Pre-Winter Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

H12-891_V1.0 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

H12-891_V1.0 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: HCIE-Datacom V1.0
  • Last Update: Oct 9, 2024
  • Questions and Answers: 610
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

H12-891_V1.0 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

H12-891_V1.0 Practice Exam Questions with Answers HCIE-Datacom V1.0 Certification

Question # 6

Is the following statement about VLAN aggregation correct?

A.

Sub-VLAN is used to isolate broadcast domains

B.

A Super VLAN can contain one or more Sub-VLANs

C.

The super Sub-VLAN contains a physical interface that can establish a Layer 3 VLANIF interface

D.

Sub-VLAN contains a physical interface that can establish a Layer 3 VLANIF interface

Full Access
Question # 7

The following description of Filter-Policy is correct?( Radio neck).

A.

With Filter-Policy, on ASBR in OSPF, you can filter the generation of type5 LSA and type7LSA.

B.

Prefix lists can be used to filter both routes and packets.

C.

Filter-policy filters the link state information received or published, and can modify the properties of route entries.

D.

When using a prefix list to filter routes, the table entry ip-prefix 1 deny 0000 0 less-equal

32 matches only the default route.

Full Access
Question # 8

If you run PIM-SM in a multicast network, you need to build a multicast forwarding tree between the multicast source and the receiver to enable the receiver to receive the multicast effect, so what are the following options for the correct tree sketch for the build?

A.

What is built between the multicast source and the RP is the SPT tree

B.

RP and the receiver is built between the RPT tree

C.

Built between the RPT tree

D.

RP and the swap is the SPT tree

Full Access
Question # 9

When the ACL in the VRP has multiple matching rules (rules), the matching order is about Which of the following statements is true?( Confirmed).

A.

By default, matching is based on the principle of "depth first"

B.

By default: Match in the order in which the perfect is matched first, then deny is matched.

C.

By default, rule-ID is followed Match from small to large

D.

There is only one matching order and cannot be modified

Full Access
Question # 10

As shown in the figure, three switches SI, SN2, and SN3, where SN1 is the root bridge between S1 and SN2 Now that link support SN2 cannot receive the configuration BPDU sent by the root car, the administrator needs to configure which spanning tree protection mechanism to prevent the problem of link congestion?

H12-891_V1.0 question answer

A.

root protection

B.

Anti-TC-BPDU attack

C.

BPD protection

D.

Loop protection

Full Access
Question # 11

Deploying the ISIS protocol in an IPv6 environment is true in the following statement (radio).

A.

By default, the DIS priority of broadcast network interfaces at Level-1 and Level-2 is 1 B In broadcast networks, the DIS priority for IPV4 and IPV6 can be set separately

B.

In the same broadcast network. If each router supports both IPV4 and Pv6, the DISC of JPV4 and Pv6 must be the same device

C.

IS-IS sient is configured under the finger port, this interface will not send ISIS packets, but will receive ISIS packet

Full Access
Question # 12

How many bits are there in the label field of MPLS ?

A.

3

B.

8

C.

1

D.

20

Full Access
Question # 13

The following statement about IPv6 Over VXLAN is wrong as ?( Single choice questions).

A.

The tunnel between VXLAN Layer 2 and Layer 3 gateways is an IPv4 network.

B.

IPv6 over VXLAN solves the problem of insufficient IP address resources for end tenants.

C.

IPv6 Over VLANs do not generate ND table entries.

D.

IPv6 over VXLAN means that the Overlay network of the VXLAN is an IPv6 network.

Full Access
Question # 14

Host HW1 in the HW device network Wants to join a video conference, so what does that host do?

A.

Sends an IGMPv2 membership report to the default router unicast of the local network

B.

Sends a unicast IGMPv2 membership report to the RP

C.

The IGMPv2 membership report is sent over multicast in the local network, and the multicast address carried in the IGMPv2 membership report is the multicast address that you want to join

D.

The IGMPV2 membership report is sent over multicast in the local network, and the destination multicast address of the IGMPv2 membership report is "All PIM Routers" 224002 Multicast address

Full Access
Question # 15

The following is the correct description of the aggregation of BGP (radio).

A.

After you configure the Aggregate ipv4-address mask, only aggregate routes are published, not detail routes.

B.

For IPv6 routing, BGP supports manual aggregation and automatic aggregation.

C.

BGP enables automatic aggregation by default.

D.

Routes in the BGP local route table can be manually aggregated.

Full Access
Question # 16

Use ping-ax-cY-sZ-vpn-instance M 105162, which has the meaning of

A.

IcMP request for the ping, message size Z (without IP and ICMP headers)

B.

The source IP address of the ping packet is X

C.

The ping belongs to the VPN instance M

D.

The ping sends Y ICMP requests

Full Access
Question # 17

How do.8021w and 8021D handle BPDUs?( Single choice questions).

A.

The 8021D bridge only forwards BPDU packets received from the root bridge

B.

8021D bridges do not forward BPDU packets

C.

The 8021w bridge only forwards BPDU packets received from the root bridge

D.

8021w Bridge does not forward BPDU packets

Full Access
Question # 18

What messages does an NMS (Network Management Station) running SNMPV1 send to the agent?

A.

Trap,Get ? Set

B.

Get, Set ?Getnext

C.

Get,Set,Getnext ? GetBulk

D.

Get,Set ? GetBulk

E.

? Trap

Full Access
Question # 19

?BGP4+?,Update ????M IP_R EACH_NLRI ?????next hop network address ????? ?

A.

It can be just link-local address

B.

Can only be a link-local address

C.

You can carry a link-local address and a global unicast address

D.

at the same time Can only be a global unicast address

Full Access
Question # 20

What check frames can IPSG set?

A.

Out of the interface

B.

MAC address

C.

IP address

D.

VLAN ID

Full Access
Question # 21

What are the differences between traffic policing and traffic shaping?

A.

Traffic shaping is applied in the inlet direction and traffic supervision is applied in the outlet direction

B.

For traffic shaping, the router caches excess packets until bandwidth is available again

C.

The token bucket algorithm is used for traffic supervision, and the SPD algorithm is used for traffic shaping

D.

For traffic policing, the usage of the buffer can be adjusted for traffic exceeding the CIR

E.

For traffic shaping, it can be over-CIR Traffic adjustment for the usage of the buffer

Full Access
Question # 22

Which of the following routing tools is unique to BGP?

A.

Route-policy

B.

ACL

C.

IP-prefix

D.

AS-path-filter

Full Access
Question # 23

Which of the following sequences can be matched by the regular expression [^100|200]$?

A.

300200 100

B.

200 100 300

C.

100 200 300

D.

100,300,200

Full Access
Question # 24

There is no routing protocol running on the router HW and only one default route reaches the remote network. On the router job with the extension Ping remote file server address 105401. The result of Ping on the router job is presented as "Request time." out”? Based on the above description, the error in the following analysis is ?

A.

Router HW's next hop router does not have a path to the destination address

B.

Ping is successful, but congestion occurs on the path to the destination address

C.

ICMP packets can reach the destination address But the destination device failed to reply

D.

Router HW does not have a legitimate route to the destination address

E.

There is a firewall in the remote destination network, and no ICMP traffic is allowed

Full Access
Question # 25

Which of the following messages does the BGP protocol support?

A.

Update

B.

Open

C.

Hello

D.

Keepalive

Full Access
Question # 26

After you divide an interface of the firewall into the Untrust security domain, the interface belongs to the Untrust zone and no longer belongs to the Local zone.

A.

TRUE

B.

FALSE

Full Access
Question # 27

The following description of MP-BGP is incorrect?( Single choice questions).

A.

The MP_UNREACH_NLRl of the update message, excluding the path nationality.

B.

MP-BGP can be used to assign tags.

C.

MP_REACH_NLRI and MP_UNREACIH_NLRI are optional transition properties.

D.

A complete MP_REACH_NLRI attribute structure contains address family, next hop, and prefix information.

Full Access
Question # 28

If you need to use the delault-route importd command if no default route exists in the local IP routing table , a default route is issued to the BGP peer (group).

A.

True

B.

False

Full Access
Question # 29

Regarding the DSCP field, the following statement is incorrect: single selection

A.

The DSCP value can be 0, and packets use the default forwarding mechanism when 0

B.

When the value of DSCP is EF, it indicates that the data belongs to the accelerated forwarding class.

C.

In addition to indicating the priority of the data, DSCP can also indicate the probability of data being discarded. The CS class in D. DSCP divides data into 8 priorities.

Full Access
Question # 30

What are the benefits of using WRED?( Multi-select)

A.

Provides some low latency

B.

Avoid TCP global synchronization

C.

Avoid congestion completely

D.

Provides a small bandwidth guarantee

E.

Can avoid UDP occupying most of the bandwidth when congested

Full Access
Question # 31

RD is used to distinguish between the same IP address in different VPNs, and how many bits (radio) the RD contains

A.

64

B.

32

C.

16

D,128

Full Access
Question # 32

The BSR/RP mechanism described below describes the correct determination ?( Multiple choice questions).

There can be multiple C-BSRs in the

A.

PIM-SM domain, but only one BSR can be elected.

B.

BSR collects C-RP information by receiving packets of C-RP

C.

BSR advertises BSR and C-RP information to all routers in the PIM-SM domain via flood bootstrap messages

D.

A C-BSR can also collect C-RP information by receiving C-RP packets

Full Access
Question # 33

Regarding MP-BGP, the following description is wrong?

A.

Radio A. MP-BGP needs to assign a private label to the VPNv4 route

B.

PE and CE are routed through BGP interaction, you need to create a BGP process on ce for each VPN instance

C.

The message type and VPNv4 routing publishing policy for MP-BGP are the same as for BGP-4

D.

MP-BGP advertises VPNv4 through two attributes, MP_REACH_NLRI and MP_UNREACH_NLRI Route

Full Access
Question # 34

In order to reduce the number of OSPF routes in some unscheduled areas, the OSPF protocol has developed special area functions, and the following characteristic description of ospf special areas is correct?( Single choice questions).

A.

ASBR-Sunmary-LSA is allowed to be published to NSSA regions

B.

AS-External-LSA is allowed to be published to Stub regions

C.

Any OSPF zone can be configured as a special zone

D.

Special area routers cannot establish OSPF neighbor relationships with regular area routers

Full Access
Question # 35

What command can be used to prevent users from accessing multiple devices through the HUB on the switch's access port?( Radio).

A.

[Huawe interface Gigabithemeto/0/1[Huawei-GigabiEthermeto/O/lport linktypetrunk [Huawel-GigabithemetO/1]port trunk allow pass vlan 10

B.

[Huawei interface GigabiEthemet/0/1[Huawe-GigablEthemetO/0/1Jpor ink type acess(Huawei GigabitEthemet/O/Tipsg enable

C.

Huawei interface GigabiEthemetO/0/1Huawei-GigabiEthemetO/OJport link-type acces Huawei GigabilEthemet/0/1port-secunty enable0

D.

[Huawei iterface Gigabithemeto/0/1 (Huawei-GigabitEthemeto//1)pot ink type access(Huawel-CigabiEthemeto/1]portisolate enable

Full Access
Question # 36

In a data communication session between two hosts, which level does the session layer of the oSI model of the host on one end communicate with the osl mode of the host on the other end?

A.

Communicate with the conversation layer on the other end B Communicate with the application layer at the other end

B.

Communicate with the data link layer at the other end

C.

Communicate with the physical layer at the other end

D.

Communicate with the presentation layer at the other end

Full Access
Question # 37

In different scenarios, RSTP provides different protection functions, and the wrong statement about this statement is

A.

The root protection feature is enabled for the specified port, and its port role can only remain as the specified port

B.

When the anti-TC-BPDU packet attack feature is enabled, the number of times the switching device processes IC BPDU packets per unit time is configurable

C.

after the BPDU protection function is enabled on the switching device, if the edge port receives RST BPDU, the edge port will be set to a non-remote port and the spanning tree calculation will be re-performed

D.

Start the specified port of root protection, when the port receives a better RSTBPDU, the port will enter the Discarding state and is no longer forwarding packets. If the port does not receive a better RSTBPD for a period of time then automatically revert to the normal Forwarding state

Full Access
Question # 38

When the load is an ICMPv6 message, what is the numeric value of the Next Header field in the IPv6 header if the presence of an extended header is not taken into account?

A.

58

B.

78

C.

55

D.

68

Full Access
Question # 39

In PIM-SM, the description of RP is incorrectly ?

A.

All members of the group and the multicast sources that send multicast data to the group converge to the unique RP

B.

The initial multicast streams for all groups in the shared tree are forwarded to the receiver via RP

C.

An RP can serve multiple multicast groups at the same time, a multicast group can correspond to multiple RPs

D.

RPs can be responsible for the forwarding of several or all multicast groups, and there can be an RP in the network

Full Access
Question # 40

Regarding route introduction, the following description is correctly ?( Multiple choice questions).

A.

OSPF introduces two types of external routes, with the first type of external route taking precedence over the second type of external route.

B.

Use the default-route imported command in BGP only to introduce default routes that already exist in the local IP routing table.

C.

When ISIS introduces an external route, if you do not specify the route type that is introduced, the Level-1 route is introduced by default on the L1/2 router

D.

When ISIS introduces an external route, if you do not specify the type of route that is introduced, the Leve1-1 route is introduced by default on the L1 router .

Full Access
Question # 41

Is the following description of the BSR/RP mechanism correct?

A.

PIM-SM domain can have more than one C-BSR, but only one BSR can be elected by the C-BSR that receives the C-RP Packets are collected C-one RP information

B.

BSR advertises BSR and C-RP information to all routers in the PIM-SM domain by flooding Bootstrap packets

C.

A C-BSR can also collect C-RP information by receiving C-RP packets

Full Access
Question # 42

In an intra-domain MPLSVPN network, when a packet enters the public network and is forwarded, it is encapsulated with two layers of MPLS tags, and the description of the two layers of tags in the following options is incorrect

A.

The outer label of mpls VPN is assigned by the LDP protocol or statically, and the inner label is assigned by the MP-BGP neighbor of the peer

B.

The outer label of MPLS VPN is called a private network label, and the inner label is called a public network label

C.

The outer label is used to correctly send packets to the appropriate VPN in

D.

on the PE device By default, the outer label is ejected before the packet is forwarded to the last hop device

Full Access
Question # 43

Auto-negotiate mode is to obtain the maximum interface rate and operating mode, the network administrator configures all Ethernet interface rates of a working switch to 10OMbps, and the operating mode is configured as Full-duplex, when a network card is configured After the auto-negotiate workstation is connected to the switch, the negotiation result is that the interface rate is 10OMbps and the working mode is half-duplex, which of the following explanations is the most reasonable for this phenomenon?

A.

The problem is on the workstation's NIC, mostly due to the aging of the NIC driver on the workstation , which causes the workstation NIC to learn the interface rate and operating mode configured on the switch

B.

Port rate negotiation is negotiated through the initial port sending FLP , and the operating mode is not negotiated through FLP

C.

STP initializes the port into the blocking state, causing auto-negotiation to fail, so the port should be configured as an edge port

D.

At higher port rates and operating modes, the workstation's network interface card cannot be configured as auto-negotiate

E.

Auto-negotiation is not configured on the switch, resulting in the switch not being able to send FLP messages to the workstation, causing the workstation to set its own operating mode to Half-duple

Full Access
Question # 44

What is the exact description of the SSM features?

A.

Using SSM, the receiver can use INCLUDE in IGMPv3 to indicate that the source

B.

SSM he wishes to join is an extension of the DVMP protocol. to efficiently transmit one-to-many communication traffic

C.

SSM requires MSDP to discover active sources in other PIM domains

D.

Routing multicast traffic in the SSM is done by relying on the number of sources, and the RP is used for the receiver to answer the corresponding number of sources

Full Access
Question # 45

When deploying BGP/MPLS IPVPN, OSPF's VPN route tag is not present

The extended properties of MP-BGP are passed only locally, only locally, and only meaningful on routers that receive MP-BGP routes and generate OSPF LSAs.

A.

TRUE

B.

FALSE

Full Access
Question # 46

IS-IS supports the processing and computation of IPv6 routes by adding ATLPs to carry IPv6 addresses and reachability information.

A.

TRUE

B.

FALSE

Full Access
Question # 47

If you delete a declared route entry on a BGP router, the BGP routing ring is triggered to send an Update message for route scattering, which carries the accepted mandatory attribute of the route entry that was discarded.

A.

True

B.

False

Full Access
Question # 48

A company network runs the OSPF protocol, an engineer in order to understand the OSPF mechanism in the network to perform packet capture operations, the following ospf message description is correct?

A.

LSUpdate message is sent only when an adjacency relationship is established

B.

LSUpdate messages synchronize the link state database by sending detailed LSA information

C.

The interface sends Hello packets as soon as it joins the OSPF area

D.

When an LS Update packet is received, the router must send an LSAck to acknowledge

Full Access
Question # 49

The LSA of type certainly does not exist in the 220SPF Stub zone

A.

Type7

B.

Type5

C.

Type4

D.

Type3

Full Access
Question # 50

As shown in the figure, Department A of Branch 1 has access to the Internet, but Department B can only use an encrypted VP to access headquarters resources, and NAT can be configured on the egress device The policy enables Department A to access the Internet, while the PSecVPN (ESP Protocol) + Tunnel mode method configured for Department B gives it access to headquarters.

B. Right

C. Wrong

Full Access
Question # 51

If the OSPP protocol is running in the network , after configuring the non-backbone area in the OSPP area as the Totally Stub region, the ABR router sends a message to Totally. The Stub region issues an LSA with an LS ID of 0000, and what type of LSA is the LAS to?

A.

LSA5

B.

LSA2

C.

LSA1

D.

LSA3

Full Access
Question # 52

In an HW MPLS network, what parameters are used to define a forwarding equivalent class??

A.

BGP MED ?

B.

IP prefix

C.

RSVP requests resource reservation

D.

from CE Layer 2 links

Full Access
Question # 53

Because BGP is an EGP routing protocol, BGP routing policies can only be deployed between EBGP neighbors, and routing policies between IBGP neighbors are not valid.

A.

TRUE

B.

FALSE

Full Access
Question # 54

The following statement about the Security Alliance SA in IPSec is wrong with ?

A.

SA is uniquely identified by a triple that includes the Security Parameter Inder ,Security Parameter Inder), the source IP address, and the Security Protocol Number (ASESP) used

B.

Use the display ipsec command to view information such as the encryption method used with another IPSEC peer, the traffic of interest, and so on.

C.

IPSec only supports encrypting data using the pair encryption algorithm.

D.

IpSec peers must be at a two-way SA to establish an IPSec VPN connection to

close

Full Access
Question # 55

In an Hw IP multicast network—which of the following multicast features are associated with (*, G) table entries? ( Multiple select)

A.

Dense mode

B.

Source tree

C.

Sparse mode

D.

PIM bidirectional E. Share the tree

E.

Dense Tree

Full Access
Question # 56

What is the following description of LDP reliability?

A.

LGP GR (Graceful Restart) takes advantage of the high difference between the LS forwarding plane and the control plane to realize that the device forwards without interruption when the protocol is restarted or the master-standby is reversed

B.

Manually configured LDP FRR policy defaults to a 32-bit backup route that triggers LDP to establish a backup ISP

C.

The LDP ERR can also generate an ISP for a tag map from a non-optimal next hop, and create a forwarding table entry as a backup of the primary LSP

D.

LDP and LGP linkage, the need for IGP to suppress the release of routes, to ensure that LDP and LGP paths are consistent

Full Access
Question # 57

In a multicast network, what causes multicast traffic to not forward properly?

A.

The router does not have an RPF route

B.

PIM is not enabled on the RPF interface

C.

The upstream router will receive the PIM Join message dropped

D.

Multi-router egress network, this router is not DR

Full Access
Question # 58

NO: 322

The following description of MED, correct:

A.

MED default value is 100

B.

MED can only be passed within this AS

C.

MED is an optional non-transitional attribute

D.

MED The default value is 0

Full Access
Question # 59

For Layer 2 VPN technology, the following statement is correct? Multi-select

A.

VPLS is a widely used technology in the live network, which can provide transparent transmission of three-layer messages and achieve multi-point access.

B.

The VPLS configuration is complex and the Layer 2 network transmits BUM packets.

C.

BGPEVPN supports features such as tenant isolation, Multi-homing, and broadcast suppression. D. BGPEVPN addresses mac address drift and multi-tenancy that VPLS cannot support.

Full Access
Question # 60

DHCP Relay is responsible for forwarding DHCP packets between the DHCP server and the DHCP client, assisting the DHCP server in dynamically assigning network parameters to the DHCP client.

A.

TRUE

B.

FALSE

Full Access
Question # 61

0SPFV2 is running on the IPV4 network IGP: OSPF3 is running in the IPV6 network, OSPF35 OSPFV2 has the same message type. Includes hello messages, DOD messages, LSR messages, LAU messages, and SAX messages about OSPP The following statement is correct?

A.

The hello packet of OSPFv3 carries the IPV6 address prefix of the router interface

B.

OSPFv3 uses the authentication field of the packet header to complete the packet authentication

C.

OSPFv3 uses the link-local address as the source address for sending packets, which can be forwarded outside the range of the originating link

D.

OSPFv3 sends OSPFv3 packet using the IPV6 multicast addresses FF02::5 and FF02

Full Access
Question # 62

In Huawei devices, when SIS introduces external routes and sets external route tags for route information, the Metric type of ISIS does not need to be modified and remains default.

A.

True

B.

False

Full Access
Question # 63

OSPF fast convergence is an extended feature to improve the convergence speed of routing, in which PRC works by speeding up routing computation by performing path calculations only on the affected nodes when the network topology changes.

A.

TRUE

B.

FALSE

Full Access
Question # 64

Two routers, connected together through the serial port, but can not ping between each other , now check the port status as follows: Can the following information determine what the cause is?

H12-891_V1.0 question answer

A.

Insufficient link bandwidth

B.

The IP addresses on both ends are not on the same network segment

C.

The link layer protocols on both ends are inconsistent

D.

Subnet mask does not match the

Full Access
Question # 65

Router A has an IP route entry with a purposeful CIDR block of 10001/32 and an outgoing interface of GigabitEthernetO/0/1. Now add the following configuration: acd number 2000 rule 10 permit source1001.10#traffic classifier test if-match acl 2000 # traffic behavior test remarkdscp cs3#traffic policy test classifier test behavior test#

interfaceGigabitftherneto/0/1 ip address 1001212552552550 traffic-policy test outbound#assuming router A received a destination IP of 10001 Of packets, the following statements are correct:

A.

If the data packet source lIP address is 1001.2, it can be forwarded with the DSCP field marked CS3

B.

If the packet source IP address is 1001.1, it can be forwarded while the DSCP field is marked as CS3

C.

If the packet source IP address is 1001.2, it cannot be forwarded

D.

If the packet source IP address is 1001.2, it can be forwarded while the DSCP field remains unchanged

Full Access
Question # 66

There are three port roles defined in RSTP, with alternative ports and backup ports flags in STP messages The port role values within the fields are consistent, all of which are 01

A.

TRUE

B.

FALSE

Full Access
Question # 67

The Layer 3 logical interface on XLAN L3 Gateway that enables communication between different VXLAN virtual networks is ?

A.

Layer 2 sub-interface

B.

NVE interface

C.

VBDIF interface

D.

VLANIF interface

Full Access
Question # 68

MSTP switches treat RSTP switches as MSTP domains, MSTP, which are formed by a single switch The interchange resolves the RSTBPDU to MSTBPDU, where IRPC is 0

A.

True

B.

False

Full Access
Question # 69

Which of the following are used in Ethernet?

A.

A MAC address in a non-canonical format

B.

CSMA/CD in multiplexed interviews

C.

Mac address in canonical format

D.

D. 8025 encapsulated frames

E.

8023 Encapsulated Frame

Full Access
Question # 70

The fields that represent priority in the VLAN (8021Q) data encapsulation are a total of 6 bits.

A.

True

B.

False

Full Access
Question # 71

The correct description about the prefix list is:

A.

The prefix list is used to filter P prefixes and can match both prefix numbers and prefix lengths

B.

The prefix list is used to filter IP prefixes, and cannot match both the prefix number and the prefix length

C.

The prefix list cannot be used for packet filtering

D.

The prefix list can be used to filter packets

Full Access
Question # 72

An engineer performed the ingestion operation on an OSPF router in a network of the company, is the following statement about the introduction of the routing LSA correct?

A.

The A. Advertising Router report is set to as the Router ID of ASBR

B.

Net Mask is set to all 0

C.

Link State lD is set as the destination network segment address

D.

Using the Link State ID and Advertising Router, you can uniquely identify an LSA

Full Access
Question # 73

What are the reasons why the BGP connection is down after it is successfully established ? ( Single choice questions) Single choice

A.

The wrong BGP packet was received.

B.

The mandatory attribute in the route update packet is missing.

C.

Open message negotiation failed.

D.

After the BGP connection is established, the keepalive message is not received within the negotiated holdtime time.

Full Access
Question # 74

A bookstore provides a wired network for customers to learn online. However, one day, it was found that some users could not access the network, and after inspection, it was found that the IP resources of the DHCP address pool had been exhausted. Which of the following is the best way to solve the problem of the moment? ( Single choice questions).

A.

Configure the static ARP binding table

B.

Configure the IPSG

C.

Limits the maximum number of DHCP Snooping binding table entries that the interface allows to learn

D.

Configuration DAI

Full Access
Question # 75

?? Route ? Policy ??:ip community-filter Ipermit 100: 1 ip as-path-filter 2 permit ^I00$ route-policy test permit node 10 if-match communityfilter 1 if-match as-path-filter 2 apply

as-path 200 Is the above configuration description correct?

A.

The BGP route matches the above only if the BGP route carries a community attribute value of 100:1 or if the AS PATH is 100 route one policy. The AS-one PATH attribute that matches the route is changed to 200

B.

The BGP route matches the above only if the BGP route carries a community attribute value of 100:1 and the AS-One PATH is 100 route policy? The AS-PATH nature of the matching route is changed to 200

C.

Only if the BGP route carries an AS-PATH of 100, the BGP route matches the route one policy above. The AS-one PATH attribute that matches the route is changed to 200

D.

As long as the BGP route carries a community attribute value of 100:1, the BGP route matches the route-policy above The AS-PATH attribute of the matching route is changed to 200

Full Access
Question # 76

Assume that BGP/MPLSIPVVPN, OSPF, LDP, and static routing protocols are already enabled on the PE router . Which of the following protocols need to enable GR on PE in order to get NSF functionality? (Multiple choice questions).

A.

BGP

B.

Static circuit

C.

OSPF

D.

MPLS LDP

Full Access
Question # 77

In order to reduce the number of OSPF routes in certain areas, the OSPf protocol has developed special area functions, and the following description of the characteristics of OSPF special areas is correct

A.

ASBR-Sunmary-LSA is allowed to be published to the NSSA region

B.

AS-External-LSA is allowed to be published to the Stub region

C.

Any OSPF zone can be configured as a special zone

D.

Zone can be equipped with zhiyi

Full Access
Question # 78

D Class IP address range 239000-239255255,What does 255 do? Radio

A.

SSM multicast address, the multicast address segment is valid for the whole network

B.

Any legitimate multicast traffic and multicast application can adopt this address C. Locally managed multicast address, which is valid only locally

C.

Link-local multicast address, where traffic that uses that address includes network control messages and that address range is only the multicast address segment used by the E. routing protocol

Full Access
Question # 79

SNMPv3 defines which security features

A.

Privacy

B.

Authentication

C.

Domain checking

D.

Accounting

Full Access
Question # 80

Run the SSM across the entire HW IP multicast network. The following about SSM understands correctly?( Multiple choice question)

A.

No RP is required

B.

SSM uses only shared trees

C.

SSM uses only the SPT tree

D.

Ideal for 1-to-many applications

E.

SSM is recommended when you have multiple sources and expect to minimize the state of mroute in your network Ideal for many-to-many applications

Full Access
Question # 81

If there are multiple recipients in a multicast group, the administrator enables the IGMP-Snooping function on the switch connecting the recipient, and when the receiver receives the universal group query packet of the queryer from the switch, how should multiple recipients respond?

A.

The first recipient whose response time time expires sends the Report message, the other receivers do not.

B.

All recipients will respond to Report messages only if ICMPV2 is running.

C.

All recipients will respond to the Report message only if IGMPvl is running.

D.

All recipients will respond to the Report message

Full Access
Question # 82

Is the following information about BGP4+ described correctly?

A.

BGP4 can use dampening commands to suppress oscillations on IBGP routes.

B.

Modifying the RouterID of BGP causes the BGP connection between routers to be re-established.

C.

The Next Hop attribute in BGP4+ is represented by an IPv6 address, which can be the link-local address of the next hop.

D.

BGP4+ does not support route auto-aggregate

Full Access
Question # 83

The following description of VLANs in Ethernet is correct?

A.

VLANs do not support bulk creation on devices

B.

The range of VLANs is 0 to 4096

C.

The default reserved VLANs for Huawei devices are 4000~4010

D.

VLANs can be extended through QinQ technology.

Full Access
Question # 84

Regarding the MPLS basic forwarding process, the following description is incorrect? Radio

A.

By default, the PHP-enabled Erass node assigns a label value of 3 to the inverted second-hop node.

B.

When an IP message enters the MPLS domain, the MPLS boundary device inserts a new label between the layer 2 header and the IP header.

C.

When the P message enters the MPLS domain, check whether the Tunel lD value corresponding to the destination IP address is Ox0O If the Tunel IlD value is Ox0 Then enter the MPLS forwarding process.

D.

The transport node device replaces the existing top-of-stack label (outermost label) with the label assigned by the next hop device.

Full Access
Question # 85

As shown in the figure, in the context of IPv4 and IPv6, the SEL field in the NET address of isis always takes a value of 00 ?

H12-891_V1.0 question answer

A.

Right

B.

Wrong

Full Access
Question # 86

The following is the correct statement about the LSA of OSPFv3?

A.

Inter-AreaPrefix-SA's LinkStatelD contains the prefix

B.

Router-LSA and Network-LSA does not contain routing information

C.

When the Intra-AreaPrefixLSA's ReferencedLinkStateType-2, referencedLinkStatelD contains the interface to DR ID

D.

Inter-AreaPrefirLSA also contains LinkLocal information file

Full Access
Question # 87

In the forwarding table of the switch, a MAC address can correspond to only one outlet at a time

A.

True

B.

False

Full Access
Question # 88

There is an existing router interface serial 0 in OSPF area 1 , well will interface Serial 0 is set to silent interface. So what is the impact of this setting?

A.

OSPF establishes usable adjacencies through this junction

B.

OSPF does not join the routes learned from the connector to the local routing table

C.

OSPF does not establish any adjacency relationships through the junction

D.

OSPF receives a route update answer from the neighbor.

Full Access
Question # 89

What information does this contain in a basic layer packet? (Multiple choice) A Data link layer header

B. Upper-level data

C. The network layer header

D. path records

E. Network Layer Tail

Full Access
Question # 90

Is the following correct statement for the VXLAN message?

A.

The outer destination IP address is the IP address of the VTEP at the far end of the VXLAN tunnel

B.

The source UDP port number is 4789

C.

The destination UDP port number is 4789

D.

VNI has 24 T bits to distinguish the VIAN segment

Full Access
Question # 91

The following description of the Layer 6 functionality in the OSI reference model is correct?

A.

Synchronous communication

B.

Establishing, maintaining, and terminating communication sessions

C.

Provides a common data compression and encryption scheme

D.

Determines the availability of resources

Full Access
Question # 92

As shown in the following figure, R1, R2, R3 establish a neighbor relationship of Level2 The IP routing table for R3 is correct (multiple choice).

H12-891_V1.0 question answer

A.

The 2::/64 route appears in the P route table

B.

The 2019:/64 route appears in the IP routing table

C.

2020::/64 The route appears in the IP routing table

D.

The 2021/64 route will appear in the IP routing table

Full Access
Question # 93

What are the following techniques for improving MPLS BGP VPN reliability?( Multiple choice question)

A.

dual home networking is configured at the access layer

B.

VPN FRR

C.

VPN GR Private IP routing between

D.

PE-CE FRR

Full Access
Question # 94

Regarding the description of the security level of the configured firewall security zone, the error is ?

A.

Two security zones are not allowed to configure the same security level in the same system

B.

Once the security level is set, it is not allowed to change

C.

You can only set the security level for a custom security zone

D.

For newly created security zones, the system defaults to a security level of 1

Full Access
Question # 95

Which of the following BGP attributes is not required in the Update message for a BGP route?

A.

WITH

B.

Local-Preference

C.

AS_PATH

D.

Origin

Full Access
Question # 96

In the multi-level RR scenario, the first-level RR will be connected to a large number of second-level R, which may cause the BGP circuit of the first-level RR to overflow from the table Risk of R BGP routing table overflow?( Radio).

A.

ORF

B.

Route Control C. Route Aggregation

C.

Set the same Cluster-ID

Full Access
Question # 97

The DHCP protocol assigns to clients—some TCPIP-related parameter information—in the process DHCP defines a variety of messages that are encapsulated at the transport layer :(sortic).

A.

PPP package

B.

IP encapsulation

C.

TCP Encapsulation

D.

UDP Encapsulation

Full Access
Question # 98

Which field in the IPv6 basic header has a similar effect to which field in the IPv4 header does?

A.

Flags

B.

Protocol

C.

Time to Live

D.

Ldentification

Full Access
Question # 99

Which of the following parameters are not required when configuring BGP Peers?

A.

as-number

B.

password

C.

peer IP Address

D.

Description

Full Access
Question # 100

In RSTP , which port provides a backup path to reach the root node of the spanning tree? What state is the port in?

A.

Root Port and Listening Status

B.

Alternate Port and Forwarding Status

C.

Alternate Port and Learning Status

D.

Designated port and Listening status

E.

Alternate port and Discarding status

Full Access
Question # 101

Regarding the OSPFv3 protocol, what is the error described below?

A.

Under the sukugan of a shared router, each OSPFv3 process runs independently

B.

Multiple instances can be run in the same OSPFv3 under the same interface

C.

Can support running multiple instances on a single link

D.

OSPFv3 message header will contain instance IDFu Duan flogging

Full Access
Question # 102

The interface Serial0 of an existing router is in OSPF area 1, and the interface Serial0 is set to Silent interface. So what kind of impact will this setting have

A.

OSPF establishes available adjacencies through this interface

B.

OSPF does not add routes learned from the interface to the local routing table

C.

OSPF does not establish any neighboring relationships through this interface D. OSPF receives routing updates from neighbors

Full Access
Question # 103

What are the three ways to send IPv4 messages?

A.

broadcast

B.

Unicast

C.

Multicast

D.

Any broadcast

Full Access
Question # 104

What descriptions of the OSPF protocol are correct?

A.

AS-External-LSA describes the router's path to ASBR

B.

The cost value of the second type of external route is only the AS external cost value, ignoring the AS internal cost value

C.

AS-External-LSA does not belong in any region

D.

AS-External-LSA describes the path to the as outside of the route, and the scope of the flood is the AS outside

Full Access
Question # 105

If we have a VPN instance configured on a router, if we need to view the VPN route on a Huawei router, which of the following commands should we use?

A.

display ip routing-table vpn-instance vpn-instance-name

B.

display ip routing-table

C.

display vpn routing-table

D.

display ip vpn-instance

Full Access
Question # 106

About multi-instance CE (Multi-VPN-Instance CE, MCE). What is the error described below?

A.

Users who connect to the same MCE but are not part of a VPN instance cannot access each other

B.

The MCE vs. PE direction must have multiple physical links to achieve isolation between different VPN instances

C.

MCE-enabled devices can access multiple VPI instances in BGP/RPLS IPVPN applications, reducing user network equipment investment

D.

On the MCE device, you need to create their own routing tables for different VPNs and bind to the corresponding interface

Full Access
Question # 107

Which of the following does the digital certificate not contain?

A.

Digital envelopes

B.

Issued by

C.

Digital signature

D.

Public key information

Full Access
Question # 108

Why is BGP an enhanced distance vector routing protocol?

A.

According to the routing rules of BGP routing, the route with lower MED is preferred

B.

BGP uses the ASPATH attribute to record all autonomous system numbers that a route passes through into an AS list, and based on that attribute, routes with shorter AS-PATH are preferred

C.

NEXT_HOP is a recognized mandatory attribute

D.

BGP cannot accept routes that carry a local AS number in the AS_PATH

Full Access
Question # 109

Router RL and Router R2 run BGP both routers are in the AS65234 The router R2 route is present in the BGP routing table of router RI, but not in the P of router R1 road

A.

With BGP, both routers are in the AS65234 Route cry PD is done by the right big worker

B.

By the table, so what causes the problem to occur? A, synchronization is turned off

C.

The B. BGP neighbor relationship is Down

D.

Router R1 does not enable BGPMulti-hop D Routing is not optimal

Full Access
Question # 110

A routing tool can define multiple entries. Which tool will automatically add a deni-any entry at the end of the configuration?

A.

Route policy

B.

Community-tilter

C.

IP-prefix

D.

AS-path-filter

Full Access
Question # 111

BGP4+ is running between two routers, and the neighbor relationship is normal, but the BGP routing table of the router on this side does not have a neighbor route entry.

A.

The route entry in the peer BGP route table is non-optimal.

B.

The next hop address of the

C.

BGP route entry is unreachable

D.

Peer ignore is configured on the peer

E.

The peer is configured with active-route-advertise

Full Access
Question # 112

Which address prefix in the following options indicates that the address is globally unique and globally routable among unicast addresses in IPv6, similar to a public address in IPv4?(). Single choice questions).

A.

::1/128

B.

FE80:/10

C.

FE80::/10

D.

2000:;/3

Full Access
Question # 113

When a Layer 3 switch sends IP packets originating from one VLAN to another LAN, which field in the following options is overridden?( Single choice questions).

A.

Three layers of TTL

B.

Layer 3 destination address

C.

Layer 3 source address

D.

Layer 3 Transport Protocol

E.

Two-tier TTL

Full Access
Question # 114

The correct statement about the difference between OSPFv2 and OSPFv3 is ? Multi-select

A.

BOTH OSPFv2 and OSPFv3 support interface authentication. And OSPFv3 authentication is still based on the fields in the ospf message header

B.

OSPFv3 is similar to OSPFv2 in that it uses a multicast address as the OSPF message destination address

C.

The same type of message exists in OSPFv2, OSPFv3: Hello, DD, LSR, LSU, LSAack, Their message format is the same

D.

OSPFv2 has the protocol number 89 in the IPv4 packet header, OSPFv 3 The next number in the IPv6 message header is 89

Full Access
Question # 115

In the following topology diagram, R1 can access the Internet through R2 and R3, R1 and R2, R1 and R1 An EGP connection is established between R3 , and R2R3 belongs to the same AS, each via BGP Publishing a default route that requires R1 to visit lnternet's traffic preference R2, can the following practices be achieved?

A.

R1 specifies that the peer R3 sets the MED property to 150 in the import direction

B.

R2 specifies that the peer R1 sets the local priority to 150 in the export direction

C.

R2 specifies that the peer R1 sets the MED property to 150 in the export direction

D.

R1 specifies that the peer R2 beats the local priority in the import direction to 150

Full Access
Question # 116

Regarding the site in the BGP/MPLSIP VPN network architecture, the following description is correct?

A.

Under no circumstances can different sites that belong to the same VPN use overlapping address spaces

B.

Two geographically separated networks must belong to different sites

C.

Terminals connected to the carrier network through the same CE may belong to different sites

D.

A site is a set of IP systems, and a network of hosts cannot be called site

Full Access
Question # 117

A home user has opened a 1Mb/s bandwidth, and in order to improve the user experience, the operator can stabilize 2Mb/s when measuring speed If we use the listening bucket technology to achieve this requirement, which of the following methods is optimal.

A.

cir 10000 pir 12000

B.

cir 10o00 cbs 12000 pbd 12000

C.

cir 8000 pir 12000

D.

cir 10000 cbs 10000 pbs 12000

Full Access
Question # 118

In broadcast networks, elections to DIS begin only after a neighbor relationship has been established

A.

True

B.

False

Full Access
Question # 119

The following description of BGP ring protection is correct

A.

The BGP router does not announce any updates from the EBGP peer to other EBGP peers

B.

BGP routers that are not RR do not announce any updates from the IBGP peer to other IBGP peers

C.

Any routing information from the IBGP peer is advertised to the other IBGP peers

D.

, through the AS-path attribute, discard any update information received from the EBGP peer that contains its own AS number in the AS-path attribute

Full Access
Question # 120

The link quality of a company's network is poor, often failures lead to route oscillation, and even occasionally there are routing loops, in order to prevent the recurrence of these phenomena, the network administrator decided to deploy URPF in the whole network to improve the stability of the network

A.

True

B.

False

Full Access
Question # 121

Among the routing policy tools commonly used by BGP, which ones can be used to filter routes?

A.

filter-policy

B.

Route-policy

C.

lp extecommunity-filter

D.

Traffic-policy

Full Access
Question # 122

What is the following description of MPLS incorrect?

A.

The length of the MPLS tag is 20 to 20 for packet forwarding.

B.

The tag space range of dynamic signaling protocols such as LDP, M P-BGP is 16 to 1023

C.

When using the TTL processing method of Pipe mode, the IP packet transmits the TTL of the IP packet over the IPLS network. The value is only minus 1 for the MPLS in and out nodes.

D.

MPLS supports multi-layer label nesting, and the S bit value of the innermost label is 1.

Full Access
Question # 123

The existing router HWl running BGP is configured with both IBGP neighbors and EBGP tenants. The following descriptions about IBGP Neighbors and EBGP Neighbors are correct?

A.

The router will have an EBGP BGP neighbor from it must be connected directly, otherwise, IBGP-Multi-hop must be configured

B.

The router sends BGP updates learned from its EBGP neighbors to its other IBGP neighbors and EBGP neighbors

C.

IBGP neighbors can establish neighbor relationships through the Loopback interface

D.

The router sends BGP updates learned from its IBGP neighbors to its other IBGP neighbors and EPGP neighbors

E.

EBGP neighbors must be directly connected, otherwise, EBGP-Multi-hop must be configured with

Full Access
Question # 124

What is correct about the multicast message forwarding?

A.

RPF check failure indicates that the multicast data packets are received from a suboptimal interface, but the interface still receives multicast traffic and forwards it downstream

B.

IGMP snooping function can not control the range of multicast traffic in the Ethernet flood

C.

In the multicast transmission mode, the destination address of the message can specify the location of the receiver

D.

The source address of the multicast message is the unicast address

Full Access
Question # 125

As shown in the figure,

H12-891_V1.0 question answer

all interfaces of the router have OSPF turned on, and the COST value of the link is identified in the figure. R2's loop backO interface advertises a cost in region l, then R1 reaches 10022/32 The value is

Full Access
Question # 126

In the VXLAN implementation, the mapping relationship between VNI and BD is

A.

1:N

B.

N:1

C.

1:1

D.

N: M

Full Access
Question # 127

To build a loopless Layer 2 network, which of the following schemes is optimal?( Single Choice)

A.

Stacking + Link Aggregation

B.

TRILL+MSTP

C.

??+MSTP

D.

Link Collection + MSTP

Full Access
Question # 128

IPv6 introduces the Solicited-Node address, which is described correctly below (multiple choice)

A.

This is a specific address that is used for resolution in ARPv6 The MAC address.

B.

The Solicited-Node address on the router interface is automatically generated and can have multiple.

C.

If the Solicited-Node address is not configured , the router automatically generates one on each interface.

D.

IPv6 introduced the Solicited-Node address to support IPv6 multicast.

Full Access
Question # 129

Which of the following options is correct?

A.

Unicast and broadcasting cannot effectively achieve data transmission between one source and multiple destinations on P2MP, but multicast technology can

B.

Multicast technology is able to reduce redundant traffic, so network bandwidth can be saved C. Multicast technology is used for "-to-many" applications

C.

Since multicast is based on TCP to establish a connection, multicast technology can ensure the reliable transmission of data

Full Access
Question # 130

As shown in the figure, three switches S1, SW, and SN3, where SWI is the root bridge, and link congestion occurs between SI and SW2, SWD cannot receive the configuration BPDU sent by the root bridge, which spanning tree protection mechanism does the administrator need to configure to prevent the problem caused by link congestion?( Single choice questions).

A.

root protection

B.

PreventS TC-BPDU attacks

C.

BPDU Protection

D.

Loop Protection

Full Access
Question # 131

The role of Link-LSA in OSPFv3 does not include ?

A.

Advertise to other routers on the link optional that is set in the Network LSA from which this link originates

B.

Advertise the per-port ID of this router to other routers on the link

C.

Advertise the link-local address

D.

of this interface to other routers on the link Advertise this IPv6 prefix list to other routers on the link

Full Access
Question # 132

The following description of the attributes of BGP is correct?( Single choice questions).

A.

The AS deficit of the adjacent AS is ranked at the far right of the list of AS_Path in the BGP route entry.

B.

When the B. BGP Speaker publishes a route learned from an EBGP peer to an IBGP peer, it does not change the next hop attribute of that routing information.

C.

Local_Pref is valid only between EBGP peers and is not advertised to third-party AS.

D.

A route can have only one community attribute value.

Full Access
Question # 133

IPV6 multicast introduces the concept of multicast scope, which of the following ways is the multicast scope concept implemented? Multi-select

A.

When the group shake source sends IP6 multicast data, the TTL value of the packet is set to limit the transmission range of the group shake

B.

There is a special field in the IPv6 multicast address that specifies the propagation range of multicast.

C.

Multicast scope is just a concept of spreading scope, and there is no specific technical implementation.

D.

During network configuration, the administrator uses the configuration command at the edge of the network to limit the multicast scope.

Full Access
Question # 134

There is an existing router running OSPF HWL, HW1 interface serial0 is published in zone 1, configure commands under the OSPF process nssa default-route-advertise, based on the previous description, infers which of the following options are correct?

A.

When HW1 injects a default route into Zone 1, HW1's local route table can not contain a single default route

B.

HW1 injects a Type 7 default route into Zone 0

C.

HW1 injects a type 7 default route into zone 1

D.

HW1 injects a Type 3 default route into Zone 1

E.

When HW1 injects a default route into zone 1, HW1's local route table needs to answer the default route

Full Access
Question # 135

Which of the following is the benefit of VLAN aggregation?

A.

Implements isolation of broadcast domains between Sub-VLANs

B.

Reduce the waste of IP addresses

C.

Increased number of available VLANs

D.

Increased flexibility in addressing

Full Access
Question # 136

The HTTP protocol is based on TCP, so http Flood attacks can be defended against HTTP Flood attacks using the TCP Flood attack prevention method.

A.

True

B.

False

Full Access
Question # 137

What are the wrong statements about OSTPF's Router LSA and Network LSA?

A.

There must be both Router LSA and Network LSA in the OSPF network

B.

Network LSA carries both topology and routing information

C.

A router running OSPF must produce a Network LSA

D.

A router running OSPF must produce a Router LSA

Full Access
Question # 138

Mainstream Layer 2 tunneling technologies include VXLAN TRILL, NVGB and MPLS.

A.

FALSE

B.

TRUE

Full Access
Question # 139

ISIS does not send CSNP packets under the P2P network type during the neighbor establishment process.

A.

True

B.

False

Full Access
Question # 140

If a Huawei S series switch needs to designate a member switch as the primary switch of the stack, it can power on this switch first, and then power on other member switches after 20s.

A.

True

B.

False

Full Access
Question # 141

You need to access the subnets of different VPNs in the VXLAN network , such as information about one subnet

Bottom: RT=10:1ORT.100:1000 Export 1000 in EVPN instance and RT-100-100 in VPN instance.

Which of the following can be basketed for another subnet?

A.

All EVPN instances are 1000:1000

B.

In VPN instances, it is 10:10

C.

1000:1000 appears in VPN instances

D.

EVPN implements 1000:1000 export

Full Access
Question # 142

The switch role in the stacking system does not include ?

A From the switch

B. Candidate Switch

C. Standby Switch

D. Primary Switch

Full Access
Question # 143

XLAN uses BGP EVPN to establish a tunnel, what type of message is used? ( Single choice questions).

A.

Typel

B.

Type2

C.

Type3

D.

Type4E. Type5

Full Access
Question # 144

The following statement about EVPN Type5 routing is wrong?( Single choice questions).

A.

Type5 routes carry Layer 3 VNI.

B.

Type5 routing carries both Layer 2 VWI and Layer 3 VNI

C.

The IP Prefix field can carry both host and network segment addresses.

D.

Type5 is an IP prefix route.

Full Access
Question # 145

The network administrator is ready to use the 6to4 automatic tunnel to carry IPv6 data on the IPv4 network, and the IPv4 address of the router interface is 1381485210, so the corresponding tunnel address is 2001:8a0e:55d2:1:230:65ff:fe2:9a6?

A.

True

B.

False

Full Access
Question # 146

Regarding the WRR (Weight Round Robin) description of the error is ?( Multiple select).

A.

WRR avoids congestion in the network

B.

WRR guarantees that various queues are allocated to a certain amount of bandwidth

C.

WRR is a congestion management technique

D.

WRR can no longer use

E.

WRR on GE interfaces to ensure that critical services are prioritized for

Full Access
Question # 147

ISIS elects DIS in broadcast multiplexed access networks, and the following statement about DIS is correct?( Multiple choice)

A.

ISIS elects dis by comparing priorities, and mac addresses if the priorities are consistent

B.

In a broadcast multiple access network, DIS sends Hello PDUs at three times the frequency

C.

DIS guarantees database synchronization by periodically sending CSNP messages

D.

DIS supports preemption function, after the new DIS preemption is successful, there is no need to flood any LSP packet

Full Access
Question # 148

What does IPV6 enable topology ipv6 mean under IS-IS protocol view?

A.

Does not have any meaning

B.

SPF calculation for IPv6 is not supported

C.

SPF calculation is performed separately in the topology of IPv4 and IPv6,

D.

IPv4, IPv6 using the same topology for SPF calculation

Full Access
Question # 149

The following statement about OSPF route filtering is incorrect.( Single choice questions).

A.

In the NSSA area, filtering for external route ingestion and advertisement can be configured on ASBR or ABR

B.

Filtering for the three types of LSAs needs to be configured on the ABR across OSPF regions

C.

Interface-based filtering of LSAs allows all LSAs in the inbound and outbound directions except grace LSAs

D.

Based on the link state database, when calculating routes, the fiter-policy import command is used, which only affects the route addition in the route table, and has no effect on the OSPF link state database

Full Access
Question # 150

The following message about OSPFV3 is correct?

A.

The Option field of the Hello and DD packets extends to 24-bit

B.

LSR packets containing the full LSA header information for requesting an update to the LSA

C.

The LSACK message contains LSA header information to confirm receipt of the LSU message

D.

The Hello message must contain the interface ID of the sending interface

Full Access
Question # 151

If all the public IP addresses are used by a company's intranet users to access the Internet using NAT's No-pat method, what will happen to subsequent intranet users who access the Internet?

A.

automatically switch NAT to PAT after the Internet

B.

Subsequent intranet users will not be able to access the Internet

C.

Synchronize messages to other NAT conversion devices for NAT conversion

D.

Squeeze out the previous user and force NAT conversion to go online

Full Access
Question # 152

S-4S supports multi-instance and multi-process, that is, on an IS-IS router, multiple VPN instances can be configured to associate with multiple IS-S processes, the following description of IS-IS multi-instance and multi-process, which are correct ?

A.

If an IS-IS router creates multiple IS-IS processes, each process is independent of each other

B.

1 IS-IS processes can only be associated with 1 VPN instance

C.

1 IS-IS processes can be associated with several different VPN instances

D.

1 VPN instances can be associated with several different IS-IS processes

Full Access
Question # 153

If the topology of the entire network does not change, but the allocation of IP segments in the router changes, ISIS only uses PRC to calculate the changed routing information, and does not recalculate all SPT

A.

True

B.

False

Full Access
Question # 154

Configuring filter-policy 2000 export in the IS-IS process, the wrong statement about the function of the command is ?

A.

which needs to be used in conjunction with route ingestion, acts as an external route sender neighbor that only partially introduces.

B.

If you do not configure this command, the device will by default introduce the external routing protocol to the IS-IS route all outgoing

C.

Restricts the external publication of route entries generated by the device itself

D.

This command will filter the link status information released to the outside world

Full Access
Question # 155

The correct statement about the IGMP proxy is ? Multi-select

A.

The downstream interface of the IGMP proxy device generates multicast relay table items

B.

IGMP proxy can detect the link status with the linkage through the information of the member host joining/leaving the multicast group, and realize the rapid switching of the primary and standby device links

C.

IGMP proxy is typically deployed on devices between hosts that are members of the access device

The

D.

IGMP proxy device cannot send query messages to downstream member hosts in place of the IGMP queryer to maintain group membership

Full Access
Question # 156

When troubleshooting a local area network, you notice a large number of frame alignment errors, FCS errors and LAG conflicts, and the possible cause of these problems is ?

A.

Switches and terminals are interconnected over 10/100/1000base-T Ethernet links, and switches and terminals operate in half-duplex mode

B.

There is a mode mismatch on the 1000base-LX/LH link

C.

The operating mode does not match

D.

on a 10/1000/1000base-T Ether link This type of error occurs in most environments

Full Access
Question # 157

MPLS is called multiprotocol label switching, and with respect to label descriptions in MPLS, the correct one is ?( Multiple select).

A.

The MPLS system has a variety of label publishing protocols, such as LDP is a label publishing protocol

B.

The label is carried by the head of the MPLS message and has a global significance, that is, the label value of all routers cannot repeat

C.

A tag is a fixed-length, locally only meaningful identifier that uniquely identifies the FEC to which a group belongs

D.

MPLS supports single-layer tags as well as multi-tier tags

Full Access
Question # 158

In order to study the working mechanism of the OSPFv3 protocol, a project to build a network topology is as follows, the configuration of R1 and R2 is as follows, please ask the LSA switched between R1 and R2 What are the types?

A.

network-LSA

B.

Router-LSA

C.

Link-LSA

D.

Inter-area-prefix-LSA

Full Access
Question # 159

In a network in MPLSVPN, different CE devices can exchange routing information with the same PE device using different routing protocols, and different CE devices can exchange routing information with the same PE The routing protocols used between devices are independent of each other

A.

True

B.

False

Full Access
Question # 160

LDP messages are exchanged between LDLRs running the LDP protocol, and LDP messages can be divided into four types according to function, which of the following is not an LDP message type ?

A.

Advertisement message

B.

Discover message

C.

Conversation message

D.

Label Exchange Information

Full Access
Question # 161

The following statement about RSTP root protection is correct?

A.

Turning on root protection on the root port takes effect

B.

The port that turns on the root protection receives the RST BDPU with a higher priority and will enter the error-down state

C.

It is recommended that you turn it on on a switch that is at the edge of the network

D.

After opening the root-protected port and receiving the RSTBPDU with a higher priority, if it does not continue to receive the RSTBPDU with a higher priority for a period of time, it will return to the normal forwarding state

Full Access
Question # 162

Compared to IPV4 multicast, which of the following descriptions is the characteristic of IP6 multicast?

A.

IPv6 multicast does not contain MSDP and dense mode

B.

The first 8bit IPV6 multicast address is always FF(11111111).

C.

IPv6 multicast clients use IGMPv3 to join multicast groups

D.

IPv6 multicast load sharing extends the multicast routing rules and is completely independent of RPF check

Full Access
Question # 163

In the description of the MAC address spoofing attack, the error is ? Radio

A.

Mac address spoofing attacks cause the switch to learn the wrong mapping of Mac addresses to IP addresses

B.

A MAC address spoofing attack causes the data that the switch is sending to the correct destination to be sent to the attacker

C.

MAC address spoofing attacks primarily exploit the switch Mac address learning mechanism

D.

An attacker can perform a MAC address spoofing attack by sending a forged source Mac address data frame to the switch

Full Access
Question # 164

To achieve an on-machine migration in the BGP EVPN distributed gateway scenario, which of the following messages is required?

A.

Type5

B.

Type4

C.

Typel

D.

Type2

E.

Type3

Full Access
Question # 165

Users within a typical VPN can only communicate with each other, not with Internet users, and with Internet. But VPN individual sites may have access to internet's needs. The correct description of the implementation of VPN interconnection with internet is ?( Multiple choice questions).

A.

is implemented on the user side, and the CE is directly connected to the Internet. Each user site can be connected to the Internet separately, that is, the CE of each site is configured with a default route to the Internet.

B.

Implementing a complex implementation on PE and having security implications, PE devices may be subject to Dos attacks on the Internet.

C.

Implemented on PE, the PE device issues a default route to the CE to the Internet and adds a default route to the VPN instance routing table pointing to the Internet Gateway o

D.

Implemented on the user side, the implementation method is simple, and the public network and private network routes are isolated, safe and reliable.

Full Access
Question # 166

As a network administrator, which of the following protocols can I use for network device configuration?

A.

SSH

B.

NETCONF

C.

LLDP

D.

SNMP

Full Access
Question # 167

Which of the following attacks are DoS (Denial of servioe) attacks?( Multiple choice question)

A.

Single packet attack

B.

Source P address spoofing attack

C.

Man-in-the-middle attack

D.

Flood Attack

Full Access
Question # 168

Which of the following are single-packet attacks?

A.

Special control message attacks

B.

Scan Probe Attack

C.

DDos Attack

D.

Malformed Message Attack

Full Access
Question # 169

As shown in the figure, the use of redundant links between the branch and the headquarters to establish IPsecVPN, while turning on URLPF on the Router_B for traffic from branch l, which of the following options is correct?

H12-891_V1.0 question answer

A.

When using IPsec active-standby link redundant backups to enable the URPF function under the physical interface , it is recommended to use URPF loose mode.

B.

When using IPsec multilink redundant backup, the URPF function can be used under the physical interface, and URPF strict mode can be used

C.

When using IPsec multilink redundant backups, urPF can be enabled under the tunnel interface, and URPF strict mode can be used

D.

When using lPsec active-standby link redundancy backup, the URPF function is enabled under the physical interface, and URPF strict mode can be used.

Full Access
Question # 170

Which of the following DNS resource records are legitimate?

A.

FQDN

B.

NS

C.

PTR

D.

MX

E.

A

Full Access
Question # 171

There are routers as follows, according to which the compromise conclusion is wrong?

A.

R3 must be the DIS of some Level-1 link

B.

The R3 router is a Level-1-2 router

C.

R3 must be the DIS of some Level-2 link

D.

The system ID of the R3 router is 000300000000

Full Access
Question # 172

In the evolution from IPv4 networks to IPv6, some transition technologies have emerged, which of the following are common types of transition technologies?

A.

Dual-stack technology

B.

Tunneling Technology

C.

Compatible with Technology

D.

Conversion Technology

Full Access
Question # 173

?? ipIp- prefoi p prefierame lndeindeoxrunmber)( pemit demy)ip+4adrssmasklengh gratrequa grater-cqual abel]lescqualesequl ole) for • Pprefofiier? If a pre-list of tooequal has been specified, but the greater-equal has not been specified, then how much of the prefix's range is sufficient?(). Radio neck).

A.

[0, less-equal-value]

B.

[mask-length, less-equal-value]

C.

[less-equal-value,32]

D.

No limit

Full Access
Question # 174

What kind of scenario can use AS-path-filter?( Multiple select).

A.

A Filters routes received from BGP neighbors based on the AS PATH attribute carried by the route, such as the command peer X.x.x.x as path-filter import

B.

The apply clause in Route policy

C.

Filter routes sent to BGP neighbors based on the AS PATH attribute that the route carries. For example, the command peer x.x.x.x as path-filter export

D.

The if-match clause in Route-policy

Full Access
Question # 175

QinQ technology is a technology that extends the VLAN space by adding a layer of 8021Q tag messages to the extended VLAN. The function of space, the following statement about QInQ is mispronounced?

A.

basic QinQ is implemented based on the interface orientation

B.

QinQ increases the number of VLANs to 4095*4095

C.

Flexible QinQ can be based on different inner layerS Tag and different outer layers of Tag, for user VL The division of AN is more granular

D.

QinQ technology enables private VLANs to pass through the public Network

Full Access
Question # 176

In a network, the same gigabit running S and OSPF anti-tampering and fluttering as shown in the figure, on the two border routers RTB and RTC are introduced into the wine route, the device question is to use gigabit one port strobe, , 222 The network is introduced into the OSE via impotrote direct on the RTD, assuming that all other configurations are dead default configurations, then the description of this network is wrong ?

H12-891_V1.0 question answer

A.

Adjusting the ISIS priority to 160 on the RTB avoids suboptimal routing problems in the network.

B.

On the RTC, the following configuration is adopted, only the routes of the 2222/32 cinder segment can be filtered out when routing is introduced, IRTClip ip-prefix 10 index 1 deny2000 8 less-equal 32

C.

RTB learns that the routing next hop for the 2222/32 network segment is RTA

D.

The following configuration can filter out the routes of the 2222/32 CIDR block of the white RTD when RTC introduces OSPF routes.

Full Access
Question # 177

Regarding the Stub region and the Totally Stub region of the OSPF protocol, the following statement is correct (multiple choice)

A.

After modifying the original Stub area to a Totally Stub area, the number of LSAs in the LSDB of each router in the region will definitely be reduced

B.

ASBR cannot be present in either the Stub zone or the Totally Stub zone

C.

When you modify the original Stub area to a Totally Stub region, the number of LSAs propagating within the region will definitely decrease

D.

If there are two ABR in the Totally Stub zone, each ABR sends an LS ID of 0000 to the router in the zone LSA

Full Access
Question # 178

As shown in the figure, as shown, as the AS10 has two paths to access THEA1, the optimal route passed from the 4S23 by default is now sprinkled with S00 to ass4O The odds belt wins even more worrying. Therefore, in the R2 configuration as follows, after the completion of the coordination, it is found that the most worrying route has not changed, and some operations can be adjusted to make the configuration

??[ R2]jpas-path-fiter l permit "4D0& [2]pouteplicy med permit node 10[R2-routepolicyli- match aspath-ilterl[R2-oute-policylapplycoast.20

H12-891_V1.0 question answer

A.

Configure compare-di fferent-as-med under the BGP process for R2

B.

Configure destiny-med under the BGP process for R1

C.

Configure compare-di fferent-as-med under the BGP process of Rl

D.

Configure the targeted-med under the BGP process for R2

Full Access
Question # 179

The topology diagram and configuration are as follows, and now we hope that there is no buttoned route entry of 10033/32 in the Rl route table

H12-891_V1.0 question answer

A.

Configure route summarization on R3 to summarize the routes to 10000/16

B.

Configure route rollup on R2 to summarize the route as 10000/16

C.

Configure filter-pollcy on top of R1 with 10033/32 via ACLL. Also applied in the Import direction

D.

Configure flter-policy on the above, match 10033/32 through ACL, and apply the answer in the expo direction

Full Access
Question # 180

In the use of the CP protocol, the following description is correct?

A.

The Eth-Trunk interface can be avoided by frequent oscillation interfaceeth-trunkllacppreemptenablelacppreemptdelaydelay-time by following command

B.

Source A address can be configured for load sharing in an enabled link aggregation group with the following command: interface eth-trunk 110ad-balance src-dst-ip

C.

A member interface can be removed from an enabled link aggregation group with the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 undo eth-trunk 1 interfaceGigabitEthernet0/0/1undoshutdown

D.

The member interface can be joined in the link aggregation group by enabling the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 trunkport

Full Access
Question # 181

What's wrong about vrrp timers is ?

A.

MASTER DOWN = (3*ADVER_ INTERVAL) + Skew_ time

B.

Skew Time= (255-Priority)/255

C.

By default, the time period for VRRP advertisement messages is 2 seconds

D.

By default, the VRRP preemption delay is I seconds

Full Access
Question # 182

There is an existing network of router RI, router R, router R3, and router R4 The 4 routers are interconnected via an LN network. All 4 routers are equipped with basic oSPF. When you execute the command "displayosp" on router R2 f peer", router R2 and router R3 are discovered The status between is "2-way". So what conclusions can you draw from this output? Multiple choice questions).

A.

Router R2 is not a DR

B.

Router R3 is not a DR, nor is it a BDR

C.

There is no full adjacency between router R2 and router R3

D.

Router R4 is destined for DR

E.

Router R2 is DR or BDR

Full Access
Question # 183

Four routers R1, R2, R3, and R4 run IS, and the I5S router type is noted in the diagram. All four routers have an area address of 49001, and looking at the routing table on R1l shows the following results, the reason why R did not reach the route of 1034344

H12-891_V1.0 question answer

A.

The routing policy configured on the ARO filters the System-ID of the default route

B.

R2 from conflicting with R3

C.

R and R4 Zone Planning Errors The System-ID of

D.

R2 conflicts with R1

Full Access