Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Huawei > HCIE-Datacom > H12-891_V1.0

H12-891_V1.0 HCIE-Datacom V1.0 Question and Answers

Question # 4

In the SD-WAN Solution, which routing protocols can be used by LAN-side devices to connect to a Layer 3 network?

A.

IS-IS

B.

OSPF

C.

BGP

D.

RIP

Full Access
Question # 5

The RR (Route Reflector) is critical to the Huawei SD-WAN Solution, and its deployment mode varies based on the scenario. In which of the following modes can an RR be deployed?

A.

Multi-area deployment of the RR

B.

Independent deployment of the RR

C.

Co-deployment of the RR and hub site

D.

Partially independent deployment of the RR

Full Access
Question # 6

Which of the following statements about BIER (Bit Index Explicit Replication) and PIM (Protocol Independent Multicast) are correct?

A.

On a BIER-based multicast network, packets sent by the multicast source must be encapsulated with the Bitstring field.

B.

On a PIM-based multicast network, an MDT covering all nodes that multicast traffic traverses needs to be established.

C.

On a BIER-based multicast network, an MDT covering all nodes that multicast traffic traverses does not need to be established.

D.

On a BIER-based multicast network, multicast users must send group join messages hop by hop.

Full Access
Question # 7

Drag the IPsec functions on the left to the corresponding function description on the right.

Full Access
Question # 8

Collecting information before a cutover helps you determine whether services are normal before and after the cutover.

A.

TRUE

B.

FALSE

Full Access
Question # 9

Which of the following statements is incorrect about a BGP/MPLS IP VPN?

A.

In most cases, CEs are unaware of VPNs and do not need to support MPLS or MP-BGP.

B.

A BGP/MPLS IP VPN consists of customer edges (CEs), provider edges (PEs), and providers (Ps). PEs and Ps are carrier devices, whereas CEs are BGP/MPLS IP VPN customer devices.

C.

Inter-site communication can be implemented through VPN. A site can only belong to only one VPN.

D.

Ps only need to provide basic MPLS forwarding capabilities and do not need to maintain VPN-related information.

Full Access
Question # 10

Which of the following link types may appear in OSPF Router-LSAs?

A.

TransNet

B.

P-2-P

C.

Vlink

D.

StubNet

Full Access
Question # 11

In the Huawei SD-WAN Solution, which of the following routing protocols is used to advertise VPN routes between CPEs?

A.

RIP

B.

OSPF

C.

IS-IS

D.

BGP

Full Access
Question # 12

Which of the following statements is correct about 6PE and 6VPE?

A.

In 6PE networking, VPN instances need to be created on PEs.

B.

In 6PE networking, IPv6 addresses of a CE can be reused.

C.

In 6VPE networking, IPv6 addresses of a CE can be reused.

D.

In 6VPE networking, no VPN instance needs to be created on PEs.

Full Access
Question # 13

The Ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is ______ IRB forwarding. (Capitalize the first letter.)

Full Access
Question # 14

IS-IS supports multi-instance and multi-process. Which of the following statements are correct about IS-IS multi-instance and multi-process?

A.

One IS-IS process can be associated with only one VPN instance.

B.

One VPN instance can be associated with multiple different IS-IS processes.

C.

One IS-IS process can be associated with multiple different VPN instances.

D.

If multiple IS-IS processes are created on an IS-IS router, these processes are independent of each other.

Full Access
Question # 15

Which of the following technologies can be used to measure performance based on actual service traffic in Huawei ' s CloudWAN solution?

A.

TWAMP

B.

BGP FlowSpec

C.

Telemetry

D.

iFIT

Full Access
Question # 16

The telemetry network model is broadly and narrowly defined. Which of the following modules are involved in telemetry in a narrow sense (device-side telemetry)?

A.

Data generation

B.

Data push

C.

Data source

D.

Data subscription

Full Access
Question # 17

In the firewall hot standby scenario, when VGMP works in load balancing mode, which of the following functions must be enabled on the firewalls to prevent the return traffic from being discarded because it does not match any session entry in the case of inconsistent forward and return paths?

A.

Automatic backup

B.

Manual batch backup

C.

Quick session backup

D.

BFD

Full Access
Question # 18

OSPFv2 is an IGP running on IPv4 networks, whereas OSPFv3 is an IGP running on IPv6 networks. OSPFv2 and OSPFv3 have similar LSA types, but their LSA functions are slightly different. Which of the following is not an OSPFv3 LSA type?

A.

ASBR-Summary-LSA

B.

AS-External-LSA

C.

Router-LSA

D.

Network-LSA

Full Access
Question # 19

The following information is displayed during OSPF troubleshooting. Based on this information, which of the following is the cause of the failure in establishing an OSPF adjacency relationship?

< Huawei > display ospf error interface GigabitEthernet 0/0/0

OSPF Process 1 with Router ID 10.0.12.2

OSPF error statistics

Interface: GigabitEthernet0/0/0 (10.0.12.2)

General packet errors:

0 : Bad version 0 : Bad checksum

0 : Bad area id 0 : Bad authentication type

0 : Bad authentication key 0 : Unknown neighbor

0 : Bad net segment 0 : Extern option mismatch

0 : Router id confusion

HELLO packet errors:

2 : Netmask mismatch 0 : Hello timer mismatch

0 : Dead timer mismatch 0 : Invalid Source Address

A.

The area types are inconsistent.

B.

The authentication passwords are inconsistent.

C.

The IP address masks of the interfaces are inconsistent.

D.

Hello packets are sent at different intervals.

Full Access
Question # 20

Which of the following statements about GRE is incorrect?

A.

GRE can encapsulate IPv6 unicast packets.

B.

GRE can encapsulate IPv4 unicast packets.

C.

GRE can encapsulate IPv6 broadcast packets.

D.

GRE is easy to implement and puts little burden on devices at both ends of a tunnel.

Full Access
Question # 21

Which of the following statements is incorrect about MP-BGP?

A.

MP-BGP uses the MP_REACH_NLRI and MP_UNREACH_NLRI attributes to advertise VPNv4 routes.

B.

When PEs and CEs exchange routes through BGP, you need to create a BGP process for each VPN instance in the CE.

C.

The packet types and VPNv4 route advertisement policies of MP-BGP are the same as those of BGP-4.

D.

MP-BGP needs to allocate private network labels for VPNv4 routes.

Full Access
Question # 22

Network Quality Analysis (NQA) is a real-time network performance detection and measurement technology. It monitors the performance of multiple protocols running on a network. Which of the following protocols can be monitored by NQA?

A.

SNMP

B.

OSPF

C.

ICMP

D.

DHCP

Full Access
Question # 23

An SRv6 Policy can be either statically configured on a device, or be delivered to a device after being dynamically generated by the controller.

A.

TRUE

B.

FALSE

Full Access
Question # 24

How long is an IPv6 prefix assigned to a host when an IPv6 address is configured for the host in SLAAC mode?

A.

64 bits

B.

32 bits

C.

96 bits

D.

128 bits

Full Access
Question # 25

When you configure a virtualized campus network on iMaster NCE-Campus and enable external networks to connect to the Internet, iMaster NCE-Campus will automatically deliver a specific route to direct traffic to the corresponding external network.

A.

TRUE

B.

FALSE

Full Access
Question # 26

The following figure shows some configurations of R1. Based on these configurations, which of the following statements about IS-IS on R1 are correct?

isis 1

is-level level-2

cost-style wide

network-entity 49.0022.ee8c.a0c2.baf1.00

isis 2 vpn-instance tt

is-level level-2

cost-style wide

network-entity 47.00ce.390d.efdc.b3e1.00

isis 3 vpn-instance rr

is-level level-2

cost-style wide

network-entity 47.cc0a.3efb.bbdd.aae1.00

A.

Process 1 contains the global routing information and routing information of VRFs tt and rr.

B.

Routing information is shared between processes 2 and 3.

C.

Process 1 contains only global routing information.

D.

Routing information of process 2 is isolated from that of process 3.

Full Access
Question # 27

Which of the following statements about prefix segments and adjacency segments are correct?

A.

A prefix SID is a local SID out of the SRGB range.

B.

An adjacency SID is an offset value within the SRGB range advertised by the source end.

C.

A prefix segment identifies the prefix of a destination address on a network.

D.

An adjacency segment identifies an adjacency on a network.

Full Access
Question # 28

The IS-IS Level-1 neighbor relationship is not established between R3 and R4. Referring to the following information, what is the possible cause?

A.

The IIH authentication between R3 and R1 fails.

B.

The IS-IS levels of R3 and R4 do not match.

C.

The circuit types of the interfaces connecting R3 and R4 do not match.

D.

The area IDs of R3 and R4 are different.

Full Access
Question # 29

The following figure shows the inter-AS MPLS L3VPN Option C (Solution 2). ASBR-PE2 is connected to CE3 and runs eBGP.

To enable all CEs to communicate with each other, which of the following address families must peer relationships be enabled in the BGP process of ASBR-PE2?

A.

VPNv4 address family

B.

BGP-LS address family

C.

VPN instance unicast address family

D.

Unicast BGP address family

Full Access
Question # 30

OSPF is deployed on a campus network to implement network interconnection. The LSDB of R2 is shown in the figure.

What can be determined from the LSDB?

A.

Area 1 is an NSSA.

B.

R2 translates Type 7 default route into Type 5 default route.

C.

R2 advertises the default route in the OSPF process.

D.

Area 1 does not have Type 3 LSAs. The possible cause is that R2 filters Type 3 LSAs in the outbound direction of area 1.

Full Access
Question # 31

Which of the following methods can be used to establish IPsec SAs? (Select All that Apply)

A.

Establish IPsec SAs through template negotiation

B.

Establish IPsec SAs in IKE auto-negotiation mode

C.

Establish IPsec SAs through certificate negotiation

D.

Manually establish IPsec SAs

Full Access
Question # 32

In Huawei SD-WAN Solution, which of the following tunneling technologies is used to establish data channels?

A.

IPsec

B.

GRE over IPsec

C.

VXLAN

D.

MPLS

Full Access
Question # 33

Which of the following is not the function of OSPFv3 Link-LSAs?

A.

Advertises the interface ID of the local router to other routers attached to the link.

B.

Advertises the link-local address of the local interface to other routers attached to the link.

C.

Advertises a list of IPv6 prefixes of the local interface to other routers attached to the link.

D.

Advertises the Options field in the Network-LSA originated on the local link to other routers attached to the link.

Full Access
Question # 34

Which of the following fields is added to BGP4+ Update packets to advertise IPv6 routes?

A.

A new path attribute: MP_UNREACH_NLRI

B.

A new path attribute: MP_REACH_NLRI

C.

A new path attribute: IPv6_REACH_NLRI

D.

A new NLRI type: IPv6_NLRI, which carries the IPv6 NLRI prefix length and IPv6 NLRI prefix.

Full Access
Question # 35

Which of the following protocols is used in the Huawei SD-WAN Solution to report device performance data?

A.

NetFlow

B.

SNMP

C.

BGP

D.

HTTP/2

Full Access
Question # 36

iMaster NCE-Campus provides the terminal identification function to display the terminal type, operating system, and manufacturer information.

A.

TRUE

B.

FALSE

Full Access
Question # 37

The BGP ORF function can be used to control the maximum number of routes that can be sent by a BGP peer. To achieve this, which of the following tools is used to send such a route list to BGP peers?

A.

Filter-policy

B.

Route-policy

C.

ACL

D.

IP prefix-list

Full Access
Question # 38

Which of the following statements is incorrect about access control on small and midsize campus networks based on the Huawei CloudCampus solution?

A.

iMaster NCE can function as an authentication server.

B.

Cloud APs support local Portal authentication.

C.

iMaster NCE can function as a Portal relay device.

D.

iMaster NCE can interconnect with a third-party RADIUS server.

Full Access
Question # 39

In BGP4+, what is the content of the next hop network address field carried in the MP_REACH_NLRI attribute of an Update packet?

A.

The link-local address and global unicast address can be carried at the same time.

B.

It can be only a link-local address.

C.

It must be a global unicast address.

D.

It must be a link-local address.

Full Access
Question # 40

MPLS supports Forwarding Equivalence Class (FEC). Which of the following cannot be used as a FEC allocation standard?

A.

Application protocol

B.

Fragment offset

C.

Class of Service (CoS)

D.

Destination address

Full Access
Question # 41

To obtain the token ID of iMaster NCE, you need to send an HTTP request using the following Python code to invoke an iMaster NCE RESTful API:

Which of the following statements is incorrect?

A.

You can run print(r.json()) to display the response message sent from the server.

B.

Token resources are located at https://139.9.213.72:18002/controller/v2/tokens.

C.

The HTTP request uses the GET method to query the token value.

D.

The request body is in JSON format.

Full Access
Question # 42

As shown in the following figure, an engineer tests network interconnection between two branches. To implement network interconnection, OSPF is deployed on R1, R2, and R3 of branch 1, and IS-IS is deployed on R2, R3, and R4 of branch 2. Which of the following operations needs to be performed to allow R1 to access R4 ' s loopback interface address?

A.

Run the default-route-advertise command in both the OSPF and IS-IS views on R2.

B.

No configuration is required.

C.

Run the default-route-advertise command only in the OSPF view on R2.

D.

Run the default-route-advertise command only in the IS-IS view on R2.

Full Access
Question # 43

Which of the following technologies can be used to isolate users in the same VLAN?

A.

Super VLAN

B.

Port isolation

C.

IPSG

D.

Ethernet port security

Full Access
Question # 44

MPLS implements data forwarding based on two different planes. Which of the following statements regarding the forwarding mechanism are correct?

A.

After an IP packet enters an MPLS domain, the MPLS device forwards the packet based on FIB table queries.

B.

If the tunnel ID is 0x0, the MPLS forwarding process starts.

C.

The system automatically assigns an ID to the upper-layer application that uses a tunnel. This ID is also called the tunnel ID.

D.

If the tunnel ID is not 0x0, the normal IP forwarding process starts.

Full Access
Question # 45

Which of the following statements about the SP scheduling algorithm is incorrect?

A.

If the SP scheduling algorithm is used and a high-priority queue occupies a large amount of bandwidth, the low-priority queue may be starved.

B.

The SP scheduling algorithm preferentially schedules high-priority queues.

C.

When the SP scheduling algorithm is used to schedule multiple low-priority queues, the data packets that enter the queue first are forwarded first.

D.

To ensure the quality of key services, the SP algorithm can be used to schedule services and set the minimum bandwidth.

Full Access
Question # 46

When static IPsec VPN is used for WAN interconnection in the Huawei CloudCampus Solution, the AP, Router, and ____ can be used as egress devices.

Full Access
Question # 47

gRPC (Google Remote Procedure Call) is a language-neutral, platform-neutral, and open-source remote RPC system that supports unary RPCs and streaming RPCs.

Which of the following service methods are NOT supported by gRPC?

A.

rpc Subscribe(SubsArgs) stream returns(SubsReply) {};

B.

rpc dataPublish(stream serviceArgs) returns(stream serviceArgs) {};

C.

rpc stream LotsOfGreetings(HelloRequest) returns (HelloResponse) {};

D.

rpc Cancel(CancelArgs) returns(CancelReply) {};

Full Access
Question # 48

Telemetry is a technology that remotely collects data from physical or virtual devices at high speed, and has a layered protocol stack. Which of the following layers is not included in the telemetry protocol stack?

A.

Communication layer

B.

Transport layer

C.

Data encoding layer

D.

Data analysis layer

Full Access
Question # 49

On an SR-MPLS network, manually configured prefix SIDs on different devices may conflict with each other. Assume that there are four routes (prefix/mask SID) as follows. Which of the following routes will be selected according to the conflict handling principle?

A.

1.1.1.1/32 → SID 2

B.

1.1.1.1/32 → SID 1

C.

2.2.2.2/32 → SID 3

D.

3.3.3.3/32 → SID 1

Full Access
Question # 50

On a broadcast network, if the DR priorities of two interfaces connecting two routers are set to 0, in which of the following states will the OSPF neighbor relationship stay?

A.

Full

B.

Down

C.

2-way

D.

Exchange

Full Access
Question # 51

In 6PE and 6VPE networking, no VPN instance needs to be created on PEs.

A.

TRUE

B.

FALSE

Full Access
Question # 52

MACsec can provide secure services during MAC-layer data transmitting and receiving. Which of the following services is not provided by MACsec?

A.

Controllability check

B.

Integrity check

C.

User data encryption

D.

Data source authenticity verification

Full Access
Question # 53

The figure shows an L3VPN over an SRv6 BE (Best Effort) network. According to the information displayed on PE2, which of the following statements is incorrect?

A.

An IBGP peer relationship is established between PE2 and PE1, and PE2 leams the route to 192.168.1.0/24 over an IBGP peer relationship.

B.

The instruction type corresponding to FO00:2 :: 1:79 is End.DT4.

C.

PE2 imports the route 192.168.1.0/24 through the import-route command.

D.

The router ID of the BGP process on the P is 1.0.0.6.

Full Access
Question # 54

During telemetry static subscription, the NMS delivers subscription configuration to devices for data sampling. Which of the following statements is incorrect about the sampling path huawei-debug:debug/cpu-infos/cpu-info?

A.

cpu-info may be a list node of the YANG model.

B.

The sampling path uses the YANG model structure.

C.

debug may be the top node of the YANG model.

D.

cpu-infos may be a container node of the YANG model.

Full Access
Question # 55

Flavors can be used to enhance SRv6 instructions to meet more diversified service requirements. Which of the following are flavors? (Select all that apply)

A.

Penultimate Segment Pop of the SRH (PSP)

B.

Ultimate Segment Decapsulation (USD)

C.

Ultimate Segment Pop of the SRH (USP)

D.

Penultimate Segment Decapsulation (PSD)

Full Access
Question # 56

NAFTIR policing can only be applied to the inbound direction. Its purpose is to monitor the traffic entering the device and ensure that the upstream device does not unnecessarily consume network resources.

A.

TRUE

B.

FALSE

Full Access
Question # 57

After a wireless user passes Portal authentication, which of the following parameters cannot be used for authorizing the user?

A.

free-rule

B.

UCL

C.

IP address

D.

ACL

Full Access
Question # 58

During the implementation of iMaster NCE-Campus Wi-Fi location-based services (LBS), terminal location data is sent to an LBS platform through HTTP requests. Which of the following data formats is used in such HTTP requests?

A.

XML

B.

HTML

C.

JSON

D.

YAML

Full Access
Question # 59

In the figure, SR-MPLS is enabled on R1, R2, and R3. The SRGB (Segment Routing Global Block) range on R3 is from 20000 to 21000, and the prefix SID index configured on the loopback1 interface of R3 is 30.

In this case, the MPLS label corresponding to the loopback1 interface of R3 is _____.

(Enter an Arabic numeral without symbols.)

Full Access
Question # 60

BGP routing policies can be used to control the advertisement and acceptance of routes.

A.

TRUE

B.

FALSE

Full Access
Question # 61

As shown in the following figure, an engineer tests network interconnection between two branches. To implement network interconnection, OSPF is deployed on R1, R2, and R3 of branch 1, and IS-IS is deployed on R2, R3, and R4 of branch 2. Which of the following operations needs to be performed to allow R1 to access R4 ' s loopback interface address?

A.

Run the default-route-advertise command in both the OSPF and IS-IS views on R2.

B.

No configuration is required.

C.

Run the default-route-advertise command only in the OSPF view on R2.

D.

Run the default-route-advertise command only in the IS-IS view on R2.

Full Access
Question # 62

Huawei Open Programmability System (OPS) uses HTTP methods to access managed objects to manage network devices. Drag the HTTP methods to their corresponding functions.

Full Access
Question # 63

The NETCONF content layer contains device configuration data.

Which of the following statements are correct about the following NETCONF configuration?

< ?xml version= " 1.0 " encoding= " UTF-8 " ? >

< rpc xmlns= " urn:ietf:params:xrnl:ns:netconf:base:1.0 " message-id= " 801 " >

< edit-config >

< target >

< running/ >

< /target >

< default-operation > merge < /default-operation >

< error-option > rollback-on-error < /error-option >

< config xmlns:xc= " urn:ietf:params:xml:ns:netconf:base:1.0 " >

< vlan xmlns= " http://www.huawei.com/netconf/vrp/huawei-vlan " >

< vlans >

< vlan >

< vlanId > 10 < /vlanId >

< protocolVlans >

< protocolVlan xc:operation= " merge " >

< protocolIndex > 0 < /protocolIndex >

< /protocolVlan >

< /protocolVlans >

< /vlan >

< /vlans >

< /vlan >

< /config >

< /edit-config >

< /rpc >

A.

The NETCONF < edit-config > operation is performed to load the configuration data to the startup configuration datastore.

B.

The Huawei-YANG model is used.

C.

VLAN 10 is created on the target device.

D.

The < config > operation contains an operation attribute so that the modified data is merged.

Full Access
Question # 64

During WLAN planning and design, channels 1, 6, and 11 are recommended on the 2.4 GHz frequency band, and channels 1, 5, 9, and 13 are recommended in high-density scenarios. On the 5 GHz frequency band, it is recommended that high-frequency and low-frequency channels of adjacent APs be staggered to prevent overlapping.

A.

TRUE

B.

FALSE

Full Access
Question # 65

To enhance reliability, you can deploy Huawei iMaster NCE-WAN controllers in active/standby mode. Which of the following IP addresses must be configured to be the same for the active and standby controllers so that the controllers can be accessed properly? (Select All that Apply)

A.

Southbound public IP addresses

B.

Internal interconnection addresses

C.

Southbound private IP addresses

D.

Northbound IP addresses

Full Access
Question # 66

HTTP is an application layer protocol for distributed, collaborative, and hypermedia information systems.

A.

TRUE

B.

FALSE

Full Access
Question # 67

Which of the following languages is integrated into the OPS?

A.

Python

B.

C programming language

C.

Java

D.

C++

Full Access
Question # 68

In addition to indicating priority, the DSCP value can also indicate the drop probability. Which of the following DSCP values is set with the highest drop probability?

A.

AF43

B.

AF10

C.

AF12

D.

AF11

Full Access
Question # 69

Huawei Open Programmability System (OPS) uses HTTP methods to access managed objects to manage network devices. To facilitate script compilation, Huawei OPS provides the Python script template. In the Python script template, what are the contents of the Content-type and Accept fields in the header of an HTTP request packet?

A.

text/xml, text/json

B.

text/json, text/json

C.

text/xml, text/xml

D.

text/json, text/xml

Full Access
Question # 70

YANG is a data modeling language for the definition of data sent over network management protocols such as NETCONF. Which of the following are basic YANG data models? (Select all that Apply)

A.

Set node

B.

Leaf node

C.

List node

D.

Tree node

Full Access
Question # 71

The display current-configuration command displays the running configurations in memory.

A.

TRUE

B.

FALSE

Full Access
Question # 72

Which of the following headend behaviors can insert SRHs into IPv6 packets? (Select All that Apply)

A.

H.Encaps.Red

B.

H.Insert

C.

H.Encaps

D.

H.Insert.Red

Full Access
Question # 73

On a CloudCampus virtualized campus network, service data enters different VNs from physical networks through edge nodes, and the VN that the data will enter is determined by the VLANs to which users belong. Which of the following statements about dynamic VLAN authorization is incorrect?

A.

When wired users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

B.

When wireless users pass Portal authentication, they join the authorization VLANs delivered to edge nodes.

C.

When wireless users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

D.

When wired users pass MAC address authentication, they join the authorization VLANs delivered to edge nodes.

Full Access
Question # 74

Which of the following user logout modes are supported by 802.1X authentication?

A.

An authentication server forces a user to log out.

B.

A user logs out manually.

C.

An access device forces a user to log out.

D.

An accounting server forces a user to log out.

Full Access
Question # 75

R1 receives a common IPv6 packet from the CE and generates a packet carrying the SRH (Segment Routing Header), as shown in the figure. The packet is forwarded along the path R1 → R2 → R3 → R4. Identify the node type of each device based on their role in SRv6 processing.

Full Access
Question # 76

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following BGP EVPN routes is used to advertise MAC addresses, ARP entries, and IRB routes?

A.

Type 3

B.

Type 4

C.

Type 2

D.

Type 1

Full Access
Question # 77

The Ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is _____ IRB forwarding. (Capitalize the first letter.)

Full Access
Question # 78

On an SR-MPLS network, manually configured prefix SIDs on different devices may conflict with each other. Assume that there are four routes (prefix/mask SID) as follows. Which of the following routes will be selected according to the conflict handling principle?

A.

1.1.1.1/32 2

B.

1.1.1.1/32 1

C.

3.3.3.3/32 1

D.

2.2.2.2/32 3

Full Access
Question # 79

On traditional campus networks, network admission control (NAC), VLAN, and ACL technologies are used to control users ' network access rights. This results in heavy network O & M workload. Which of the following improvements does the free mobility solution of iMaster NCE-Campus make to traditional campus networks in terms of policy management and control?

A.

Administrators can use iMaster NCE-Campus to centrally manage service policies on network-wide policy enforcement points.

B.

Administrators can define service policies based on security groups to decouple service policies from IP addresses.

C.

Administrators need to configure service policies multiple times for each policy enforcement point through iMaster NCE-Campus, which then automatically delivers the policies to the corresponding policy enforcement points.

D.

Policy enforcement points on a network can subscribe to IP-security group entries through iMaster NCE-Campus to obtain the mapping between users and IP addresses on the entire network.

Full Access
Question # 80

Which of the following statements about IPSG is incorrect?

A.

IPSG can be used to check the validity of IP packets. If IP packets are invalid, the device reports an alarm to an NMS.

B.

IPSG is a source IP address filtering technology based on Layer 3 interfaces.

C.

IPSG can be used to prevent hosts from changing IP addresses.

D.

IPSG can defend against IP address spoofing attacks.

Full Access
Question # 81

The figure shows a packet that contains three label headers. Select the values (in decimal notation) of the X, Y, and Z fields, respectively.

Full Access
Question # 82

According to the following information displayed on a router, which of the following are the causes of the failure in establishing an OSPF adjacency relationship?

OSPF error statistics:

    1: Hello timer mismatch

    0: Netmask mismatch

    0: Bad checksum

    0: Bad authentication type

    0: Unknown neighbor

    0: Extern option mismatch

A.

Hello packets are sent at different intervals.

B.

The area IDs are inconsistent.

C.

The IP address masks of the interfaces are inconsistent.

D.

The area types are inconsistent.

Full Access
Question # 83

The channelized sub-interface and FlexE technologies both can be used to implement network slicing, but the application scenarios of the two technologies are slightly different. Which of the following statements about the two technologies are correct?

A.

It is recommended that channelized sub-interface be used to reserve resources for interfaces with a bandwidth of less than 50 Gbit/s.

B.

It is recommended that FlexE be used to reserve resources for 50GE and higher-rate interfaces.

C.

Only FlexE-based network slicing can be deployed across OTN devices.

D.

Only network slicing based on channelized sub-interface can be deployed across MSTP devices.

Full Access
Question # 84

Telemetry data must be encoded in GPB binary format. This format reduces the number of bytes in telemetry messages and improves the transmission efficiency compared with messages encoded in JSON format.

A.

TRUE

B.

FALSE

Full Access
Question # 85

On a CloudCampus virtualized campus network, which of the following modes can be used by a fabric to connect to external networks?

A.

Layer 3 shared egress

B.

Layer 2 shared egress

C.

Layer 3 exclusive egress

D.

Layer 2 exclusive egress

Full Access
Question # 86

An LSR (Label Switching Router) supports various label retention modes. Which of the following statements regarding the liberal mode are correct?

A.

An LSR retains labels from a neighboring LSR only when the neighbor is its next hop.

B.

This label retention mode saves memory and label space.

C.

An LSR reserves all labels distributed by its neighbor.

D.

The liberal mode requires more memory and label space.

Full Access
Question # 87

Among NETCONF operations, the < config > operation may contain an operation attribute, which is used to specify an operation type for configuration data. Which of the following operation attributes is incorrect?

A.

remove

B.

merge

C.

create

D.

update

Full Access
Question # 88

When an NVE encapsulates a data frame into a VXLAN packet, information of which of the following protocols is encapsulated between the outer IP header and the VXLAN header?

A.

IP

B.

TCP

C.

UDP

D.

Ethernet

Full Access
Question # 89

On a small- or medium-sized campus network deployed based on the Huawei CloudCampus Solution, an AR functioning as the egress gateway supports web-based network management, registration center query, and DHCP Option 148-based deployment, but does not support CLI-based deployment.

A.

TRUE

B.

FALSE

Full Access
Question # 90

This figure shows an SRv6 (Segment Routing over IPv6) packet. If the Destination Address field in the IPv6 basic header is FC04::4, the value of the SL (Segment Left) field in the SRv6 header should be ____. (Enter only digits.)

Full Access
Question # 91

Which of the following statements about 802.1X authentication are correct?

A.

802.1X authentication uses EAPoL to exchange authentication information between the client, device, and authentication server.

B.

In EAP termination mode, EAP packets are terminated and re-encapsulated into RADIUS packets on the network access device. The network access device and AAA server use the standard RADIUS protocol to implement authentication, authorization, and accounting.

C.

EAPoL implements EAP encapsulation on an IEEE 802.3 network, whereas EAPoW implements EAP encapsulation on an IEEE 802.11 network.

D.

In EAP relay mode, EAP packets are directly encapsulated by the network access device into RADIUS packets (that is, EAP over RADIUS, or EAPoR). The network access device and AAA server use EAPoR to perform authentication, authorization, and accounting.

Full Access
Question # 92

In the Huawei CloudCampus Solution, which of the following deployment modes are supported by Huawei switches?

A.

DHCP Option 148

B.

CLI

C.

Web interface

D.

Huawei registration center

Full Access
Question # 93

Huawei Open Programmability System (OPS) uses HTTP methods to access managed objects to manage network devices. HTTP is the most widely used network transmission protocol on the Internet. By default, which TCP port number is used?

Full Access
Question # 94

SR-MPLS uses the MPLS forwarding plane, and therefore requires MPLS to be enabled. Which of the following conditions must be met for MPLS to be automatically enabled on an interface? (Select all that apply)

A.

The SRGB is configured for the IGP process.

B.

Segment routing is enabled for IGP, and IGP is enabled on the interface.

C.

The static adjacency label of the corresponding interface is configured in the segment routing view.

D.

Segment routing is enabled in the system view.

Full Access
Question # 95

Which of the following parameters is not included in an IPsec security association (SA)?

A.

Security parameter index (SPI)

B.

Destination IP address

C.

Security protocol ID (AH or ESP)

D.

Source IP address

Full Access
Question # 96

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following command needs to be run on the VBDIF interface to enable the VTEP peer to generate BGP EVPN Type 2 routes based on ARP information of the local terminal?

A.

mac-address xxxx-xxxx-xxxx

B.

arp-proxy enable

C.

arp collect host enable

D.

arp distribute-gateway enable

Full Access