Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

H12-891_V1.0 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

H12-891_V1.0 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: HCIE-Datacom V1.0
  • Last Update: Sep 12, 2025
  • Questions and Answers: 322
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

H12-891_V1.0 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

H12-891_V1.0 Practice Exam Questions with Answers HCIE-Datacom V1.0 Certification

Question # 6

Which of the following statements about GRE is incorrect?

A.

GRE can encapsulate IPv6 unicast packets.

B.

GRE can encapsulate IPv4 unicast packets.

C.

GRE can encapsulate IPv6 broadcast packets.

D.

GRE is easy to implement and puts little burden on devices at both ends of a tunnel.

Full Access
Question # 7

Which of the following number sequences can be matched by the regular expression 100.s?

A.

100

B.

10000

C.

1000

D.

1001

Full Access
Question # 8

An engineer uses two routers to perform IPv6 tests and wants to use OSPFv3 for IPv6 network connectivity. Which of the following OSPFv3 configurations for R1 are correct?

A.

[R1-GigabitEthernet0/0/1] ospfv3 1 area 0

B.

[R1-ospfv3-1] router-id 10.1.1.1

C.

[R1-ospfv3-1-area-0.0.0.0] network 2001:DB8:2345:12::1 ::

D.

[R1] router id 10.1.1.1

Full Access
Question # 9

You have developed a third-party Portal authentication application and connected it to iMaster NCE-Campus to perform Portal authentication for Wi-Fi users. After connecting to Wi-Fi, a user will be redirected to the login page pushed by the authentication application when visiting any website for the first time.

A.

TRUE

B.

FALSE

Full Access
Question # 10

OSPFv3 link LSAs are advertised in the entire area.

A.

TRUE

B.

FALSE

Full Access
Question # 11

OSPF is deployed on a campus network to implement network interconnection. An engineer configures R2 as shown in the figure. Which of the following statements is incorrect about LSAs on the OSPF network?

H12-891_V1.0 question answer

A.

Type 5 LSAs are flooded in Area 1.

B.

Type 3 LSAs are not flooded in Area 1.

C.

Type 3 LSAs are not flooded in Area 2.

D.

Type 5 LSAs are flooded in Area 2.

Full Access
Question # 12

On a campus network, which of the following problems may occur when you manually create a static VXLAN tunnel?

A.

Although the static VXLAN tunnel mode supports the distributed gateway scenario, the configuration involves a heavy workload and is complex to adjust.

B.

Remote MAC addresses can be learned by the VTEP only through data flooding.

C.

A static VXLAN tunnel also uses corresponding protocols on the control plane, which consumes device resources.

D.

If N devices need to establish static VXLAN tunnels, a maximum of N(N -1)/2 tunnels need to be manually configured, which involves a heavy workload.

Full Access
Question # 13

The following figure shows the inter-AS MPLS L3VPN Option C (Solution 2). ASBR-PE2 is connected to CE3 and runs eBGP.

To enable all CEs to communicate with each other, which of the following address families must peer relationships be enabled in the BGP process of ASBR-PE2?

A.

VPNv4 address family

B.

BGP-LS address family

C.

VPN instance unicast address family

D.

Unicast BGP address family

Full Access
Question # 14

To enhance reliability, you can deploy Huawei iMaster NCE-WAN controllers in active/standby mode. Which of the following IP addresses must be configured to be the same for the active and standby controllers so that the controllers can be accessed properly? (Select All that Apply)

A.

Southbound public IP addresses

B.

Internal interconnection addresses

C.

Southbound private IP addresses

D.

Northbound IP addresses

Full Access
Question # 15

The following figure shows the inter-AS MPLS VPN Option B solution. IfASBR-PE1andASBR-PE2only transmit VPNv4 routes, you can run the following command onASBR-PE1:

[ASBR-PE1-bgp-af-vpnv4] undo peer 10.0.34.4 enable

H12-891_V1.0 question answer

A.

TRUE

B.

FALSE

Full Access
Question # 16

In BGP4+, what is the content of the next hop network address field carried in the MP_REACH_NLRI attribute of an Update packet?

A.

The link-local address and global unicast address can be carried at the same time.

B.

It can be only a link-local address.

C.

It must be a global unicast address.

D.

It must be a link-local address.

Full Access
Question # 17

/ifm/interfaces/interface in Huawei Open Programmability System (OPS) is the URL used to identify a device's managed object.

A.

TRUE

B.

FALSE

Full Access
Question # 18

The figure shows a packet that contains three label headers. Select the values (in decimal notation) of the X, Y, and Z fields, respectively.

H12-891_V1.0 question answer

Full Access
Question # 19

Which of the following statements regarding RT are correct?

A.

Each VPN instance is associated with one or more pairs of VPN Target attributes, used to control VPN routing information advertisement and reception between sites.

B.

Export Target and Import Target are independent of each other and support multiple values to implement flexible VPN routing information advertisement and reception control.

C.

RTs are classified into two types: Export Target and Import Target.

D.

The RT value is advertised to neighbors through the BGP extended community attribute in Update messages.

Full Access
Question # 20

With telemetry, certain data can be sampled based on specific sampling paths. Which of the following sampling paths are supported by telemetry?

A.

Interface statistics

B.

Information about the optical module on an interface

C.

CPU information

D.

Memory information

Full Access
Question # 21

To obtain the token ID of iMaster NCE, you need to send an HTTP request message that includes the following Python code to invoke an iMaster NCE RESTful API.

Which of the following statements is incorrect?

import requests

nbi_name = "demo13@north.com"

nbi_pwd = "CgocVcVe1@"

host = "139.9.213.72"

port = "18002"

URI = "/controller/v2/tokens"

post_token_url = "https:// " + host + ":" + port + URI

headers_post = {"Content-Type": "application/json", "Accept": "application/json"}

r = requests.post(post_token_url, headers=headers_post, json={"userName": nbi_name, "password": nbi_pwd}, verify=False)

A.

You can run the print(r.json()) command to display the response message sent from the server.

B.

Token resources are located at https://139.9.213.72:18002/controller/v2/tokens.

C.

The request body is in JSON format.

D.

The HTTP request uses the GET method to query the token value.

Full Access
Question # 22

MPLS supports Forwarding Equivalence Class (FEC). Which of the following cannot be used as a FEC allocation standard?

A.

Application protocol

B.

Fragment offset

C.

Class of Service (CoS)

D.

Destination address

Full Access
Question # 23

The Ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is ______ IRB forwarding. (Capitalize the first letter.)

Full Access
Question # 24

Exhibit:

H12-891_V1.0 question answer

The following figure shows the inter-AS MPLS VPN Option C (solution 2). RRs are deployed, and no traffic passes through the RRs during forwarding. If a data packet sent from PE2 to192.168.1.1carries two labels, which of the following statements about the two labels are correct?

A.

T1 is allocated by RR2.

B.

T1 is allocated by P2.

C.

V1 is allocated by PE1.

D.

V1 is allocated by P2.

Full Access
Question # 25

Flavors can be used to enhance SRv6 instructions to meet more diversified service requirements. Which of the following are flavors? (Select all that apply)

A.

Penultimate Segment Pop of the SRH (PSP)

B.

Ultimate Segment Decapsulation (USD)

C.

Ultimate Segment Pop of the SRH (USP)

D.

Penultimate Segment Decapsulation (PSD)

Full Access
Question # 26

gRPC (Google Remote Procedure Call)is a language-neutral, platform-neutral, and open-source remote RPC system that supportsunary RPCs and streaming RPCs.

Which of the following service methodsare NOT supportedby gRPC?

A.

rpc Subscribe(SubsArgs) stream returns(SubsReply) {};

B.

rpc dataPublish(stream serviceArgs) returns(stream serviceArgs) {};

C.

rpc stream LotsOfGreetings(HelloRequest) returns (HelloResponse) {};

D.

rpc Cancel(CancelArgs) returns(CancelReply) {};

Full Access
Question # 27

Which of the following items are included in static information collection and analysis?

A.

Device types

B.

Interface types

C.

License

D.

Packet loss rate

Full Access
Question # 28

Huawei Open Programmability System (OPS) uses standard HTTP methods to access managed objects to manage network devices. Which of the following HTTP methods is used to configure the value of a network device's managed object?

A.

PUT

B.

POST

C.

PATCH

D.

GET

Full Access
Question # 29

When aclient invokes the iMaster NCE-Campus RESTful API, it sends anHTTP request. The server then returns thestatus code 401.

Which of the following errors has occurred?

A.

The service is unavailable.

B.

Access denied.

C.

The requested resource does not exist.

D.

Unauthorized.

Full Access
Question # 30

In Huawei's NAC solution, which of the following cannot be used for Portal authentication?

A.

User name and password

B.

Passcode

C.

SMS verification code

D.

User’s MAC address

Full Access
Question # 31

If the number of MAC addresses learned on an interface enabled with port security reaches the upper limit, which of the following actions may the switch take?

A.

Discards packets with unknown source MAC addresses without generating any alarm.

B.

Sets the interface state to error-down without generating any alarm.

C.

Discards packets with unknown source MAC addresses and generates an alarm.

D.

Sets the interface state to error-down and generates an alarm.

Full Access
Question # 32

Free mobility is deployed on a campus network through iMaster NCE-Campus. During this deployment, which of the following steps are performed by administrators and which are automatically performed by iMaster NCE-Campus? Drag the administrators and iMaster NCE-Campus icons on the left to the corresponding steps on the right.

Full Access
Question # 33

H12-891_V1.0 question answer

As shown in the following figure, an engineer tests network interconnection between two branches. To implement network interconnection,OSPFis deployed onR1, R2, and R3of branch 1, andIS-ISis deployed onR2, R3, and R4of branch 2. Which of the following operations needs to be performed to allowR1 to access R4's loopback interface address?

A.

Run the default-route-advertise command in both the OSPF and IS-IS views on R2.

B.

No configuration is required.

C.

Run the default-route-advertise commandonly in the OSPF viewon R2.

D.

Run the default-route-advertise commandonly in the IS-IS viewon R2.

Full Access
Question # 34

On a router,SRv6is enabled, and the configurations shown below are performed. Which of the following statements about the configurations are correct?

[Router-segment-routing-ipv6] locator srv6_locator1 ipv6-prefix 2001:DB8:ABCD::/64 static 32

A.

The locator of this node is2001:DB8:ABCD::.

B.

The static segment of the node occupies32 bits.

C.

The dynamic segment of the node occupies32 bits.

D.

The Args field of this node occupies32 bits.

Full Access
Question # 35

On the campus network shown, IPv6 is deployed for service tests. Four routers are deployed on the network, and OSPFv3 is used for IPv6 network connectivity. An engineer checks the LSDB of R2 and obtains a Link-LSA. Which of the following statements about the LSA are correct?

H12-891_V1.0 question answer

A.

The link-local address of R2’s GE0/0/0 is FE80::2E0:FCFF:FECD:4F79.

B.

The IPv6 address prefix of R2’s GE0/0/0 is 2001:DB8:2345:23::/64.

C.

This LSA indicates that R2 does not support external routes but can participate in IPv6 route calculation.

D.

This LSA is generated by R2.

Full Access
Question # 36

BFD can implement millisecond-level link status detection.

A.

TRUE

B.

FALSE

Full Access
Question # 37

Which of the following statements aboutBIER (Bit Index Explicit Replication) and PIM (Protocol Independent Multicast)are correct?

A.

On a BIER-based multicast network, packets sent by the multicast source must be encapsulated with the Bitstring field.

B.

On a PIM-based multicast network, an MDT covering all nodes that multicast traffic traverses needs to be established.

C.

On a BIER-based multicast network, an MDT covering all nodes that multicast traffic traverses does not need to be established.

D.

On a BIER-based multicast network, multicast users must send group join messages hop by hop.

Full Access
Question # 38

Which of the following statements is incorrect about access control on small and midsize campus networks based on the Huawei CloudCampus solution?

A.

iMaster NCE can function as an authentication server.

B.

Cloud APs support local Portal authentication.

C.

iMaster NCE can function as a Portal relay device.

D.

iMaster NCE can interconnect with a third-party RADIUS server.

Full Access
Question # 39

During WLAN planning and design, channels 1, 6, and 11 are recommended on the 2.4 GHz frequency band, and channels 1, 5, 9, and 13 are recommended in high-density scenarios. On the 5 GHz frequency band, it is recommended thathigh-frequency and low-frequency channels of adjacent APs be staggered to prevent overlapping.

A.

TRUE

B.

FALSE

Full Access
Question # 40

What can be determined from the following figure?

A.

R3 must be a Level-2 device.

B.

The device role of R3 cannot be determined.

C.

R3 must be a Level-1-2 device.

D.

R3 must be a Level-1 device.

Full Access
Question # 41

Network Admission Control (NAC) needs to be deployed on the network shown in the figure. Drag a proper authentication mode to each authentication point.

H12-891_V1.0 question answer

Full Access
Question # 42

According to the following information displayed on a router, which of the following are the causes of the failure in establishing an OSPF adjacency relationship?

OSPF error statistics:

1: Hello timer mismatch

0: Netmask mismatch

0: Bad checksum

0: Bad authentication type

0: Unknown neighbor

0: Extern option mismatch

A.

Hello packets are sent at different intervals.

B.

The area IDs are inconsistent.

C.

The IP address masks of the interfaces are inconsistent.

D.

The area types are inconsistent.

Full Access
Question # 43

SR-MPLS uses IGP extensions to advertise labels and reserve bandwidth to support high-bandwidth services.

A.

TRUE

B.

FALSE

Full Access
Question # 44

The telemetry network model is broadly and narrowly defined. Which of the following modules are involved intelemetry in a narrow sense (device-side telemetry)?

A.

Data generation

B.

Data push

C.

Data source

D.

Data subscription

Full Access
Question # 45

In the admission design for large- and medium-sized campus networks, which of the following authentication modes can be used for PCs connected to IP phones?

A.

MAC address authentication

B.

802.1X authentication

C.

Multi-mode authentication

D.

Portal authentication

Full Access
Question # 46

Which of the following functions can be provided by iMaster NCE-Campus when it functions as a relay agent for authentication?

A.

User accounting

B.

User authentication

C.

User analysis

D.

Marketing

Full Access
Question # 47

MACsec can provide secure services during MAC-layer data transmitting and receiving. Which of the following services isnotprovided by MACsec?

A.

Controllability check

B.

Integrity check

C.

User data encryption

D.

Data source authenticity verification

Full Access
Question # 48

Exhibit:

A loop occurs because Spanning Tree Protocol (STP) is not enabled on the network. Which of the following symptoms may occur?

A.

A loop alarm is generated on the LAN switch.

B.

CPU usage is too high.

C.

MAC entries flap.

D.

Host receives a large number of broadcast packets.

Full Access
Question # 49

In the Huawei SD-WAN Solution, which of the following routing protocols is used to advertise VPN routes between CPEs?

A.

RIP

B.

OSPF

C.

IS-IS

D.

BGP

Full Access
Question # 50

IPsec SAs can be established in either manual mode or IKE auto-negotiation mode. Which of the following statements about the two modes is incorrect?

A.

The lifetime of an SA established in IKE auto-negotiation mode is controlled by the lifetime parameters configured on both ends of the tunnel.

B.

In manual mode, all parameters (including encryption and authentication keys) required for establishing an IPsec SA need to be manually configured.

C.

In IKE auto-negotiation mode, the encryption and authentication keys required for establishing an SA are generated using the DH algorithm.

D.

SAs established in both manual and IKE auto-negotiation modes can be dynamically updated.

Full Access
Question # 51

On a small- or medium-sized campus network deployed based on the Huawei CloudCampus Solution, an AR functioning as the egress gateway supports web-based network management, registration center query, and DHCP Option 148-based deployment, but does not support CLI-based deployment.

A.

TRUE

B.

FALSE

Full Access
Question # 52

In OSPFv3, which of the following types of LSAs can be flooded in the entire AS?

A.

AS-external-LSA

B.

Intra-Area-Prefix-LSA

C.

Link-LSA

D.

Inter-Area-Prefix-LSA

Full Access
Question # 53

Which of the following statements aboutOPS (Open Programmability System) application scenariosisincorrect?

A.

To enable a network device to automatically send a configuration file to the server after the device configuration is saved, users can use the maintenance assistant to create a timer trigger condition and periodically run the Python script.

B.

When the OPS is used to automatically deploy unconfigured devices, a Python script is used to obtain the IP addresses of the software and configuration file server and download the system software and configuration file.

C.

The OPS can reduce the impact of the network environment in some cases. For example, when collected information is transmitted to a server, the Python script can be used to temporarily store the execution result to the device when the network is disconnected. After the network is reconnected, the execution result is transmitted to the server.

D.

The OPS can be used to automatically check the health status of devices.

Full Access
Question # 54

On the bearer WAN shown in the figure,SR (Segment Routing)is deployed, and the controller is used to compute paths. Drag network technologies on the left to the corresponding application locations on the right.

H12-891_V1.0 question answer

Full Access
Question # 55

NETCONF uses an XML-based encoding format. NETCONF uses text files to represent complex hierarchical data. Which of the following statements are correct about the following XML file?

Learners

Huawei

Reminder

<body>Don't forget Reading!</body>

A.

encoding: indicates the character set encoding format. Currently, only UTF-8 encoding is supported.

B.

/: indicates the end of the current tag.

C.

D.

?>: indicates the end of an instruction.

Full Access
Question # 56

Which of the following are carried in the HTTP/1.1 response header?

A.

Status code

B.

Reason phrase

C.

Protocol version

D.

Response method

Full Access
Question # 57

There are multipleSR-MPLS TE tunnel protection mechanisms.FRR (Fast Reroute)constructs avirtual nodeto convert multiple identical route advertisement nodes into a single route advertisement node, and then computes the backup next hop of the virtual node based on theTI-LFA algorithm. In this way, traffic can be quickly switched when a fault occurs.

What is the name of this protection mechanism?

Full Access
Question # 58

On a CloudCampus virtualized campus network, service data enters different VNs from physical networks through edge nodes, and the VN that the data will enter is determined by the VLANs to which users belong. Which of the following statements about dynamic VLAN authorization is incorrect?

A.

When wired users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

B.

When wireless users pass Portal authentication, they join the authorization VLANs delivered to edge nodes.

C.

When wireless users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

D.

When wired users pass MAC address authentication, they join the authorization VLANs delivered to edge nodes.

Full Access
Question # 59

H12-891_V1.0 question answer

Refer to the configuration in the figure. Which queue on R2 do packets of PC1 enter by default?

A.

AF4

B.

AF2

C.

AF3

D.

EF

Full Access
Question # 60

The channelized sub-interface and FlexE technologies both can be used to implement network slicing, but the application scenarios of the two technologies are slightly different. Which of the following statements about the two technologies are correct?

A.

It is recommended that channelized sub-interface be used to reserve resources for interfaces with a bandwidth of less than 50 Gbit/s.

B.

It is recommended that FlexE be used to reserve resources for 50GE and higher-rate interfaces.

C.

Only FlexE-based network slicing can be deployed across OTN devices.

D.

Only network slicing based on channelized sub-interface can be deployed across MSTP devices.

Full Access
Question # 61

Which of the following statements regarding OSPF neighbor relationship faults is incorrect?

A.

For non-DR and non-BDR routers on an Ethernet link, the 2-Way state is acceptable.

B.

The Init state indicates that the router has received Hello packets from its neighbors, but the received Hello packets do not contain the OSPF RID of the receiving router.

C.

The ExStart state indicates that two neighbor routers have inconsistent MTUs or the same OSPF Router ID (RID).

D.

The Attempt state indicates that the router does not send unicast Hello packets to configured neighbors.

Full Access
Question # 62

By default, the domain ID of an OSPF process is the same as the process ID. You can run the domain-id command in the OSPF process view to change a domain ID.

A.

TRUE

B.

FALSE

Full Access
Question # 63

Which of the following types of LSAs does OSPF use to support SR-MPLS?

A.

Type 7 NSSA External LSA

B.

Type 10 Opaque LSA

C.

Type 1 Router LSA

D.

Type 2 Network LSA

Full Access
Question # 64

The following figure shows some configurations of R1. Based on these configurations, which of the following statements about IS-IS on R1 are correct?

isis 1

is-level level-2

cost-style wide

network-entity 49.0022.ee8c.a0c2.baf1.00

isis 2 vpn-instance tt

is-level level-2

cost-style wide

network-entity 47.00ce.390d.efdc.b3e1.00

isis 3 vpn-instance rr

is-level level-2

cost-style wide

network-entity 47.cc0a.3efb.bbdd.aae1.00

A.

Process 1 contains the global routing information and routing information of VRFs tt and rr.

B.

Routing information is shared between processes 2 and 3.

C.

Process 1 contains only global routing information.

D.

Routing information of process 2 is isolated from that of process 3.

Full Access
Question # 65

In an MPLS VPN network, two-layer MPLS labels are added into data packets before they are transmitted over the public network. Which of the following statements regarding data packet processing are correct?

A.

The egress PE sends the data packet to the correct VPN based on the inner label.

B.

The penultimate hop removes the outer label before forwarding the data packet to a peer egress PE.

C.

The IP data packet received by egress LSR is without labels.

D.

The penultimate-hop device receives a packet with an outer label.

Full Access
Question # 66

An LSR (Label Switching Router) supports various label retention modes. Which of the following statements regarding the liberal mode are correct?

A.

An LSR retains labels from a neighboring LSR only when the neighbor is its next hop.

B.

This label retention mode saves memory and label space.

C.

An LSR reserves all labels distributed by its neighbor.

D.

The liberal mode requires more memory and label space.

Full Access
Question # 67

Based on the configuration in the following figure, how many interfaces on R4 are advertised into IS-IS?

plaintext

CopyEdit

display isis interface

Interface information for ISIS(1)

Interface Id IPV4.State IPV6.State MTU Type DIS

GE0/0/0 001 Up Down 1497 L1/L2 No/No

GE0/0/1 002 Up Down 1497 L1/L2 No/No

Loop0 001 Up Down 1500 L1/L2 -

A.

2

B.

1

C.

3

D.

0

Full Access
Question # 68

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following BGP EVPN routes is used to advertise MAC addresses, ARP entries, and IRB routes?

A.

Type 3

B.

Type 4

C.

Type 2

D.

Type 1

Full Access
Question # 69

Which of the following is the purpose of configuring IS-IS fragmentation on an IS-IS device?

A.

Disable the device from establishing IS-IS neighbor relationships.

B.

Enable the device to support more IS-IS routes.

C.

There is no practical purpose.

D.

Disable the device from learning IS-IS link-state information.

Full Access
Question # 70

Which of the following statements about DHCP snooping isincorrect?

A.

After DHCP snooping is enabled in the view of a VLAN, it takes effect for the VLAN's DHCP messages received by all the interfaces of the device.

B.

After DHCP snooping is enabled globally, the device processes only DHCPv4 messages by default if no parameter is specified.

C.

DHCP snooping can prevent attacks by configuring trusted interfaces.

D.

After DHCP snooping is enabled in the view of an interface, it takes effect for all DHCP messages on the interface.

Full Access
Question # 71

When MPLS/BGP IP VPN is deployed, which of the following statements is incorrect about BGP route exchange between PEs and CEs?

A.

When PEs and CEs use BGP to exchange routing information, you do not need to import private network routes to BGP on PEs.

B.

In a Hub&Spoke scenario, when Hub-CE and Hub-PE run an IGP for communication, EBGP cannot be configured on Spoke-PE or Spoke-CE.

C.

In a scenario where PEs and CEs use BGP to exchange routing information, if two VPN sites have the same private AS number, the AS number replacement function can be used to replace the AS number in a received private network route with any specified AS number. This prevents routes from being discarded because of repeated AS numbers.

D.

In a CE multi-homing scenario, the BGP AS number replacement function may cause routing loops. BGP SoO can be used to prevent routing loops at a VPN site.

Full Access
Question # 72

Which of the following is the drop probability of packets exceeding the upper threshold in WRED?

A.

0.2

B.

0.5

C.

1

D.

0.8

Full Access
Question # 73

How long is an IPv6 prefix assigned to a host when an IPv6 address is configured for the host in SLAAC mode?

A.

64 bits

B.

32 bits

C.

96 bits

D.

128 bits

Full Access
Question # 74

InSRv6, each time a packet passes through anSRv6 endpoint node, theSegments Leftfield valuedecrements by 1, and theIPv6 DA changes.

A.

TRUE

B.

FALSE

Full Access
Question # 75

iMaster NCE-WANis the core component of theHuawei SD-WAN Solutionand is responsible forSD-WAN network management and service orchestration.

A.

TRUE

B.

FALSE

Full Access
Question # 76

In the Huawei CloudCampus Solution, which of the following deployment modes are supported by Huawei switches?

A.

DHCP Option 148

B.

CLI

C.

Web interface

D.

Huawei registration center

Full Access
Question # 77

BGP EVPN can be used as the VXLAN control plane protocol to completely prevent traffic flooding, such as broadcast ARP packets, on the VXLAN network.

A.

TRUE

B.

FALSE

Full Access
Question # 78

Which of the following statements is correct about the differences between NSR and NSF?

A.

NSR requires the collaboration of neighboring routers.

B.

NSF requires the collaboration of neighboring routers.

C.

NSF does not require the collaboration of neighboring routers.

D.

Both NSR and NSF require the collaboration of neighboring routers.

Full Access
Question # 79

Prefix segments and adjacency segments are globally visible and unique.

A.

TRUE

B.

FALSE

Full Access
Question # 80

The naming of SRv6 instructions complies with certain rules. You can quickly determine the function of an instruction based on the instruction name. Which of the following statements about the keywords in SRv6 instruction names are correct? (Select all that apply)

A.

X: Forwards packets through one or a group of specified Layer 3 interfaces.

B.

M: Searches a Layer 2 forwarding table for unicast forwarding.

C.

V: Searches a VPN instance routing table to forward packets.

D.

T: Searches a specified routing table to forward packets.

Full Access
Question # 81

In the CloudCampus public cloud scenario, if deployment through the Huawei registration query center is used, you do not need to configure DHCP Option 148 on the DHCP server of the campus network.

A.

TRUE

B.

FALSE

Full Access
Question # 82

HTTP/2 is a UDP-based low-delay Internet transport layer protocol.

A.

TRUE

B.

FALSE

Full Access
Question # 83

In the figure,SR-MPLSis enabled onR1, R2, and R3. TheSRGB (Segment Routing Global Block) rangeonR3is from20000 to 21000, and theprefix SID indexconfigured on theloopback1 interface of R3 is 30.

In this case, theMPLS label corresponding to the loopback1 interface of R3 is _____.

(Enter anArabic numeralwithout symbols.)

Full Access
Question # 84

The IS-IS Level-1 neighbor relationship is not established betweenR3andR4. Referring to the following information, what is the possible cause?

H12-891_V1.0 question answer

A.

The IIH authentication betweenR3andR1fails.

B.

The IS-IS levels ofR3andR4do not match.

C.

The circuit types of the interfaces connectingR3andR4do not match.

D.

The area IDs ofR3andR4are different.

Full Access
Question # 85

Which of the following intelligent traffic steering policies can be used to fully utilize link bandwidth and implement link bandwidth-based load balancing on an enterprise network with multiple links?

A.

Application priority-based traffic steering

B.

Link quality-based traffic steering

C.

Link priority-based traffic steering

D.

Traffic bandwidth-based traffic steering

Full Access
Question # 86

In Huawei SD-WAN Solution, which of the following tunneling technologies is used to establish data channels?

A.

WLAN

B.

IPsec

C.

MPLS

D.

GRE over IPsec

Full Access
Question # 87

Which of the following statements does not cause the flapping of a VRRP group?

A.

Too small interval between Advertisement packet transmissions

B.

Inconsistent preemption delay settings

C.

Packet loss on an interface of the backup device

D.

Flapping on the link transmitting VRRP Advertisement packets

Full Access
Question # 88

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following statements about symmetric IRB forwarding are correct?

A.

Both the ingress VTEP and egress VTEP forward packets based on the Layer 3 forwarding table.

B.

The ingress VTEP forwards packets based only on the Layer 2 forwarding table.

C.

The egress VTEP forwards packets based only on the Layer 2 forwarding table.

D.

When VTEPs forward inter-subnet user communication packets, the VNI carried in the VXLAN header is the L3VNI.

Full Access
Question # 89

As shown in the figure,ARP broadcast suppression is enabled on VTEP1inBD 20 (VNI 200).

VTEP1 learns ARP informationaboutPC2 through BGP EVPN routes.

WhenVTEP1 forwards the ARP request for PC1’s MAC address to VTEP2,

What is the destination MAC address of the inner data frame?

H12-891_V1.0 question answer

A.

MAC B

B.

MAC C

C.

MAC A

D.

MAC D

Full Access
Question # 90

During telemetry static subscription, the NMS delivers subscription configuration to devices for data sampling. Which of the following statements is incorrect about the sampling path huawei-debug:debug/cpu-infos/cpu-info?

A.

cpu-info may be a list node of the YANG model.

B.

The sampling path uses the YANG model structure.

C.

debug may be the top node of the YANG model.

D.

cpu-infos may be a container node of the YANG model.

Full Access
Question # 91

A carrier's home broadband service requires a maximum downstream bandwidth of 100 Mbit/s during off-peak hours and a guaranteed downstream bandwidth of 50 Mbit/s during peak hours. The home broadband service includes the home IP phone service and the home Internet access service. Which of the following configurations best meets the service requirement?

A.

qos gts cir 100000

B.

qos car inbound cir 50000 pir 100000

C.

qos car inbound cir 100000 pir 50000

D.

qos car inbound cir 100000

Full Access
Question # 92

In Huawei SD-WAN Solution, which of the following tunneling technologies is used to establish data channels?

A.

IPsec

B.

GRE over IPsec

C.

VXLAN

D.

MPLS

Full Access
Question # 93

Huawei CloudCampus Solution has multiple application scenarios, and iMaster NCE-Campus provides different APIs for each application scenario. Match the following application scenarios with the open APIs provided by iMaster NCE-Campus.

Full Access
Question # 94

Which of the following statements is incorrect about a BGP/MPLS IP VPN?

A.

In most cases, CEs are unaware of VPNs and do not need to support MPLS or MP-BGP.

B.

A BGP/MPLS IP VPN consists of customer edges (CEs), provider edges (PEs), and providers (Ps). PEs and Ps are carrier devices, whereas CEs are BGP/MPLS IP VPN customer devices.

C.

Inter-site communication can be implemented through VPN. A site can only belong to only one VPN.

D.

Ps only need to provide basic MPLS forwarding capabilities and do not need to maintain VPN-related information.

Full Access
Question # 95

An enterprise has three types of services. Voice and video services are key services and need to be guaranteed, and FTP services are non-key services. Which of the following scheduling modes is optimal for satisfying the service requirements?

A.

WFQ scheduling is configured for IP voice, video, and FTP download services.

B.

PQ scheduling is configured for IP voice and video services, and WFQ scheduling is configured for FTP download services.

C.

LPQ scheduling is configured for IP voice services, PQ scheduling is configured for video services, and WFQ scheduling is configured for FTP download services.

D.

PQ scheduling is configured for IP voice, video, and FTP download services.

Full Access
Question # 96

Refer to the figure.

H12-891_V1.0 question answer

Which of the following steps are mandatory to enable 802.1X authentication on GE0/0/2 and GE0/0/3 of SW3 and configure a RADIUS server to authenticate and deliver network access rights to users?

A.

Configure an AAA scheme.

B.

Configure an authentication profile.

C.

Configure an authentication domain.

D.

Configure an 802.1X access profile.

Full Access