Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! H12-811_V1.0 has been withdrawn.

H12-811_V1.0 Practice Exam Questions with Answers HCIA-Datacom V1.0 Exam Certification

Question # 6

After the network administrator uses the Tracer tRoute function on the router device, in the data packet sent by the router, the value of the Protoco1 field in the IPv4 header is?

A.

17

B.

B. 2

C.

1

D.

D. 6

Full Access
Question # 7

In a Layer 2 network with redundant links, which of the following protocols can be used to avoid loops?

A.

STP

B.

UDP

C.

ARP

D.

VRRP

Full Access
Question # 8

In the network shown in the figure, which of the following descriptions is correct? () (Multiple Choice Questions)

H12-811_V1.0 question answer

A.

The network between RTA and SWC is the same conflict domain

B.

The network between SWA and SWB is the same broadcast domain

C.

The network between SWA and SWC is the same conflict domain

D.

The network between SWA and SWC is the same broadcast domain

Full Access
Question # 9

The DHCPv6 server supports the provision of other configuration information such as DNS server addresses for the host. ()

A.

True

B.

False

Full Access
Question # 10

The Trunk port can send both tagged data frames and untagged data frames.

A.

True

B.

False

Full Access
Question # 11

What kind of packets does the OSPF protocol use to describe its LSDB? ()

A.

DD

B.

B. HELLO

C.

LSR

D.

D. LSU

Full Access
Question # 12

What kind of message does the OSPF protocol use to confirm the received LSU message? ()

A.

LSU

B.

LSR

C.

LSACK

D.

LSA

Full Access
Question # 13

The following statement about static routing in Huawei equipment is wrong ().

A.

The cost value (Cost) of a static route cannot be modified.

B.

The default value of the static route priority is 60

C.

The range of static route priority value is 1-255

D.

When the priority of a static route is 0, the route will definitely be preferred.

Full Access
Question # 14

UDP is oriented to connectionless and must rely on () to ensure the reliability of transmission. ()

A.

Internet Protocol

B.

Transmission Control Protocol

C.

Application layer protocol

D.

Network layer protocol

Full Access
Question # 15

If the MAC address of an interface is 0OEO-FCEF-OFEC, what is its corresponding EUI-64 address? ()

A.

02EO-FCFF-FEEF-OFEC

B.

00EO-FCFF-FEEF-OFEC

C.

02EO-FCEF-FFFE-OFEC

Full Access
Question # 16

After the administrator successfully logs in to the router through Telnet, it is found that the router's interface P address cannot be allocated, then the possible reasons are ()

A.

Telnet user level configurationB. False

B.

B. SNMP parameter configurationB. False

C.

Telnet user authentication mode configurationB. False

D.

D. The administrator uses the telnet terminal software to prohibit the corresponding operation

Full Access
Question # 17

As shown in the figure below. All switches enable the $P protocol and keep other configurations in their default state. When the network is stable, are the following statements correct? () (Multiple Choice Questions)

H12-811_V1.0 question answer

A.

Both ports of SWC are in Forwarding state

B.

Both ports of SWB are in Forwarding state

C.

SWA is the root bridge in this network

D.

D. SWB is the root bridge in this network

Full Access
Question # 18

The administrator cannot log in to the Huawei router through Telnet, but other administrators can log in normally, so which of the following are the possible reasons? ()*

A.

The authority level of the administrator user account has been modified to 0

B.

The administrator user account has been disabled

C.

The Te1net service of the AR2200 router has been disabled

D.

The administrator user account has been deleted

Full Access
Question # 19

Which of the following MAC addresses cannot be used as the MAC address of the host network card? ()*

A.

03-04-05-06-07-08

B.

00-02-03-04-05-06

C.

02-03-04-05-o6-d7

D.

01-02-03-04-05-06

Full Access
Question # 20

Which authorization modes are supported by AAA on Huawei ARG3 series routers? ()*

A.

Not authorized

B.

HWTACACS authorization

C.

Local authorization

D.

Authorization after successful RADIUS authentication

Full Access
Question # 21

Which of the following statements about RA. and RS messages in IPv6 are correct? ()*

A.

RS is used to request address prefix information

B.

RA. Used to reply address prefix information

C.

D. RS is used to reply address prefix information

Full Access
Question # 22

The route entry 10.0.0.24/29 may be aggregated from which of the following subnet routes? ()*

A.

10.0.0.23/30

B.

10.0.0.28/30

C.

10.0.0.26/30

D.

10.0.0.24/30

Full Access
Question # 23

The output information of the sub-interface of a certain router's aggregation port 1 is shown in the figure. Based on this information, which of the following statements is correct? ( )

[Router A] display Interface Eth-Trunk 1.100Eth-Trunk1.100 current state UP Line protocol current state UP Last line protocol up time 2019-03-04 10:22:40 UTC.-08:00 Description: HUAWEI, ARSeries, Eth-Trunk1.100 Interface Route Port, Hash arithmetiC.:According to SIP-XOR-DIP, Maximal BW:2G.Current BW:2G, The Maximum Transmit Unit is 1500 Internet Address is 10.0.12.2/24 IP Sending Frames'Format is PKTFIT ETENT 2, Hardwareaddress 1s 00e0-fc3b-2015 Current system time:2019-03-04 10:24:29-08:00 Last 300 seconds input rate0 bits/sec.0 packets/sec Last 300 seconds output rate 0 bits /seC.0 packets/sec Realtime 0 seconds inputrate 0 bits/seC.0 packets/sec Realtime 0 seconds output rate 0 bits/seC.0 packets/sec Input: 6 packets, 574 bytes,

Output: 7 packets, 638 bytes, Input bandwidth utilization 0% Output bandwidth utilization 0%

PortName Status Weight

GigabitEthernet0/0/1 UP 1 GigabitEthernet0/0/2 UP 1

The Number of Ports in Trunk:2 The Number of UP Ports in Trunk:2*

A.

Two links exist on the aggregated port

B.

The P address of the sub-interface of the aggregate port is 10.0.12.2/24

C.

The sub-interface number of the aggregate port is 100

D.

The sub-interface of the aggregate port carries VLAN TAG100 when forwarding data frames

Full Access
Question # 24

The network is shown in the figure below. The router uses a sub-interface as the host gateway. The gateway IP address is 10.0.12.2. Which of the following commands can achieve this requirement? () (Multiple Choice Questions)

H12-811_V1.0 question answer

A.

interface GigabitEthernet0/0/0.20Dotlg termination vid 10

Ip address10.0.12.2255.255.255.0Arp broadcast enable

B.

interface GigabitEthernet0/0/0.10Dotlq termination vid 10

Ip address10.0.12.2255.255.255.0 Arp broadcast enable #

C.

interface GigabitEthernet0/0/0.20Dotlq termination vid 20

Ip address10.0.12.2255.255.255.0Arp broadcast enable #

D.

interface GigabitEtherneto/0/0.10Dotlq termination vid 20

Ip address10.0.12.2255.255.255.0Arp broadcast enable

Full Access
Question # 25

Which frequencies does IEEE802.11n support? ()

A.

2.4GHz

B.

5GHz

C.

D. 6GHz

Full Access
Question # 26

Which of the following statements about IPv6 RA. and RS messages are correct? ()

A.

RS is used to reply address prefix information

B.

RS is used to request address prefix information

C.

RA. Used to request address prefix information

D.

RA. Used to reply address prefix information

Full Access
Question # 27

What is RouterDeadInterval of the OSPF protocol on the broadcast network by default? ()

A.

40s

B.

10s

C.

20s

D.

30s

Full Access
Question # 28

To provide different network services for different users on the AP, which of the following can be configured?

A.

TAP

B.

VAP

C.

VAC

D.

VT

Full Access
Question # 29

VRP operating platform, which of the following commands can only view static routes? ()

A.

display ip routing-table statistics

B.

display ip routing-table verbose

C.

display ip routing-table

D.

display ip routing-table protocol static

Full Access
Question # 30

If it is UDP, the value of the protocol field of the network layer is 6 ()

A.

True

B.

False

Full Access
Question # 31

Which statement about OSPF area division is wrong? ( )

A.

AreA.0 is the backbone area. All other areas must be connected to this area

B.

The LSDBs in the routers in the same OSPF area are exactly the same

C.

Dividing OSPF areas can reduce the size of the LSDB of some routers

D.

Only ABR can be used as ASBR

Full Access
Question # 32

All interfaces of routers running 0SPF protocol must belong to the same area. ()

A.

True

B.

False

Full Access
Question # 33

AP does not need AC. It can independently complete the work of wireless user access, wireless user authentication, and business data forwarding.

A.

True

B.

False

Full Access
Question # 34

By default, in the SNMP protocol, which port number does the agent process use to send alarm messages to N? ()

A.

164

B.

163

C.

162

D.

161

Full Access
Question # 35

It is known that there are two entries in the routing table of a router. If the router wants to forward packets with the destination address of 9.1.4.5, the correct one of the following statements is ()

1. Choose the second item as the best matching item, because the cost of the RIP protocol is small

2. The second item is selected as the best matching item, because the route is a more accurate match relative to the destination 9.1.4.5

3. Select the second item as the best match, because the speed of Ethernet0 is faster than the speed of serial0

4. Chooses the first item as the best matching item, because the priority value of the ospf protocol is higher

Full Access
Question # 36

Which of the following statements about Adjacency Segment is wrong? ()

A.

Adjacency Segment is identified by Adjacency Segment ID. (SID)

B.

Adjacency Segment spreads to other network elements through the IGP protocol, which is visible globally and valid locally

C.

Adjacency Segment must be configured manually

D.

Adjacency Segment is used to identify an adjacency of a node in the network

Full Access
Question # 37

The following two configuration commands can implement router RIA. The route to the same destination 10.1.1.1.0 is active and standby:

A.

True

B.

Mistake

Full Access
Question # 38

For the description of the PPP link establishment process, the following statement is wrong ()

A.

In the Establish phase, the PPP link performs LCP parameter negotiation. The negotiation content includes the maximum receiving unit MRU, authentication method magic word and other options

B.

After the NCP negotiation is successful, the PPP link will maintain the communication state and enter the Terminate phase

C.

The Dead phase is also called the physical layer unavailable phase. When both ends of the communication parties detect that the physical circuit is activated, they will migrate from the Dead phase to the Establish phase, which is the link establishment phase.

D.

In the Network phase, the PPP link performs NCP negotiation. Select and configure a network layer protocol through NCP negotiation, E.PPP link supports half-duplex and full-duplex modes

Full Access
Question # 39

Does the WEP security policy support the use of TKIP for data encryption?

A.

True

B.

False

Full Access
Question # 40

If the Proto of a certain route information in the routing table is OSPF, the priority of this route must be 10. ()

A.

True

B.

False

Full Access
Question # 41

The network administrator hopes to be able to effectively use the P address of the 192.168.176.0/25 network segment. Now that the company’s marketing department has 20 hosts, which of the following address segments is best allocated to the marketing department? ()

A.

192.168.176.160/27

B.

B. 192.168.176.0/25

C.

192.168.176.96/27

D.

D. 192.168.176.48/29

Full Access
Question # 42

The DHCP request message is sent by broadcast

A.

True

B.

False

Full Access
Question # 43

The election of the root switch in STP only compares the priority of the switch, while in RSTP, the priority of the switch and the MAC address are compared at the same time. ()

A.

True

B.

False

Full Access
Question # 44

Layer 2 ACL can match source MAC, destination MAC, source IP, destination IP and other information. ()

A.

True

B.

False

Full Access
Question # 45

Which of the following statements about the role of the STP protocol ForwarD.Delay is correct? ()

A.

Prevent temporary loops

B.

B. There is a delay in the transition between Blocking state and DsiableD state

C.

Reduce the time interval of BPDu transmission and improve the convergence speed of STP

D.

D. Improve the survival time of BPDUs to ensure that the configured BPDUs can be forwarded to more switches

Full Access
Question # 46

There is no need to write a hop when writing static routes at both ends of the PPP link. The Ethernet link needs

A.

True

B.

False

Full Access
Question # 47

The device port running the STP protocol is in the Forwarding state. Which of the following statements are correct? ()

A.

This port port not only forwards user traffic but also processes BPDU packets

B.

B. This port only receives and processes BPDUs, and does not forward user traffic

C.

The port will construct a MAC address table based on the received user traffic, but does not forward user traffic

D.

The port not only does not process BPDU packets, but also does not forward user traffic

Full Access
Question # 48

FIT AP can work independently without relying on AC. ()

A.

True

B.

False

Full Access
Question # 49

The network structure and 0$PF partition are shown in the figure. In the figure, except for RTA., the routers RTB.RTC. and RTD. are ABR routers. ()

(RTA) ip route-statiC.10.1.1.02412.1.1.1 permanent

(RTA) ip route-statiC.10.2.2.02413.1.1.1.

A.

True

B.

False

Full Access
Question # 50

PAP authentication is more secure than CHAP authentication because it does not carry passwords in clear text

A.

True

B.

False

Full Access
Question # 51

UDP cannot guarantee the reliability of data transmission, and does not provide functions such as message sequencing and flow control. It is suitable for flows that do not require high transmission reliability, but require high transmission speed and delay ().

A.

True

B.

False

Full Access
Question # 52

The router running the OSPF protocol reaches the FULL state first, and then synchronizes the LSDB. ()

A.

True

B.

False

Full Access
Question # 53

What elements can NAPT transform? ()

A.

B. Only IP address

B.

IP address + port number

C.

D. Only MAC. address

Full Access
Question # 54

IPCP dynamic address negotiation can automatically obtain the address()

A.

True

B.

False

Full Access
Question # 55

During data access, when accessing different network segments, the destination MAC. Encapsulate the MAC address of the gateway on the source host

A.

True

B.

False

Full Access
Question # 56

Which of the following are not the characteristics of a small campus network? ()

A.

Simple network level

B.

Fewer users

C.

Simple network requirements

D.

Wide coverage

Full Access
Question # 57

The last option field (option) of 1Pv4 is variable-length optional information. What is the maximum length of this field? ()

A.

10B

B.

40B

C.

60B

D.

20B

Full Access
Question # 58

In a Layer 2 network with redundant links, which of the following protocols can be used to avoid loops? ()

A.

VRRP

B.

ARP

C.

UDP

D.

STP

Full Access
Question # 59

What is the full name of the general routing platform VRP? ()

A.

Versatile Redundancy Platform

B.

Versatile Routing Protocol

C.

Versatile Routing Platform

D.

Virtual Routing Platform

Full Access
Question # 60

The following statement about Python is incorrect ()

A.

Is a fully open source high-level programming language

B.

B. Has a rich third-party library

C.

Have a clear grammatical structure, easy to learn, and high efficiency for colleagues

D.

D. Can be used for automated operation and maintenance scripts, artificial intelligence data science and many other fields

Full Access
Question # 61

When deploying ACL on Huawei equipment, which of the following descriptions is correct is ()

A.

When calling ACL under the interface, it can only be applied to the outbound direction

B.

ACL can match the TCP/UDP port number of the packet, and can specify the range of port numbers

C.

ACL cannot be used to filter OSPF traffic, because COSPF traffic does not use UDP protocol encapsulation

D.

The same ACL can be called under multiple interfaces

E.

E. When ACL defines rules, it can only proceed in the order of 10, 20, 30

Full Access
Question # 62

When the lease period reaches what percentage does the DHCP client send the lease renewal message for the first time? ()

A.

0.5

B.

0.875

C.

D. 0.25

Full Access
Question # 63

Take effect immediately after the Router ID of the OSPF process is modified ()

A.

True

B.

False

Full Access
Question # 64

Which of the following fields is not included in the He1lo packet of the OSPF protocol? ()

A.

sysname

B.

C. HelloInterval

C.

D. Neighbor

Full Access
Question # 65

Which of the following statements about single-arm routing are correct? ()

A.

On the switch, configure the port connected to the router as a Trunk port, and allow the relevant AN frame to pass

B.

B. One physical connection per VLAN

C.

C. Need to create a subinterface on the router

D.

D. Only one physical link is used between the switch and the router to connect

Full Access
Question # 66

There are multiple route entries to the same destination network in the routing table. These routes are called? ()

A.

Equal cost routing

B.

B. Multipath routing

C.

Default route

D.

D. Suboptimal routing

Full Access
Question # 67

On the broadcast network, both DR and BDR use the multicast address 224.0.0.6 to receive link state update messages ()

A.

True

B.

False

Full Access
Question # 68

In the STP protocol, which of the following factors will affect the election of the root switch? ()*

A.

IP address of the switch

B.

Switch interface ID

C.

Switch interface bandwidth port

D.

Switch priority

E.

MAC address of the switch

Full Access
Question # 69

On the switch, which VLANs can be deleted by using the undo command? ()*

A.

vlan 4094

B.

vlan 2

C.

vlan 1

D.

vlan 1024

Full Access
Question # 70

In order to detect the connectivity status of the CAPWAP tunnel, after the CAPWAP tunnel is established, which of the following CAPTAP messages is used by the AC for detection? ()*

A.

Hello

B.

DPD

C.

Keepalive

D.

Echo

Full Access
Question # 71

Which of the following fields does the MPLS header include? ()*

A.

EXP

B.

TTL

C.

Label

D.

Tos

Full Access
Question # 72

The LACP mode of link aggregation uses LACPDU to elect the active end. What information in LACPDU is the basis for electing the active end of LACP? ()*

A.

Interface priority

B.

Device priority

C.

MAC address

D.

Interface number

Full Access
Question # 73

Which of the following elements are included in the routing table? ()*

A.

Interface

B.

Destination/mask

C.

Nexthop

D.

Protocol

E.

Cost

Full Access
Question # 74

The network shown in the figure below. The host has an ARP cache. Which of the following statements are correct? )(Multiple Choice Questions)

H12-811_V1.0 question answer

A.

The following entries may appear in the ARP cache of host A 10.0.12.2MAC-C

B.

The router needs to be configured with a static route. Otherwise, host A and host B cannot communicate in both directions

C.

Host A and Host B can communicate in two directions

D.

D. The following entry 11.0.12.1 MAC-B exists in the ARP cache of host A

Full Access
Question # 75

What are the functions of OSPF protocol DR and BDR?

A.

Reduce the number of adjacencies

B.

Reduce the types of OSPF protocol packets

C.

Reduce the time to establish adjacency

D.

Reduce the number of exchanges of link state information

Full Access
Question # 76

In the CAPWAP tunnel establishment phase, after AC. receives the Join Request message sent by the AP, AC. will check the validity of the AP. Which of the following is the authentication method supported by AC. ()*

A.

SN certification

B.

PassworD. certification

C.

MAC. Authentication

D.

Not certified

Full Access
Question # 77

Which of the following statements about IPv6 address configuration are correct? ()*

A.

IPv6 supports stateless automatic configuration

B.

IPv6 address supports automatic configuration in multiple ways

C.

IPv6 supports DHCPv6 for address configuration

D.

IPv6 addresses can only be configured manually

Full Access
Question # 78

Which NAT can convert multiple private network addresses into one public network address to access the public network at the same time

A.

Static NAT

B.

Dynamic NAT

C.

NAPT

D.

Easy IP

Full Access
Question # 79

What are the advantages of using dynamic host configuration protocol DHCP to assign IP addresses? ()*

A.

Heavy workload and difficult to manage

B.

can be realized IP address reuse

C.

avoid IP address conflict

D.

When the configuration information changes (such as DNS), only the administrator needs to modify it on the DHCP server, which is convenient for unified management

Full Access
Question # 80

As shown in the figure below. Router A has passed the IP address 10.0.12.2 Telnet Router B. Which of the following operations on the current interface will cause the Telnet session between Router A and Router B to be interrupted? () (Multiple Choice Questions)

H12-811_V1.0 question answer

A.

Enable OSPF protocol under G0/0/1 interface

B.

Configure static routing

C.

Modify G0/0/1 interfaceIP address

D.

Close G0/0/1 interface

Full Access
Question # 81

ForwardD.Delay exists when an STP port transitions between which of the following states?

A.

Forwarding-Di sableD.Learning-Forwarding

B.

Learning-Forwarding

C.

Disabled-Blocking

D.

Blocking-Listening

E.

Listening-Learning

Full Access
Question # 82

Which of the following features does the default VLAN in the Layer 2 Ethernet switch have? ()*

A.

The default VLAN cannot be deleted manually

B.

By default, all ports of the switch are member ports of the default VLAN

C.

A default VLAN must be created before it can be assigned a port

D.

The P address configured on the switch will only be applied to the member ports of the default VLAN

Full Access
Question # 83

In the network as shown in the figure, the administrator hopes that all hosts cannot access the Web service (the port number is 80). Other services can be accessed normally. Then, in the interface configuration of G0/0/1, traffic-filWhich ACL rule needs to be bound to ter outbound? ()

H12-811_V1.0 question answer

A.

acl number 3000

ARule 5 deny tcy destination-port eq www

Rule 10 permit ip

#

B.

acl number 3001

Rule 5 deny udp destination-port eg www

Rule 10 permit ip

#

C.

acl number 3002

Rule 5 permit ip

Rule 10 deny tep destination eq www

#

D.

acl number 3003

Rule 5 permit ip

Rule 10 deny udp destination eq www

#

Full Access
Question # 84

Management Information Base (MIB) Information Base) is a virtual database, this database only exists on NMS. ()

A.

True

B.

False

Full Access
Question # 85

The Hybri D port can be connected to the user host or other switches. ()

A.

True

B.

False

Full Access
Question # 86

In the network shown in the figure below, the router receives a data packet with a destination IP address of 11.0.12.1 from host A. This data packet is forwarded by the router. What are the destination mc and destination IP? () (Single-choice question)

H12-811_V1.0 question answer

A.

MAC-D10.0.12.2

B.

MAC-D11.0.12.1

C.

MAC-C11.0.12.1

D.

MAC-B11.0.12.1

Full Access
Question # 87

The ACL configuration information of a certain router is shown in the figure. Which of the following statements is correct? () (Single-choice question)

H12-811_V1.0 question answer

A.

The packet whose source IP address is 192.168.1.254 is matched by the permit rule

B.

Packets with source IP addresses of 192.168.1.1 and 192.168.1.254 are matched by the permit rule

C.

The packet with the source IP address of 192.168.1.1 is matched by the pemit rule

D.

D. The packet with the source IP address 192.168.1.1 is matched by the deny rule

Full Access
Question # 88

Which of the following SNMP packets are sent to the NMS by the Agent on the managed device ()

A.

Set-Request

B.

Get-Request

C.

Get-Next-Request

D.

Response

Full Access
Question # 89

Which of the following types of addresses are not included in IPv6 addresses? ()

A.

Anycast address

B.

Broadcast address

C.

Unicast address

D.

Multicast address

Full Access
Question # 90

In order to distinguish between different users and provide different network services on the AP. Which of the following can be configured through configuration? ()

A.

VT

B.

B. VAP

C.

VAC

D.

D. WAP

Full Access
Question # 91

When the switch port sends a data frame that carries the same VLANTAG and PVID., it must be stripped of VLANTAG and forwarded. ()

A.

True

B.

False

Full Access
Question # 92

Network as shown in the picture. The administrator hopes that all hosts cannot access the Web service (the port number is 80). Other services can be accessed normally. In the interface configuration of G0/0/1, which ACL rule needs to be bound to trattie-frilter outbound?

H12-811_V1.0 question answer

A.

rule 5 permit ip

ARule 10 deny top destination-port eq ww#

B.

acl number 3003

Rule 5 permit ip

Rule 10 deny udp destination-port eq ww#

C.

acl number 3001

Rule 5 deny udp destination-port eq ww

Rule 10 permit ip

#

D.

acl number 3000

Rule 5 deny tcp destination-port eq www Rule 10 permit ip

#

Full Access
Question # 93

Which of the following descriptions about the switch is wrong?

A.

The switch is generally used as the export equipment of the network

B.

B. Switches generally work at the data link layer

C.

C. The switch can complete the exchange of data frames

D.

D. The switch can provide network access services for terminal devices (PC/server)

Full Access
Question # 94

The IPv6 protocol uses NS and NA. packets for duplicate address detection ().

A.

True

B.

False

Full Access
Question # 95

The following figure shows the routing table of a router. When the router receives a destinationIWhen the P address is a data packet of 9.1.1.1,The router will forward according to the route of 9.1.0.0/16 because the mask length of this route is longer. ()(True or False)

H12-811_V1.0 question answer

A.

B.False

Full Access
Question # 96

In the network shown in the figure below, switch A and router A are connected by two links, and the two links are aggregated in manual load sharing mode. The aggregated port number is 1, and the aggregated link performs data forwarding It needs to carry VLAN TAG100, and switch A uses trunk link. Which of the following configurations should be used for switch A? ()

H12-811_V1.0 question answer

A.

interface Eth-Trunk 1

Port link-type trunk

Port trunk allow-pass vlan 100#

Interface GigabitEthernet0/0/1Eth-trunk 1

#

Interface GigabitEthernet0/0/2Eth-trunk 1

#

B.

interface Vlanif 100

Ip address10.0.12.1255.255.255.0

#

C.

interface Eth-Trunk 1

Ip address10.0.12.1255.255.255.0#

D.

interface Eth-Trunk 1

Mode lacp-static

Port link-type trunk

Port trunk allow-pass vlan 100#

Interface GigabitEthernet0/0/1Eth-trunk 1

#

Interface GigabitEthernet0/0/2Eth-trunk 1

#

Full Access
Question # 97

The administrator has configured the router as shown in the figure. At the same time, the administrator wants to assign a shorter lease period to the DHCP address. Which of the following commands should be used? () (Single-choice question)

H12-811_V1.0 question answer

A.

lease day 0 hour 10

B.

B. lease 24

C.

C. dhcp select relay

D.

D. lease

Full Access
Question # 98

If the configured ACL rules have an inclusive relationship, it should be noted that the rule numbers of strict conditions need to be sorted first, and the rule numbers of loose conditions need to be sorted later to prevent packets from hitting the rules of loose conditions and stop being pushed down to continue matching. Cannot hit the strict conditions of the rules. ()

A.

True

B.

False

Full Access
Question # 99

Network equipment running the SNMP protocol can take the initiative to report alarm information so that network administrators can find faults in time. ()

A.

True

B.

False

Full Access
Question # 100

Which of the following parameters cannot be used for advanced access control lists? ()

A.

Physical interface

B.

B. time limit

C.

C. Agreement number

D.

D. Destination port number

Full Access
Question # 101

Which of the following parameters cannot be used for advanced access control lists? ()

A.

B. Destination port number

B.

Physical interface

C.

D. time limit

Full Access
Question # 102

Which of the following statements about the usage scenarios of the DHCP protocol is correct? ()

A.

network does not allow multiple DHCP servers

B.

After receiving the DHCP request or response message, the DHCP relay does not modify the message format and forwards it directly

C.

If the DHCP client and the DHCP server are not on the same network segment, the DHCP relay needs to be used to forward DHCP messages

D.

D. DHCP client and DHCP server must be connected to the same switch

Full Access
Question # 103

The network management system can only view the operating status of the device through the SNMP protocol, but cannot issue the configuration ()

A.

True

B.

False

Full Access
Question # 104

All the devices in the picture can communicate normally. Is the corresponding relationship between the MAC address table of $WA and the port correct? () (Single-choice question)

H12-811_V1.0 question answer

A.

MAC-AG0/0/2

MAC-BG0/0/2

MAC-CG0/0/3

B.

MAC-AG0/0/1

MAC-BG0/0/2

MAC-CG0/0/1

C.

MAC-A--GO/0/1

MAC-B--G0/0/1

MAC-C--GO/0/3

D.

MAC-A--GO/0/1

MAC-B-G0/0/2

MAC-C-GO/0/3

Full Access
Question # 105

When using the ping command on the VRp platform, if you need to specify an IP address as the source address of the echo request message, which of the following parameters should be used? ()

A.

=-a

B.

B. =-S

C.

=-d

D.

D. =-1n

Full Access
Question # 106

The network structure and OSPF partition are shown in the figure. Except for RTA in the figure, the routers RTB, RTC and RTD are all ABR routers. ()(True or False)

H12-811_V1.0 question answer

A.

True

B.

False

Full Access