Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Huawei H12-821_V1.0 HCIP-Datacom-Core Technology V1.0 Exam Practice Test

Demo: 86 questions
Total 329 questions

HCIP-Datacom-Core Technology V1.0 Questions and Answers

Question 1

IP multicast effectively conserves network bandwidth and reduces network load. Therefore, it is widely used in network services, such as IPTV, real-time data transmission, and multimedia conferencing.

Options:

A.

TRUE

B.

FALSE

Question 2

An enterprise administrator wants to configure single-hop BFD to implement fast detection of direct links. Which of the following configurations are mandatory?

Options:

A.

Configure the remote discriminator of a BFD session.

B.

Configure the local discriminator of a BFD session.

C.

Configure a multicast IP address for BFD.

D.

Enable BFD globally.

Question 3

BGP is generally applied to complex networks where routes change frequently. Frequent route flapping consumes a large number of bandwidth and CPU resources, and even affects the normal operation of the network. This is an unavoidable problem that cannot be solved in BGP.

Options:

A.

TRUE

B.

FALSE

Question 4

On an IS-IS network, all routers generate LSPs. Which of the following types of information isnotcontained in the LSPs generated by pseudonodes?

Options:

A.

Interface information

B.

Information about supported network protocols

C.

Route information

D.

Neighbor information

Question 5

In the OSPF protocol, intra-area route calculation involves only Router LSA, Network LSA, and Summary LSA.

Options:

A.

TRUE

B.

FALSE

Question 6

On an IS-IS network, areas are divided by router, and a router can belong to only one area. Therefore, an IS-IS router only needs to maintain the LSDB of its area.

Options:

A.

TRUE

B.

FALSE

Question 7

On an office network of an enterprise, OSPF is enabled on two directly connected routers. During adjacency establishment, the state machine stays in the 2-way state. Which of the following statements are not possible causes?

Options:

A.

Hello time values are different.

B.

Area IDs are different.

C.

Router IDs conflict.

D.

The N-bit and E-bit of Hello packets are the same.

Question 8

On an enterprise network, the directly connected interfaces of two OSPF routers are on different network segments and have different masks. To establish an OSPF neighbor relationship between the two interfaces, you can change their network types to which of the following?

Options:

A.

Point-to-point

B.

NBMA

C.

P2MP

D.

Broadcast

Question 9

During routine maintenance, an enterprise administrator runs a command to check VRRP group information. Which of the following statements is false about the command output?

yaml

CopyEdit

display vrrp verbose

Vlanif100 | Virtual Router 1 State: Master

Virtual IP: 10.1.1.100

Master IP: 10.1.1.2

PriorityRun: 120 PriorityConfig: 120

DR: None BDR: None MTU: 0

Preempt: YES Delay Time: 20s

Remain: --

Track: YES Priority Reduced: 20

Auth Type: MD5

BFD-session State: UP

Options:

A.

Preemption is enabled for the VRRP group.

B.

This VRRP group is an mVRRP group.

C.

Authentication is enabled for the VRRP group.

D.

The ID of the VRRP group is 1.

Question 10

Four routers run IS-IS and have established adjacencies. The area IDs and router levels are marked in the following figure. Which of the following statements is true?

Options:

A.

The LSDB of R2 does not contain the LSP of R4.

B.

The LSDB of R1 does not contain the LSP of R4.

C.

The LSDB of R2 does not contain the LSP of R3.

D.

The LSDB of R3 does not contain the LSP of R4.

Question 11

Multiple BGP processes cannot be configured on the same router.

Options:

A.

TRUE

B.

FALSE

Question 12

Which of the following statements regarding OSPF multi-instance is false?

Options:

A.

Route exchange between different OSPF processes is similar to route exchange between different routing protocols.

B.

An interface of a router belongs to only a certain OSPF process.

C.

The OSPF process IDs must be the same when OSPF neighbor relationships are established between different routers.

D.

Multiple OSPF processes can run on the same router, and they are independent of each other.

Question 13

Similar to the OSPF DR, the IS-IS DIS needs to be elected on a broadcast network. However, the OSPF DR is preemptive by default, whereas the IS-IS DIS is not preemptive by default.

Options:

A.

TRUE

B.

FALSE

Question 14

IGMP has three versions. Different versions support different features. Which of the following features is supported by all versions?

Options:

A.

Group-Specific Query message

B.

Leave message

C.

Report message

D.

Specifying a multicast source

Question 15

An enterprise administrator views the following details about a BGP route during routine O&M:

yaml

CopyEdit

display bgp routing-table 192.168.1.1

BGP local router ID: 10.1.1.1

Local AS number: 100

Paths: 2 available, 0 best, 0 select

BGP routing table entry information of 192.168.1.1/32:

From: 10.1.1.2 (10.1.1.2)

Route Duration: 00h01m31s

Relay IP Nexthop: 0.0.0.0

Relay IP Out-Interface: --

Original nexthop: 172.16.1.2

AS-path: 200, origin incomplete, MED 0, localpref 100, pref-val 0, internal, pre 255, invalid for IP unreachable

Not advertised to any peer yet

Which of the following statements are true about the BGP route?

Options:

A.

The original next hop of the route is 172.16.1.2.

B.

The local BGP router ID is 10.1.1.1.

C.

The local AS number is 100.

D.

The route is preferentially selected because its Local_Pref has a higher priority.

Question 16

In VRRP networking, if VRRP is not configured to track an uplink interface and the uplink interface or link of the master device in a VRRP group fails, no switchover will be triggered. As a result, a traffic blackhole occurs.

Options:

A.

TRUE

B.

FALSE

Question 17

In the OSPF protocol, inter-area route calculation involves only Router LSA, Network LSA, and Summary LSA.

Options:

A.

TRUE

B.

FLASE

Question 18

The following figure shows the OSPF network of an enterprise and the OSPF configurations of R1. Which of the following statements is false about the network?

Options:

A.

R2 can access the server.

B.

GE 0/0/1 of R1 cannot send OSPF packets.

C.

The network segment to which GE 0/0/1 of R1 belongs cannot be advertised.

D.

GE 0/0/1 of R1 cannot accept OSPF packets.

Question 19

On a P2P IS-IS network, after a neighbor relationship is established between R1 and R2, R2 finds that its LSDB is not synchronized. Then, R2 requests corresponding LSPs from R1 for LSDB synchronization. The following figure shows the synchronization process. Drag the following packet types to the steps in which they are used.(Token is reusable)

Options:

Question 20

Which of the following statements about the forwarding plane of a switch is false?

Options:

A.

Provides high-speed and non-blocking data channels.

B.

Can encapsulate and decapsulate packets.

C.

Can collect packet statistics.

D.

Consists of main control boards and interface boards.

Question 21

Security policy is the core feature of firewalls. Only valid traffic that complies with security policies can be forwarded by firewalls. Which of the following statements are true about security policy matching rules?

Options:

A.

Multiple values can be configured for a single matching condition, and the values are logically ANDed.

B.

If a security policy contains multiple matching conditions, the relationship between them is AND.

C.

The system has a default security policy nameddefault, where all matching conditions areanyand the default action ispermit.

D.

When multiple security policy rules are configured, they are sorted in a list by configuration sequence by default. A security policy rule configured earlier is placed higher in the list and has a higher priority.

Question 22

What parameters can a DHCP6 server assign to a DHCPv6 client?

Options:

A.

Gateway address

B.

DNS server address

C.

IPV6 address/prefix

D.

SNTP server address

Question 23

A router uses an advanced ACL to filter data. The ACL configuration is shown below. Which of the following statements is false about the configuration?

csharp

CopyEdit

[Huawei] acl 3001

[Huawei-acl-adv-3001] rule permit icmp source 192.168.1.3 0 destination 192.168.2.0 0.0.0.255

Options:

A.

The ACL permits ICMP packets from host 192.168.1.3 to host 192.168.2.200.

B.

The ACL denies ICMP packets from host 192.168.1.2 to network segment 192.168.2.0/24.

C.

The ACL permits IP packets from host 192.168.1.3 to network segment 192.168.2.0/24.

D.

The ACL is a numbered ACL whose number is 3001.

Question 24

This configuration is part of RTA configuration. Which of the following statements regarding the configuration are true?

[RTA] ospf 100

[RTA-ospf-100]silent-interface GigabitEthernet 1/0/0

Options:

A.

RTA cannot establish a neighbor relationship with the neighbor that this interface is directly connected to.

B.

GigabitEthernet 1/0/0 is prohibited from sending OSPF packets.

C.

Direct routes of GigabitEthernet 1/0/0 can still be advertised.

D.

This interface cannot send Hello packets.

Question 25

Match the following IPv4 multicast protocols with the corresponding functions.

Options:

Question 26

As shown in the figure, R1 imports the direct route10.1.1.0/24to OSPF. An engineer enablesbidirectional route re-advertisementon R2 and R3.

After the network becomes stable, which of the following is thePre (preference) valueof the route10.1.1.0/24in therouting table of R3?

Options:

A.

0

B.

10

C.

150

D.

15

Question 27

On an enterprise WLAN where Portal authentication is deployed, an AC functions as an access device and communicates with a Portal server using the Portal protocol. Which of the following statements are true about the Portal protocol?

Options:

A.

The HTTP or HTTPS protocol can be used as the Portal access or authentication protocol.

B.

By default, the access device processes Portal protocol packets through port 2000.

C.

By default, the device uses the destination port number 50100 to proactively send packets to the Portal server.

D.

Portal protocol packets are transmitted over TCP.

Question 28

ASPF enables the firewall to support multi-channel protocols such as FTP and to define security policies for complex applications.

Options:

A.

TRUE

B.

FALSE

Question 29

On an OSPF network, LSDBs are used to store LSAs. Common LSAs include router LSAs and network LSAs. Which of the following items is not included in the 3-tuple that is used to uniquely identify an LSA?

Options:

A.

LS Sequence Number

B.

Link State ID

C.

Advertising Router

D.

LSType

Question 30

The Interface \P address and VRRP virtual IP address can be the same.

Options:

A.

TRUE

B.

FALSE

Question 31

BFD provides fast fault detection independent of media and routing protocols. To use this mechanism to detect link connectivity, devices at both ends must support this feature.

Options:

A.

TRUE

B.

FALSE

Question 32

The native AC function allows an agile switch to integrate AC capabilities, achieving wired and wireless convergence. The agile switch centrally manages wired and wireless service traffic.

Options:

A.

TRUE

B.

FALSE

Question 33

A BGP device receives a route carrying an unknown attribute from a peer but does not know whether other devices need the attribute. In this case, the BGP device retains this attribute when advertising the route to other peers. Which of the following attributes is of this type?

Options:

A.

Community

B.

AS.Path

C.

MED

D.

OriginatorID

Question 34

Which of the following is the default interval at which the DIS on a broadcast IS_IS network sends CSNPs.

Options:

A.

30

B.

3.3

C.

10

D.

40

Question 35

Which of the following statements regarding the firewall zone security level is false?

Options:

A.

The configured security level cannot be changed.

B.

Two zones cannot be configured with the same security level.

C.

The default security level of the new zone is 1.

D.

Only the security level of the user-defined zone can be configured.

Question 36

A monitoring plane usually comprises the monitoring units of main control boards and interface boards. This plane can monitor the system environment independently. Which of the following environment monitoring functions can be provided by the monitoring plane?

Options:

A.

Voltage monitoring

B.

Temperature monitoring

C.

Fan control

D.

System power-on and power-off control

Question 37

Both MQC and PBR can be applied on device interfaces to filter received and sent packets or control packet forwarding paths.

Options:

A.

TRUE

B.

FALSE

Question 38

An enterprise administrator configures route summarization on ASBRs to reduce the number of inter-area Type 3 LSAs, which in turn reduces the routing table size and improves device resource utilization.

Options:

A.

TRUE

B.

FALSE

Question 39

See the command output of a router below. Which of the following statements is true?

display ospf interface GigabitEthernet 0/0/0 verbose

OSPF Process 1 with Router ID 10.0.2.2

Interface: 10.0.12.2 (GigabitEthernet 0/0/0)

Cost: 1 State: BDR Type: Broadcast MTU: 1500

Priority: 1

Designated Router: 10.0.12.1

Backup Designated Router: 10.0.12.2

Timers: Hello 10 , Dead 40 , Poll 120 , Retransmit 5 , Transmit Delay 1

Options:

A.

The router ID is 10.0.12.2.

B.

The interface cost is 1500.

C.

This router is a BDR.

D.

The interface IP address is 10.1.12.1.

Question 40

After the administrator of an enterprise deploys a DHCP server, employees complain that their clients cannot obtain IP addresses from the DHCP server. Which of the following may cause this problem?

Options:

A.

Multiple DHCP servers are configured.

B.

STP is enabled on the DHCP server.

C.

The DHCP function is disabled by default, and the administrator forgets to enable the DHCP function.

D.

DHCP clients and the DHCP server are on different network segments, and no DHCP relay agent is configured on the network.

Question 41

On an IPv6 network, intermediate forwarding devices do not fragment IPv6 packets for the purpose of reducing their packet processing pressure. Packets are fragmented only on the source node.

Options:

A.

TRUE

B.

FALSE

Question 42

The filter-policy 2000 export command is run in an ISIS process. Which of the following statements about the functions of a filter policy is false?

Options:

A.

Is used together with the route import function to advertise some imported external routes to neighbors.

B.

If this command is not run, the device by default advertises all routes that ISIS Imports form external routing protocols.

C.

Controls the advertisement of routes generated by the device.

D.

Filters LSPs to be advertised.

Question 43

The Neighbor Discovery Protocol (NDP) is an important basic protocol in the IPv6 protocol suite and plays an important role. Which of the following functions and features does it support?

Options:

A.

Address resolution

B.

Neighbor state tracing

C.

Duplicate address detection

D.

Redirection

Question 44

Which of the following routing protocols support the default route through command configuration?

Options:

A.

BGP

B.

IS-IS

C.

OSPF

D.

ICMP

Question 45

The typical characteristics of the AI era are that it focuses on data, explores data value, and improves AI efficiency. Therefore, the core requirement of AI for data center networks is speed, meaning low latency.

Options:

A.

TRUE

B.

FALSE

Question 46

On an OSPF network, one router with P2P as the network type is directly connected to another router with P2MP as the network type. If the Hello intervals on the two routers are changed to be the same, neighbor relationship establishment and LSDB synchronization are not affected.

Options:

A.

TRUE

B.

FALSE

Question 47

STAs stay on different subnets before and after Layer 3 roaming. To enable the STAs to access the original network after roaming, network engineers need to configure user traffic to be forwarded to the original subnet over a CAPWAP tunnel.

Options:

A.

TRUE

B.

FALSE

Question 48

On an OSPF network, OSPF routers exchange LSAs to synchronize their LSDBs. If an OSPF router receives an LSA that does not exist in its LSDB, it updates its LSDB and floods the LSA.

Options:

A.

TRUE

B.

FALSE

Question 49

Which of the following statements about stack split is false?

Options:

A.

After a stack splits, the MAC addresses of the two stacks change immediately.

B.

If the master and standby switches are still in the same stack after the stack splits, the slave switches separated from the original master and standby switches re-elect the master and standby switches due to protocol packet timeout.

C.

If the master and standby switches are in two stacks after the split, the stack where the original master switch resides updates the topology and selects a new standby switch. The original standby switch becomes the master switch in the new stack and a new standby switch is elected.

D.

After a stack splits, multiple stacks have the same IP address and MAC address. To prevent network faults, the stacks perform MAD detection. The stack that fails the MAD detection shuts down all physical ports except reserved ports.

Question 50

A session is an entry used to record the connection status of a protocol and is fundamental for the firewall to forward packets. Which of the following protocol packets will the firewall create sessions for?

Options:

A.

Subsequent fragment

B.

ICMP error packet

C.

GRE

D.

TCP

Question 51

On an OSPF network, if a router functions as an ABR, the router must also be a BR.

Options:

A.

TRUE

B.

FALSE

Question 52

IPv6 defines multiple types of addresses. Which of the following statements is false about these addresses?

Options:

A.

Link-local addresses can be quickly generated using the EUI-64 method.

B.

Anycast addresses can be used only as destination addresses.

C.

Each interface can have multiple global unicast addresses with different network prefixes.

D.

Manually configured link-local addresses have a higher priority than automatically generated ones.

Question 53

Hackers often obtain the login permissions of system administrators through various attacks.

Which of the following measures can be taken to enhance the security of administrator accounts?(Select all that apply)

Options:

A.

Periodically check whether unnecessary administrator accounts exist in the system. If such accounts exist, delete them to reduce the attack surface.

B.

Encrypt passwords before transferring them. Whenever possible, transfer passwords by email.

C.

Assign exclusive accounts for administrators with different maintenance roles to avoid account sharing.

D.

To ensure security and make the password easier to remember, you can set the password to be valid for a long time.

Question 54

In the VRP, by default, the routes imported by BGP will be automatically summarized.

Options:

A.

TRUE

B.

FALSE

Question 55

When an SSH client accesses an SSH server for the first time and the SSH server's public key is not configured on the SSH client, you can enable first-time authentication on the SSH client. This allows the SSH client to access the SSH server and saves the SSH server's public key on the SSH client. In this way, the next time the SSH client accesses the SSH server, the SSH client can use the saved public key to authenticate the SSH server.

Options:

A.

TRUE

B.

FALSE

Question 56

In VRRP networking, devices assume the Master and Backup roles after election. Match the two roles with their working mechanisms.(Token is reusable)

Options:

Question 57

If a router ID is configured in both the system via and the BGP view, BGP uses the router ID configured in the BGP view because the BGP view takes precedence over the system view.

Options:

A.

TRUE

B.

FALSE

Question 58

A large number of routes typically exist in a BGP routing table, and transmitting such extensive routing information brings a heavy burden to a device. In order to address this problem, it is necessary to filter those routes to be advertised. You can configure a device to advertise only necessary routes or those that its peers require.

Options:

A.

TRUE

B.

FALSE

Question 59

Preferences of routing protocols determine the sequence In which a router selects a route among routes to the same destination /earned through different routing protocols.

Options:

A.

TRUE

B.

FALSE

Question 60

Which of the following statements regarding the summary automatic command and BGP route summarization is false?

Options:

A.

After this command is configured, BGP sends only the summarized routes to peers

B.

This command is used to implement automatic summarization. Automatic summarization takes precedence over manual summarization

C.

This command enables automatic summarization for the locally imported routes

D.

After this command is configured, BGP summarizes routes based on natural network segments

Question 61

A router performs a lookup in its FIB table for a packet. If the tunnel ID in the matching entry is 0, the packet needs to be forwarded through a tunnel, such as an MPLS tunnel.

Options:

A.

TRUE

B.

FALSE

Question 62

To enable PC1 to access PC2 using the IP address of the firewall's GE0/0/2, you need to configure NAPT for source address translation. In the following figure, fill in the blank to complete the command.

Options:

Question 63

Which of the following LSAs are advertised only within a single area?

Options:

A.

Network LSA

B.

Router LSA

C.

Summary LSA

D.

AS External LSA

Question 64

Which of the following TLVs is used by ISIS to describe the IP address of an interface?

Options:

A.

129

B.

131

C.

128

D.

132

Question 65

After BGP initiates a TCP connection, the ConnectRetry timer is disabled if the TCP connection is successfully established. If the TCP connection fails to be established, the device tries to reestablish the TCP connection when the ConnectRetry timer expires.

Options:

A.

TRUE

B.

FALSE

Question 66

OSPF supports area authentication and interface authentication. If both authentication modes are configured, Interface authentication takes preference over area authentication.

Options:

A.

TRUE

B.

FALSE

Question 67

See the network shown in the following figure.

R1 and R2 run IS-IS and establish an adjacency. IS-IS is enabled on Loopback0 of R2 but disabled on Loopback3 of R2. The configurations shown in the figure are performed in the IS-IS process of R2. Which of the following statements are true?

Options:

A.

The routing table of R1 contains the route 10.0.2.3/32.

B.

The routing table of R1 does not contain the route 10.0.2.3/32.

C.

The routing table of R1 does not contain the routes 10.0.2.2/32 and 10.0.2.3/32.

D.

The routing table of R1 contains the route 10.0.2.2/32.

Question 68

In BGP, Notification messages are used to request peers to resend routing information after routing policies are changed.

Options:

A.

TRUE

B.

FALSE

Question 69

L2TP does not provide security encryption. Therefore, other security measures, such as IPsec, are required to ensure the security of the entire tunnel for data transmission.

Options:

A.

TRUE

B.

FALSE

Question 70

Which command is used to configure the VRRP preemption delay?

Options:

A.

vrrp vrid 1 timer delay 20

B.

vrrp vrid 1 preempt-delay 20

C.

vrrp vrid 1 preempt-mode timer delay 20

D.

vrrp vrid 1 preempt-timer 20

Question 71

On an IS-IS network, two directly connected routers establish a neighbor relationship through the three-way handshake mechanism by default, regardless of whether the network type is P2P or broadcast.

Options:

A.

TRUE

B.

FALSE

Question 72

Which of the following protocols are multi-channel protocols?

Options:

A.

H.323

B.

FTP

C.

Telnet

D.

SMTP

Question 73

Compress the 2001:0DBB:B8:0000:C030:0000:0000:09A0:CDEF address.___________(if the answer contains letters, capitalize them.)

Options:

Question 74

To inject IGP routes into BGP routes, you can only use the network command.

Options:

A.

TRUE

B.

FALSE

Question 75

ICMPv6 messages are classified as error or informational messages.

Options:

A.

TRUE

B.

FALSE

Question 76

When a packet passes through a firewall, the firewall creates a session connection for the packet to guide subsequent forwarding of the packet. However, the firewall does not create session entries for all packets. For which of the following packets does the firewall not create session entries when the packet reaches the firewall?

Options:

A.

ICMP ping packet

B.

GRE packet

C.

Subsequent fragment

D.

UDP packet

Question 77

If the interval for two consecutive packets of a TCP session reaching the firewall is longer than the aging time of the session, the firewall deletes the session information from the session table to ensure network security.

Options:

A.

TRUE

B.

FALSE

Question 78

There are various types of VPNs, which can be applied to different layers. Which of the following network layers does SSL VPN belong to?

Options:

A.

Network layer

B.

Application layer

C.

Transport layer

D.

Data link layer

Question 79

BFD control packets are encapsulated in UDP packets for transmission. What is the destination port number of multi-hop BFD control packets?

Options:

A.

4784

B.

3784

C.

5784

D.

2784

Question 80

Compress the 2001:0DB8:0000:C030:0000:0000:09A0 address.

Options:

Question 81

GRE is a Layer 2 VPN encapsulation technology that encapsulates packets of certain data link layer protocols so that the encapsulated packets can be transmitted over an IP network.

Options:

A.

TRUE

B.

FALSE

Question 82

A switch running a later IGMP version can identify Report messages of an earlier IGMP version, but the switch running an earlier IGMP version cannot identify Report messages of a later IGMP version. To ensure that IGMP runs properly, you are advised to set the IGMP version on the switch to be the same as or later than the IGMP version of member hosts.

Options:

A.

TRUE

B.

FALSE

Question 83

During BGP route summarization configuration, the keyword can be used to suppress all specific routes so that only the summary route is advertised. The summary route carries the Atomic-aggregate attribute rather than the community attributes of specific routes.

Options:

Question 84

The BFD Echo function checks the connectivity of the forwarding link by looping back packets. Which of the following statements are true about this function?

Options:

A.

If URPF is enabled on the peer end, BFD packets may be incorrectly discarded on the peer end.

B.

In the BFD Echo function, the device uses the IP address of the outbound interface as the source IP address by default.

C.

The BFD Echo function applies only to single-hop BFD sessions.

D.

When configuring a BFD session supporting the BFD echo function, you need to configure both the local and remote discriminators.

Question 85

When deploying BFD, you need to adjust some parameters so that it can better detect the network status. Which of the following statements isfalseabout BFD optimization?

Options:

A.

After a high priority is configured for BFD packets, BFD packets are preferentially forwarded.

B.

To quickly learn about the network status and performance requirements, you can set the interval for sending BFD packets to the minimum value.

C.

On a live network, some devices switch traffic only when a BFD session changes to the Up state. If a routing protocol goes Up later than an interface, no route is available for switching traffic back, leading to traffic loss. To resolve this issue, configure a delay to compensate for the time difference caused when the routing protocol goes Up later than the interface.

D.

If a BFD session flaps, master/backup switchovers are frequently performed on the application associated with the BFD session. To prevent this, set the WTR time of the BFD session.

Question 86

On the network shown in the following figure, the management VLAN is VLAN 10, and the AP isconfigured to obtain an IP address on the network segment 10.1.1.0/24 through DHCP. The AP, AC, and AR function as the DHCP client, DHCP relay agent, and DHCP server, respectively. Which of the following configurations for the DHCP relay agent and DHCP server are correct?

Options:

A.

[AC] dhcp server group AP[AC-dhcp-server-group-AP] dhcp-server 172.21.1.2[AC-dhcp-server-group-AP] quit[AC] interface Vlanif 10[AC-Vlanif 10] dhcp select relay[AC-Vlanif 10] dhcp relay server-select AP[AC-Vlanif 10] quit

B.

[AR] ip pool AP[AR-ip-pool-AP] network 10.1.1.0 mask 24[AR-ip-pool-AP] gateway-list 10.1.1.2[AR-ip-pool-AP] excluded-ip-address 10.1.1.1[AR-ip-pool-AP] quit[AR] interface GigabitEthernet 0/0/1[AR-GigabitEthernetO/O/1] dhcp select global[AR-GigabitEthernet0/0/l] quit[AR] ip route-static 10.1.1.0 255.255.255.0 172.21.1.1

C.

[AR] ip pool AP[AR-ip-pool-AP] network 172.21.1.0 mask 24[AR-ip-pool-AP] gateway-list 172.21.1.2[AR-ip-pool-AP] excluded-ip-address 172.21.1.1[AR-ip-pool-AP] quit[AR] interfaceGigabitEthernet 0/0/1[AR-GigabitEthernetO/0/1] dhcp select global[AR-GigabitEthernetO/0/1] quit[AR] ip route-static 10.1.1.0 255.255.255.0 172.21.1.1

D.

[AC] dhcp server group AP[AC-dhcp-server-group-AP] dhcp-server 10.1.1.2[AC-dhcp-server-group-AP] quit[AC] interface Vlanif 10[AC-Vlanif 10] dhcp select relay[AC-Vlanif 10] dhcp relay server-select AP[AC-VlaniflO] quit

Demo: 86 questions
Total 329 questions