Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! H12-222 has been withdrawn.

H12-222 Practice Exam Questions with Answers Huawei Certified Network Professional-R&S-IENP Certification

Question # 6

Which command is used to enable association between BFD and OSPF on all interfaces?

A.

bfd enable

B.

bfd all-interface enable

C.

all-interface bfd enable

D.

undo bfd all-interface disable

Full Access
Question # 7

Which of the following statements regarding RT are true? (Multiple Choice)

A.

Each VPN instance is associated with one or more pairs of VPN Target attribute, used to control VPN routing information advertisement and reception between sites.

B.

Ts are classified into two types: Export Target and Import Target.

C.

Export Target and Import Target are independent from each other and support multiple values to implement flexible VPN access control.

D.

The RT value is advertised to neighbors through the BGP extended community attribute in Update messages.

Full Access
Question # 8

Which are the new requirements on the enterprise network stimulated by the mobility trend? (Multiple Choice)

A.

Unified wired and wireless management

B.

Consistent service experience anytime, anywhere

C.

Fast deployment of mobile applications

D.

Strict hierarchical networking

Full Access
Question # 9

DHCP snooping is a security feature that can be used to defend against various attacks, including: (Multiple Choice)

A.

Starvation attacks by changing the CHADDR field value

B.

Bogus DHCP server attacks

C.

TCP flag attacks

D.

Man-in-the-middle attacks and IP/MAC spoofing attacks

Full Access
Question # 10

Which of the following are included in the full lifecycle guest management of the Agile Controller? (Multiple Choice)

A.

Account registration

B.

Account approval and distribution

C.

Account authentication

D.

Account audit and deregistration

Full Access
Question # 11

Which configuration modes are supported by VXLAN? (Multiple Choice)

A.

Virtualization software configuration

B.

SDN controller configuration

C.

SNMP configuration

D.

Automatic configuration

Full Access
Question # 12

Packet loss occurs only at the transmit end.

A.

TRUE

B.

FALSE

Full Access
Question # 13

Which of the following statements regarding MPLS label space is false?

A.

The label space 16-1023 is shared by static LSPs and static CR-LSPs.

B.

The label space 1024 and higher is shared by dynamic signaling protocols, such as LDP, RSVP-TE, and MP-BGP.

C.

When the last hop receives packets with the label control 0, it directly performs IP forwarding or forwards the packets based on the next-layer label.

D.

When the penultimate-hop LSR performs label switching, if it finds that the label value after the switching is 3, then it pops out the label and sends the packet to the last hop.

Full Access
Question # 14

ASPF enables the firewall to support multi-channel protocols such as FTP and to define security policies for complex applications.

A.

TRUE

B.

FALSE

Full Access
Question # 15

On the network shown in the following figure, a MPLS LSP is configured and a local LDP session is established between SWA and SWB. Which of the following statements is true?

H12-222 question answer

A.

The configuration is correct.

B.

The MPLS LSR IDs of the two devices must be different.

C.

MPLS does not need to be enabled globally.

D.

MPLS does not need to be enabled on interfaces.

Full Access
Question # 16

Flow mirroring is divided into bcal flow mirroring and remote flow mirroring.

A.

TRUE

B.

FALSE

Full Access
Question # 17

Which of the following is not the application scenario of the guest access management function of the Agile Controller?

A.

Customers access the enterprise network, public resources, or Internet during exchanges with or visits to the enterprise.

B.

Citizens access the Internet through the network provided by public utilities.

C.

Consumers connect to the Internet over the enterprise network.

D.

Enterprise employees on a business trip connect to the enterprise network through the branch network.

Full Access
Question # 18

MPLS performs different actions on labels. What is the meaning of the pop action?

A.

The top label is removed from the MPLS label stack.

B.

The top label is added to the MPLS label stack.

C.

The top label is replaced with another value.

D.

The top label is replaced with the label of another group.

Full Access
Question # 19

Which queue technology is used to implement the Best-Effort Service model?

A.

FIFO

B.

WFQ

C.

PQ

D.

LQ

Full Access
Question # 20

How is traffic classification classified based on reference different information of rules? (Multiple Choice)

A.

Simple traffic classification

B.

Complex traffic classification

C.

On-demand classification

D.

Service traffic classification

Full Access
Question # 21

IP packets are marked with the ToS field for QoS, and the first 6 bits of the ToS field mark the DSCP priority.

A.

TRUE

B.

FALSE

Full Access
Question # 22

Which remote alarm notification modes are supported by eSight? (Multiple Choice)

A.

Email

B.

Voice

C.

SMS message

D.

WeChat

Full Access
Question # 23

MPLS supports multi-layer labels and connection-oriented on the forwarding plane, therefore it is widely used. So Which of the following is not the cause for MPLS deployment?

A.

Wide recognition by vendors

B.

Traffic engineering capabilities

C.

Simplifying route query on software-based routers

D.

Using VPN services

Full Access
Question # 24

The WRED drop profile defines the following parameters for AF21 traffic: the lower drop threshold is 35, the upper drop threshold is 40, and the maximum drop probability is 50%. Which of the following statements regarding the processing result of AF21 traffic are false? (Multiple Choice)

A.

When the average length of packets in the queue is smaller than 35, packets are discarded.

B.

When the average length of packets in the queue is larger than 35 and smaller than 40, the drop probability of packet is 50%.

C.

When the average length of packets in the queue is larger than 40, packets enter the queue.

D.

When the average length of packets in the queue is larger than 40, packets are discarded.

Full Access
Question # 25

Among the BE service model, IntServ model, and DiffServ model, only the IntServ model and DiffServ model can provide multi-service QoS guarantee. During network construction, the network edge should use the IntServ model and the network core should use the DiffServ model.

A.

TRUE

B.

FALSE

Full Access
Question # 26

Which of the following items is not the disadvantage of the traditional congestion avoidance mechanism (tail drop)?

A.

Global TCP synchronization

B.

High jitter and long delay

C.

High cost

D.

Packets are discarded without differentiating the priority

Full Access
Question # 27

Which of the following is correct procedure for a DHCP client to apply for an IP address from a DHCP server?

H12-222 question answer

A.

1-2-3-4

B.

1-4-3-2

C.

3-2-1-4

D.

3-4-1-2

Full Access
Question # 28

MPLS is a label forwarding technology, Which of the following MPLS statements is false?

A.

MPLS uses the connection-oriented control plane and connectionless data plane.

B.

The control plane transmits route information and distributes labels. The data plane transmits packets along the created label switched path (ISP).

C.

Switches in an MPLS domain only need to forward packets based on the label added before the IP header.

D.

Compared with traditional IP forwarding, MPLS label forwarding greatly improves the data forwarding efficiency.

Full Access
Question # 29

MPLS VPN is used to solve some limitations of traditional VPN technology. Which are the major limitation that MPLS VPN solves?

A.

Private routes cannot communicate with each other.

B.

Leased lines are expensive.

C.

Bandwidth resources cannot be fully used.

D.

The address space is overlapping.

Full Access
Question # 30

MPLS supports forwarding equivalence class (FEC). Which of the following cannot be used as a FEC allocation standard?

A.

Fragment offset

B.

Destination address

C.

Application protocol

D.

Class of Service (CoS)

Full Access
Question # 31

The TTL field encapsulated to the MPLS label header can prevent infinite loops of MPLS packets. Which of the following statements regarding the TTL field are true? (Multiple Choice)

A.

MPLS encapsulation in frame mode supports the TTL field. MPLS encapsulation in cell mode does not support the TTL field.

B.

MPLS provides two processing modes on the TTL field: 1. TTL in the MPLS header copies the IP TTL value when an IP packet enters the MPLS network. 2. The ingress LER sets the TTL value in the MPLS header to 255.

C.

The processing of IP TTL copy hides the LSR in a MPLS domain, improving the network security.

D.

If TTL copy is disabled, users can use the tracert function to view the LSR of the MPLS domain.

Full Access
Question # 32

Which IP precedence value represents the critical service traffic?

A.

0

B.

2

C.

5

D.

6

Full Access
Question # 33

How is NFV defined?

A.

Network infrastructure virtualization

B.

Network function virtualization

C.

Network bus virtualization

D.

Network architecture virtualization

Full Access
Question # 34

The QoS service model includes? (Multiple Choice)

A.

BE service model

B.

IntServ model

C.

DiffServ model

D.

FIFO model

Full Access
Question # 35

Which of the following statements regarding the firewall interzone security policy is true?

A.

The interzone security policies are arranged in the order of the match, the listed first is matched preferentially.

B.

The interzone security policy with the smaller ID is matched preferentially.

C.

The interzone security policy with the larger ID is matched preferentially.

D.

The interzone security policies are listed automatically based on sequence numbers. When the order is changed, the number is changed.

Full Access
Question # 36

What are the advantages of NFV? (Multiple Choice)

A.

Reduce device and energy cost.

B.

Shorten the network service innovation period.

C.

Uses the unified software versions for devices and uniformly manage access tenants.

D.

Provide services for different applications and tenants through the single platform.

Full Access
Question # 37

Which mechanism can be used with VRRP to monitor the uplink connectivity? (Multiple Choice)

A.

Association with an interface

B.

BFD

C.

NQA

D.

IP link

Full Access
Question # 38

BFD uses TCP connections and the destination port number is 3784.

A.

TRUE

B.

FALSE

Full Access
Question # 39

Which of the following statements regarding forwarding equivalence class (FEC) in MPLS are false?

(Multiple Choice)

A.

Packets with the same FEC are processed differently on a MPLS network.

B.

FECs can be divided flexibly by source IP address, destination IP address, source port, destination port, protocol type, VPN, or any combinations of them.

C.

MPLS classifies packets with the same forwarding processing mode into one FEC.

D.

One FEC has only one unique label marker.

Full Access
Question # 40

Which are the layers of SDN network architecture? (Multiple Choice)

A.

Orchestration application layer

B.

Control layer

C.

Logical layer

D.

Forwarding layer

Full Access
Question # 41

In peer-to-peer VPN model, which of the following devices is directly connected to a client and is responsible for connecting VPN services to the carrier network?

A.

CE

B.

PE

C.

P

D.

Client device

Full Access
Question # 42

Which of the following statements regarding the VRRP backup are true? (Multiple Choice)

A.

When the VRRP backup receives VRRP packet from the VRRP master, it can determine whether the master is in the normal state.

B.

When receiving VRRP packets with the priority of 0, the backup directly switches to be the master.

C.

The backup discards IP packets destined for the virtual MAC address.

D.

The backup responds to IP packets destined for the virtual IP address.

Full Access
Question # 43

Which of the following statements regarding the differences between GTS, LR, and CAR is false?

A.

During traffic control, CAR enables the device to discard the packets of which the rate is exceeded.

B.

During traffic control, GTS enables the device to buffer packets of which the rate is exceeded into queues.

C.

During traffic control, LR enables the device to discard the packets of which the rate is exceeded.

D.

During traffic control, LR enables the device to buffer the packets of which the rate is exceeded and to send packets to QoS queues.

Full Access