Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

H12-821_V1.0 Sample Questions Answers

Questions 4

An edge port is a new port role added to RSTP to overcome the disadvantages of STP. Which of the following statements is false about this port role?

Options:

A.

The port does not participate in RSTP calculation.

B.

The port can directly enter the Forwarding state from the Discarding state.

C.

After receiving a configuration BPDU, the port is still in the Forwarding state.

D.

The Up and Down states of the port do not cause network topology changes.

Buy Now
Questions 5

The following figure shows the OSPF network of an enterprise and the OSPF configurations of R1. Which of the following statements is false about the network?

Options:

A.

R2 can access the server.

B.

GE 0/0/1 of R1 cannot send OSPF packets.

C.

The network segment to which GE 0/0/1 of R1 belongs cannot be advertised.

D.

GE 0/0/1 of R1 cannot accept OSPF packets.

Buy Now
Questions 6

As shown in the figure, data traffic is forwarded in tunnel mode along the path of STA -> HAP -> HAC -> upper-layer network before roaming. What is the flow direction of data traffic after Layer 3 roaming?

Options:

A.

STA -> FAP -> FAC -> HAC -> HAP -> HAC -> Upper-layer network

B.

STA -> FAP -> FAC -> HAC -> Upper-layer network

C.

STA -> FAP -> FAC -> Upper-layer network

D.

STA -> FAP -> FAC -> HAC -> HAP -> Upper-layer network

Buy Now
Questions 7

Which of the following attribute must be carried in an Update message?

Options:

A.

Local-pref

B.

Prefval

C.

MED

D.

AS-Path

Buy Now
Questions 8

See the following figure. RTA, RTB, RTC, and RTD are in the same AS and establish IBGP peer relationships through direct links. RTB an RTC are route reflectors (RRs), RTA and RTC are the RR clients of RTB, and RTB and RTD are the RR clients of RTC. If RTA advertises the route 10.1.1.0/24 to the BGP process, the Originator ID of the BGP route received by RTD is------------------.

Options:

Buy Now
Questions 9

An enterprise network runs OSPF to implement network communication. Which of the following types of LSAs may be generated by an ABR?

Options:

A.

NSSA LSA

B.

AS External LSA

C.

Network Summary LSA

D.

ASBR Summary LSA

Buy Now
Questions 10

Which of the following values is the Reserved/Circuit Type field in the IIH packets sent by a Level-1-2 router on an IS-IS network?

Options:

A.

00

B.

11

C.

01

D.

10

Buy Now
Questions 11

An enterprise administrator views the following details about a BGP route during routine O&M:

yaml

CopyEdit

display bgp routing-table 192.168.1.1

BGP local router ID: 10.1.1.1

Local AS number: 100

Paths: 2 available, 0 best, 0 select

BGP routing table entry information of 192.168.1.1/32:

From: 10.1.1.2 (10.1.1.2)

Route Duration: 00h01m31s

Relay IP Nexthop: 0.0.0.0

Relay IP Out-Interface: --

Original nexthop: 172.16.1.2

AS-path: 200, origin incomplete, MED 0, localpref 100, pref-val 0, internal, pre 255, invalid for IP unreachable

Not advertised to any peer yet

Which of the following statements are true about the BGP route?

Options:

A.

The original next hop of the route is 172.16.1.2.

B.

The local BGP router ID is 10.1.1.1.

C.

The local AS number is 100.

D.

The route is preferentially selected because its Local_Pref has a higher priority.

Buy Now
Questions 12

When an SSH client accesses an SSH server for the first time and the SSH server's public key is not configured on the SSH client, you can enable first-time authentication on the SSH client. This allows the SSH client to access the SSH server and saves the SSH server's public key on the SSH client. In this way, the next time the SSH client accesses the SSH server, the SSH client can use the saved public key to authenticate the SSH server.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 13

On an IS-IS network, each device needs to be configured with a network entity title (NET), which consists of three parts, each containing different fields. Which of the following fields are contained in the Area Address part?

Options:

A.

High Order DSP

B.

AFI

C.

IDI

D.

System ID

Buy Now
Questions 14

As shown in the figure, VRRP is associated with a BFD session. When a backup device detects a fault through BFD, the backup device immediately assumes the master role after the Master_Down_Timer timer expires.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 15

On an OSPF network, an algorithm is used to prevent loops within an area, but loops may occur between areas. Therefore, OSPF defines a loop prevention mechanism for inter-area routes. Which of the following statements are true about the loop prevention mechanism?

Options:

A.

Inter-area routes cannot be directly transmitted between non-backbone areas.

B.

All non-backbone areas must be directly connected to area 0.

C.

Inter-area routes need to be forwarded through area 0.

D.

An ABR cannot inject Type 3 LSAs that describe routes to a network segment in an area back to the same area.

Buy Now
Questions 16

On an OSPF network, one router with P2P as the network type is directly connected to another router with P2MP as the network type. If the Hello intervals on the two routers are changed to be the same, neighbor relationship establishment and LSDB synchronization are not affected.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 17

By default, some security zones are created when Huawei firewalls are enabled. Which of the following security zones is created by users?

Options:

A.

DMZ

B.

ISP

C.

Trust

D.

Local

Buy Now
Questions 18

On an RSTP network, port roles are optimized to overcome the disadvantages of STP. Which of the following port roles are supported in RSTP?

Options:

A.

Root port

B.

Designated port

C.

Backup port

D.

Alternate port

Buy Now
Questions 19

VRF, also called VPN instance, is a network virtualization technology that helps VPN technology to isolate users. In normal cases, multiple VPN instances can be created on a physical device, and each VPN instance has independent entries. Which of the following resources can be independently owned by a VPN instance?

Options:

A.

Interface

B.

Routing table

C.

MAC address table

D.

Routing protocol process

Buy Now
Questions 20

The Interface \P address and VRRP virtual IP address can be the same.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 21

A switch running a later IGMP version can identify Report messages of an earlier IGMP version, but the switch running an earlier IGMP version cannot identify Report messages of a later IGMP version. To ensure that IGMP runs properly, you are advised to set the IGMP version on the switch to be the same as or later than the IGMP version of member hosts.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 22

Which of the following is used as the destination port for single-hop BFD?

Options:

A.

UDP port 3784

B.

UDP port 4784

C.

TCP port 3784

D.

TCP port 4784

Buy Now
Questions 23

This configuration is part of RTA configuration. Which of the following statements regarding the configuration are true?

[RTA] ospf 100

[RTA-ospf-100]silent-interface GigabitEthernet 1/0/0

Options:

A.

RTA cannot establish a neighbor relationship with the neighbor that this interface is directly connected to.

B.

GigabitEthernet 1/0/0 is prohibited from sending OSPF packets.

C.

Direct routes of GigabitEthernet 1/0/0 can still be advertised.

D.

This interface cannot send Hello packets.

Buy Now
Questions 24

When receiving a packet, a router matches the packet against ACL rules. The ACL matching result is either Matched or Unmatched. If the matching result is Unmatched, which of the following are possible causes?

Options:

A.

All rules are traversed but no matching rule is found.

B.

The packet matches an ACL rule with the deny action.

C.

No ACL is configured on the device.

D.

An ACL is configured but it does not contain any rules.

Buy Now
Questions 25

The Origin attribute is used to define the origin of BGP path information. There are three types of Origin attributes. Which of the following lists the Origin attributes in descending order of priority?

Options:

A.

IGP > EGP > Incomplete

B.

Incomplete > IGP > EGP

C.

EGP > IGP > Incomplete

D.

Incomplete > EGP > IGP

Buy Now
Questions 26

In IGMPv1, querier selection depends on a multicast routing protocol, such as PIM. In IGMPv2 and IGMPv3, the interface with the largest IP address acts as the querier.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 27

To overcome the disadvantages of STP, RSTP changes the format of configuration BPDUs. Which of the following fields in STP BPDUs is used to specify the port role?

Options:

A.

Flags

B.

BPDU Type

C.

PID

D.

PVI

Buy Now
Questions 28

On an OSPF network, if two routers with the same router ID run in different areas and one of the routers is an ASBR, LSA flapping occurs.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 29

STAs stay on different subnets before and after Layer 3 roaming. To enable the STAs to access the original network after roaming, network engineers need to configure user traffic to be forwarded to the original subnet over a CAPWAP tunnel.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 30

After BGP initiates a TCP connection, the ConnectRetry timer is disabled if the TCP connection is successfully established. If the TCP connection fails to be established, the device tries to reestablish the TCP connection when the ConnectRetry timer expires.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 31

Which of the following statement regarding the display ospf peer command output is true?

Options:

A.

Address: 10.1,1.1 Indicates that the local interface address is 10.1.1.1.

B.

Through negotiation during DD packet exchange, the local end becomes the slave.

C.

Router ID indicates that the local router ID Is 10.1.1.1.

D.

The DR address is 10.1.1.1

Buy Now
Questions 32

Roaming technology is typically used on a large WLAN to ensure that STA (station) services are not interrupted when STAs move between coverage areas of different APs.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 33

OSPF has five types of packets, which have the same header format. If the Auth Type field in the packet header is 1, which of the following authentication modes is used?

Options:

A.

Non-authentication

B.

MD5 authentication

C.

Plaintext authentication

D.

Hash authentication

Buy Now
Questions 34

The traffic limiting policy feature only supports the number of connections initiated by the specified IP or the number of connections received.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 35

When a routing policy is used to filter routes, which of the following route prefixes will be denied by the IP prefix below?

Options:

A.

1.1.1.1/26

B.

1.1.1.2/16

C.

1.1.1.1/32

D.

1.1.1.1/24

Buy Now
Questions 36

In BGP, Notification messages are used to request peers to resend routing information after routing policies are changed.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 37

During routine O&M, the administrator checks the IGMP configuration on a router interface. The configuration is as follows:

display igmp interface

Interface information of VPN-Instance: public net

GigabitEthernet0/0/1(192.168.1.1):

IGMP is enabled

Current IGMP version is 2

IGMP state: up

IGMP group policy: none

IGMP limit: -

Value of query interval for IGMP (negotiated): -

Value of query interval for IGMP (configured): 60 s

Value of other querier timeout for IGMP: 0 s

Value of maximum query response time for IGMP: 10 s

Querier for IGMP: 192.168.1.1 (this router)

Given this, which of the following statements are true?

Options:

A.

The IP address of the interface is 192.168.1.1.

B.

The IGMP version is IGMPv2.

C.

The maximum response time to Query messages is 10s.

D.

The interval for sending Group-Specific Query messages is 60s.

Buy Now
Questions 38

When configuring an ACL on a router, you can specify a unique number or name to identify the ACL. Once a named ACL is created, it cannot be modified. You can only delete the named ACL and reconfigure it.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 39

Four routers run ISIS and have established adjacencies. The area IDs and router levels are marked in the following figure. If route leaking is configured on R3, which of the following is the cost of the route from R4 to 10.0.2.2/32?

Options:

A.

80

B.

50

C.

40

D.

30

Buy Now
Questions 40

Which of the following statements about BFD operating modes are true?

Options:

A.

In demand mode, once a BFD session is set up, the system no longer periodically sends BFD Control packets.

B.

Asynchronous mode does not support the Echo function.

C.

In asynchronous mode, two systems periodically exchange BFD Control packets at the negotiated interval. If one system does not receive any BFD Control packets from the other within the detection time, the BFD session is declared down.

D.

Asynchronous mode is the primary BFD operating mode.

Buy Now
Questions 41

The Internet Assigned Numbers Authority (IANA) allocates Class D addresses to IPv4 multicast. An IPv4 address is 32 bits long, and the four most significant bits of a Class D address are 1110.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 42

R1, R2, R3, and R4 run IS-IS, and the DIS priorities of their interfaces are shown in the following figure. If all these devices are started simultaneously, will be elected as the DIS. (Enter the device name, for example, R1.)

Options:

Buy Now
Questions 43

After which of the following parameters are modified does an IS-IS neighbor relationship need to re-established?

Options:

A.

The cost of an IS-IS interface is changed.

B.

The IP address of an ISIS interface is changed.

C.

The level of an ISIS interface is changed.

D.

The interval at which an IS-IS interface sends IIH packets is changed.

Buy Now
Questions 44

GRE is a VPN encapsulation technology that is widely used to transmit packets across heterogeneous networks. Which of the following statements is false about GRE?

Options:

A.

GRE supports encryption and authentication.

B.

GRE supports multicast transmission.

C.

GRE is a Layer 3 VPN encapsulation technology.

D.

GRE can work with other VPN protocols to better ensure data security.

Buy Now
Questions 45

An IP prefix list is configured on a router using the following command:

ip ip-prefix huawei index 10 permit 10.1.1.0 24 greater-equal 26

In this case, the value of greater-equal-value is ____, and the value of less-equal-value is ____.

Options:

Buy Now
Questions 46

Which Of the following IEEE 802.11 standards is also known as Wi-Fi 6?

Options:

A.

802.11ac

B.

802.11n

C.

802.11ax

D.

802.11b

Buy Now
Questions 47

In IPsec, an SA (Security Association) is uniquely identified by three parameters. Which of the following parameters does not belong to the 3-tuple information?

Options:

A.

Key exchange protocol

B.

SPI

C.

Destination IP address

D.

Security protocol ID

Buy Now
Questions 48

After a BGP peer relationship is established between two ends, changing the router ID of one end resets the BGP peer relationship.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 49

On an RSTP network, port priorities may be compared during root port or designated port election. Which of the following values is the default priority of a port on a Huawei switch?

Options:

A.

1

B.

128

C.

4096

D.

32768

Buy Now
Questions 50

A large shopping mall configures a VLAN pool to prevent network performance deterioration caused by potentially large broadcast domains. A network engineer runs the display vlan pool name STA command to check information about the VLAN pool. The following command output is displayed:

display vlan pool name STA Name : STA Total : 2 Assignment: hash Threshold Notify Count: 3 Threshold Notify time(min): 3 VLAN ID : 2 4

Which of the following statements are true?

Options:

A.

The VLANs with the IDs of 2 and 4 are added to the VLAN pool.

B.

The total number of VLAN pools is 2.

C.

The name of the VLAN pool is STA.

D.

The VLAN pool uses the even VLAN assignment algorithm.

Buy Now
Questions 51

The figure shows the VRRP status switchover events. Match these events with their sequence numbers.

Options:

Buy Now
Questions 52

On an STP network, the root bridge, root port, and designated port are elected in sequence. The election rules of these ports are different. List the steps for electing the root port in sequence.

Options:

Buy Now
Questions 53

Which of the following statements is false about BFD?

Options:

A.

The asynchronous mode is the primary BFD operating mode.

B.

In asynchronous mode, two systems periodically exchange BFD Control packets at the negotiated interval. If one system does not receive any BFD Control packets from the other within the detection interval, the BFD session is declared down.

C.

The asynchronous mode does not support the echo function.

D.

In demand mode, after a BFD session is set up, the system does not periodically send BFD Control packets.

Buy Now
Questions 54

A BGP device receives a route carrying an unknown attribute from a peer but does not know whether other devices need the attribute. In this case, the BGP device retains this attribute when advertising the route to other peers. Which of the following attributes is of this type?

Options:

A.

Community

B.

AS.Path

C.

MED

D.

OriginatorID

Buy Now
Questions 55

A campus network uses OSPF for network communication. The display ospf peer command is run on a router, and the command output is as follows:

vbnet

Copy

Edit

display ospf peer

OSPF Process 1 with Router ID 10.0.2.2

Area 0.0.0.0 interface 10.0.235.2 (GigabitEthernet0/0/1)'s neighbors

Router ID: 10.0.5.5 Address: 10.0.235.5

State: Full Mode: Nbr is Master Priority: 1

DR: 10.0.235.5 BDR: 10.0.235.3 MTU: 0

Dead timer due in 40 sec

Area 0.0.0.0 interface 10.0.24.2 (Serial1/0/1)'s neighbors

Router ID: 10.0.4.4 Address: 10.0.24.4

State: Full Mode: Nbr is Master Priority: 1

DR: None BDR: None MTU: 0

Dead timer due in 35 sec

Which of the following statements are true about the device?

Options:

A.

The IP address of the DR on the network where R2 and its neighbor 10.0.5.5 reside is 10.0.235.5.

B.

R2 has established adjacencies with 10.0.5.5 and 10.0.4.4.

C.

The DR/BDR election fails on the network where R2 and its neighbor 10.0.4.4 reside.

D.

Router IDs of the two OSPF neighbors of R2 are 10.0.5.5 and 10.0.4.4.

Buy Now
Questions 56

OSPF routers exchange Hello packets to establish neighbor relationships. The Hello packet sending modes vary by network type. On which of the following types of networks are Hello packets multicast?

Options:

A.

NBMA

B.

P2MP

C.

P2P

D.

Broadcast

Buy Now
Questions 57

OSPF has multiple types of routes with varying priorities. Which of the following types of routes has the lowest priority when they have the same prefix?

Options:

A.

Type 1 external route

B.

Inter-area route

C.

Type 2 external route

D.

Intra-area route

Buy Now
Questions 58

On an IS-IS network, areas are divided by router, and a router can belong to only one area. Therefore, an IS-IS router only needs to maintain the LSDB of its area.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 59

In BGP, the Origin attribute is used to identify the origin of a route. Which of the following statements are true about the Origin attribute?

Options:

A.

If a route is imported to BGP by the originator using the network command, the Origin attribute of the BGP route is displayed as i in the BGP routing table.

B.

If a route is learned through EGP, the Origin attribute of this BGP route is displayed as ? in the BGP routing table.

C.

If multiple routes carry the same destination address but different Origin attributes and all other route selection conditions are the same, BGP selects the optimal route according to the Origin attribute in the following order: IGP > EGP > Incomplete.

D.

This attribute is a well-known mandatory attribute.

Buy Now
Questions 60

ICMPv6 messages are classified as error or informational messages.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 61

Which of the following statements regarding routing policy and policy-based routing are true?

Options:

A.

A routing policy is used to control import, advertisement, and receiving of routing information.

B.

Policy-based routing is used to control import, advertisement, and receiving of routing information.

C.

Policy-based routing is used to control packet forwarding without following routes in the routing table.

D.

A routing policy is used to control packet forwarding without following routes in the routing table.

Buy Now
Questions 62

What is the default sending interval of BFD packets?

Options:

A.

10s

B.

5s

C.

100ms

D.

1000ms

Buy Now
Questions 63

In the VRP, by default, the routes imported by BGP will be automatically summarized.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 64

On a network, each router has a local core routing table and protocol routing tables. A routing entry in the local core routing table has multiple key fields. Which of the following are included?

Options:

A.

Destination address of a route

B.

Routing protocol preference of a route

C.

Inbound interface that learns a route

D.

Routing protocol that learns a route

Buy Now
Questions 65

Which of the following statements about multicast packet forwarding is true?

Options:

A.

If a multicast data packet fails the RPF check, the packet must have been received through a sub-optimal interface. However, this interface still receives and forwards the multicast traffic downstream.

B.

IGMP snooping cannot control the scope of multicast traffic flooding on a Layer 2 network.

C.

The source address of a multicast packet is a unicast address.

D.

In multicast transmission, the destination address of a packet can be the unicast address of a host.

Buy Now
Questions 66

Which of the following statements regarding different LSA types is false?

Options:

A.

LS Request packets contain only LS Type, LS ID, and Advertising Router.

B.

LS Ack packets contain complete LSA information.

C.

DD packets contain only LSA summary information, including LS Type, LS ID, Advertising Router, and LS Sequence Number.

D.

LS Update packets contain complete LSA information.

Buy Now
Questions 67

Which of the following statements regarding Local-Preference in BGP is true?

Options:

A.

Local-Preference affects traffic that enters an AS.

B.

Local-Preference can be transmitted between ASs.

C.

The default Local-Preference value is 100.

D.

Local-Preference is a well-known mandatory attribute.

Buy Now
Questions 68

Which of the following is the default interval at which the DIS on a broadcast IS_IS network sends CSNPs.

Options:

A.

30

B.

3.3

C.

10

D.

40

Buy Now
Questions 69

During the DHCP interaction process, the DHCP server and client exchange various types of packets. Which of the following packets is not sent from the client to the server?

Options:

A.

DHCP Release

B.

DHCPNAK

C.

DHCP Request

D.

DHCP Discover

Buy Now
Questions 70

In IP multicast transmission, packets are transmitted from a source to a group of receivers. Which of the following statements are true about IP multicast technologies?

Options:

A.

Compared with broadcast, IP multicast prevents information flooding.

B.

Compared with broadcast, IP multicast effectively conserves network bandwidth.

C.

Compared with unicast, IP multicast improves information transmission security.

D.

Compared with unicast, IP multicast increases the load of information sources.

Buy Now
Questions 71

When deploying BFD, you need to adjust some parameters so that it can better detect the network status. Which of the following statements is false about BFD optimization?

Options:

A.

After a high priority is configured for BFD packets, BFD packets are preferentially forwarded.

B.

To quickly learn about the network status and performance requirements, you can set the interval for sending BFD packets to the minimum value.

C.

On a live network, some devices switch traffic only when a BFD session changes to the Up state. If a routing protocol goes Up later than an interface, no route is available for switching traffic back, leading to traffic loss. To resolve this issue, configure a delay to compensate for the time difference caused when the routing protocol goes Up later than the interface.

D.

If a BFD session flaps, master/backup switchovers are frequently performed on the application associated with the BFD session. To prevent this, set the WTR time of the BFD session.

Buy Now
Questions 72

Which of the following statements is true about BGP?

Options:

A.

If the export routing policy applied to a BGP peer changes, manual intervention is required so that the device resends Update messages to the peer.

B.

IGP routes can be converted into BGP routes only through the network command.

C.

A router cannot be configured with multiple BGP processes.

D.

Open messages carry only the BGP header.

Buy Now
Questions 73

Which of the following statements regarding an IP prefix are true?

Options:

A.

An IP prefix filter is used to filter IP address prefixes and cannot match an IP prefix number and a prefix length at the same time.

B.

An IP prefix filter cannot be used to filter data packets.

C.

An IP prefix filter is used to filter IP address prefixes and can match an IP prefix number and a prefix length at the same time.

D.

An IP prefix filter can be used to filter data packets.

Buy Now
Questions 74

When two BGP peers support different Hold Time, they will negotiate to support the shortest Hold Time interval they can support.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 75

The VRID of the VRRP virtual router is 3 and the virtual IP address is 100.1.1.10. What is the virtual MAC address?

Options:

A.

01-00-5E-00-01-64

B.

01-00-5E-00-01-03

C.

00-00-5E-00-01-64

D.

00-00-5E-00-01-03

Buy Now
Questions 76

NETCONF is a network configuration protocol that automates network configuration in a programmable manner, simplifying and accelerating network service deployment. Which of the following operations can be performed by using this protocol?

Options:

A.

Modifying configurations

B.

Deleting configurations

C.

Restoring configurations

D.

Backing up configurations

Buy Now
Questions 77

In an OSPF routing domain, two routers must be specified as one DR and one BDR in a broadcast or NBMA network with at least two routers.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 78

ACLs are a common matching tool in routing policies. An ACL can be configured on a router to match routes.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 79

On an IS-IS network, two directly connected routers establish a neighbor relationship through the three-way handshake mechanism by default, regardless of whether the network type is P2P or broadcast.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 80

There are various types of VPNs, which can be applied to different layers. Which of the following network layers does SSL VPN belong to?

Options:

A.

Network layer

B.

Application layer

C.

Transport layer

D.

Data link layer

Buy Now
Questions 81

SSH is a secure protocol that establishes tunnels for users on insecure networks. Which of the following statements is false about SSH login?

Options:

A.

The SSH server supports authentication. Only users who have passed authentication can log in to the device.

B.

When the SSH server function is enabled on a device, the socket obtaining service is also enabled on the device. This makes the device prone to scanning by attackers. As such, the SSH server function and the corresponding port can be disabled when the SSH server function is not required.

C.

An ACL rule can be configured for each VTY channel to control the IP addresses of clients that are allowed to log in to the device.

D.

By default, the port number of the SSH server is 23. You can change the port number of the SSH server to a non-well-known port number to reduce the probability of being scanned and attacked.

Buy Now
Questions 82

In BGP, Keepalive messages are used to maintain BGP peer relationships. When a BGP router receives a Keepalive message from a peer, the BGP router sets the state of the peer to Established and periodically sends Keepalive messages to maintain the connection. By default, the device sends Keepalive messages every seconds.

Options:

Buy Now
Questions 83

Without a prior version check, an engineer configures IGMP snooping on a device and the version of IGMP snooping is earlier than the IGMP versions on user hosts. In this case, which of the following situations will occur?

Options:

A.

Users cannot receive multicast data because the device forwards received IGMP Report messages only to router ports and does not generate group member ports or forwarding entries.

B.

Users cannot receive multicast data, but the device generates forwarding entries after receiving IGMP Report messages.

C.

The IGMP snooping version of the device is automatically degraded, and users can receive multicast data properly.

D.

The IGMP versions of the hosts are automatically upgraded, and users can receive multicast data properly.

Buy Now
Questions 84

To enable PC1 to access PC2 using the IP address of the firewall's GE0/0/2, you need to configure NAPT for source address translation. In the following figure, fill in the blank to complete the command.

Options:

Buy Now
Questions 85

An enterprise administrator wants to configure single-hop BFD to implement fast detection of direct links. Which of the following configurations are mandatory?

Options:

A.

Configure the remote discriminator of a BFD session.

B.

Configure the local discriminator of a BFD session.

C.

Configure a multicast IP address for BFD.

D.

Enable BFD globally.

Buy Now
Questions 86

On an enterprise network, the directly connected interfaces of two OSPF routers are on different network segments and have different masks. To establish an OSPF neighbor relationship between the two interfaces, you can change their network types to which of the following?

Options:

A.

Point-to-point

B.

NBMA

C.

P2MP

D.

Broadcast

Buy Now
Questions 87

Huawei modular devices have multiple hardware modules that provide different functions. Match the following hardware modules with their functions.

Options:

Buy Now
Questions 88

The typical characteristics of the AI era are that it focuses on data, explores data value, and improves AI efficiency. Therefore, the core requirement of AI for data center networks is speed, meaning low latency.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 89

The administrator of an enterprise configures SNMPv3 on a device for communicating with the NMS (Network Management System). After the configuration is complete, the display trapbuffer command output shows that there are traps in the trap buffer of the information center, but the NMS does not receive any of them. Which of the following may cause this problem?

Options:

A.

The SNMP version configured on the device is different from the SNMP version of traps sent by the device.

B.

The SNMPv3 password used by the NMS is incorrect.

C.

The size of packets sent by the NMS exceeds the threshold set on the device.

D.

The community name configured on the NMS is inconsistent with that configured on the device.

Buy Now
Exam Code: H12-821_V1.0
Exam Name: HCIP-Datacom-Core Technology V1.0
Last Update: Mar 7, 2025
Questions: 299
$66  $164.99
$50  $124.99
$42  $104.99
buy now H12-821_V1.0