Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

H12-821_V1.0 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

H12-821_V1.0 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: HCIP-Datacom-Core Technology V1.0
  • Last Update: Jun 20, 2025
  • Questions and Answers: 329
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

H12-821_V1.0 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

H12-821_V1.0 Practice Exam Questions with Answers HCIP-Datacom-Core Technology V1.0 Certification

Question # 6

In an OSPF routing domain, two routers must be specified as one DR and one BDR in a broadcast or NBMA network with at least two routers.

A.

TRUE

B.

FALSE

Full Access
Question # 7

InIPsec, anSA (Security Association)is uniquely identified bythree parameters.Which of the following parameters does not belong to the 3-tuple information?

A.

Key exchange protocol

B.

SPI

C.

Destination IP address

D.

Security protocol ID

Full Access
Question # 8

On Huawei switches, which of the following planes provides network information and forwarding entries that are mandatory for data plane forwarding?

A.

Forwarding plane

B.

Control plane

C.

Data plane

D.

Monitoring plane

Full Access
Question # 9

In addition to a route reflector, the confederation is another method that reduces the number of IBGP connections in an AS.

Which of the following statements are true about the confederation technology? (Choose all that apply)

A.

This technology is applicable to large-scale networks.

B.

Special EBGP connections are established among sub-ASs in a confederation, and the sub-ASs need to be fully meshed.

C.

All member devices in a confederation need to be reconfigured.

D.

The logical topology does not need to be changed when a confederation is used.

Full Access
Question # 10

Which of the following methods is usually used by a network administrator to configure a newly purchased device for the first time?

A.

Telnet

B.

SNMP

C.

Login through the Console port

D.

FTP

Full Access
Question # 11

An IP prefix list is configured on a router using the following command:

ip ip-prefix huawei index 10 permit 10.1.1.0 24 greater-equal 26

In this case, the value ofgreater-equal-valueis ____, and the value ofless-equal-valueis ____.

Full Access
Question # 12

Which of the following statements regarding OSPF route summarization commands are true?

A.

The asbr-summary command is executed in the OSPF view.

B.

The abr-summary command is executed in the OSPF area view.

C.

Advertise is the default parameter of the abr-summary command. That is, if not-advertise is not specified in the abr-summary command, the advertise parameter takes effect by default.

D.

Not-advertise is the default parameter of the abr-summary command. That is, if advertise is not specified in the abr-summary command, the not-advertise parameter takes effect by default.

Full Access
Question # 13

InIP multicast transmission, packets are transmitted from a source to agroup of receivers. Which of the following statements aretrueabout IP multicast technologies?

A.

Compared with broadcast, IP multicast prevents information flooding.

B.

Compared with broadcast, IP multicast effectively conserves network bandwidth.

C.

Compared with unicast, IP multicast improves information transmission security.

D.

Compared with unicast, IP multicast increases the load of information sources.

Full Access
Question # 14

An IP prefix list is a common matching tool used in routing policies. Which of the following cannot be configured as matching conditions in an IP prefix list on a Huawei router?

A.

Port number

B.

Mask

C.

Action

D.

Index

Full Access
Question # 15

A BGP device receives a route carrying an unknown attribute from a peer but does not know whether other devices need the attribute. In this case, the BGP device retains this attribute when advertising the route to other peers. Which of the following attributes is of this type?

A.

Community

B.

AS.Path

C.

MED

D.

OriginatorID

Full Access
Question # 16

InIPv6,NDP (Neighbor Discovery Protocol)uses multiple types ofICMPv6 packets. Which of the following functions areRS (Router Solicitation) packetsused for?

A.

Duplicate address detection

B.

Prefix readdressing

C.

Redirection

D.

Address resolution

Full Access
Question # 17

Which of the following statements about stack split is false?

A.

After a stack splits, the MAC addresses of the two stacks change immediately.

B.

If the master and standby switches are still in the same stack after the stack splits, the slave switches separated from the original master and standby switches re-elect the master and standby switches due to protocol packet timeout.

C.

If the master and standby switches are in two stacks after the split, the stack where the original master switch resides updates the topology and selects a new standby switch. The original standby switch becomes the master switch in the new stack and a new standby switch is elected.

D.

After a stack splits, multiple stacks have the same IP address and MAC address. To prevent network faults, the stacks perform MAD detection. The stack that fails the MAD detection shuts down all physical ports except reserved ports.

Full Access
Question # 18

On an RSTP network, port priorities may be compared during root port or designated port election. Which of the following values is the default priority of a port on a Huawei switch?

A.

1

B.

128

C.

4096

D.

32768

Full Access
Question # 19

During the DHCP interaction process, the DHCP server and client exchange various types of packets. Which of the following packets is not sent from the client to the server?

A.

DHCP Release

B.

DHCPNAK

C.

DHCP Request

D.

DHCP Discover

Full Access
Question # 20

There are two types of routing entries on a PIM network. (S, G) routing entries are used to set up on a PIM network and are applicable to both PIM-DM and PIM-SM networks.

Full Access
Question # 21

To inject IGP routes into BGP routes, you can only use the network command.

A.

TRUE

B.

FALSE

Full Access
Question # 22

On the OSPF network shown in the figure, R1, R2, and R3 run OSPF, and R1 advertises four VPN routes to OSPF. A filter-policy needs to achieve the following goal: R1's and R3's routingtables contain the routes to 192.168.3.0/24, but R2's routing table does not. Which of the following filter-policies cannot meet this requirement?

H12-821_V1.0 question answer

A.

A filter-policy on R2 for filtering received routes

B.

A filter-policy on R2 for filtering the routes to be advertised

C.

A filter-policy on R1 for filtering the routes to be imported

D.

A filter-policy on R1 for filtering the imported routes to be advertised

Full Access
Question # 23

In addition to numerous normal service packets, the CPUs of devices on a network may also receive large numbers of attack packets. To ensure that the CPUs can properly respond to normal services, the devices provide the local attack defense function.

Which of the following statements are true about this function?(Select all that apply)

A.

The device can schedule the protocol packets to be sent to the CPU in the attack defense policy based on the protocol priorities so that the packets with higher priorities are processed preferentially.

B.

To ensure that session-based application-layer data runs properly during an attack, you can configure the dynamic link protection function.

C.

Regardless of the packet type, the same rate limit must be set to reduce the number of packets sent to the CPU.

D.

CPU attack defense can also take effect on the management interface of the device.

Full Access
Question # 24

Alarge enterprisedeploys aWLAN in VRRP HSB modeto ensureWLAN reliability. Which of the following statements arefalseabout theVRRP configuration?

A.

The default priority of a device in a VRRP group is 100. A smaller value indicates a higher priority.

B.

The VRIDs must be configured to be the same on the master and backup ACs in the same VRRP group.

C.

The virtual IP addresses must be configured to be the same on the master and backup ACs in the same VRRP group.

D.

The default interval for sending VRRP heartbeat packets is 1s.

Full Access
Question # 25

A router performs a lookup in its FIB table for a packet. If the tunnel ID in the matching entry is 0, the packet needs to be forwarded through a tunnel, such as an MPLS tunnel.

A.

TRUE

B.

FALSE

Full Access
Question # 26

Which of the following statements regarding different LSA types is false?

A.

LS Request packets contain only LS Type, LS ID, and Advertising Router.

B.

LS Ack packets contain complete LSA information.

C.

DD packets contain only LSA summary information, including LS Type, LS ID, Advertising Router, and LS Sequence Number.

D.

LS Update packets contain complete LSA information.

Full Access
Question # 27

The VRID of the VRRP virtual router is 3 and the virtual IP address is 100.1.1.10. What is the virtual MAC address?

A.

01-00-5E-00-01-64

B.

01-00-5E-00-01-03

C.

00-00-5E-00-01-64

D.

00-00-5E-00-01-03

Full Access
Question # 28

Which of the following statements about the forwarding plane of a switch is false?

A.

Provides high-speed and non-blocking data channels.

B.

Can encapsulate and decapsulate packets.

C.

Can collect packet statistics.

D.

Consists of main control boards and interface boards.

Full Access
Question # 29

When deploying BFD, you need to adjust some parameters so that it can better detect the network status. Which of the following statements isfalseabout BFD optimization?

A.

After a high priority is configured for BFD packets, BFD packets are preferentially forwarded.

B.

To quickly learn about the network status and performance requirements, you can set the interval for sending BFD packets to the minimum value.

C.

On a live network, some devices switch traffic only when a BFD session changes to the Up state. If a routing protocol goes Up later than an interface, no route is available for switching traffic back, leading to traffic loss. To resolve this issue, configure a delay to compensate for the time difference caused when the routing protocol goes Up later than the interface.

D.

If a BFD session flaps, master/backup switchovers are frequently performed on the application associated with the BFD session. To prevent this, set the WTR time of the BFD session.

Full Access
Question # 30

OSPF supports area authentication and interface authentication. If both authentication modes are configured, Interface authentication takes preference over area authentication.

A.

TRUE

B.

FALSE

Full Access
Question # 31

Which of the following statements regarding the BGP error display of a router false?

A.

The error may be caused by the incorrect neighbor address.

B.

The neighbor address of this router is 10.1.1.5.

C.

Error Type indicates that the BGP error is caused by the neighbor relationship error.

D.

The error occurred at 12:40:39 on March 22, 2010.

Full Access
Question # 32

When a BGP device sends an Open message to establish a peer connection, which of the following information is carried?

A.

Local AS number

B.

Router ID

C.

NLRI

D.

Hold time

Full Access
Question # 33

Which of the following statements regarding IGMPv1 and IGMPv2 are true?

A.

1GMPv2 supports only general query.

B.

1GMPv2 defines the Leave message type.

C.

IGMPv1 does not define the IGMP Leave message type.

D.

IGMPv1 supports general query.

Full Access
Question # 34

In an MST region, MSTP independently calculates an MSTI for each VLAN based on mappings between VLANs and MSTIs.

Which of the following statements is false about the characteristics of MSTIs?

A.

A port must have the same spanning tree parameter settings for different MSTIs.

B.

The spanning tree calculation method of each MSTI is similar to that in STP.

C.

Spanning trees of MSTIs can have different roots and topologies.

D.

Each MSTI sends BPDUs only on its own spanning tree.

Full Access
Question # 35

Which of the following statements regarding the MED value in BGP are true?

A.

According to BGP route selection rules, the MED value has a lower priority than AS_Path, Preferred-Value, Local-Preference, and Origin.

B.

The default MED value of BGP routes is 0.

C.

By default, BGP can compare the MED values of routes from different ASs.

D.

By default, if there is no MED value in routes, the value 0 is used. If the bestroute med-none-as-maximum command is configured, the maximum MED value 4294967295 is used.

Full Access
Question # 36

During routineO&M, the administrator checks theIGMP configurationon a router interface. The configuration is as follows:

display igmp interface

Interface information of VPN-Instance: public net

GigabitEthernet0/0/1(192.168.1.1):

IGMP is enabled

Current IGMP version is 2

IGMP state: up

IGMP group policy: none

IGMP limit: -

Value of query interval for IGMP (negotiated): -

Value of query interval for IGMP (configured): 60 s

Value of other querier timeout for IGMP: 0 s

Value of maximum query response time for IGMP: 10 s

Querier for IGMP: 192.168.1.1 (this router)

Given this, which of the following statements aretrue?

A.

The IP address of the interface is 192.168.1.1.

B.

The IGMP version is IGMPv2.

C.

The maximum response time to Query messages is 10s.

D.

The interval for sending Group-Specific Query messages is 60s.

Full Access
Question # 37

The Internet Assigned Numbers Authority (IANA) allocates Class D addresses to IPv4 multicast. An IPv4 address is 32 bits long, and the four most significant bits of a Class D address are 1110.

A.

TRUE

B.

FALSE

Full Access
Question # 38

In VRRP networking, if VRRP is not configured to track an uplink interface and the uplink interface or link of the master device in a VRRP group fails, no switchover will be triggered. As a result, a traffic blackhole occurs.

A.

TRUE

B.

FALSE

Full Access
Question # 39

After a BGP peer relationship is established between two ends, changing the router ID of one end resets the BGP peer relationship.

A.

TRUE

B.

FALSE

Full Access
Question # 40

BGP can select routes based on the AS_Path attribute. Therefore, in some cases, a route-policy needs to be used to modify the AS_Path attribute for route selection. Which of the following parameters can be specified in the apply as-path command for a route-policy to modify this attribute?

A.

Delete

B.

Additive

C.

Copy

D.

Overwrite

Full Access
Question # 41

A filter named si is configured on a device using the as-path-filter command and is applied to a specified BGP peer. The detailed configurations are as follows:

csharp

Copy

[SW1] ip as-path-filter si permit _65500$

[SW1] bgp 65100

[SW1-bgp] ipv4-family unicast

[SW1-bgp-af-ipv4] peer 10.1.1.2 as-path-filter si import

After the configuration is complete, which of the following statements is true about the way the local device processes the routes received from the peer?

A.

It accepts only the routes whose AS_Path contains AS 65500.

B.

It accepts only the routes originated from AS 65500.

C.

It accepts only the routes that last pass through AS 65500.

D.

It accepts only the routes forwarded by AS 65500.

Full Access
Question # 42

On an IS-IS network, all routers generate LSPs. Which of the following types of information isnotcontained in the LSPs generated by pseudonodes?

A.

Interface information

B.

Information about supported network protocols

C.

Route information

D.

Neighbor information

Full Access
Question # 43

The BFD Echo function checks the connectivity of the forwarding link by looping back packets. Which of the following statements are true about this function?

A.

If URPF is enabled on the peer end, BFD packets may be incorrectly discarded on the peer end.

B.

In the BFD Echo function, the device uses the IP address of the outbound interface as the source IP address by default.

C.

The BFD Echo function applies only to single-hop BFD sessions.

D.

When configuring a BFD session supporting the BFD echo function, you need to configure both the local and remote discriminators.

Full Access
Question # 44

L2TP does not provide security encryption. Therefore, other security measures, such as IPsec, are required to ensure the security of the entire tunnel for data transmission.

A.

TRUE

B.

FALSE

Full Access
Question # 45

BGP is a distance-vector protocol that implements route reachability between ASs and selects optimal routes. Which of the following statements are true about this protocol?

A.

BGP does not support authentication. Therefore, it cannot ensure network security.

B.

BGP uses TCP as the transport layer protocol.

C.

BGP provides various routing policies.

D.

BGP supports automatic peer discovery.

Full Access
Question # 46

Which of the following values is theReserved/Circuit Typefield in theIIH packetssent by aLevel-1-2 routeron an IS-IS network?

A.

00

B.

11

C.

01

D.

10

Full Access
Question # 47

On an enterprise WLAN where Portal authentication is deployed, an AC functions as an access device and communicates with a Portal server using the Portal protocol. Which of the following statements are true about the Portal protocol?

A.

The HTTP or HTTPS protocol can be used as the Portal access or authentication protocol.

B.

By default, the access device processes Portal protocol packets through port 2000.

C.

By default, the device uses the destination port number 50100 to proactively send packets to the Portal server.

D.

Portal protocol packets are transmitted over TCP.

Full Access
Question # 48

On a P2P IS-IS network, after a neighbor relationship is established between R1 and R2, R2 finds that its LSDB is not synchronized. Then, R2 requests corresponding LSPs from R1 for LSDB synchronization. The following figure shows the synchronization process. Drag the following packet types to the steps in which they are used.(Token is reusable)

Full Access
Question # 49

In a route-policy, which of the following BGP attributes can be used in apply clauses?

A.

MED

B.

AS_Path

C.

Tag

D.

Local-Preference

Full Access
Question # 50

Which of the following statements regarding the summary automatic command and BGP route summarization is false?

A.

After this command is configured, BGP sends only the summarized routes to peers

B.

This command is used to implement automatic summarization. Automatic summarization takes precedence over manual summarization

C.

This command enables automatic summarization for the locally imported routes

D.

After this command is configured, BGP summarizes routes based on natural network segments

Full Access
Question # 51

GRE is a VPN technology that can implement packet transmission over heterogeneous networks. Which of the following statements are true about GRE?

A.

GRE is a Layer 2 VPN encapsulation technology.

B.

GRE enables encapsulated data packets to be transmitted over another network layer protocol, butcannot encapsulate multicast data.

C.

GRE tunnels can work with IPsec to ensure the security of multicast services such as voice and video.

D.

GRE tunnels can extend the working range of network protocols with hop limits.

Full Access
Question # 52

BFD for OSPF is deployed on a directly connected link. If the physical link is disconnected, drag the following BFD processes to the corresponding sequence numbers.

Full Access
Question # 53

In BGP, the AS_Path attribute records the numbers of all ASs that a route passes through from the local end to the destination in the vector order.

Which of the following statements is false about the attribute change during route transmission?

A.

When advertising the route to an IBGP peer, the BGP speaker creates an empty AS_Path in the Update message.

B.

When advertising the route to an EBGP peer, the BGP speaker adds the local AS number to the end of the AS_Path.

C.

When advertising the route to an EBGP peer, the BGP speaker creates an AS_Path carrying the local AS number in the Update message.

D.

When advertising the route to an IBGP peer, the BGP speaker does not change the AS_Path attribute of the route.

Full Access
Question # 54

On a WLAN, MAC address authentication controls network access rights of a user based on the user's access interface and terminal MAC address.

Which of the following statements is false about MAC address authentication?

A.

User passwords can be processed using PAP or CHAP.

B.

By default, the MAC address of a terminal is used as the user name and the last 6 hexadecimal digits of the terminal MAC address are used as the password for MAC address authentication.

C.

No client software needs to be installed on user terminals.

D.

A MAC address authentication system consists of three types of entities: terminal, access device, and authentication server.

Full Access
Question # 55

In BGP, Notification messages are used to request peers to resend routing information after routing policies are changed.

A.

TRUE

B.

FALSE

Full Access
Question # 56

After aBGP deviceestablishes apeer relationship, it advertises routes. Which of the following statements aretrueabout BGP route advertisement?

A.

Routes obtained from EBGP peers are advertised to all peers.

B.

When routes are updated, the BGP device sends all BGP routes.

C.

When there are multiple valid routes to the same destination, a BGP device advertises only the optimal route to its peers.

D.

Routes obtained from an IBGP peer are not sent to other IBGP peers.

Full Access
Question # 57

In BGP, the origin attribute of the routes imported using the import-route command is incomplete.

A.

TRUE

B.

FALSE

Full Access
Question # 58

On a network, some switches are enabled with RSTP and some switches are enabled with STP. What will happen?

A.

A Huawei switch changes from RSTP to STP. After the STP-enabled switch is removed from the network, the RSTP-enabled switch can be moved back to the RSTP mode.

B.

A Huawei switch changes its mode from STP to RSTP. After the RSTP-enabled switch is removed from the network, the STP-enabled switch can be moved back to the RSTP mode.

C.

STP and RSTP are compatible with each other, but the rapid convergence of RSTP is unavailable.

D.

STP and RSTP calculation are performed independently.

Full Access
Question # 59

To enable PC1 to access PC2 using the IP address of the firewall's GE0/0/2, you need to configure NAPT for source address translation. In the following figure, fill in the blank to complete the command.H12-821_V1.0 question answer

Full Access
Question # 60

Route attributes are specific descriptions of routes. BGP route attributes can be classified into four types. Which of the following are well-known discretionary attributes?

A.

Atomic_Aggregate

B.

Local-Preference

C.

Community

D.

MED

Full Access
Question # 61

Preferences of routing protocols determine the sequence In which a router selects a route among routes to the same destination /earned through different routing protocols.

A.

TRUE

B.

FALSE

Full Access
Question # 62

Compared with STP, RSTP defines the different port states. Which of the following statements regarding discarding and learning states are true?

A.

The port In discarding or learning state does not forward data frames.

B.

The port in discarding state does not learn MAC addresses table.

C.

The port in discarding or learning state does not learn MAC addresses

D.

The port In learning stole docs not learn MAC addresses table.

Full Access
Question # 63

On an OSPF network, if a router functions as an ABR, the router must also be a BR.

A.

TRUE

B.

FALSE

Full Access
Question # 64

A non-client is an IBGP peer that functions as neither an RR nor a client. A non-client must establish fully meshed connections with the RR and all the other non-clients.

A.

TRUE

B.

FALSE

Full Access
Question # 65

A monitoring plane usually comprises the monitoring units of main control boards and interface boards. This plane can monitor the system environment independently. Which of the following environment monitoring functions can be provided by the monitoring plane?

A.

Voltage monitoring

B.

Temperature monitoring

C.

Fan control

D.

System power-on and power-off control

Full Access
Question # 66

R1, R2, R3, and R4 run IS-IS, and the DIS priorities of their interfaces are shown in the following figure. Ifall these devices are started simultaneously, will be elected as the DIS. (Enter the device name, for example, R1.)H12-821_V1.0 question answer

Full Access
Question # 67

In an IPv4 address space, Class D addresses are used for multicast. Among Class D addresses, which of the following is the permanent group address range reserved for routing protocols?

A.

232.0.0.0 to 232.255.255.255

B.

239.0.0.0 to 239.255.255.255

C.

224.0.0.0 to 224.0.0.255

D.

224.0.1.0 to 231.255.255.255

Full Access
Question # 68

Route summarization is a mechanism that combines multiple routes.BGP supports automatic summarization and manual summarization on IPv6 networks.

A.

TRUE

B.

FALSE

Full Access
Question # 69

On an OSPF network, there are multiple types of packets, each with a different function. Which of the following are the main functions of Hello packets?

A.

Neighbor relationship maintenance

B.

Neighbor discovery

C.

Neighbor deletion

D.

Neighbor relationship establishment

Full Access
Question # 70

As shown in the figure, R1 imports the direct route 10.1.1.0/24 to OSPF. An engineer enables bidirectional route re-advertisement on R2 and R3, and configures the following commands on R3. After the network becomes stable, which of the following is thePrevalue of the route 10.1.1.0/24 in the routing table of R4?

H12-821_V1.0 question answer

[R3]acl 2000

[R3-acl-basic-2000] rule permit source 10.1.1.0 0

[R3-acl-basic-2000] quit

[R3]route-policy hcip permit node 10

[R3-route-policy-10] if-match acl 2000

[R3-route-policy-10] apply preference 14

[R3-route-policy-10] quit

[R3]ospf 1

[R3-ospf-1] preference ase route-policy hcip

A.

150

B.

14

C.

10

D.

15

Full Access
Question # 71

BFD provides fast fault detection independent of media and routing protocols. To use this mechanism to detect link connectivity, devices at both ends must support this feature.

A.

TRUE

B.

FALSE

Full Access
Question # 72

When multiple access channels are set for the same access requirement, the insecure access channels are not used and secure access channels are selected in normal cases. Which of the following are secure access channels?

A.

HTTPS

B.

Telnet

C.

SNMPv2

D.

SFTP

Full Access
Question # 73

Which of the following PIM protocol packets have unicast destination addresses.

A.

Register Stop

B.

Bootstrap

C.

Graft

D.

Assert

Full Access
Question # 74

RSTP provides different functions in different scenarios. Which of the following statements Is false?

A.

After TC-BPDU attack defense function is enabled, you can set the number of times the switch processes TC BPDUs within a certain period

B.

The role of the designated port that is enabled with root protection cannot be changed

C.

If the edge port on the switch enabled with BPDU protection receives RST BPDU, the switch sets the edge port as a non-edge-port and triggers STP calculation

D.

When the designated port enabled with root protection receives optimal RST BPDUs, the port enters the Discarding state and does not forward packets. If the port does not receive optimal RST BPDUs within a certain period of time, the port will automatically restore to the Forwarding state

Full Access
Question # 75

Which of the following attributes must be carried when BGP sends route update messages?

A.

MED

B.

Next_Hop

C.

AS_Path

D.

Local_Preference

Full Access
Question # 76

Which of the following statements regarding OSPF multi-instance is false?

A.

Route exchange between different OSPF processes is similar to route exchange between different routing protocols.

B.

An interface of a router belongs to only a certain OSPF process.

C.

The OSPF process IDs must be the same when OSPF neighbor relationships are established between different routers.

D.

Multiple OSPF processes can run on the same router, and they are independent of each other.

Full Access
Question # 77

Which of the following attributes cannot be directly referenced in an apply clause of a route-policy?

A.

community

B.

IP-prefix

C.

tag

D.

origin

Full Access
Question # 78

If a router ID is configured in both the system via and the BGP view, BGP uses the router ID configured in the BGP view because the BGP view takes precedence over the system view.

A.

TRUE

B.

FALSE

Full Access
Question # 79

On an IS-IS network, two directly connected routers establish a neighbor relationship through the three-way handshake mechanism by default, regardless of whether the network type is P2P or broadcast.

A.

TRUE

B.

FALSE

Full Access
Question # 80

VRRP defines three states. Only the device in which state can forward packets destined for a virtual IP address?

(Write in full and capitalize the first letter.)

Full Access
Question # 81

Route summarization can effectively reduce the number of BGP routes. However, many parameters need to be properly set when configuring BGP route summarization. Otherwise, problems such as routing loops may occur.

Which of the following statements is false about BGP route summarization?

A.

If the aggregate command with suppress-policy specified is run on a device, the device advertises only the specific routes that match the given routing policy.

B.

If the aggregate command is run on a device, the device advertises both specific and summary routes.

C.

If the summary automatic command is run on a device, the device summarizes subnet routes based on natural network segments.

D.

If the aggregate command with detail-suppressed specified is run on a device, the device advertises only the summary route.

Full Access
Question # 82

There are two types ofBGP peer relationships:EBGPandIBGP. When configuring EBGP, ensure that the peer IP address is routable and theUDPconnection can be correctly established.

A.

TRUE

B.

FALSE

Full Access
Question # 83

Which of the following statements regarding BGP route advertisement are false?

A.

All the BGP routes learned from all BGP peer will be advertised to other BGP peers.

B.

Only the optimal routes preferred by BGP can be advertised to other BGP peers.

C.

By default, the routes learned from an IBGP peer will not be forwarded to other IBGP peers.

D.

Only the routes learned from IGPs can be advertised to other BGP peers.

Full Access
Question # 84

On aBGP network, aroute-policycan be used to modify route attributes. Which of the following statements isfalseaboutroute-policies?

A.

When OSPF routes are imported using the import command, aroute-policycan be used to change their defaultMED value.

B.

When direct routes are imported using the import command, aroute-policycan be used to filter out the routes that you do not want to advertise.

C.

When routes are imported using the network command, aroute-policycannot be used to modify the attributes of the imported routes.

D.

In the address family view, the peer command can be run to reference aroute-policyto modify thelocal preferenceof the routes to be advertised.

Full Access
Question # 85

The IP prefix list configuration on a Huawei router is shown below. Which of the following routes can match this IP prefix list?

bash

Copy

[huawei] ip ip-prefix test index 10 permit 10.0.0.0 8 less-equal 32

A.

10.1.1.1/32

B.

10.1.1.0/6

C.

10.1.1.0/24

D.

10.0.0.0/16

Full Access
Question # 86

On an OSPF network, an IR in area 0 must be a BR, but an ASBR may not be an ABR.

A.

TRUE

B.

FALSE

Full Access
Question # 87

In inter-AC roaming scenarios, an AC can function as the mobility server of multiple mobility groups, but can be added only to one mobility group.

A.

TRUE

B.

FALSE

Full Access
Question # 88

Depending on the type of algorithms used, routing protocols are classified into distance-vector protocols and link-state protocols. Which of the following routing protocols are link-state protocols?

A.

RIP

B.

OSPF

C.

IS-IS

D.

BGP

Full Access
Question # 89

IPv6 defines multiple types of addresses. Which of the following statements is false about these addresses?

A.

Link-local addresses can be quickly generated using the EUI-64 method.

B.

Anycast addresses can be used only as destination addresses.

C.

Each interface can have multiple global unicast addresses with different network prefixes.

D.

Manually configured link-local addresses have a higher priority than automatically generated ones.

Full Access
Question # 90

On an IS-IS network, the length and components of aNETare the same as those of anNSAP. Which of the followingNETfields is used to uniquely identify a host or router in an area?

A.

System ID

B.

IDI

C.

SEL

D.

Area Address

Full Access
Question # 91

Similar to the OSPF DR, the IS-IS DIS needs to be elected on a broadcast network. However, the OSPF DR is preemptive by default, whereas the IS-IS DIS is not preemptive by default.

A.

TRUE

B.

FALSE

Full Access
Question # 92

Without a prior version check, an engineer configures IGMP snooping on a device and the version of IGMP snooping is earlier than the IGMP versions on user hosts. In this case, which of the following situations will occur?

A.

Users cannot receive multicast data because the device forwards received IGMP Report messages only to router ports and does not generate group member ports or forwarding entries.

B.

Users cannot receive multicast data, but the device generates forwarding entries after receiving IGMP Report messages.

C.

The IGMP snooping version of the device is automatically degraded, and users can receive multicastdata properly.

D.

The IGMP versions of the hosts are automatically upgraded, and users can receive multicast data properly.

Full Access
Question # 93

When two routers exchange LSDB information using DD packets, a master/slave relationship is formed first, the router with a larger router ID is the master, and determine the MS bit.

A.

TRUE

B.

FALSE

Full Access
Question # 94

When deploying a VRRP network, an enterprise administrator sets the virtual IP address to 192.168.1.254 and VRID to 1. Which of the following is the virtual MAC address after the network becomes stable?

A.

0000-5e01-0101

B.

0000-5e01-0254

C.

0000-5e00-0101

D.

0000-5e00-0254

Full Access
Question # 95

A company has a stack consisting of three switches that are running properly. The master switch restarts due to a fault. Given this, which of the following statements are true?

A.

Before the restart of the original master switch is complete, the original slave switch is specified as the new standby switch.

B.

After the original master switch restarts, it becomes the new master switch.

C.

After the original master switch restarts, the original standby switch becomes a new slave switch.

D.

Before the restart of the original master switch is complete, the original standby switch becomes the new master switch.

Full Access
Question # 96

GRE is a Layer 2 VPN encapsulation technology that encapsulates packets of certain data link layer protocols so that the encapsulated packets can be transmitted over an IP network.

A.

TRUE

B.

FALSE

Full Access
Question # 97

On an IS-IS network, each router can generate LSPs. Which of the following events trigger the generation of a new LSP?

A.

Related IS-IS interfaces go up or down.

B.

Periodic updates occur.

C.

Inter-area IP routes change.

D.

The IS-IS interface cost is increased.

Full Access
Question # 98

IGMP has three versions. Different versions support different features. Which of the following features is supported by all versions?

A.

Group-Specific Query message

B.

Leave message

C.

Report message

D.

Specifying a multicast source

Full Access