Pre-Summer Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

Practice Free H12-891_V1.0 HCIE-Datacom V1.0 Exam Questions Answers With Explanation

We at Crack4sure are committed to giving students who are preparing for the Huawei H12-891_V1.0 Exam the most current and reliable questions . To help people study, we've made some of our HCIE-Datacom V1.0 exam materials available for free to everyone. You can take the Free H12-891_V1.0 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.

Question # 6

MPLS implements data forwarding based on two different planes. Which of the following statements regarding the forwarding mechanism are correct?

A.

After an IP packet enters an MPLS domain, the MPLS device forwards the packet based on FIB table queries.

B.

If the tunnel ID is 0x0, the MPLS forwarding process starts.

C.

The system automatically assigns an ID to the upper-layer application that uses a tunnel. This ID is also called the tunnel ID.

D.

If the tunnel ID is not 0x0, the normal IP forwarding process starts.

Question # 7

A 32-bit MPLS header consists of a 20-bit label used for packet forwarding, a 3-bit EXP field that identifies the IP packet priority, a 1-bit bottom-of-stack flag that identifies the last label, and an 8-bit TTL field. Which statement regarding the TTL field is correct?

A.

This field is used to control the upstream device in label distribution.

B.

This field is used for label management.

C.

This field limits the LSR.

D.

This field is used to prevent packet forwarding loops, similar to the TTL field in an IP header.

Question # 8

What can be determined from the following figure?

< R1 > display bgp ipv6 routing-table

Total Number of Routes: 2

* > i Network : 3002::3

NextHop : 3000:FDEA::3

MED : 0

Path/Orgn : i

* > i Network : 3002::4

NextHop : 3000:FDEA::3

MED : 0

PrefixLen : 128

LocPrf : 100

PrefVal : 0

Path/Orgn : 65001 i

A.

If no routing policy is configured for the AS Path attribute, 3002::4/128 does not originate from AS 65001.

B.

R1 does not have routes 3002::3/128 and 3002::4/128.

C.

If no routing policy is configured for the AS_Path attribute, 3002::4/128 originates from AS 65001.

D.

R1 has routes 3002::3/128 and 3002::4/128.

Question # 9

BGP EVPN can be used as the VXLAN control plane protocol to completely prevent traffic flooding, such as broadcast ARP packets, on the VXLAN network.

A.

TRUE

B.

FALSE

Question # 10

The IS-IS Level-1 neighbor relationship is not established between R3 and R4. Referring to the following information, what is the possible cause?

H12-891_V1.0 question answer

A.

The IIH authentication between R3 and R1 fails.

B.

The IS-IS levels of R3 and R4 do not match.

C.

The circuit types of the interfaces connecting R3 and R4 do not match.

D.

The area IDs of R3 and R4 are different.

Question # 11

On a VXLAN-based virtualized campus network, BGP EVPN can be used as the control plane protocol. Which of the following EVPN route types are not used in the virtualized campus network scenario?

A.

Type 3

B.

Type 2

C.

Type 4

D.

Type 1

Question # 12

Network Quality Analysis (NQA) is a real-time network performance detection and measurement technology. It monitors the performance of multiple protocols running on a network. Which of the following protocols can be monitored by NQA?

A.

SNMP

B.

OSPF

C.

ICMP

D.

DHCP

Question # 13

Which of the following issues do DiffServ model-based QoS have?

A.

It involves only single-hop behaviors and does not change the network topology.

B.

Independent resources cannot be provided for users.

C.

It does not change service behaviors. If bursty traffic in a single flow is too heavy, congestion still occurs.

D.

The number of queues is small, and SLA assurance cannot be provided for specific users. As a result, deterministic delay assurance cannot be provided.

Question # 14

Which of the following inter-AS MPLS L3VPN solutions needs ASBRs to transmit VPNv4 routes?

A.

Option C

B.

Option B

C.

Option A

D.

Option D

Question # 15

The on-premise mode is recommended for controller deployment on small and midsize campus networks.

A.

TRUE

B.

FALSE

Question # 16

On a CloudCampus virtualized campus network, virtual networks are defined based on services. Each virtual network corresponds to a service, and isolation needs to be manually configured between virtual networks.

A.

TRUE

B.

FALSE

Question # 17

There are multiple SR-MPLS TE tunnel protection mechanisms. FRR (Fast Reroute) constructs a virtual node to convert multiple identical route advertisement nodes into a single route advertisement node, and then computes the backup next hop of the virtual node based on the TI-LFA algorithm. In this way, traffic can be quickly switched when a fault occurs.

What is the name of this protection mechanism?

Question # 18

A carrier ' s home broadband service requires a maximum downstream bandwidth of 100 Mbit/s during off-peak hours and a guaranteed downstream bandwidth of 50 Mbit/s during peak hours. The home broadband service includes the home IP phone service and the home Internet access service. Which of the following configurations best meets the service requirement?

A.

qos gts cir 100000

B.

qos car inbound cir 50000 pir 100000

C.

qos car inbound cir 100000 pir 50000

D.

qos car inbound cir 100000

Question # 19

OSPF is deployed on a campus network to implement network interconnection. The LSDB of R2 is shown in the figure.

H12-891_V1.0 question answer

What can be determined from the LSDB?

A.

Area 1 is an NSSA.

B.

R2 translates Type 7 default route into Type 5 default route.

C.

R2 advertises the default route in the OSPF process.

D.

Area 1 does not have Type 3 LSAs. The possible cause is that R2 filters Type 3 LSAs in the outbound direction of area 1.

Question # 20

Which of the following statements about BGP EVPN principles are correct in a scenario where a VXLAN tunnel is dynamically established through BGP EVPN?

A.

MP_REACH_NLRI is used to carry routing information.

B.

Several BGP EVPN routes are defined through BGP extension.

C.

MP_REACH_NLRI is used to carry the RD.

D.

MP_REACH_NLRI is used to carry the RT.

Question # 21

Man-in-the-middle attacks (MITM) or IP/MAC Spoofing attacks are common on intranets and can cause information leakage.

Which configuration method can prevent these attacks?

A.

Configure the trusted or untrusted interface.

B.

Limit the maximum number of MAC addresses that can be learned on a switch interface.

C.

Configure DHCP snooping to check the CHADDR field carried in a DHCP Request packet.

D.

Configure association between DHCP snooping and IPSG or DAI on the switch.

Question # 22

NETCONF provides a set of mechanisms for managing network devices. What layers can NETCONF be conceptually partitioned into?

A.

Encrypted transport layer, messages layer, operations layer, and content layer

B.

Encrypted transport layer, messages layer, configuration layer, and content layer

C.

Secure transport layer, messages layer, configuration layer, and content layer

D.

Secure transport layer, messages layer, operations layer, and content layer

Question # 23

Exhibit:

H12-891_V1.0 question answer

The following figure shows the inter-AS MPLS VPN Option C (solution 2). RRs are deployed, and no traffic passes through the RRs during forwarding. If a data packet sent from PE2 to 192.168.1.1 carries two labels, which of the following statements about the two labels are correct?

A.

T1 is allocated by RR2.

B.

T1 is allocated by P2.

C.

V1 is allocated by PE1.

D.

V1 is allocated by P2.

Question # 24

MPLS supports forwarding equivalence class (FEC). Which of the following cannot be used as an FEC allocation standard?

A.

Fragment offset

B.

Application protocol

C.

Destination address

D.

Class of Service (CoS)

Question # 25

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, run the command on the VTEP to view BGP EVPN routes. The route entries shown in the following figure are displayed. Which of the following statements about these routing entries are correct?

Network (EthTagId/IP Prefix/IP PrefixLen)

NextHop

* > i 0:172.16.2.0:24 1.1.1.2

* > i 0:172.16.13.0:24 1.1.1.2

* > i 0:192.168.122.0:30 1.1.1.2

A.

These routes are Type 5 routes and carry network segment or mask information.

B.

These routes are Type 2 routes and carry host IP addresses.

C.

These routes carry the L2VNI.

D.

These routes carry the L3VNI.

Question # 26

OSPF is a mature protocol and is unlikely to have route computation errors in a regular networking environment under correct configurations. Which of the following statements are correct about the possible causes preventing an OSPF neighbor relationship from entering Full state?

A.

A link works abnormally.

B.

The OSPF network types on both ends of the link are inconsistent.

C.

The router IDs of neighbors are the same.

D.

The OSPF MTU values of interfaces on both ends of the link are different.

Question # 27

In the following figure, R1, R2, R3, and R4 all belong to OSPF area 0. The link costs are marked in the figure. The Loopback0 addresses of R1, R2, R3, and R4 are advertised to OSPF. R1, R2, and R3, which are R4 clients, use Loopback0 to establish an iBGP peer relationship with R4. The directly connected network segment 172.20.1.4/32 of R4 is advertised to BGP. Which of the following statements are correct about the direction of traffic from R1 to 172.20.1.4/32?

H12-891_V1.0 question answer

A.

The preferred path is R1–R3–R4.

B.

If the stub router on-startup command is run on R3, packet loss occurs during the power-off process of R3 but no packet loss occurs during the startup process of R3.

C.

The preferred path is R1–R2–R4.

D.

Packet loss occurs during both the power-off and startup processes of R3.

Question # 28

IPsec SAs can be established in either manual mode or IKE auto-negotiation mode. Which of the following statements about the two modes is incorrect?

A.

The lifetime of an SA established in IKE auto-negotiation mode is controlled by the lifetime parameters configured on both ends of the tunnel.

B.

In manual mode, all parameters (including encryption and authentication keys) required for establishing an IPsec SA need to be manually configured.

C.

In IKE auto-negotiation mode, the encryption and authentication keys required for establishing an SA are generated using the DH algorithm.

D.

SAs established in both manual and IKE auto-negotiation modes can be dynamically updated.

Question # 29

After the reset isis all command is run, the specified IS-IS process is reset, and all involved IS-IS neighbor relationships are re-established; however, IS-IS statistics are not cleared.

A.

TRUE

B.

FALSE

Question # 30

Which of the following are advantages of GRE tunnels? (Select All that Apply)

A.

GRE tunnels enlarge the scope of a hop-limited network

B.

GRE tunnels can be used to construct VPN networks

C.

ARP packets can be encapsulated through GRE tunnels

D.

Multicast data can be encapsulated through GRE tunnels

Question # 31

When static IPsec VPN is used for WAN interconnection in the Huawei CloudCampus Solution, the AP, Router, and _____ can be used as egress devices. (Use full spelling with the first letter capitalized.)

Question # 32

Which of the following factors does not need to be considered during the selection of core devices for the enterprise bearer WAN?

A.

Device naming conventions

B.

Service volume

C.

Physical location

D.

Node quantity

Question # 33

Refer to the following command output on the router R1. Which of the following statements is incorrect?

< R1 > display interface Tunnel

Tunnel0/0/0 current state : UP

Line protocol current state : UP

Last line protocol up time : 15:21:23 UTC-08:00

Description: ! 0.0.3.3

Route Port, The Maximum Transmit Unit is 1500

Internet Address is 20.1.1.1/24

Encapsulation is TUNNEL, loopback not set

Tunnel source 10.0.1.1 (LoopBack0), destination 10.0.3.3

Tunnel protocol/transport GRE/IP, key disabled

keepalive disabled

Checksumming of packets disabled

Current system time: 15:21:37-08:00

300 seconds input rate 0 bits/sec, 0 packets/sec

300 seconds output rate 0 bits/sec, 0 packets/sec

13 seconds input rate 0 bits/sec, 0 packets/sec

13 seconds output rate 448 bits/sec, 0 packets/sec

9 packets output, 824 bytes

0 output error

Input bandwidth utilization : -

Output bandwidth utilization : -

A.

Key authentication is disabled for the tunnel.

B.

The destination IP address of the tunnel is 10.0.3.3.

C.

The tunnel is a GRE tunnel.

D.

Keepalive detection is enabled on the tunnel.

Question # 34

The ________ command can be run to completely isolate Layer 2 and Layer 3 of different interfaces in a VLAN. (Use lowercase letters to supplement the command, which cannot be abbreviated.)

Question # 35

Which of the following statements regarding RT are correct?

A.

Each VPN instance is associated with one or more pairs of VPN Target attributes, used to control VPN routing information advertisement and reception between sites.

B.

Export Target and Import Target are independent of each other and support multiple values to implement flexible VPN routing information advertisement and reception control.

C.

RTs are classified into two types: Export Target and Import Target.

D.

The RT value is advertised to neighbors through the BGP extended community attribute in Update messages.

Question # 36

Drag the IPsec functions on the left to the corresponding function description on the right.

H12-891_V1.0 question answer

Question # 37

Portal authentication is recommended for scenarios with high mobility and numerous terminal types, such as shopping malls and supermarkets. MAC address authentication is recommended for dumb terminals that do not support Portal authentication, such as printers, fax machines, and IP phones.

A.

TRUE

B.

FALSE

Question # 38

OSPFv2 is an IGP running on IPv4 networks, whereas OSPFv3 is an IGP running on IPv6 networks. OSPFv2 and OSPFv3 have similar LSA types, but their LSA functions are slightly different. Which of the following is not an OSPFv3 LSA type?

A.

ASBR-Summary-LSA

B.

AS-External-LSA

C.

Router-LSA

D.

Network-LSA

Question # 39

VLAN-based MAC address flapping detection is configured. If MAC address flapping occurs, actions to be taken on an interface can be configured as required. Which of the following actions cannot be configured?

A.

Traffic filtering

B.

Alarm sending

C.

MAC address blocking

D.

Interface blocking

Question # 40

SR-MPLS uses IGP extensions to advertise labels and reserve bandwidth to support high-bandwidth services.

A.

TRUE

B.

FALSE

Question # 41

Which of the following statements about SR-MPLS Policy path planning are correct?

A.

When planning paths based on bandwidth, you need to set the available bandwidth of each interface in advance.

B.

When planning paths based on delay, you must deploy TWAMP or iFIT in advance to measure real-time network delay.

C.

If you use the controller to plan SR-MPLS Policy paths, only primary and backup paths can be deployed, and load balancing cannot be implemented for the primary path.

D.

When statically planning SR-MPLS Policy paths, you can plan load balancing for the primary path.

Question # 42

Telemetry data must be encoded in GPB binary format. This format reduces the number of bytes in telemetry messages and improves the transmission efficiency compared with messages encoded in JSON format.

A.

TRUE

B.

FALSE

Question # 43

The ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is _____ IRB forwarding. (Capitalize the first letter.)

Question # 44

The following figure shows the inter-AS MPLS L3VPN Option C (Solution 2). ASBR-PE2 is connected to CE3 and runs eBGP.

To enable all CEs to communicate with each other, which of the following address families must peer relationships be enabled in the BGP process of ASBR-PE2?

A.

VPNv4 address family

B.

BGP-LS address family

C.

VPN instance unicast address family

D.

Unicast BGP address family

Question # 45

When static IPsec VPN is used for WAN interconnection in the Huawei CloudCampus Solution, the AP, Router, and ____ can be used as egress devices.

Question # 46

After a wireless user passes Portal authentication, which of the following parameters cannot be used for authorizing the user?

A.

free-rule

B.

UCL

C.

IP address

D.

ACL

Question # 47

An SR-MPLS Policy needs to divert service traffic to a tunnel for forwarding. If traffic from various services is destined for the same address, which of the following traffic diversion modes is recommended to ensure the quality of each service?

A.

Endpoint-based traffic diversion

B.

Color-based traffic diversion

C.

5-tuple-based traffic diversion

D.

DSCP-based traffic diversion

Question # 48

In the small and midsize campus network design based on the Huawei CloudCampus Solution, when over 100 branches need to communicate with each other, which of the following interconnection networking models is recommended?

A.

Direct networking

B.

Full-mesh networking

C.

Hub-spoke networking

D.

Partial-mesh networking

Question # 49

In the Huawei CloudCampus Solution, which of the following devices can go online through the registration query center?

A.

Switch

B.

AR

C.

AP

D.

Firewall

Question # 50

As shown in the figure, when PE1 receives an ARP request packet, it forwards the packet to PE4. The packet then carries two labels. The label value 201 is carried by the EVPN Type ____ route. (Enter only digits.)

Question # 51

iMaster NCE-Campus provides the terminal identification function to display the terminal type, operating system, and manufacturer information.

A.

TRUE

B.

FALSE

Question # 52

Which of the following commands needs to be run in the BGP view to enable a VPN instance to advertise IP routes to the BGP-EVPN address family?

A.

advertise irbvfi

B.

advertise vpnv4

C.

advertise irb

D.

advertise l2vpn evpn

Question # 53

Which of the following roles is NOT a core role in Huawei ' s Free Mobility solution?

A.

iMaster NCE-Campus

B.

Policy enforcement device

C.

Authentication device

D.

Policy control device

Question # 54

When configuring a static VXLAN tunnel, you need to manually configure the _____, VTEP IP address, and ingress replication list. (Enter only uppercase letters.)

Question # 55

The TTL field encapsulated in the MPLS label header can prevent infinite loops of MPLS packets. Which of the following statements regarding the TTL field are correct?

A.

If TTL copy is disabled, users can use the tracert function to view the LSR of the MPLS domain.

B.

The processing of IP TTL copy hides the LSR in an MPLS domain, improving network security.

C.

MPLS provides two processing modes on the TTL field:TTL in the MPLS header copies the IP TTL value when an IP packet enters the MPLS network.The ingress LER sets the TTL value in the MPLS header to 255.

D.

MPLS encapsulation in frame mode supports the TTL field. MPLS encapsulation in cell mode does not support the TTL field.

Question # 56

Which of the following number sequences can be matched by the regular expression 100.s?

A.

100

B.

10000

C.

1000

D.

1001

Question # 57

During the evolution from OSPFv2 to OSPFv3, LSA formats and functions remain unchanged, except that the network layer addresses in LSAs are changed from IPv4 to IPv6.

A.

TRUE

B.

FALSE

Question # 58

Which of the following statements about SR-MPLS characteristics are correct? (Select all that apply)

A.

Only the controller can compute paths based on explicit paths.

B.

SR-MPLS supports smooth network evolution by extending existing protocols, such as IGPs.

C.

Efficient TI-LFA FRR protection is provided for fast path fault recovery.

D.

Such networks can quickly interact with upper-layer applications through the source routing technology.

Question # 59

During the implementation of iMaster NCE-Campus Wi-Fi location-based services (LBS), terminal location data is sent to an LBS platform through HTTP requests. Which of the following data formats is used in such HTTP requests?

A.

XML

B.

HTML

C.

JSON

D.

YAML

Question # 60

Flavors can be used to enhance SRv6 instructions to meet more diversified service requirements. Which of the following are flavors? (Select all that apply)

A.

Penultimate Segment Pop of the SRH (PSP)

B.

Ultimate Segment Decapsulation (USD)

C.

Ultimate Segment Pop of the SRH (USP)

D.

Penultimate Segment Decapsulation (PSD)

Question # 61

The channelized sub-interface and FlexE technologies both can be used to implement network slicing, but the application scenarios of the two technologies are slightly different. Which of the following statements about the two technologies are correct?

A.

It is recommended that channelized sub-interface be used to reserve resources for interfaces with a bandwidth of less than 50 Gbit/s.

B.

It is recommended that FlexE be used to reserve resources for 50GE and higher-rate interfaces.

C.

Only FlexE-based network slicing can be deployed across OTN devices.

D.

Only network slicing based on channelized sub-interface can be deployed across MSTP devices.

Question # 62

Which of the following is the purpose of configuring IS-IS fragmentation on an IS-IS device?

A.

Disable the device from establishing IS-IS neighbor relationships.

B.

Enable the device to support more IS-IS routes.

C.

There is no practical purpose.

D.

Disable the device from learning IS-IS link-state information.

Question # 63

Which of the following are carried in an HTTP/1.1 response?

A.

Status line

B.

Response body

C.

Response header

D.

Empty line

Question # 64

/ifm/interfaces/interface in Huawei Open Programmability System (OPS) is the URL used to identify a device ' s managed object.

A.

TRUE

B.

FALSE

Question # 65

Among NETCONF operations, the < config > operation may contain an operation attribute, which is used to specify an operation type for configuration data. Which of the following operation attributes is incorrect?

A.

remove

B.

merge

C.

create

D.

update

Question # 66

IPsec uses an asymmetric encryption algorithm to encrypt the symmetric algorithm key, which it uses to encrypt/decrypt data, ensuring security and performance.

A.

TRUE

B.

FALSE

Question # 67

Which of the following are carried in the HTTP/1.1 response header?

A.

Status code

B.

Reason phrase

C.

Protocol version

D.

Response method

Question # 68

The NETCONF content layer contains device configuration data.

Which of the following statements are correct about the following NETCONF configuration?

< ?xml version= " 1.0 " encoding= " UTF-8 " ? >

< rpc xmlns= " urn:ietf:params:xrnl:ns:netconf:base:1.0 " message-id= " 801 " >

< edit-config >

< target >

< running/ >

< /target >

< default-operation > merge < /default-operation >

< error-option > rollback-on-error < /error-option >

< config xmlns:xc= " urn:ietf:params:xml:ns:netconf:base:1.0 " >

< vlan xmlns= " http://www.huawei.com/netconf/vrp/huawei-vlan " >

< vlans >

< vlan >

< vlanId > 10 < /vlanId >

< protocolVlans >

< protocolVlan xc:operation= " merge " >

< protocolIndex > 0 < /protocolIndex >

< /protocolVlan >

< /protocolVlans >

< /vlan >

< /vlans >

< /vlan >

< /config >

< /edit-config >

< /rpc >

A.

The NETCONF < edit-config > operation is performed to load the configuration data to the startup configuration datastore.

B.

The Huawei-YANG model is used.

C.

VLAN 10 is created on the target device.

D.

The < config > operation contains an operation attribute so that the modified data is merged.

Question # 69

Refer to the following command output on the router R3. Which of the following statements are correct?

< R3 > display interface Tunnel

Tunnel0/0/0 current state : UP

Line protocol current state : UP

Last line protocol up time : 15:21:26 UTC-08:00

Description: HUAWEI, AR Series, Tunnel0/0/0 Interface

Route Port, The Maximum Transmit Unit is 1500

Internet Address is 20.1.1.2/24

Encapsulation is TUNNEL, loopback not set

Tunnel source 10.0.3.3 (LoopBack0), destination 10.0.1.1

Tunnel protocol/transport GRE/IP, key disabled

keepalive disabled

Checksumming of packets disabled

A.

The tunnel destination IP address is 10.0.1.1.

B.

The tunnel interface MTU is 1500 bytes.

C.

The tunnel interface IP address is 20.1.1.2/24.

D.

The tunnel source IP address is 10.0.1.1.

Question # 70

In the Huawei SD-WAN Solution, which of the following routing protocols is used to advertise VPN routes between CPEs?

A.

RIP

B.

OSPF

C.

IS-IS

D.

BGP

Question # 71

An enterprise has three types of services. Voice and video services are key services and need to be guaranteed, and FTP services are non-key services. Which of the following scheduling modes is optimal for satisfying the service requirements?

A.

WFQ scheduling is configured for IP voice, video, and FTP download services.

B.

PQ scheduling is configured for IP voice and video services, and WFQ scheduling is configured for FTP download services.

C.

LPQ scheduling is configured for IP voice services, PQ scheduling is configured for video services, and WFQ scheduling is configured for FTP download services.

D.

PQ scheduling is configured for IP voice, video, and FTP download services.

Question # 72

What can be determined from the following figure?

< R1 > display ipv6 routing-table protocol isis

Public Routing Table : ISIS

Summary Count: 6

ISIS Routing Table ' s Status : < Active >

Summary Count: 6

Destination : 3000:FDEA::4

NextHop : FE80::2E0:FCFF:FE98:2577

Cost : 20

Interface : GigabitEthernet0/0/1

PrefixLength : 128

Preference : 15

Protocol : ISIS-L2

Flags : D

A.

R1 has six IS-IS IPv6 routes.

B.

R1 does not have IS-IS IPv6 routes.

C.

IS-IS IPv6 must have been enabled on GigabitEthernet0/0/1 of R1.

D.

R1 is not a Level-1 device.

Question # 73

What is the router ID length supported by OSPFv3?

A.

128 bits

B.

64 bits

C.

100 bits

D.

32 bits

Question # 74

Which MPLS label will be used by PE2 for forwarding traffic to 10.0.1.1 based on the following SR-MPLS database?

Given Data (LSDB Information):

    Prefix-SID: 100

    SRGB Base: 40000

A.

39002

B.

40002

C.

38002

D.

36002

Question # 75

An O & M platform mainly provides unified monitoring and performance management for network devices. Which of the following is NOT device monitoring data?

A.

Management-plane data

B.

Data-plane data

C.

Control-plane data

D.

Monitoring-plane data

Question # 76

On the campus network shown, IPv6 is deployed for service tests. Four routers are deployed on the network, and OSPFv3 is used for IPv6 network connectivity. An engineer checks the LSDB of R2 and obtains a Link-LSA. Which of the following statements about the LSA are correct?

H12-891_V1.0 question answer

A.

The link-local address of R2’s GE0/0/0 is FE80::2E0:FCFF:FECD:4F79.

B.

The IPv6 address prefix of R2’s GE0/0/0 is 2001:DB8:2345:23::/64.

C.

This LSA indicates that R2 does not support external routes but can participate in IPv6 route calculation.

D.

This LSA is generated by R2.

Question # 77

NAFTIR policing can only be applied to the inbound direction. Its purpose is to monitor the traffic entering the device and ensure that the upstream device does not unnecessarily consume network resources.

A.

TRUE

B.

FALSE

Question # 78

In an MPLS VPN network, two-layer MPLS labels are added into data packets before they are transmitted over the public network. Which of the following statements regarding data packet processing are correct?

A.

The egress PE sends the data packet to the correct VPN based on the inner label.

B.

The penultimate hop removes the outer label before forwarding the data packet to a peer egress PE.

C.

The IP data packet received by egress LSR is without labels.

D.

The penultimate-hop device receives a packet with an outer label.

Question # 79

Huawei Open Programmability System (OPS) uses standard HTTP methods to access managed objects to manage network devices. Which of the following HTTP methods is used to configure the value of a network device ' s managed object?

A.

PUT

B.

POST

C.

PATCH

D.

GET

Question # 80

Which of the following statements about IPSG is incorrect?

A.

IPSG can be used to check the validity of IP packets. If IP packets are invalid, the device reports an alarm to an NMS.

B.

IPSG is a source IP address filtering technology based on Layer 3 interfaces.

C.

IPSG can be used to prevent hosts from changing IP addresses.

D.

IPSG can defend against IP address spoofing attacks.

Question # 81

To obtain the token ID of iMaster NCE, you need to send an HTTP request message that includes the following Python code to invoke an iMaster NCE RESTful API.

Which of the following statements is incorrect?

import requests

nbi_name = " demo13@north.com "

nbi_pwd = " CgocVcVe1@ "

host = " 139.9.213.72 "

port = " 18002 "

URI = " /controller/v2/tokens "

post_token_url = " https:// " + host + " : " + port + URI

headers_post = { " Content-Type " : " application/json " , " Accept " : " application/json " }

r = requests.post(post_token_url, headers=headers_post, json={ " userName " : nbi_name, " password " : nbi_pwd}, verify=False)

A.

You can run the print(r.json()) command to display the response message sent from the server.

B.

Token resources are located at https://139.9.213.72:18002/controller/v2/tokens.

C.

The request body is in JSON format.

D.

The HTTP request uses the GET method to query the token value.

Question # 82

O & M personnel for a large-scale event center receive feedback about Wi-Fi access failures. iMaster NCE-CampusInsight provides the function for personnel to view packet exchange processes and locate the root cause. It is found that IP addresses in the DHCP address pool are exhausted, preventing IP addresses from being assigned to mobile terminals. Which of the following functions is used by O & M personnel in this scenario?

A.

Simulation feedback

B.

Protocol trace

C.

Issue analysis

D.

Client journey

Question # 83

The path of an SR-MPLS TE tunnel can be calculated by the controller or tunnel ingress.

A.

TRUE

B.

FALSE

Question # 84

Which of the following are application optimization functions in the Huawei SD-WAN Solution?

A.

Application identification

B.

Intelligent traffic steering

C.

WAN optimization

D.

QoS

Question # 85

Network administrator A wants to use an IP prefix list to match specific routes. Which of the following routes can be matched by the IP prefix list shown in this figure?

ip ip-prefix TEST permit 10.0.0.0 24 less-equal 30

A.

10.0.2.0/24

B.

10.0.1.0/24

C.

10.0.0.1/30

D.

10.0.0.0/24

Question # 86

When you configure a virtualized campus network on iMaster NCE-Campus and enable external networks to connect to the Internet, iMaster NCE-Campus will automatically deliver a specific route to direct traffic to the corresponding external network.

A.

TRUE

B.

FALSE

Question # 87

How long is an IPv6 prefix assigned to a host when an IPv6 address is configured for the host in SLAAC mode?

A.

64 bits

B.

32 bits

C.

96 bits

D.

128 bits

Question # 88

Which of the following is the type of northbound API used by iMaster NCE-WAN?

A.

NETCONF

B.

SNMP

C.

CLI

D.

RESTful

Question # 89

On a CloudCampus virtualized campus network, which of the following modes can be used by a fabric to connect to external networks?

A.

Layer 3 shared egress

B.

Layer 2 shared egress

C.

Layer 3 exclusive egress

D.

Layer 2 exclusive egress

Question # 90

The following figure shows some configurations of R1. Based on these configurations, which of the following statements about IS-IS on R1 are correct?

isis 1

is-level level-2

cost-style wide

network-entity 49.0022.ee8c.a0c2.baf1.00

isis 2 vpn-instance tt

is-level level-2

cost-style wide

network-entity 47.00ce.390d.efdc.b3e1.00

isis 3 vpn-instance rr

is-level level-2

cost-style wide

network-entity 47.cc0a.3efb.bbdd.aae1.00

A.

Process 1 contains the global routing information and routing information of VRFs tt and rr.

B.

Routing information is shared between processes 2 and 3.

C.

Process 1 contains only global routing information.

D.

Routing information of process 2 is isolated from that of process 3.

Question # 91

In the admission design for large- and medium-sized campus networks, which of the following authentication modes can be used for PCs connected to IP phones?

A.

MAC address authentication

B.

802.1X authentication

C.

Multi-mode authentication

D.

Portal authentication

Question # 92

A client sends an HTTP request to a server, and the server sends back an HTTP response. Which of the following parameters is not carried in the HTTP response?

A.

Reason phrase

B.

Status code

C.

Protocol version

D.

URI

Question # 93

In a BGP/MPLS IP VPN scenario, if a PE and CE use OSPF to exchange routing information, domain IDs are used to identify whether the routes imported to VPN instances are from the same OSPF domain.

A.

TRUE

B.

FALSE

Question # 94

Which of the following statements about DHCP snooping is incorrect?

A.

After DHCP snooping is enabled in the view of a VLAN, it takes effect for the VLAN ' s DHCP messages received by all the interfaces of the device.

B.

After DHCP snooping is enabled globally, the device processes only DHCPv4 messages by default if no parameter is specified.

C.

DHCP snooping can prevent attacks by configuring trusted interfaces.

D.

After DHCP snooping is enabled in the view of an interface, it takes effect for all DHCP messages on the interface.

Question # 95

BGP Link State (BGP-LS) introduces a new NLRI into BGP. The NLRI carries link, node, topology prefix, and other information, and is also referred to as the link state NLRI.

A.

TRUE

B.

FALSE

Question # 96

As shown in the figure, SW1 and SW2 use asymmetric IRB (Integrated Routing and Bridging) forwarding, and PC1 and PC2 communicate with each other. Which of the following is the destination MAC address of the original data frame in the packet sent from VTEP1 to VTEP2?

A.

MAC D

B.

MAC B

C.

MAC C

D.

MAC A

H12-891_V1.0 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

H12-891_V1.0 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: HCIE-Datacom V1.0
  • Last Update: Apr 10, 2026
  • Questions and Answers: 322
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

H12-891_V1.0 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included