Pre-Winter Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! H12-224 has been withdrawn.

H12-224 Practice Exam Questions with Answers HCNP-Routing & Switching (Fast Track) Certification

Question # 6

Which of the following statements regarding the OSPF feature is false?

A.

OSPF uses the link state algorithm

B.

Each router advertises local link state information by flooding LSAs

C.

Each OSPF device collects LSAs sent by other routers All LSAs form the link state database (LSDB)

D.

AII the routers in OSPF Area 0 have the same 13DML Based on the directed graph each router uses a SPF algorithm to compute the shortest path tree with itself as the root

Full Access
Question # 7

Which of the following statements regarding VRRP is false?

A.

The master in the VRRP group is selected based on priorities

B.

The master sends gratuitous ARP packets and notifies the connected device or host of its virtual MAC address 'iSSi

C.

if the master fails the new master is selected among backup devices based on priorities

D.

The priority ranges from 1to 255 When the backup received VRRP Advertisement packets which the priority is 0 the backup discards the packets

Full Access
Question # 8

Which of the following statements regarding DR/BDR are false?

A.

All DR others establish neighbor relationships with DR and BDR only.

B.

In a broadcast network, DR and BDR must be elected. A broadcast network without a

DR or BDR cannot operate normally.

C.

DR others listen on the multicast address 224.0.0.5.

D.

DR others listen on the network address 224.0.0.6.

Full Access
Question # 9

Which are lower-layer physical devices of NFV framework?

A.

Storage device

B.

Network device

C.

Server

D.

Air conditioning system

Full Access
Question # 10

An attacker sends ICMP Request packets with the destination address as the broadcast address of the attacked user host. What is this attack?

A.

IP spoofing attack

B.

Smurf attack

C.

ICMP redirection attack

D.

SYN Flood attack

Full Access
Question # 11

A DHCP server supports various types of address allocation policy allocation policies to meet different requirement. Which of the following is not a correct address allocation policy?

A.

Automatic allocation

B.

Dynamic allocation

C.

Duplicated allocation

D.

Manual allocation

Full Access
Question # 12

Which of the following are roles in port mirroring?

A.

Mirrored port

B.

Local observing port

C.

Remote mirroring port

D.

Trunk port

Full Access
Question # 13

Which of the following statements regarding IGMP snooping are true? (Multiple Choice)

A.

IGMP snooping prevents multicast packets from being broadcast at Layer 3.

B.

IGMP snooping is a multicast restraint mechanism that runs on layer 2 Ethernet switches to manage and control multicast groups.

C.

IGMP snooping creates a multicast MAC address table by listening to IGMP packets sent from hosts.

D.

IGMP snooping does not consume CPU resources of switch.

Full Access
Question # 14

Which of the following statements regarding the OSPF protocol is false?

A.

After a router receives a Network-Summary-LSA, this router runs a SPF algorithm.

B.

Network-LSA describes link state information of broadcast and NBMA segment.

C.

A virtual connection is a virtual link that belongs to the backbone area (Area 0).

D.

Type 4 LSA describes how to reach an A5BR, including routing and topology information.

Full Access
Question # 15

RSTP provides faster convergence than STP, what are causes?

A.

RSTP defines the edge port role. The edge port does not receive and process configuration BPDUs, and not participate in RSTP calculation

B.

When the root port fails, the optimal alternate port will become the root port and the forwarding state.

C.

In RSTP, when a port is elected as the designated port, it enters the discarding state.

Then the port immediately enters the forwarding state

D.

In RSTP, when a port receives is bpdus form the upstream designated bridge , the port will compare the own stored is bpdu with the E. When the designated port fails, the optimal alternate port will become the root port and enter the forwarding state.

Full Access
Question # 16

Which of the following BGP attributes can define a set of destination addresses with the public characteristics?

A.

origin

B.

Community

C.

AS. Path

D.

MED

Full Access
Question # 17

Which of the following statements regarding the static LACP mode are false?

A.

If a high bandwidth of the link between two directly connected devices is required but the remote does not support LACP you

B.

In static LACP mode a larger LACP priority of an interface indicates a higher priority of

the interface and a high probability of become

C.

The interface that forwards data is called the active interface that does not forward data

is called the inactive interface fails.

D.

When preemption is enabled and an active interface fails , the backup interface with a larger priority becomes the active interface after become the active interface.

Full Access
Question # 18

Which of the following statements is false?

A.

A device with a higher router priority has a higher election priority

B.

If two devices have the same muter priority the device with a larger router ID has a higher election priority

C.

If the current DR fails the current BDR automatically becomes a new DR and a BDR will be elected again

D.

When a muter with the highest router priority joins an OSPF network this router will become the new DR

Full Access
Question # 19

During network design, VLANs are assigned in many ways which of the following ways is seldom adopted?

A.

10

B.

5

C.

25

D.

20

Full Access
Question # 20

Which of the following items are used to remind customers of information security?

A.

Account soft-out reminder

B.

Password updated reminder

C.

Log protection reminder

D.

Data backup reminder

Full Access
Question # 21

RSTP provides different functions in different scenarios. Which of the following statements are false?

A.

If the edge port on the switch enabled with BPDU protection receives RST BPDU, the switch sets the edge port as a non-edge-port

B.

The role of the designated port that is enabled with root protection cannot be changed.

C.

When the designated port enabled with root protection receives optimal RST BPDUs, the port enters the Discarding state and does

D.

RST BPDUs within a certain period of time, the port will automatically restore to the Forwarding state.

E.

After TC protection is enabled, you can set the number of times the switch processes TC BPDUs with a certain period.

Full Access
Question # 22

MPLS VPN is used to solve some limitations of traditional VPN technology. Which are the major limitation the MPLS VPN solves?

A.

Private routes cannot communicate with each other

B.

Leased lines are expensive

C.

Bandwidth resources cannot be fully used

D.

The address space is overlapping

Full Access
Question # 23

In the Controller's access control scenario, which of the following statements regarding the roles of the RADIUS server and client is true?

A.

The Agile Controller integrates all functions of the RADIUS server and client.

B.

The Agile Controller as the RADIUS server, while the user terminal as the RADIUS client.

C.

The authentication device (such as a 802.1X switch as the RADIUS server, while the user terminal as the RADIUS client).

D.

The Agile Controller as the RADIUS server, while the authentication device (such as a 802.1x switch) as the RADIUS clients.

Full Access
Question # 24

Which of the flowing statements regarding Huawei eSight network management software is false?

A.

Multiple users can be created for network management Users may be asked to log in to

B.

eSight from specified IP addresses in specific time ranges.

C.

% The administrator can force unauthorized login users to log out.

D.

% The login time of the administrator role also can be limited.

Full Access
Question # 25

Which of the following command is used to apply the traffic policy to an interface on an AR router?

A.

traffic-policy pi inbound

B.

traffic classifier pi inbound

C.

traffic behavior pi inbound

D.

services-policy pi inbound

Full Access
Question # 26

Which of the following authorization items is not required for risky operations?

A.

Management authorization

B.

Technology authorization

C.

Customer authorization

D.

Administrative authorization

Full Access
Question # 27

What are the mainly methods of data collection?

A.

Collection by physical optical splitter

B.

Collection through port mirroring

C.

Centralized collection by NMS

D.

Automatic collection

Full Access
Question # 28

Compared with traffic policing, traffic shaping uses queues to cache the traffic that exceeds the limit which of the following statements regarding traffic shaping is false?

A.

Compared with traffic policing traffic shaping has good anti-burst capability

B.

Traffic shaping enables packets to be transmitted at an even rate

C.

Because queues are used the delay is added when congestion occurs.

D.

Compared with traffic policing traffic shaping is more suitable for voice service

Full Access
Question # 29

When a huawei router serves as an SSH client and attempts b log to another huawei muter, the login, it is suspected that the SSH server configuration is incorrect which of the following causes is the most impossible for the server fault?

A.

The SSH protocol is not bound in the VTY user interface view.

B.

The user service type authentication type and user service type are not configured.

C.

The SSH server and client have inconsistent versions.

D.

The SSH first-time authentication function is disabled.

Full Access
Question # 30

What features must a risky operation solution have?

A.

Accuracy

B.

Good portability

C.

Verification

D.

Rollback

Full Access
Question # 31

MPLS uses LDP to provide different label distribution modes. Which of the following statements regarding LDP label distribution control modes are false?

A.

LDP label distribution can be controlled in ordered mode

B.

ln ordered mode when an LSR is the origin of a route it can send label mapping messages to the upstream router in

C.

LDP label distribution cannot be controlled in independent mode

D.

ln independent mode an LSR cannot send label mapping messages to the upstream router before it receives label m

Full Access
Question # 32

Which of the following is not an external risk to a project?

A.

Exchange rate change

B.

Rainstorm disaster

C.

Social unrest

D.

Differences of industrial standards

Full Access
Question # 33

By default vrrp on a huawei AR router works in preemption mode

A.

TRUE

B.

FALSE

Full Access
Question # 34

In the VRP, by default, the routes imported by BGP will be automatically summarized.

A.

TRUE

B.

FALSE

Full Access
Question # 35

Which information are included in the DHCP binding entry?

A.

MAC address

B.

IP address

C.

Lease time

D.

Physical port and UDP port

Full Access
Question # 36

Which of the following statements regarding the stateful inspection firewall is true?

A.

The stateful inspection firewall needs to match the rules for each incoming packet

B.

Because UDP is a connectionless protocol so the stateful inspection firewall cannot match UDP packets with the status table

C.

When the stateful inspection firewall checks packets of one same connection are not correlated

D.

The stateful inspection firewall only needs to match the first data packet against a rule and the subsequent packets of the conned

Full Access
Question # 37

What is the multicast destination address of VRRP packets?

A.

224.0.0.18

B.

224.0.0.20

C.

224.0.1.18

D.

224.0.1.20

Full Access
Question # 38

During EBGP peer relationship troubleshooting, it is found that two directly connected devices set up connections using loopback interfaces command is executed to check the configuration of peer ebgp-max hop hop-count. Which of the following statements is correct?

A.

The hop count must be greater than

B.

The hop count must be greater than2

C.

The hop count must be greater than 15

D.

The hop count must be greater than 255

Full Access
Question # 39

Which of the following is not overlay VPN technology?

A.

GRE

B.

IPSec VPN

C.

SSL VPN

D.

L2TP VPN

Full Access
Question # 40

Which of the following is not the application scenario of the guest access management function of the Agile Controller?

A.

Customers access the enterprise network public resources or Internet during exchanges with or visits to the enterprise

B.

Citizens access the Internet through the network provided by public utilities

C.

Consumers connect to the Internet over the enterprise network

D.

Enterprise employees on a business trip connect to the enterprise network through branch network

Full Access
Question # 41

Which of the following statements regarding MUX VLAN is false?

A.

Each group VLAN must be bound to a principal VLAN

B.

lf the VLAN ID has been used by the principal VLAN this VLAN cannot be used for the

VLANIF interface super-VLAN or sub-VLAN

C.

After MUX VLAN is enabled on an interface VLAN mapping and VLAN stacking can be configured on the interface

D.

An enterprise can use the principal port to connect to the enterprise servers separate port to connect to enterprise customers and groups to employees can both access enterprise servers enterprise employees can communicate with each other enterprise customers cannot communicate with each other

Full Access
Question # 42

Which of the following firewalls has the highest forwarding efficiency when processing non- first-packet data flows?

A.

Packet filtering firewall

B.

Proxy firewall

C.

Stateful inspection firewall

D.

Software firewall

Full Access
Question # 43

When bgp route load balancing is configured and there are two load balancing routes whose first eight bgp attributes described in bgp route the two routes prefix be advertised to neighbors?

A.

The two routes will be both advertised to other BGP peers

B.

One optimal route is selected from the two routes and then advertised to other BGP peers

C.

The two routes will not be advertised to other BGP peers

D.

One optimal route is selected from the two routes and then advertised to IBGP peers

Full Access
Question # 44

Which of the following contents are include in a migration project solution?

A.

Migration preparation

B.

Migration implementation

C.

Rollback solution

D.

Contingency plan

Full Access
Question # 45

In addition to P2P network, which of the following network types is supported in IS-IS else?

A.

P2MP

B.

NBMA

C.

SNAP

D.

LAN(broadcast network)

Full Access
Question # 46

If router priority is set to 0 for a router.it is allowed to elect this router as a DR or BDR

in an OSPF routing domain, but its priority is the lowest

A.

TRUE

B.

FALSE

Full Access
Question # 47

If the number of checked goods is different from the number of goods on the packing

list, you can unpack and inspect goods and then contact the vendor to handle the inconsistency

A.

TRUE

B.

FALSE

Full Access
Question # 48

Which of the following statements regarding the alarm is fault authentication type conflicts with the local authentication key or authentication type.

A.

Incorrect interface authentication configuration

B.

Inconsistent Hello intervals

C.

Unmatched subnet masks

Ds Inconsistent area IDs

Full Access
Question # 49

Which configuration modes are supported by VXLAN?

A.

Virtualization software configuration

B.

SDN controller configuration

C.

SNMP configuration

D.

Automatic configuration

Full Access
Question # 50

Which of the following items is not the disadvantage of the traditional congestion avoidance mechanism.

A.

GIobal TCP synchronization

B.

High jitter and long delay

C.

High cost

D.

Packets are discarded without differentiating the priority

Full Access
Question # 51

which of the following subsystems are involved in building cabling?

A.

Horizontal subsystem

B.

Access subsystem

C.

Backbone subsystem

D.

Vertical subsystem E. Switching subsystem

Full Access
Question # 52

During follow-up operation of the strured network troubleshooting process, which of the following documents need to be transferred?

A.

Troubleshooting intermediate documents

B.

Troubleshooting summary report

C.

Change backup and maintains suggestions

D.

User communication plan

Full Access
Question # 53

Which of the following causes will lead a failure to establish BGP peer relationships?

A.

An ACL is configured to prohibit all TCP connections between two BGP neighbor

B.

Two IBGP peers are not physically directly connected

C.

BGP synchronization is enabled on fully-meshed IBGP peers

D.

Two BGP peers are configured with different routing Update intervals

Full Access
Question # 54

Which of the following command is used to configure the listening address of the SDN controller?

A.

openflow listening-ip 1.1.1.1

B.

sdn controller souce-addressl.1.1.1

C.

controller-ip 1.1.1.1

D.

sdn listening-ip 1.1.1.1

Full Access
Question # 55

Which of the following statements regarding OSPF external route types is false?

A.

OSPF includes type 1 and type 2 external routes

B.

The cost of a Type 1 external route is the addition of the AS external cost and the AS internal cost the cost form a router to an A

C.

The cost of a Type 2 external route is the AS external cost

D.

A Type 2 external route is always preferred over a Type 1 external route when other when other conditions are the same

Full Access
Question # 56

MSTP has different port roles. Which statement are false?

A.

Other pots except the edge port participate in MSTP calculation

B.

A port can function as different roles in different MSTIs

C.

A regional edge port is located at the backup of the root port and provides a path from the designated to the root bridge

D.

The backup port functions as the backup of the root port and provides a path from the designated bridge to the root bridge

Full Access
Question # 57

Ethernet supports broadcast once a network loop occurs this simple broadcast mechanism will cause catastrophic consequences which of the following symptoms may

be caused by a loop?

A.

Users cannot log in to the device remotely

B.

The display interface coming output shows a large number of broadcast packets received on an interface

C.

The CPU usage exceeds 70%

D.

A lot of ICMP packets are lost in ping tests

Full Access
Question # 58

How is CAPEX defined?

A.

Cost expenditure

B.

Capital expenditure

C.

One-time expenditure

D.

Daily expenditure

Full Access