Month End Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

H12-891_V1.0 Sample Questions Answers

Questions 4

As shown in the figure, PE1 establishes an EVPN peer relationship with each of PE2 and PE3. When the network is initialized, CE1 sends an ARP request packet.

Which of the following statements are correct about how a PE processes the packet?

Options:

A.

When forwarding the packet to PE3, PE1 needs to add the BUM traffic label allocated by PE3 to the packet.

B.

PE1 sends a MAC/IP advertisement route carrying the MAC address of CE1.

C.

PE2 forwards the packet to CE1.

D.

PE3 forwards the packet to CE1.

Buy Now
Questions 5

BGP Link State (BGP-LS) introduces a new NLRI into BGP. The NLRI carries link, node, topology prefix, and other information, and is also referred to as the link state NLRI.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 6

In theHuawei CloudCampus Solution, which of the following devices can go online through theregistration query center?

Options:

A.

Switch

B.

AR

C.

AP

D.

Firewall

Buy Now
Questions 7

Exhibit:

The following figure shows the inter-AS MPLS VPN Option C (solution 2). RRs are deployed, and no traffic passes through the RRs during forwarding. If a data packet sent from PE2 to192.168.1.1carries two labels, which of the following statements about the two labels are correct?

Options:

A.

T1 is allocated by RR2.

B.

T1 is allocated by P2.

C.

V1 is allocated by PE1.

D.

V1 is allocated by P2.

Buy Now
Questions 8

Which of the following statements is incorrect about a BGP/MPLS IP VPN?

Options:

A.

In most cases, CEs are unaware of VPNs and do not need to support MPLS or MP-BGP.

B.

A BGP/MPLS IP VPN consists of customer edges (CEs), provider edges (PEs), and providers (Ps). PEs and Ps are carrier devices, whereas CEs are BGP/MPLS IP VPN customer devices.

C.

Inter-site communication can be implemented through VPN. A site can only belong to only one VPN.

D.

Ps only need to provide basic MPLS forwarding capabilities and do not need to maintain VPN-related information.

Buy Now
Questions 9

Which of the following inter-AS MPLS L3VPN solutions does not require MPLS to run between ASBRs?

Options:

A.

Option C

B.

Option D

C.

Option A

D.

Option B

Buy Now
Questions 10

When aclient invokes the iMaster NCE-Campus RESTful API, it sends anHTTP request. The server then returns thestatus code 401.

Which of the following errors has occurred?

Options:

A.

The service is unavailable.

B.

Access denied.

C.

The requested resource does not exist.

D.

Unauthorized.

Buy Now
Questions 11

In the CloudCampus public cloud scenario, if deployment through the Huawei registration query center is used, you do not need to configure DHCP Option 148 on the DHCP server of the campus network.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 12

Which of the following channels are involved in the Huawei SD-WAN Solution?

Options:

A.

Management channel

B.

Control channel

C.

Data channel

D.

Orchestration channel

Buy Now
Questions 13

According to the following information displayed on a router, which of the following are the causes of the failure in establishing an OSPF adjacency relationship?

OSPF error statistics:

1: Hello timer mismatch

0: Netmask mismatch

0: Bad checksum

0: Bad authentication type

0: Unknown neighbor

0: Extern option mismatch

Options:

A.

Hello packets are sent at different intervals.

B.

The area IDs are inconsistent.

C.

The IP address masks of the interfaces are inconsistent.

D.

The area types are inconsistent.

Buy Now
Questions 14

On the campus network shown, IPv6 is deployed for service tests. Four routers are deployed on the network, and these routers use OSPFv3 for network connectivity. Which of the following statements about LSAs generated by the OSPFv3 network is incorrect?

Options:

A.

R1 generates Router-LSAs describing interface information and receives Router-LSAs generated by R2 and R3.

B.

R1 receives two Link-LSAs generated by R2. The two Link-LSAs describe information about the two links connected to R2.

C.

The LSDB of R1 contains Network-LSAs generated by R3, indicating that R3 may be the DR on the local link.

D.

R2 functions as an area border router (ABR), generates Inter-Area-Prefix-LSAs that describe the IPv6 address prefix of area 1, and advertises these Inter-Area-Prefix-LSAs to R1 and R3.

Buy Now
Questions 15

Refer to the output information of a device below. According to the information, which of the following MPLS labels is carried in a data packet forwarded by the device to 10.0.1.1?

Options:

A.

36100

B.

36200

C.

40100

D.

40200

Buy Now
Questions 16

Which of the following intelligent traffic steering policies can be used to fully utilize link bandwidth and implement link bandwidth-based load balancing on an enterprise network with multiple links?

Options:

A.

Application priority-based traffic steering

B.

Link quality-based traffic steering

C.

Link priority-based traffic steering

D.

Traffic bandwidth-based traffic steering

Buy Now
Questions 17

MPLS is located between the data link layer and network layer in the TCP/IP protocol stack and can provide services for all network layer protocols.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 18

Which of the following statements about SR-MPLS characteristics are correct? (Select all that apply)

Options:

A.

Only the controller can compute paths based on explicit paths.

B.

SR-MPLS supports smooth network evolution by extending existing protocols, such as IGPs.

C.

Efficient TI-LFA FRR protection is provided for fast path fault recovery.

D.

Such networks can quickly interact with upper-layer applications through the source routing technology.

Buy Now
Questions 19

Which of the following functions can be provided by iMaster NCE-Campus when it functions as a relay agent for authentication?

Options:

A.

User accounting

B.

User authentication

C.

User analysis

D.

Marketing

Buy Now
Questions 20

On a campus network, which of the following problems may occur when you manually create a static VXLAN tunnel?

Options:

A.

Although the static VXLAN tunnel mode supports the distributed gateway scenario, the configuration involves a heavy workload and is complex to adjust.

B.

Remote MAC addresses can be learned by the VTEP only through data flooding.

C.

A static VXLAN tunnel also uses corresponding protocols on the control plane, which consumes device resources.

D.

If N devices need to establish static VXLAN tunnels, a maximum of N(N -1)/2 tunnels need to be manually configured, which involves a heavy workload.

Buy Now
Questions 21

Complete the basic processing procedure for DiffServ model-based QoSshown in the figure

Options:

Buy Now
Questions 22

On the network shown in the following figure, a remote LDP session needs to be established between SWA and SWC. Which of the following statements is correct?

[SWA] mpls lsr-id 1.1.1.1

[SWA] mpls

[SWA-mpls] mpls ldp

[SWC] mpls lsr-id 33.3.3.3

[SWC] mpls

[SWC-mpls] mpls ldp

SWA ---- SWB ---- SWC

<------ Remote LDP Session ------>

Options:

A.

You don't need to specify the LSR ID of the remote peer.

B.

You need to configure the directly-connected interfaces between SWA and SWC to set up TCP connections.

C.

The existing configuration is correct.

D.

You need to create a remote peer and specify an LSR ID for the remote peer.

Buy Now
Questions 23

Huawei Open Programmability System (OPS) uses HTTP methods to access managed objects to manage network devices. To facilitate script compilation, Huawei OPS provides the Python script template. In the Python script template, what are the contents of the Content-type and Accept fields in the header of an HTTP request packet?

Options:

A.

text/xml, texthttps://www.dumpspedia.com/json

B.

texthttps://www.dumpspedia.com/json, texthttps://www.dumpspedia.com/json

C.

text/xml, text/xml

D.

texthttps://www.dumpspedia.com/json, text/xml

Buy Now
Questions 24

OSPF is a mature protocol and is unlikely to have route computation errors in a regular networking environment under correct configurations. Which of the following statements are correct about the possible causes preventing an OSPF neighbor relationship from entering Full state?

Options:

A.

A link works abnormally.

B.

The OSPF network types on both ends of the link are inconsistent.

C.

The router IDs of neighbors are the same.

D.

The OSPF MTU values of interfaces on both ends of the link are different.

Buy Now
Questions 25

On the bearer WAN shown in the figure,SR (Segment Routing)is deployed, and the controller is used to compute paths. Drag network technologies on the left to the corresponding application locations on the right.

Options:

Buy Now
Questions 26

In OSPF, an ABR translates all Type 7 LSAs in a Not-So-Stubby Area (NSSA) into Type 5 LSAs.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 27

During the evolution from OSPFv2 to OSPFv3, LSA formats and functions remain unchanged, except that the network layer addresses in LSAs are changed from IPv4 to IPv6.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 28

MPLS supports both static and dynamic LSP establishment. Which of the following protocols cannot dynamically establish LSPs in MPLS TE scenarios? (Select all that apply)

Options:

A.

OSPF

B.

RSVP-TE

C.

BGP

D.

IS-IS

Buy Now
Questions 29

On aCloudCampus virtualized campus network, which of the following modes can be used by afabricto connect to external networks?

Options:

A.

Layer 3 shared egress

B.

Layer 2 shared egress

C.

Layer 3 exclusive egress

D.

Layer 2 exclusive egress

Buy Now
Questions 30

Which of the following types of LSAs does OSPF use to support SR-MPLS?

Options:

A.

Type 7 NSSA External LSA

B.

Type 10 Opaque LSA

C.

Type 1 Router LSA

D.

Type 2 Network LSA

Buy Now
Questions 31

Which of the following statements are correct about authentication points and policy enforcement points in Huawei's free mobility solution?

Options:

A.

The policy enforcement point executes inter-group policies based on security groups.

B.

The authentication point and policy enforcement point must be deployed on the same device.

C.

When receiving user traffic, the authentication point enforces a policy to process the traffic based on the source or destination security group corresponding to the source or destination IP address of the traffic.

D.

The authentication point and policy enforcement point can be deployed on different devices.

Buy Now
Questions 32

NETCONF provides a set of mechanisms for managing network devices. NETCONF operations take place on a configuration datastore of network devices. Which of the following statements is incorrect about the configuration datastore?

Options:

A.

The configuration datastore of network devices can be classified into the candidate, running, and startup configuration datastores.

B.

The operation is oriented at the startup configuration datastore.

C.

The operation is oriented at the candidate configuration datastore.

D.

The operation submits the configuration in a startup configuration datastore to a running configuration datastore.

Buy Now
Questions 33

This figure shows anSRv6 (Segment Routing over IPv6)packet. If theDestination Addressfield in the IPv6 basic header isFC04::4, the value of theSL (Segment Left)field in the SRv6 header should be____.(Enter only digits.)

Options:

Buy Now
Questions 34

Python Paramikoimplements theSSH protocol. In thePython Paramiko module, which of the following classes is used tocreate SFTP sessions and perform remote file operations?

Options:

A.

Packetizer class

B.

SFTPClient class

C.

Channel class

D.

Transport class

Buy Now
Questions 35

Which of the following statements regarding OSPF neighbor relationship faults is incorrect?

Options:

A.

For non-DR and non-BDR routers on an Ethernet link, the 2-Way state is acceptable.

B.

The Init state indicates that the router has received Hello packets from its neighbors, but the received Hello packets do not contain the OSPF RID of the receiving router.

C.

The ExStart state indicates that two neighbor routers have inconsistent MTUs or the same OSPF Router ID (RID).

D.

The Attempt state indicates that the router does not send unicast Hello packets to configured neighbors.

Buy Now
Questions 36

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following BGP EVPN routes is used to advertise MAC addresses, ARP entries, and IRB routes?

Options:

A.

Type 3

B.

Type 4

C.

Type 2

D.

Type 1

Buy Now
Questions 37

What can be determined from the following figure?

display bgp ipv6 routing-table

Total Number of Routes: 2

*>i Network : 3002::3

NextHop : 3000:FDEA::3

MED : 0

Path/Orgn : i

*>i Network : 3002::4

NextHop : 3000:FDEA::3

MED : 0

PrefixLen : 128

LocPrf : 100

PrefVal : 0

Path/Orgn : 65001 i

Options:

A.

If no routing policy is configured for the AS Path attribute, 3002::4/128 does not originate from AS 65001.

B.

R1 does not have routes 3002::3/128 and 3002::4/128.

C.

If no routing policy is configured for the AS_Path attribute, 3002::4/128 originates from AS 65001.

D.

R1 has routes 3002::3/128 and 3002::4/128.

Buy Now
Questions 38

The following figure shows some configurations of R1. Based on these configurations, which of the following statements about IS-IS on R1 are correct?

isis 1

is-level level-2

cost-style wide

network-entity 49.0022.ee8c.a0c2.baf1.00

isis 2 vpn-instance tt

is-level level-2

cost-style wide

network-entity 47.00ce.390d.efdc.b3e1.00

isis 3 vpn-instance rr

is-level level-2

cost-style wide

network-entity 47.cc0a.3efb.bbdd.aae1.00

Options:

A.

Process 1 contains the global routing information and routing information of VRFs tt and rr.

B.

Routing information is shared between processes 2 and 3.

C.

Process 1 contains only global routing information.

D.

Routing information of process 2 is isolated from that of process 3.

Buy Now
Questions 39

Whenstatic IPsec VPNis used for WAN interconnection in theHuawei CloudCampus Solution, theAP, Router, and ____can be used as egress devices.

Options:

Buy Now
Questions 40

Which of the following roles is NOT a core role in Huawei's Free Mobility solution?

Options:

A.

iMaster NCE-Campus

B.

Policy enforcement device

C.

Authentication device

D.

Policy control device

Buy Now
Questions 41

As shown in the figure, a sham link is established between PE1 and PE2 through the loopback interfaces. CE2 can learn the 192.168.1.0/24 route (directed route on CE1) through the sham link and backdoor link. If other parameters use their default settings, the cost of the 192.168.1.0/24 route on CE2 should be ______. (Enter an Arabic numeral without symbols.)

Options:

Buy Now
Questions 42

In a VXLAN scenario, which of the following features can be enabled to reduce ARP packet flooding between VTEPs?

Options:

A.

Local proxy ARP

B.

ARP broadcast suppression

C.

Host information collection

D.

Port isolation

Buy Now
Questions 43

Which MPLS label will be used by PE2 for forwarding traffic to 10.0.1.1 based on the following SR-MPLS database?

Given Data (LSDB Information):

Prefix-SID:100

SRGB Base:40000

Options:

A.

39002

B.

40002

C.

38002

D.

36002

Buy Now
Questions 44

In the figure,SR-MPLSis enabled onR1, R2, and R3. TheSRGB (Segment Routing Global Block) rangeonR3is from20000 to 21000, and theprefix SID indexconfigured on theloopback1 interface of R3 is 30.

In this case, theMPLS label corresponding to the loopback1 interface of R3 is _____.

(Enter anArabic numeralwithout symbols.)

Options:

Buy Now
Questions 45

Congestion management technology can be used to discard data packets in the buffer queue to prevent the buffer queue from being exhausted.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 46

An HTTP request line consists of three fields. Select the fields to form a complete HTTP request message.

Options:

Buy Now
Questions 47

An Ethernet Segment Identifier (ESI) is 10 bytes long and unique on the entire network.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 48

Which of the following factors does not need to be considered during the selection of core devices for the enterprise bearer WAN?

Options:

A.

Device naming conventions

B.

Service volume

C.

Physical location

D.

Node quantity

Buy Now
Questions 49

SSH connections are usually established based on TCP/IP connections. In specific cases, SSH connections can be established based on UDP connections.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 50

How long is an IPv6 prefix assigned to a host when an IPv6 address is configured for the host in SLAAC mode?

Options:

A.

64 bits

B.

32 bits

C.

96 bits

D.

128 bits

Buy Now
Questions 51

The Ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is ______ IRB forwarding. (Capitalize the first letter.)

Options:

Buy Now
Questions 52

To obtain thetoken IDofiMaster NCE, you need to send anHTTP requestusing the followingPython codeto invoke aniMaster NCE RESTful API:

Which of the following statements isincorrect?

Options:

A.

You can run print(r.json()) to display the response message sent from the server.

B.

Token resources are located at https://139.9.213.72:18002/controller/v2/tokens.

C.

The HTTP request uses the GET method to query the token value.

D.

The request body is inJSON format.

Buy Now
Questions 53

Portal authentication is recommended for scenarios with high mobility and numerous terminal types, such as shopping malls and supermarkets. MAC address authentication is recommended for dumb terminals that do not support Portal authentication, such as printers, fax machines, and IP phones.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 54

TheNETCONF content layercontainsdevice configuration data.

Which of the following statements are correct about the followingNETCONF configuration?

merge

rollback-on-error

http://www.huawei.com/netconf/vrp/huawei-vlan ">

10

0

Options:

A.

The NETCONF operation is performed to load the configuration data to the startup configuration datastore.

B.

The Huawei-YANG model is used.

C.

VLAN 10 is created on the target device.

D.

The operation contains an operation attribute so that the modified data is merged.

Buy Now
Questions 55

The command can be run to completely isolate Layer 2 and Layer 3 of different interfaces in a VLAN. (Use lowercase letters to supplement the command, which cannot be abbreviated.)

Options:

Buy Now
Questions 56

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following statements about symmetric IRB forwarding are correct?

Options:

A.

Both the ingress VTEP and egress VTEP forward packets based on the Layer 3 forwarding table.

B.

The ingress VTEP forwards packets based only on the Layer 2 forwarding table.

C.

The egress VTEP forwards packets based only on the Layer 2 forwarding table.

D.

When VTEPs forward inter-subnet user communication packets, the VNI carried in the VXLAN header is the L3VNI.

Buy Now
Questions 57

When Huawei iMaster NCE-IP is used to configureSR-MPLS TE tunnels, which of the following protocols is used by the controller to collect device running status information?

Options:

A.

Telemetry

B.

Telnet

C.

BGP-LS

D.

IS-IS

Buy Now
Questions 58

When an NVE encapsulates a data frame into a VXLAN packet, information of which of the following protocols is encapsulated between the outer IP header and the VXLAN header?

Options:

A.

IP

B.

TCP

C.

UDP

D.

Ethernet

Buy Now
Questions 59

An SRLB is a set of user-specified local labels reserved for SR-MPLS. These labels are locally configured and have only local significance. Therefore, they are not advertised through the IGP.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 60

MPLS supports Forwarding Equivalence Class (FEC). Which of the following cannot be used as a FEC allocation standard?

Options:

A.

Application protocol

B.

Fragment offset

C.

Class of Service (CoS)

D.

Destination address

Buy Now
Questions 61

The following figure shows the inter-AS MPLS L3VPN Option C (Solution 2). ASBR-PE2 is connected to CE3 and runs eBGP.

To enable all CEs to communicate with each other, which of the following address families must peer relationships be enabled in the BGP process of ASBR-PE2?

Options:

A.

VPNv4 address family

B.

BGP-LS address family

C.

VPN instance unicast address family

D.

Unicast BGP address family

Buy Now
Questions 62

Which of the following are application optimization functions in the Huawei SD-WAN Solution?

Options:

A.

Application identification

B.

Intelligent traffic steering

C.

WAN optimization

D.

QoS

Buy Now
Questions 63

You write the following Python code to invoke a RESTful API to obtain the token ID of iMaster NCE. Which of the following statements are correct?

import requests

response = requests.get("https://139.9.213.72 ")

print(response.json())

Error returned:

requests.exceptions.SSLError: HTTPSConnectionPool(host='139.9.213.72', port=18002): Max retries exceeded with url: /controller/v2/tokens (Caused by SSLError(CertificateError('hostname '139.9.213.72' doesn't match 'devzone.huawei.com')))

Options:

Options:

A.

The client does not trust the SSL certificate of the server.

B.

The SSL certificate verification fails.

C.

The code can be modified as follows:import requestsresponse = requests.get("https://139.9.213.72 ", verify=False)print(response.json())

D.

The code can be modified as follows:import requestsresponse = requests.post("http://139.9.213.72 ", verify=False)print(response.json())

Buy Now
Questions 64

On a VXLAN-based virtualized network, if the fabric networking mode is centralized gateway networking, the gateway is located on the _____ device. (Capitalize the first letter.)

Options:

Buy Now
Questions 65

Which of the following is the type ofnorthbound APIused byiMaster NCE-WAN?

Options:

A.

NETCONF

B.

SNMP

C.

CLI

D.

RESTful

Buy Now
Questions 66

In BGP4+, what is the content of the next hop network address field carried in the MP_REACH_NLRI attribute of an Update packet?

Options:

A.

The link-local address and global unicast address can be carried at the same time.

B.

It can be only a link-local address.

C.

It must be a global unicast address.

D.

It must be a link-local address.

Buy Now
Questions 67

The path of an SR-MPLS TE tunnel can be calculated by the controller or tunnel ingress.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 68

NETCONF provides a set of mechanisms for managing network devices. What layers can NETCONF be conceptually partitioned into?

Options:

A.

Encrypted transport layer, messages layer, operations layer, and content layer

B.

Encrypted transport layer, messages layer, configuration layer, and content layer

C.

Secure transport layer, messages layer, configuration layer, and content layer

D.

Secure transport layer, messages layer, operations layer, and content layer

Buy Now
Questions 69

HTTP/2 is a UDP-based low-delay Internet transport layer protocol.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 70

Which of the following are potential risks in HTTP communication?

Options:

A.

Eavesdropping: Third parties can obtain communication data.

B.

Pretending: Third parties can impersonate another user.

C.

Tampering: Third parties can tamper with communication data.

D.

Lost: There is a low probability that data is lost during transmission.

Buy Now
Questions 71

What can be determined from the following figure?

display ipv6 routing-table protocol isis

Public Routing Table : ISIS

Summary Count: 6

ISIS Routing Table's Status : < Active >

Summary Count: 6

Destination : 3000:FDEA::4

NextHop : FE80::2E0:FCFF:FE98:2577

Cost : 20

Interface : GigabitEthernet0/0/1

PrefixLength : 128

Preference : 15

Protocol : ISIS-L2

Flags : D

Options:

A.

R1 has six IS-IS IPv6 routes.

B.

R1 does not have IS-IS IPv6 routes.

C.

IS-IS IPv6 must have been enabled on GigabitEthernet0/0/1 of R1.

D.

R1 is not a Level-1 device.

Buy Now
Questions 72

Which of the following statements aboutSR-MPLS Policy candidate pathsare correct?

Options:

A.

A candidate path can contain multiple segment lists, with each segment list carrying the weight attribute.

B.

Load balancing can be implemented among candidate paths and among segment lists.

C.

An SR-MPLS policy can contain multiple candidate paths with the preference attribute.

D.

The valid candidate path with the highest preference functions as the primary path of the SR-MPLS Policy.

Buy Now
Questions 73

In a BGP/MPLS IP VPN scenario, if a PE and CE use OSPF to exchange routing information, domain IDs are used to identify whether the routes imported to VPN instances are from the same OSPF domain.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 74

In an MPLS VPN network, two-layer MPLS labels are added into data packets before they are transmitted over the public network. Which of the following statements regarding data packet processing are correct?

Options:

A.

The egress PE sends the data packet to the correct VPN based on the inner label.

B.

The penultimate hop removes the outer label before forwarding the data packet to a peer egress PE.

C.

The IP data packet received by egress LSR is without labels.

D.

The penultimate-hop device receives a packet with an outer label.

Buy Now
Questions 75

Which of the following statements is incorrect about access control on small and midsize campus networks based on the Huawei CloudCampus solution?

Options:

A.

iMaster NCE can function as an authentication server.

B.

Cloud APs support local Portal authentication.

C.

iMaster NCE can function as a Portal relay device.

D.

iMaster NCE can interconnect with a third-party RADIUS server.

Buy Now
Questions 76

Among NETCONF operations, the operation may contain an operation attribute, which is used to specify an operation type for configuration data. Which of the following operation attributes isincorrect?

Options:

A.

remove

B.

merge

C.

create

D.

update

Buy Now
Questions 77

VLAN-based MAC address flapping detection is configured. If MAC address flapping occurs, actions to be taken on an interface can be configured as required. Which of the following actions cannot be configured?

Options:

A.

Traffic filtering

B.

Alarm sending

C.

MAC address blocking

D.

Interface blocking

Buy Now
Questions 78

Which of the followinguser logout modesare supported by802.1X authentication?

Options:

A.

An authentication server forces a user to log out.

B.

A user logs out manually.

C.

An access device forces a user to log out.

D.

An accounting server forces a user to log out.

Buy Now
Questions 79

Which of the following technologies can be used to measure performance based on actual service traffic in Huawei's CloudWAN solution?

Options:

A.

TWAMP

B.

BGP FlowSpec

C.

Telemetry

D.

iFIT

Buy Now
Questions 80

Which of the following statements about configuring user access authentication is incorrect?

Options:

A.

To implement network access control on users, you need to determine the domains to which they belong and the AAA schemes that they use.

B.

You can configure an 802.1X access profile, a MAC access profile, a Portal access profile, or a multi-mode authentication profile based on the actual authentication requirements on the network.

C.

If the RADIUS or HWTACACS server is used for authentication, you need to configure parameters for interconnection with the authentication server in the AAA scheme.

D.

You need to bind an access profile to an authentication profile to specify the user authentication mode. Then, apply the authentication profile to an interface to enable network access control.

Buy Now
Questions 81

In the firewall hot standby scenario, when VGMP works in load balancing mode, which of the following functions must be enabled on the firewalls to prevent the return traffic from being discarded because it does not match any session entry in the case of inconsistent forward and return paths?

Options:

A.

Automatic backup

B.

Manual batch backup

C.

Quick session backup

D.

BFD

Buy Now
Questions 82

In Huawei's NAC solution, which of the following cannot be used for Portal authentication?

Options:

A.

User name and password

B.

Passcode

C.

SMS verification code

D.

User’s MAC address

Buy Now
Questions 83

A client sends an HTTP request to a server, and the server sends back an HTTP response. Which of the following parameters isnotcarried in the HTTP response?

Options:

A.

Reason phrase

B.

Status code

C.

Protocol version

D.

URI

Buy Now
Questions 84

Free mobility is deployed on a campus network through iMaster NCE-Campus. During this deployment, which of the following steps are performed by administrators and which are automatically performed by iMaster NCE-Campus? Drag the administrators and iMaster NCE-Campus icons on the left to the corresponding steps on the right.

Options:

Buy Now
Questions 85

Which of the following statements is incorrect about intranet security design for a large or medium-sized virtualized campus network?

Options:

A.

In addition to terminal access security, interface security must be considered during wireless network security design.

B.

Traffic suppression can be configured on the wired network to block broadcast traffic by shutting down interfaces.

C.

To secure data transmission, the CAPWAP tunnel between the AC and AP supports DTLS encryption.

D.

Intranet security refers to both wired and wireless network security.

Buy Now
Questions 86

Which of the following are carried in an HTTP/1.1 response?

Options:

A.

Status line

B.

Response body

C.

Response header

D.

Empty line

Buy Now
Questions 87

Which of the following parameters is not included in an IPsec security association (SA)?

Options:

A.

Security parameter index (SPI)

B.

Destination IP address

C.

Security protocol ID (AH or ESP)

D.

Source IP address

Buy Now
Questions 88

During the implementation of iMaster NCE-Campus Wi-Fi location-based services (LBS), terminal location data is sent to an LBS platform through HTTP requests. Which of the following data formats is used in such HTTP requests?

Options:

A.

XML

B.

HTML

C.

JSON

D.

YAML

Buy Now
Questions 89

Which of the following statements is incorrect about the user authentication points on the network?

Options:

A.

Deploying user authentication points at the access layer achieves granular permission management and high network security.

B.

Moving user authentication points from the access layer to the aggregation or core layer greatly reduces the number of user authentication points, thereby effectively mitigating the pressure on the AAA server.

C.

Deploying user authentication points at the access layer has both advantages and disadvantages when compared to doing so at the aggregation or core layer. Policy association can be applied if user authentication points are deployed at the access layer.

D.

When user authentication points are moved from the access layer to the aggregation layer, MAC address authentication for users may fail.

Buy Now
Questions 90

Which of the following number sequences can be matched by the regular expression100.$?

Options:

A.

1000

B.

1001

C.

10000

D.

100

Buy Now
Questions 91

Which of the following languages is integrated into the OPS?

Options:

A.

Python

B.

C programming language

C.

Java

D.

C++

Buy Now
Questions 92

OSPFv3 link LSAs are advertised in the entire area.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 93

As shown in the figure, what is known about the default routes on R4?

Routing Table on R4:

display ip routing-table protocol isis

Destination/Mask Proto Pre Cost Flags NextHop Interface

0.0.0.0/0 ISIS-L1 15 10 D 10.1.24.1 GigabitEthernet0/0/1

ISIS-L1 15 10 D 10.1.34.1 GigabitEthernet0/0/0

172.16.1.2/32 ISIS-L1 15 10 D 10.1.24.1 GigabitEthernet0/0/1

172.16.1.3/32 ISIS-L1 15 10 D 10.1.34.1 GigabitEthernet0/0/0

Options:

A.

Four equal-cost default routes

B.

One default route

C.

Two default routes with different costs

D.

Two equal-cost default routes

Buy Now
Questions 94

The ________ command can be run to completely isolate Layer 2 and Layer 3 of different interfaces in a VLAN. (Use lowercase letters to supplement the command, which cannot be abbreviated.)

Options:

Buy Now
Questions 95

When you configure avirtualized campus networkoniMaster NCE-Campus, Fit APs can immediately go online after you add them toiMaster NCE-Campus.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 96

Which of the following inter-AS MPLS L3VPN solutions need VPN user data packets to carry MPLS labels when being forwarded between ASs?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Exam Code: H12-891_V1.0
Exam Name: HCIE-Datacom V1.0
Last Update: Apr 25, 2025
Questions: 275
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now H12-891_V1.0