March Sale Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

H12-891_V1.0 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

H12-891_V1.0 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: HCIE-Datacom V1.0
  • Last Update: Mar 28, 2024
  • Questions and Answers: 610
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

H12-891_V1.0 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

H12-891_V1.0 HCIE-Datacom V1.0 Questions and Answers

Question # 6

The following description of the BGP route reflector is ?( Multiple choice questions).

A.

Cluster_List is an optional non-staging property for ring protection within the cluster.

B.

The route learned from the client, all non-clients and clients published to this RR.

C.

A network of bones is divided into multiple reflection clusters, each of which configures the other RRs as non-clients, and establishes an IBGP full connection between the RRs.

D.

The Originator_ID attribute is generated by the Route Reflector (RR) for inter-cluster ring protection.

Full Access
Question # 7

RTA is the source DR router, RTB is the RP router, and the multicast source sends multicast data to the RTA, but the PIM is not visible on the RTB Register the multicast source to which the message is registered, then the possible causes are ?

A.

Multicast network statically configures RP, while RTA router does not statically configure RP

B.

The RP elected by RTA is not an RTB

C.

RTB to RTA has no unicast routing, causing the RTB to fail RPF checks for the source

D.

The multicast network dynamically elects the RP instead RTA failed RPF check for BSR

Full Access
Question # 8

s the following description of THE MUX VLA N in huawei switches correct?

A.

MUX VLAN ??Principal VI-AN ?Subordinate VI-AN ???Separate VLAN ? Isolate VLAN

B.

Each Separate VLAN can bind multiple Principal VLANs

C.

Under the same VLAN, muX VLANs can be mixed with SuperVLANs

D.

The Principal port can pass the answer to all ends within the MUX VLAN

Full Access
Question # 9

If a Huawei S series switch needs to designate a member switch as the primary switch of the stack, it can power on this switch first, and then power on other member switches after 20s.

A.

True

B.

False

Full Access
Question # 10

What kind of scenario can use AS one path and one filter?

A.

Filter routes received from BGP neighbors based on the AS PATH attribute that the route carries. For example, the command peer x.X.x.x as path-filter import

B.

The apply clause in Routepolicy

C.

Filter routes sent to BGP neighbors based on the AS PATH attribute that the route carries. For example, the command peerx. X.x.x as path-filter export

D.

If-natch clause answer in Route-policy.

Full Access
Question # 11

Regular expressions can be used for Community-filter and AS-path-filter definition attribute types for route filtering.

A.

True

B.

False

Full Access
Question # 12

An engineer performed the ingestion operation on an OSPF router in a network of the company, is the following statement about the introduction of the routing LSA correct?

A.

The A. Advertising Router report is set to as the Router ID of ASBR

B.

Net Mask is set to all 0

C.

Link State lD is set as the destination network segment address

D.

Using the Link State ID and Advertising Router, you can uniquely identify an LSA

Full Access
Question # 13

A VRRP virtual router configuration VRID is 3 and the virtual IP address is 100 1. 1. 10, so what is the virtual MAC address?

A.

O0-00-5E-00-01-64

B.

01-00-5E-00-01-03

C.

01-00-5E-00-01-54

D.

00-00-5E-00-01-03

Full Access
Question # 14

The fields that represent priority in the VLAN (8021Q) data encapsulation are a total of 6 bits.

A.

True

B.

False

Full Access
Question # 15

How do IGMPv2 routers maintain cinderband group membership? Multi-select

A.

The router queries a specific group

B.

The router maintains a timeout timer for each group membership, refreshes the timer if the receiver host is received, and deletes the group membership if the timer times out

C.

The router periodically sends a Query message, and after the receiver host receives the Query message, it reports a Report message

D.

As soon as the leave message is received, the router immediately deletes the group membership

Full Access
Question # 16

LDP messages are exchanged between LDLRs running the LDP protocol, and LDP messages can be divided into four types according to function, which of the following is not an LDP message type ?

A.

Advertisement message

B.

Discover message

C.

Conversation message

D.

Label Exchange Information

Full Access
Question # 17

BGP authentication can prevent illegal routers from establishing neighbors with BGP routers, BGP authentication can be divided into MD5 authentication and Keychain authentication, please ask which BGP messages will be carried below BGPKeychain authentication information?( Multiple select).

A.

Update

B.

Notification

C.

Keeplive

D.

Open

Full Access
Question # 18

BGP can only automatically aggregate routes whose source is Incomplete.

A.

True

B.

False

Full Access
Question # 19

An engineer used 2 routers to test IPv6 services and simulated the interconnection between headquarters and branches by running BGP4+. The network logic topology is shown in the figure, regarding the delivery of IPv6 routes between two devices, which of the following statements is wrong?

H12-891_V1.0 question answer

A.

When a route is passed, it carries a recognized mandatory attribute such as AS_Path

B.

BGP4+ passes routing information between peers via Update packet C. When routing is passed, the Next_Hop attribute must be an IPv6 global unicast address

C.

If the Update message carries the MP_REACH_NLRI attribute, it means that the advertisement is reachable route

Full Access
Question # 20

The switch can suppress traffic by suppressing traffic and extremely other failures can affect operations, which of the following traffic suppression configurations is the wrong configuration

H12-891_V1.0 question answer

A.

[Quidway] wan 10 [Quidway-wan10] multicast-suppression 1000 [Quidway-van10] quit

B.

[Qudway ineface gigabtethemnet /0'1

[Quidway-GigabitEfthemetO0/O/1]multicast-suppression 80TQuidway-GigabitEthernet0/0/1]quit

C.

Quidway inteface gigabiethenet ou0/1

[Quidway-GigabtEthernet/0/1J,broadcast-suppression 80 IQuidway-GigabitEthernet//1]Jqut

D.

[Quidway] icmp rate-limit enable [Quidway] icmp rate-limit total threshold 20

E.

[Quidway ] wan 10 [Quidway-wani0] broadcast-suppression 1000 [Quidway-van10] quit

Full Access
Question # 21

When the BFD detection intervals on both ends are 30ms and 40ms, are the following options described correctly? An A. BFD session can be established, which takes 40ms after negotiation

A B. BFD session can be established, which takes 30ms after negotiation

C. BFD sessions can be established, each occurring at its own interval

l D. BFD sessions cannot be established

Full Access
Question # 22

In order to study the working mechanism of the OSPFv3 protocol, a project to build a network topology is as follows, the configuration of R1 and R2 is as follows, please ask the LSA switched between R1 and R2 What are the types?

A.

network-LSA

B.

Router-LSA

C.

Link-LSA

D.

Inter-area-prefix-LSA

Full Access
Question # 23

In route-policy, what are the BGP attributes that can be used for the apply clause?

A.

AS-Path

B.

MED

C.

Local-Preference

D.

Day

Full Access
Question # 24

A campus deployed both IPv4 and IPv6 networks for service testing, and ran IS-S to interconnect the networks. (The S-S routing protocol has good scalability and is widely used in the live network.) Regarding IS-IS extensibility, which of the following statements is true?

A.

In order to support IPv6, IS-IS needs to add TLV to carry IPv6 address information

B.

IS-IS uses the TLV structure to build messages, making lS-IS more flexible and extensible

C.

NLPID is a new type of TLV added by IS-IS to support IPv6

D.

For IS-IS, adding new features simply adds a new TLV to

Full Access
Question # 25

What are the ways to divide VLANs in Huawei switches? ( Multi-select) A Subnetting based on IP.

B. Division based on QoS

C. Partitioning based on port

D. Division based on protocol

E. Division based on MAC address.

Full Access
Question # 26

Huawei's two switches SWA and SWB are connected together by 7 Ethernet cables, and static link clustering is configured, and the corresponding port on the switch SWA is Ethernet 1/0/1 ?Ethernet1/0/2?Ethernet 1/0/3?Ethernet 1/0/4?Ethernet 1/0/5, Ethernet1/0/6, Ethernet 1/0/7, configured in order of port if the switch SWA, SWB supports only 6 ports per aggregation group

A.

In the case of consistent configuration of each port, Ethernet 1/0/6 port is an aggregate group Unselected port

B.

In the case of consistent configuration of each port, the Ethernet1/0/1 port is an aggregate group Unselected port

C.

With the same configuration of each port, the Ethernet 1/0/7 port is the aggregate group Unselecte port

D.

With the same configuration of each port, SWA randomly selects one of the 7 ports as the aggregate group Unselecte port

Full Access
Question # 27

Mainstream Layer 2 tunneling technologies include VXLAN TRILL, NVGB and MPLS.

A.

FALSE

B.

TRUE

Full Access
Question # 28

What is the following description of LDP reliability?

A.

LGP GR (Graceful Restart) takes advantage of the high difference between the LS forwarding plane and the control plane to realize that the device forwards without interruption when the protocol is restarted or the master-standby is reversed

B.

Manually configured LDP FRR policy defaults to a 32-bit backup route that triggers LDP to establish a backup ISP

C.

The LDP ERR can also generate an ISP for a tag map from a non-optimal next hop, and create a forwarding table entry as a backup of the primary LSP

D.

LDP and LGP linkage, the need for IGP to suppress the release of routes, to ensure that LDP and LGP paths are consistent

Full Access
Question # 29

A switch joins a running stacking system after powering up, a behavior known as heap overlay.

A.

TRUE

B.

FALSE

Full Access
Question # 30

In broadcast networks, elections to DIS begin only after a neighbor relationship has been established

A.

True

B.

False

Full Access
Question # 31

If you run PIM-SM in a multicast network, you need to build a multicast forwarding tree between the multicast source and the receiver to enable the receiver to receive the multicast effect, so what are the following options for the correct tree sketch for the build?

A.

What is built between the multicast source and the RP is the SPT tree

B.

RP and the receiver is built between the RPT tree

C.

Built between the RPT tree

D.

RP and the swap is the SPT tree

Full Access
Question # 32

The basic header length of an IPv6 message is a fixed value.

A.

TRUE

B.

FALSE

Full Access
Question # 33

To implement the traffic filtering function, you can use trapp-filter or MQC, which can be called in more views than traffic-filter

A.

FALSE

B.

TRUE

Full Access
Question # 34

OSPFv3 uses the same route advertisement method as OSPFv2: advertising is done through the network command in the OSPFv3 area view.

A.

TRUE

B.

False

Full Access
Question # 35

Regarding BGP's recognized arbitrary attributes, which of the following descriptions is correct?

A.

must be passed between BGP neighbors

B.

All BGP routers must be recognized

C.

There is no requirement to be present in the Update message, and you can decide whether to add it to the Update message on a case-by-case basis

D.

The BGP router cannot recognize the

Full Access
Question # 36

There is an existing network of router RI, router R, router R3, and router R4 The 4 routers are interconnected via an LN network. All 4 routers are equipped with basic oSPF. When you execute the command "displayosp" on router R2 f peer", router R2 and router R3 are discovered The status between is "2-way". So what conclusions can you draw from this output? Multiple choice questions).

A.

Router R2 is not a DR

B.

Router R3 is not a DR, nor is it a BDR

C.

There is no full adjacency between router R2 and router R3

D.

Router R4 is destined for DR

E.

Router R2 is DR or BDR

Full Access
Question # 37

In different scenarios, RSTP provides different protection functions, and the wrong statement about this statement is

A.

The root protection feature is enabled for the specified port, and its port role can only remain as the specified port

B.

When the anti-TC-BPDU packet attack feature is enabled, the number of times the switching device processes IC BPDU packets per unit time is configurable

C.

after the BPDU protection function is enabled on the switching device, if the edge port receives RST BPDU, the edge port will be set to a non-remote port and the spanning tree calculation will be re-performed

D.

Start the specified port of root protection, when the port receives a better RSTBPDU, the port will enter the Discarding state and is no longer forwarding packets. If the port does not receive a better RSTBPD for a period of time then automatically revert to the normal Forwarding state

Full Access
Question # 38

What type of prefix does a router running BGP advertise to its IBGP neighbor (assuming the router is not configured as a route reflector)? (radio).

A.

Prefixes are learned through other IBGP neighbors, or prefixes are learned from EBGP neighbors, or prefixes are learned through routing introduction

B.

A prefix that exists in the routing table

C.

Prefixes are learned through other BGP neighbors, or prefixes are learned locally through network or routing introduction

D.

Prefixes are learned through EBGP neighbors, or prefixes are learned locally through network or routing introduction

E.

The prefix is learned through an EBGP neighbor, or the prefix is learned from an from RR

Full Access
Question # 39

The following message about the Register in PIM-SM describes the correct ?( Multiple choice questions).

A.

The Register message enables the RP to learn the multicast source information

B.

The Register message is sent by the receiver router

C.

Register messages are sent to RPv via unicast instead of multicast

D.

The Register message is sent by the source DR

Full Access
Question # 40

Regarding the domain-authentication-mode md5 hello command in the ISIS process, the correct explanation is ?

A.

ISIS authentication cannot be applied in IPv6 environments.

B.

This command is mainly used to make is the ISIS Hello message carry authentication information during the transmission process.

C.

All router domain authentication methods of the same routing domain are MD5, the password is hello, and lS-IS SNP and LSP will spread normally.

D.

outing domain authentication is primarily used to allow level-1 and Level-2 SNP and LSP messages to carry authentication information during delivery.

Full Access
Question # 41

The following description of the characteristics of Huawei device Eth-trunk link aggregation is correct?

A.

Link aggregation enables load balancing based on data TCP or UDP ports

B.

Link aggregation cannot be deployed across devices

C.

Link aggregation can be applied to Both Layer 2 and Layer 3 devices

D.

Link aggregation can only be applied to Layer 2 devices.

Full Access
Question # 42

As shown in the FIGURE, in the HUB & Spoke networking mode of MPLS BGPVPN, in order to achieve the division, it can only communicate with the headquarters. Divisions cannot communicate with each other, and the settings for RT can be which of the following scenarios? (Multiple choice questions).

H12-891_V1.0 question answerH12-891_V1.0 question answer

A.

??:Import Target: 123; Export Target:123 ?? 1: lmport Target:123; Export Target:123 ?? 2:lmport Target: 12: 3; Export Target: 123

B.

??: Ilmport Target: 1:1l; Export Target: 3:3 ?? 1: Import Target: 33; Export Target: 1.1 ?? 2:lmport Target: 3:3; ExportTarget: 2

C.

??: lmport Target: 22; Export Target: 33 ?? 1: lmport Target: 33; Export Target: 1:1 ?? 2:lImport Target: 33; Export Target: 2

D.

??: lmport Target:123; Export Target: 3:12 ?? 1:Import Target: 312; Export Target:123 ?? 2:Import Target: 3:12; Export Target: 12:3

Full Access
Question # 43

In cross-domain VPN-OptionB packet forwarding, two ASBRs exchange the same LSP tags once.

A.

True

B.

False

Full Access
Question # 44

What is correct below about LDP synchronization in ISIS?

A.

LDP synchronization can be turned on globally.

B.

LDP establishes neighbors faster than ISIS, so LDP synchronization is turned off by default

C.

LDP synchronization avoids traffic loss when the active-standby link is switched.

D.

LDP synchronization can be deployed on the Loopback interface.

Full Access
Question # 45

The following statement about IPSec VPN is correct ?qo

A.

Two routers establish an IPSec VPN in brutal mode, so that the two devices can interact with a minimum of 4 messages to establish a tunnel.

B.

Brutal mode can support NAT traversal, while main mode does not support NAT traversal.

C.

The two routers can establish OSPF neighbor relations and exchange intranet routes through the IPSec VPN tunnel

D.

The two routers establish IPSecVPN in main mode, and from the 5th packet (included), the payload's data will be encrypted.

Full Access
Question # 46

IPSGs can statically configure binding tables or form binding tables by using them with DHCP-Snooping

A.

True

B.

False

Full Access
Question # 47

What are the three ways to send IPv4 messages?

A.

broadcast

B.

Unicast

C.

Multicast

D.

Any broadcast

Full Access
Question # 48

If the OSPP protocol is running in the network , after configuring the non-backbone area in the OSPP area as the Totally Stub region, the ABR router sends a message to Totally. The Stub region issues an LSA with an LS ID of 0000, and what type of LSA is the LAS to?

A.

LSA5

B.

LSA2

C.

LSA1

D.

LSA3

Full Access
Question # 49

The advantages of building a campus network using stacking, clustering technology include which of the following?( Multi-select)

A.

Improved network equipment and link utilization

B.

It can effectively reduce network power consumption

C.

Business disruption time is greatly reduced

D.

Simplifies network management and reduces the complexity of network deployment planning

Full Access
Question # 50

Mainstream Layer 2 technologies such as VXLAN, TRILL, NVGRE and MPLS

A.

True

B.

False

Full Access
Question # 51

Which of the following options can affect the establishment of IBGP neighbors?

A.

iBGP-Multi-hop is not configured

B.

Authentication is unsuccessful

C.

IGP routing is not passable

D.

BGP protocol version inconsistencies

Full Access
Question # 52

MPLS is called multiprotocol label switching, and with respect to label descriptions in MPLS, the correct one is ?( Multiple select).

A.

The MPLS system has a variety of label publishing protocols, such as LDP is a label publishing protocol

B.

The label is carried by the head of the MPLS message and has a global significance, that is, the label value of all routers cannot repeat

C.

A tag is a fixed-length, locally only meaningful identifier that uniquely identifies the FEC to which a group belongs

D.

MPLS supports single-layer tags as well as multi-tier tags

Full Access
Question # 53

The command to adjust the LINK cost value for the IS-IS interface is ?( Radio)

A.

ISIS cost

B.

ISIS timer hello

C.

lSIS circuit type

D.

ISIS circuit level

Full Access
Question # 54

As shown in the following topology, EBGP is running between AS100, AS200, AS300, AS400, and the neighbor relationship is established S400 When you receive a BGP route from ASI00 for a 1.1.1.1/32 network segment, is the path order recorded in the ASPath properties correct?

H12-891_V1.0 question answer

A.

10,200,3

B.

400,300,200,100

C.

100, 200,300, 400

D.

300, 200,100

Full Access
Question # 55

As shown in the figure, in the HUB & Spoke networking mode of MPLS BGPVPN, in order to achieve the division can only communicate with the headquarters, the division can not communicate with each other When setting up RT, which of the following scenarios is this?( Radio).

H12-891_V1.0 question answer

A???:import Target:12:3EpodTarget:12:3

B. Headquarters: importTarget:1:1EpodTarget:3:3

C. Headquarters: Impot Target:2:2; Expor Target:3:3 D. Headquarters: importTarget: 12:3EpodTarget: 3:12

Full Access
Question # 56

Deploying the ISIS protocol in an IPv6 environment is true in the following statement (radio).

A.

By default, the DIS priority of broadcast network interfaces at Level-1 and Level-2 is 1 B In broadcast networks, the DIS priority for IPV4 and IPV6 can be set separately

B.

In the same broadcast network. If each router supports both IPV4 and Pv6, the DISC of JPV4 and Pv6 must be the same device

C.

IS-IS sient is configured under the finger port, this interface will not send ISIS packets, but will receive ISIS packet

Full Access
Question # 57

What are the following advanced features supported by BGP EVPN?

A.

ARP broadcast suppression

B.

VRRP overVXLAN

C.

Multi-active gateway

D.

WI-AN Qos

Full Access
Question # 58

Which of the following parameters are not required when configuring BGP Peers?

A.

as-number

B.

password

C.

peer IP Address

D.

Description

Full Access
Question # 59

When deploying the ISIS protocol in an IPv6 environment , the following statement is correct (single choice).

A.

By default, the DIS priority for broadcast network interfaces at Level-1 and Level-2 is 1

B.

In broadcast networks, IPv4 and The DIS priority for IPv6 can be set separately

C.

In the same broadcast network. If each router supports both IPv4 and IPv6 The DIS for IPv4 and IPv6 must be the same device

D.

IS-IS is configured under the finger port is ISIS silent, this interface will not send ISIS packets, but will receive ISIS packets

Full Access
Question # 60

A campus deploys OSPF to achieve network interoperability, and an engineer configures R2 as shown in the figure, then the following description of the LSA in the OSPF network is wrong

H12-891_V1.0 question answer

A.

There is no Type3 LsA flooding within Areal

B.

There is no Type3 LSA flooding in Area2

C.

There is Type5 LSA flooding within Areal

D.

Area2 contains Type5 LSA generic adverb

Full Access
Question # 61

What messages does an NMS (Network Management Station) running SNMPv1 send to the agent?

A.

Trap,Get ? Set

B.

Get,Set ? Getnext

C.

Get,Set,Getnext ? GetBulk

D.

Get,Set ? GetBulk

E.

Get Trap

Full Access
Question # 62

As shown in the figure, Department A of Branch 1 has access to the Internet, but Department B can only use an encrypted VP to access headquarters resources, and NAT can be configured on the egress device The policy enables Department A to access the Internet, while the PSecVPN (ESP Protocol) + Tunnel mode method configured for Department B gives it access to headquarters.

B. Right

C. Wrong

Full Access
Question # 63

The Option field in OSPFv3 appears in all LSAs

A.

True

B.

False

Full Access
Question # 64

IPv6 introduces the Solicited-Node address, which is described correctly below (multiple choice)

A.

This is a specific address that is used for resolution in ARPv6 The MAC address.

B.

The Solicited-Node address on the router interface is automatically generated and can have multiple.

C.

If the Solicited-Node address is not configured , the router automatically generates one on each interface.

D.

IPv6 introduced the Solicited-Node address to support IPv6 multicast.

Full Access
Question # 65

The DHCP protocol assigns to clients—some TCPIP-related parameter information—in the process DHCP defines a variety of messages that are encapsulated at the transport layer :(sortic).

A.

PPP package

B.

IP encapsulation

C.

TCP Encapsulation

D.

UDP Encapsulation

Full Access
Question # 66

: :1/128 is the IPV6 loopback address

A.

TRUE

B.

False

Full Access
Question # 67

OSPFv2 is an IGP running on an IPV4 network; OSPFV3 is an IGP running in an IPV6 network

IGP, OSPFv3 in the network has a similar LSA type compared to OSPFV2, but the functionality is slightly different, osPFv3LSA type does not include which of the following?

A.

Router-LSA

B.

Network-LSA

C.

Asbr-summary-LSA

D.

AS-external-LSA

Full Access
Question # 68

By default, which of the following security MAC address types lose table entries after the device restarts?

A.

Sticty MAC address

B.

Black hole MAC address

C.

Secure static MAC address

D.

Secure dynamic MAC address

Full Access
Question # 69

The following link-LSA for OSPFv3 is correct?

A.

Contains both the link-local address of this interface and all IPV6 prefixes of the same area on this router.

B.

Contains both the link-local address of the interface and all IPv6 prefixes on the interface.

C.

?Link-LSA ???Prefix ?Prefixoptions ???Ox00,?? Prefix ????IPv6??????

D.

The Option field exists in the header of the LSA, not in the data area of the Link-LSA

Full Access
Question # 70

The following statement about is the ISIS protocol LSP message is correct

A.

LSP fast diffusion feature, first diffuse less than the specified number of LSPs, to speed up the synchronization process of LSDB

B.

By configuring an LSP-generated smart timer, the timer automatically adjusts the delay time based on the frequency of changes in routing information

C.

When the link status information increases, the message length of the LSP can be increased so that each LSP can carry more information.

D.

Reducing the minimum time interval for sending LSPs per port can speed up the diffusion of LSPs.

Full Access
Question # 71

The following is a description of how BFD sessions are established, which is the wrong one

A.

The system distinguishes between static BFD sessions and dynamic BPD sessions by dividing the identifier area Dynamically assign this landmark identifier

B.

BFD sessions can only be established dynamically

C.

Static configuration of BFD session refers to manual configuration of BFD session parameters through the command line, including local identifiers and remote identifiers

Full Access
Question # 72

There are many ways to establish a cluster on a box switch, what methods does Huawei frame switch support to establish a cluster?

A.

Set up via a cluster card on the motherboard

B.

Establish

C.

through the cluster daughter card on the interface board. Establish

D.

through the service interface on the interface board Established by switching the cluster card on the network board

Full Access
Question # 73

A home user has opened a 1Mb/s bandwidth, and in order to improve the user experience, the operator can stabilize 2Mb/s when measuring speed If we use the listening bucket technology to achieve this requirement, which of the following methods is optimal.

A.

cir 10000 pir 12000

B.

cir 10o00 cbs 12000 pbd 12000

C.

cir 8000 pir 12000

D.

cir 10000 cbs 10000 pbs 12000

Full Access
Question # 74

Run the SSM across the entire HW IP multicast network. The following about SSM understands correctly?( Multiple choice question)

A.

No RP is required

B.

SSM uses only shared trees

C.

SSM uses only the SPT tree

D.

Ideal for 1-to-many applications

E.

SSM is recommended when you have multiple sources and expect to minimize the state of mroute in your network Ideal for many-to-many applications

Full Access
Question # 75

Assume that BGP/MPLSIPVVPN, OSPF, LDP, and static routing protocols are already enabled on the PE router . Which of the following protocols need to enable GR on PE in order to get NSF functionality? (Multiple choice questions).

A.

BGP

B.

Static circuit

C.

OSPF

D.

MPLS LDP

Full Access
Question # 76

Router RL runs the OSPF protocol and uses the display ip routing-tabe command to view the router RL's routing table , the following information about OSPF in the routing table is described correctly as ?

A.

In the routing table, the routing table entries identified by the OSPF identifier can only be learned through the 3 types of LSAs to

B.

In the routing table, used The 'OSPF' identifier identifies a route table entry that can only pass a Type 1 LSA

C.

In the routing table, the routing table entries identified with the 'OSPF identifier' can be learned through the 1/2/3/5 LSA to

D.

In the routing table, Route table entries identified with the "O_ASE identifier can only be learned through routing introduction

Full Access
Question # 77

Regarding the FTP protocol, which of the descriptions below is correct?

A.

In FTP Passive mode, the client completes the initialization of the TCP session for control and data

B.

In FTP Active mode, the server tells the client which port it expects to send data on by commanding "PORT"

C.

FTP always uses a TCP session to transmit control information and data information

D.

FTP always uses TCP port 20 to establish a data session, and ICP port 21 to establish control will always use E. FTP TCP port 21 to establish a data session, TCP port 20 to establish a control session

Full Access
Question # 78

If the Interface Sticky MAC function is enabled, what is the number of MAC addresses that the interface learns by default?

A.

15

B.

10

C.

5

D.

1

Full Access
Question # 79

In the city, that is, mpLS BGPVPN network, when the packet enters the public network forwarding, it will be encapsulated with two layers of MPLS tags, the following description of the two layers of tags, the error is ?

A.

Private network tags are carried and distributed by MP-BGP when routing, and public network tags are distributed by the LDP protocol.

B.

MPLS BGPVPN uses two layers of tags: public labels (also known as outer labels) and private network labels (also known as inner labels).

C.

By default, the router assigns the same tag value to all VPNv4 routes destined for the peer

D.

The egress PE uses the inner tag when determining which egress CE the message should be sent to.

Full Access
Question # 80

XLAN uses BGP EVPN to establish a tunnel, what type of message is used? ( Single choice questions).

A.

Typel

B.

Type2

C.

Type3

D.

Type4E. Type5

Full Access
Question # 81

The following is the correct description of the aggregation of BGP? (Single Choice Questions).

A.

After you configure aggregate ipv4-address mask , only aggregate routes are published, not detail routes.

B.

For IPv6 routing, BGP supports manual coalescing and automatic aggregation

C.

By default, BGP enables automatic aggregation

D.

You can manually aggregate the routes in the BGP local routing table with a profile

Full Access
Question # 82

In a network, the same gigabit running S and OSPF anti-tampering and fluttering as shown in the figure, on the two border routers RTB and RTC are introduced into the wine route, the device question is to use gigabit one port strobe, , 222 The network is introduced into the OSE via impotrote direct on the RTD, assuming that all other configurations are dead default configurations, then the description of this network is wrong ?

H12-891_V1.0 question answer

A.

Adjusting the ISIS priority to 160 on the RTB avoids suboptimal routing problems in the network.

B.

On the RTC, the following configuration is adopted, only the routes of the 2222/32 cinder segment can be filtered out when routing is introduced, IRTClip ip-prefix 10 index 1 deny2000 8 less-equal 32

C.

RTB learns that the routing next hop for the 2222/32 network segment is RTA

D.

The following configuration can filter out the routes of the 2222/32 CIDR block of the white RTD when RTC introduces OSPF routes.

Full Access
Question # 83

In addition to stateless address autoconfiguration, IPV6 devices can also obtain addresses, gateways, DNS, and other information through DHCPv6

A.

True

B.

False

Full Access
Question # 84

What is the following description of MPLS BGPVPN incorrect?

A.

The TTL field in the label has the effect of preventing loops.

B.

IBGP PEes generally use the Loopback interface address to establish a stable BGP neighbor relationship

C.

BGP So0, which is used to prevent routes issued from a VPN site from passing through the MPLS backbone and back to that site. So0 is an extended group attribute that MP-BGP automatically generates.

D.

The routing exchange between D. PE-CE can be static routing, OSPF multi-instance, IS-IS multi-instance, EBGP

Full Access
Question # 85

Which nationality meets the following two conditions: 1] BGP Router A can choose whether the Ulpdate message is based on the nationality. ( ) If Router B receives a Updae message containing a cross-hatch, run-by B does not have an identified solidity, but will also contain a multifaceted] Ulpdate retracts the advertisement to Router C. Router C may recognize and apply this attribute. (Multiple choice questions).

A.

Aggregator

B.

Local_Pref

C.

Multi_Exit_Disc

D.

Community

Full Access
Question # 86

The address resolution feature for NDP in the following description is incorrect?

A.

When sending a neighbor request packet, the source address—is set as the link-local address

B.

of the local interface Two types of ICMPv6 messages,

C.

are used in the address resolution process, neighbor request and neighbor advertisement Address resolution implements the ability to resolve from IPv6 addresses to link-layer addresses

D.

When sending a neighbor request packet, the destination address must be the multicast address of the neighbor's requested node

Full Access
Question # 87

What are the following correct statements about MUX VLANs?( Multiple select).

A.

The Principal VLAN can communicate with all VLANs within the MUX VLAN

B.

Each Separate VLAN must be bound to a Principal VLAN

C.

Separate VLANs can communicate with all VLANs within a MUX VLAN

D.

Each Group VLAN must be bound to a Principal VLAN

Full Access
Question # 88

What are the following statements about 8021x, RADIUS, and HWTACACS certification? ( Multiple choice questions).

A.

Users can use 8021x authentication to access the network and complete identity authentication through RADIUS

B.

RADIUS authentication and WTACACS authentication are mutually exclusive and cannot be two-factor authentication for the same user at the same time.

C.

RADIUS authentication and HWTACACS authentication can perform two-factor authentication for the same user at the same time, which is more secure.

D.

RADIUS authentication is mutually exclusive with 8021x authentication.

Full Access
Question # 89

The following description of Filter-Policy is correct?( Radio).

A With Filter-Policy, on ASBR in OSPF, type5LSA and type7LSA can be applied The build is filtered.

B. Prefix lists can be used to filter both routes and packets.

C. Filter-policy filters the link state information received or published, and can modify the properties of route entries.

D. When filtering routes using the pre-slow list, the table entry ip-prefxldeny0000 0 lese-qual 32 indicates that only the default route matches

Full Access
Question # 90

When configuring AS-Path-Filter, ip as-path-filter 10 permit_100$ indicates a matching route received from the A5100 but not from the AS100

A.

TRUE

B.

FALSE

Full Access
Question # 91

The existing router HWl running BGP is configured with both IBGP neighbors and EBGP tenants. The following descriptions about IBGP Neighbors and EBGP Neighbors are correct?

A.

The router will have an EBGP BGP neighbor from it must be connected directly, otherwise, IBGP-Multi-hop must be configured

B.

The router sends BGP updates learned from its EBGP neighbors to its other IBGP neighbors and EBGP neighbors

C.

IBGP neighbors can establish neighbor relationships through the Loopback interface

D.

The router sends BGP updates learned from its IBGP neighbors to its other IBGP neighbors and EPGP neighbors

E.

EBGP neighbors must be directly connected, otherwise, EBGP-Multi-hop must be configured with

Full Access