Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

H12-831_V1.0 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

H12-831_V1.0 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: HCIP-Datacom-Advanced Routing & Switching Technology V1.0
  • Last Update: May 2, 2024
  • Questions and Answers: 266
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

H12-831_V1.0 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

H12-831_V1.0 Practice Exam Questions with Answers HCIP-Datacom-Advanced Routing & Switching Technology V1.0 Certification

Question # 6

According to the configuration shown in the figure below, you can know that R4 has an interface advertised into IS-IS?

H12-831_V1.0 question answer

A.

1

B.

3

C.

2

D.

0

Full Access
Question # 7

Which of the following is not a hardware preparation for cutover?

A.

Test the operation of the board

B.

Power-on test

C.

Device version check

D.

Cable Continuity Test

Full Access
Question # 8

In an MPLS network, functions such as neighbor discovery, session establishment and maintenance, and label management are implemented by exchanging LDP messages between SRs running the DP protocol. To ensure the reliability of message delivery, all LDP messages are sent and received based on TCP connections.

A.

True

B.

False

Full Access
Question # 9

As shown in the figure, an engineer uses 4 routers to test branch network interoperability. Among them, R1, R2, and R3 in branch 1 deploy OSPF to implement network interoperability. R2, R3, and R4 in branch 2 deploy IS-S to implement network interoperability. Now the engineer wants to implement R1 to access the loopback interface address of R4. Which of the following operations can meet this requirement?

H12-831_V1.0 question answer

A.

existR2ofOSFFprocess neutralizationIS-ISDuring the process, the default route is advertised separately

B.

No configuration required

C.

only atR2ofIS-ISDuring the process, the default route is advertised

D.

only atR2ofOSPFDuring the process, the default route is advertised

Full Access
Question # 10

Which of the following will not cause the VRRP backup group to flap?

A.

both endsVRRPBackup group preemption delay configuration is inconsistent

B.

BackupDevice Interface Packet Loss

C.

the time interval of the notification message is too small

D.

transmissionVRRPLink flapping of advertisement packets

Full Access
Question # 11

BGP routing policies can control the advertisement and reception of routes.

A.

True

B.

False

Full Access
Question # 12

In BGP/MPLS IP VPN, the 0SPF multi-instance process uses the DN bit to prevent Type5 LSA loops.

A.

True

B.

False

Full Access
Question # 13

According to this diagram, can we break the

H12-831_V1.0 question answer

H12-831_V1.0 question answer

A.

system-IDforee8c.a0c2.baf2The device' whose type isLevel-1

B.

system-IDforee8c.a0c2.baf2device whose type isLevel-1-2

C.

R4belong only toLevel-1

D.

R4dry onlyLevel2

Full Access
Question # 14

As shown in the figure, MPLS LSP is set up in the network, and the goal is to establish an LDP session between SWA and SWB.

H12-831_V1.0 question answer

A.

Configured correctly

B.

No global enable requiredMPLS

C.

No need to enable on the portMPLS

D.

two devicesmpls Isr-idcannot be configured the same

Full Access
Question # 15

Regarding the description of the encapsulation format of labels in MPLS, the correct one is

A.

MPLSThe total length of a single label is4bytes(32bits)

B.

For Ethernet,PPPpacket, the tag stack is like 'shim*—between the L2 header and the data: yesVLAN tagTime,MPLShead on the ether head withVLAN tagbetween

C.

in the labelSfield:lbit,Used to identify whether the label is the bottom label of the stack, the value is1is indicated as the penultimate layer label

D.

in the labelTTLfields andIPgroupedTTL( Time To Live.,time-to-live) is similar in meaning and also has the effect of preventing loops

Full Access
Question # 16

Regarding multi-instance CE (Mlulti-VPN-Instance CE, MCE), which of the following descriptions is wrong?

A.

existMCEdevice needs to be differentVPNCreate their own routing table and bind to the correct interface

B.

connected to the sameMCEbut not oneVPNInstance users cannot access each other

C.

haveMCEfunctional devices can be found inBGPIMPLS IP VPNAccess to multiple applicationsVPNExample, reduce the investment of user network equipment

D.

MCEandPEThere must be multiple physical links betweenVPINIsolation between instances

Full Access
Question # 17

The traditional BGP 4 can only manage IPv4 single routing information. In order to provide support for a variety of network layer protocols, MP-BGP extends BGP-4. MP-BGP uses address families to distinguish different network layer protocols. Which of the following address families are currently supported?

A.

BGP-VPNv4address family

B.

BGP-IPV6Unicast address family

C.

BGP-IPV4broadcast address family

D.

BGP-MPexampleIPv6address family

Full Access
Question # 18

From this picture, we can judge

Public Routing Table . ISIS

Summary Count 6

ISIS Routing Table's Status : < Active >

Summary Count 6

H12-831_V1.0 question answer

A.

R1The type of device is definitely notLevel-1

B.

R1have6stripIS-ISofIPv6routing

C.

R1noIS-ISofIPv6routing

D.

R1ofGigabitEthernetOD/1must be enabledIS-IS IPv6

Full Access
Question # 19

As shown below:

H12-831_V1.0 question answer

IR2] ad 2000

[R2-ad-basic-2000]rule deny

[R2-ad-basic-2000]quit

#

[R2] ospf

[R2-ospf»1]area 1

[R2-ospM-area-0.0.0.1] filter 2000 import

[R2-ospf-1-area-0.0.0,1] quit

[R2-ospf-1] default-route-advertise always

A.

Area2containsType5LSAflood

B.

Area2no insideType3 LSAflood

C.

ArealcontainsType5 LSAflood

D.

Arealno insideType3 LSAflood

Full Access
Question # 20

ping -a Xc Ys z -vpn-instance M 10.5.16.2, the meaning of this command is:

A.

ShouldpingsendYindivualICMPask

B.

ShouldpingofICMPThe request packet size isZ(excludingIPandICMPhead)

C.

Shouldpingpackage sourceIFPaddress isX

D.

Shouldpingpackage belongs toVPNexampleM

Full Access
Question # 21

In the multi-level RR scenario, a large number of secondary RRs will be connected to the primary RR, which may lead to BGP of the primary RR. The routing table overflows, what method can be used to reduce the risk of overflowing the routing table of the advanced RR BGP?

A.

ORF

B.

route aggregation

C.

routing control

D.

set the sameCluster-ID

Full Access
Question # 22

Which of the following is included in the routine collection of basic equipment information?

A.

License information

B.

Patch information

C.

The software version the device is running

D.

Whether the configuration is saved

Full Access
Question # 23

Which statement about DHCP Snooping is wrong?

A.

DHCP SnoopingYou can prevent illegal attacks by setting trusted ports (all interfaces are untrusted by default.

mouth)

B.

Global enableDHCP Snoopingfunction, without any post-parameters, the device only processes by default

DHCPv4message

C.

Enable in interface viewDHCP Snoopingfunction, then all theDHCPThe message command function takes effect

D.

existVLANEnable in viewDHCP Snoopingfunction, then all interfaces of the device receive data belonging to thisVLANofDHCPThe message command function takes effect

Full Access
Question # 24

In the process of viewing the debug output through the SSH terminal, a lot of information pops up. Which of the following operations can

Make the Moni tor terminal no longer pop up debug messages?

A.

exit currentMonitorinterface redesignSSHLog in to the device to open a new oneMonitorinterface

B.

Open Notepad and enterundo debugging a 11,Copy the command line and paste it intoMonitorinterface

C.

Open Notepad$SLIAundo terminal monitor,Copy the command line and paste it intoMonitorinterface

D.

open notepad inputundo terminal debugging,Copy the command line and paste it intoMonitorinterface

Full Access
Question # 25

Regarding the sham link, which of the following descriptions is wrong?

A.

sham linkThe coat is twoVPNlinks between instances, eachVPNThere must be one in the instancesham linkthe endpoint address, it must bePEon the routerVPNone in the address space has32bitmaskedLoopbackinterface address

B.

becauseVPNflow is throughMPLSBackbone forwarding,sham linkThe routing cost should be less thanbackdoorroadOSPFrouting cost

C.

sham linkThe endpoint address of theBGPasVPhv4address published. passedsamlikThe route can also be reconfigured withVPNv4The form of routing is introduced toBGP

D.

Sham linkIt can be configured in any area and needs to be manually configured and the local endVPNThe instance must have tosham linkdestination address (peerPEofsham linkendpoint address) routing

Full Access
Question # 26

As shown in the figure, OSPF is enabled on all interfaces of the router, and the ip address identified in the figure is the device's IP address.

Loopback0 presses the IP address of the port, RI, R2, R3EJLoopbacD is advertised in the area 1, R4

LoopbacfkD advertises in area D and which of the following functional addresses can be pinged between the LoopbackD announcements of R5 and R5 in area 2?

H12-831_V1.0 question answer

Areal

10.0.1.1/32

A,10.0.3.3 10.0.5.5

B,10.0.4.4and10.0.2.2

C,10.0.2.2and10.0.3.3

D,10.0.2.2 10.0.5.5

Full Access
Question # 27

In the DU label distribution mode, if the Liberal retention mode is adopted, the device will retain the labels distributed by all LDP peers, regardless of whether the LDP peer is the optimal next hop to the destination network segment.

A.

True

B.

False

Full Access
Question # 28

In an MPLS VPN network, data packets are forwarded when they enter the public network. will be encapsulated with two layers of MPLS labels

sign. Which of the following options describes the processing of the packet correctly:

A.

The data packet is forwarded toEgress PEequipment

B.

Egress PEThe device correctly sends the data packet to the correspondingVPNmiddle

C.

the outer label of the packet received by the penultimate hop device is3

D.

Egress PEDevice received untaggedIPdata pack

Full Access
Question # 29

A campus has deployed IPv6 for service testing. There are 4 routers (R1, 22, R3 and R4) in this network, running 0SPFV3 to realize the interconnection of IPv6 network. A new router R5 needs to be connected to the network for testing. An engineer introduces a direct route in the OSPFVV3 process of R4 so that devices in the campus network can access the GE0/0/1 port address of R5. Which of the following statements about the scene is true of?

H12-831_V1.0 question answer

A.

R2will generate aType4 LSAonly inArea 0internal flooding

B.

R4will generate aType5 LSAdescribe bowIenteredIPv6routing prefix

C.

R2will generate aType4 LSAdescribeR4ofRouter ID

D.

R4will generate aType5 LSAonly inArea 1internal flooding

Full Access
Question # 30

What is wrong with this configuration description is:

H12-831_V1.0 question answer

[Huawei]dhcp enable

[Huaweijinte GigabitEthernet 0/0/1 [Huawei-GigabitEthernet0/0/1 ]dhcp option82 insert en [Huawei-GigabitEthernet0/0/1 ]dhcp snooping enable [Huawei-GigabitEthernet0/0/1]dhcp snooping trusted

A.

ifGigabitEthemnetOIO/1received by the interfaceDHCPIn the request message, there is noOption82of

SutOptioninformation, the device will generateOption82,and insert it into the message

B.

turn onDHCP Snoopingconfiguration can be used to preventDHCP ServerCounterfeiter Attack

C.

configureGigabitEthernetO/0/lThe interface is a trusted interface

D.

turn onDHCP Snoopingconfiguration can be used to preventARPspoofing attack

Full Access
Question # 31

In intra-domain MPLS VPN networks, data packets will be encapsulated with two layers of MPLS when they enter the public network and are forwarded.

Label, a description of the two-layer label in the following options. What is wrong is:

A.

MPLS VPNThe outer label is made byLDPprotocol or statically assigneD. the inner label is assigned by the correct end

MP-BGPassigned by neighbors

B.

By default, the outer label is popped before the packet is forwarded to the last hop device

C.

M PLS VPNThe outer layer is labeled as a private network label, and the inner layer label is called a public network label.

D.

Layer labels are used inPEThe device sends the packet correctly to the correspondingVPNmiddle

Full Access
Question # 32

esigth uses different colors to distinguish different alarm levels, red represents emergency, orange represents important, and yellow represents

The table is secondary, and blue represents the prompt. Which of the following statements about different alarm levels is correct: (multiple choice)

A.

Prompt: A potential or imminent business-impacting failure has been detecteD. but currently has little business impact

B.

Minor: There is currently a certain impact on the business, but corrective actions are required to prevent serious failure alarms

C.

Urgent: Alerts that have affected the business and require immediate corrective action

D.

Important: An alarm that has affected the business and will have serious consequences if not handled in time

Full Access
Question # 33

What is the default aging time of the MA, C address table of Huawei switches?

A.

300

B.

500

C.

400

D.

5

Full Access
Question # 34

Link LSAs of OSPFv3 are propagated throughout the area.

A.

right

B.

wrong

Full Access
Question # 35

Network administrator A wants to use the IP Prefix List to match a specific route entry. Which of the following routes will

Matched by the IIP Prefix List in the figure?

A.

10.0.0.1/30

B.

10.0.0.0/24

C.

10.0.2.0/24

D.

10.0.1.0/24

Full Access
Question # 36

Which of the following reasons may cause the hosts in the same--VLAN LAN to fail to communicate with each other

A.

port isolation is configured on the switch

B.

the wrong port is configured on the machine, andMA, Caddress binding

C.

interface is artificialshutdownor the physical interface is damaged

D.

switchMA, Caddress learning errors

Full Access
Question # 37

The Discovery message of LDP is used for neighbor discovery, and LDP has different discovery mechanisms when discovering neighbors. The following statement about the Discovery message in the basic discovery mechanism is correct

A.

TCPAfter the connection is establisheD. LSRdo not continue sendingHello Message

B.

Purpose of the messageIPaddress is multicastIPaddress224.0.0.2

C.

This message is encapsulated inUDPIn the message, the destination port number is646

D.

The message is sent to the specifiedLDP Peer

Full Access
Question # 38

Which of the following actions may affect the normal operation of the customer's network?

A.

Device naming

B.

software upgrade

C.

Hardware expansion

D.

Routing Protocol Configuration Changes

Full Access