can be forwarded while the DSCP field is marked as CS3

C.

If the packet source IP address is 1001.2, it cannot be forwarded

D.

If the packet source IP address is 1001.2, it can be forwarded while the DSCP field remains unchanged

Full Access