Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Huawei H12-891_V1.0 HCIE-Datacom V1.0 Exam Practice Test

Demo: 67 questions
Total 275 questions

HCIE-Datacom V1.0 Questions and Answers

Question 1

Huawei CloudCampus Solution has multiple application scenarios, and iMaster NCE-Campus provides different APIs for each application scenario. Match the following application scenarios with the open APIs provided by iMaster NCE-Campus.

Options:

Question 2

In an MPLS VPN network, two-layer MPLS labels are added into data packets before they are transmitted over the public network. Which of the following statements regarding data packet processing are correct?

Options:

A.

The egress PE sends the data packet to the correct VPN based on the inner label.

B.

The penultimate hop removes the outer label before forwarding the data packet to a peer egress PE.

C.

The IP data packet received by egress LSR is without labels.

D.

The penultimate-hop device receives a packet with an outer label.

Question 3

If the number of MAC addresses learned on an interface enabled with port security reaches the upper limit, which of the following actions may the switch take?

Options:

A.

Discards packets with unknown source MAC addresses without generating any alarm.

B.

Sets the interface state to error-down without generating any alarm.

C.

Discards packets with unknown source MAC addresses and generates an alarm.

D.

Sets the interface state to error-down and generates an alarm.

Question 4

Before connecting an SSH client to an SSH server in public key authentication mode, a client needs to create a key pair. Which of the following commands is used to create a DSS key pair on the client using Git Bash?

Options:

A.

ssh-keygen -t dss

B.

ssh-keygen -t ecc

C.

ssh-keygen -t dsa

D.

ssh-keygen -t rsa

Question 5

In the SD-WAN Solution, which routing protocols can be used by LAN-side devices to connect to a Layer 3 network?

Options:

A.

IS-IS

B.

OSPF

C.

BGP

D.

RIP

Question 6

MPLS implements data forwarding based on two different planes. Which of the following statements regarding the forwarding mechanism are correct?

Options:

A.

After an IP packet enters an MPLS domain, the MPLS device forwards the packet based on FIB table queries.

B.

If the tunnel ID is 0x0, the MPLS forwarding process starts.

C.

The system automatically assigns an ID to the upper-layer application that uses a tunnel. This ID is also called the tunnel ID.

D.

If the tunnel ID is not 0x0, the normal IP forwarding process starts.

Question 7

What can be determined from the following figure?

Options:

A.

R3 must be a Level-2 device.

B.

The device role of R3 cannot be determined.

C.

R3 must be a Level-1-2 device.

D.

R3 must be a Level-1 device.

Question 8

In the firewall hot standby scenario, which of the following status information can be backed up between the active and standby firewalls?

Options:

A.

Server mapping table

B.

AAA user table (excluding the default user admin)

C.

Session table

D.

Dynamic MAC address table

Question 9

In an MPLS domain, LSRs can be classified into ingress, transit, and egress LSRs based on how they process data. For the same FEC, an LSR can be both an ingress and a transit LSR of the FEC.

Options:

A.

TRUE

B.

FALSE

Question 10

An engineer uses two routers to perform IPv6 tests and wants to use OSPFv3 for IPv6 network connectivity. Which of the following OSPFv3 configurations for R1 are correct?

Options:

A.

[R1-GigabitEthernet0/0/1] ospfv3 1 area 0

B.

[R1-ospfv3-1] router-id 10.1.1.1

C.

[R1-ospfv3-1-area-0.0.0.0] network 2001:DB8:2345:12::1 ::

D.

[R1] router id 10.1.1.1

Question 11

Refer to the following command output on the router R1. Which of the following statements isincorrect?

display interface Tunnel

Tunnel0/0/0 current state : UP

Line protocol current state : UP

Last line protocol up time : 15:21:23 UTC-08:00

Description: ! 0.0.3.3

Route Port, The Maximum Transmit Unit is 1500

Internet Address is 20.1.1.1/24

Encapsulation is TUNNEL, loopback not set

Tunnel source 10.0.1.1 (LoopBack0), destination 10.0.3.3

Tunnel protocol/transport GRE/IP, key disabled

keepalive disabled

Checksumming of packets disabled

Current system time: 15:21:37-08:00

300 seconds input rate 0 bits/sec, 0 packets/sec

300 seconds output rate 0 bits/sec, 0 packets/sec

13 seconds input rate 0 bits/sec, 0 packets/sec

13 seconds output rate 448 bits/sec, 0 packets/sec

9 packets output, 824 bytes

0 output error

Input bandwidth utilization : -

Output bandwidth utilization : -

Options:

A.

Key authentication is disabled for the tunnel.

B.

The destination IP address of the tunnel is 10.0.3.3.

C.

The tunnel is a GRE tunnel.

D.

Keepalive detection is enabled on the tunnel.

Question 12

When a client invokes the iMaster NCE-Campus RESTful API, it sends an HTTP request. The server then returns the status code 401. Which of the following errors has occurred?

Options:

A.

Unauthorized

B.

The requested resource does not exist

C.

Access denied

D.

The service is unavailable

Question 13

In the following figure, R1, R2, R3, and R4 all belong to OSPF area 0. The link costs are marked in the figure. The Loopback0 addresses of R1, R2, R3, and R4 are advertised to OSPF. R1, R2, and R3, which are R4 clients, use Loopback0 to establish an iBGP peer relationship with R4. The directly connected network segment 172.20.1.4/32 of R4 is advertised to BGP. Which of the following statements are correct about the direction of traffic from R1 to 172.20.1.4/32?

Options:

A.

The preferred path is R1–R3–R4.

B.

If the stub router on-startup command is run on R3, packet loss occurs during the power-off process of R3 but no packet loss occurs during the startup process of R3.

C.

The preferred path is R1–R2–R4.

D.

Packet loss occurs during both the power-off and startup processes of R3.

Question 14

Which of the following statements about DHCP snooping isincorrect?

Options:

A.

After DHCP snooping is enabled in the view of a VLAN, it takes effect for the VLAN's DHCP messages received by all the interfaces of the device.

B.

After DHCP snooping is enabled globally, the device processes only DHCPv4 messages by default if no parameter is specified.

C.

DHCP snooping can prevent attacks by configuring trusted interfaces.

D.

After DHCP snooping is enabled in the view of an interface, it takes effect for all DHCP messages on the interface.

Question 15

The telemetry network model is broadly and narrowly defined. Which of the following modules are involved intelemetry in a narrow sense (device-side telemetry)?

Options:

A.

Data generation

B.

Data push

C.

Data source

D.

Data subscription

Question 16

MPLS is located between the data link layer and network layer in the TCP/IP protocol stack and can provide services for all network layer protocols.

Options:

A.

TRUE

B.

FALSE

Question 17

Which of the following channels are involved in the Huawei SD-WAN Solution?

Options:

A.

Management channel

B.

Control channel

C.

Data channel

D.

Orchestration channel

Question 18

SR-MPLS is enabled on all routers. The label information encapsulated byR1into a data packet is shown in the figure.

Which of the following is the forwarding path of the data packet?

Options:

A.

R1-R2-R3-R5-R6

B.

R1-R2-R4-R6

C.

R1-R3-R2-R4-R6

Question 19

Which of the following statements are correct about authentication points and policy enforcement points in Huawei's free mobility solution?

Options:

A.

The policy enforcement point executes inter-group policies based on security groups.

B.

The authentication point and policy enforcement point must be deployed on the same device.

C.

When receiving user traffic, the authentication point enforces a policy to process the traffic based on the source or destination security group corresponding to the source or destination IP address of the traffic.

D.

The authentication point and policy enforcement point can be deployed on different devices.

Question 20

Free mobility is deployed on a campus network through iMaster NCE-Campus. During this deployment, which of the following steps are performed by administrators and which are automatically performed by iMaster NCE-Campus? Drag the administrators and iMaster NCE-Campus icons on the left to the corresponding steps on the right.

Options:

Question 21

BGP routing policies can be used to control the advertisement and acceptance of routes.

Options:

A.

TRUE

B.

FALSE

Question 22

On the campus network shown, IPv6 is deployed for service tests. Four routers are deployed on the network, and OSPFv3 is used for IPv6 network connectivity. An engineer checks the LSDB of R2 and obtains a Link-LSA. Which of the following statements about the LSA are correct?

Options:

A.

The link-local address of R2’s GE0/0/0 is FE80::2E0:FCFF:FECD:4F79.

B.

The IPv6 address prefix of R2’s GE0/0/0 is 2001:DB8:2345:23::/64.

C.

This LSA indicates that R2 does not support external routes but can participate in IPv6 route calculation.

D.

This LSA is generated by R2.

Question 23

As shown in the figure, what is known about the default routes on R4?

Routing Table on R4:

display ip routing-table protocol isis

Destination/Mask Proto Pre Cost Flags NextHop Interface

0.0.0.0/0 ISIS-L1 15 10 D 10.1.24.1 GigabitEthernet0/0/1

ISIS-L1 15 10 D 10.1.34.1 GigabitEthernet0/0/0

172.16.1.2/32 ISIS-L1 15 10 D 10.1.24.1 GigabitEthernet0/0/1

172.16.1.3/32 ISIS-L1 15 10 D 10.1.34.1 GigabitEthernet0/0/0

Options:

A.

Four equal-cost default routes

B.

One default route

C.

Two default routes with different costs

D.

Two equal-cost default routes

Question 24

Which of the following number sequences can be matched by the regular expression100.$?

Options:

A.

1000

B.

1001

C.

10000

D.

100

Question 25

The naming of SRv6 instructions complies with certain rules. You can quickly determine the function of an instruction based on the instruction name. Which of the following statements about the keywords in SRv6 instruction names are correct?

Options:

A.

T: searches a specified routing table to forward packets.

B.

M: searches a Layer 2 forwarding table for unicast forwarding.

C.

V: searches a VPN instance routing table to forward packets.

D.

X: forwards packets through one or a group of specified Layer 3 interfaces.

Question 26

On the bearer WAN shown in the figure,SR (Segment Routing)is deployed, and the controller is used to compute paths. Drag network technologies on the left to the corresponding application locations on the right.

Options:

Question 27

OSPF is a mature protocol and is unlikely to have route computation errors in a regular networking environment under correct configurations. Which of the following statements are correct about the possible causes preventing an OSPF neighbor relationship from entering Full state?

Options:

A.

A link works abnormally.

B.

The OSPF network types on both ends of the link are inconsistent.

C.

The router IDs of neighbors are the same.

D.

The OSPF MTU values of interfaces on both ends of the link are different.

Question 28

IPsec uses an asymmetric encryption algorithm to encrypt the symmetric algorithm key, which it uses to encrypt/decrypt data, ensuring security and performance.

Options:

A.

TRUE

B.

FALSE

Question 29

The TTL field encapsulated in the MPLS label header can prevent infinite loops of MPLS packets. Which of the following statements regarding the TTL field are correct?

Options:

A.

If TTL copy is disabled, users can use the tracert function to view the LSR of the MPLS domain.

B.

The processing of IP TTL copy hides the LSR in an MPLS domain, improving network security.

C.

MPLS provides two processing modes on the TTL field:TTL in the MPLS header copies the IP TTL value when an IP packet enters the MPLS network.The ingress LER sets the TTL value in the MPLS header to 255.

D.

MPLS encapsulation in frame mode supports the TTL field. MPLS encapsulation in cell mode does not support the TTL field.

Question 30

An engineer often remotely logs in to the device to check the device status. The engineer can use the Python Paramiko and telnetlib libraries to implement automatic remote login through Python scripts. The remote login implemented using telnetlib is more secure.

Options:

A.

TRUE

B.

FALSE

Question 31

VLAN-based MAC address flapping detection is configured. If MAC address flapping occurs, actions to be taken on an interface can be configured as required. Which of the following actions cannot be configured?

Options:

A.

Traffic filtering

B.

Alarm sending

C.

MAC address blocking

D.

Interface blocking

Question 32

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following command needs to be run on the VBDIF interface to enable the VTEP peer to generate BGP EVPN Type 2 routes based on ARP information of the local terminal?

Options:

A.

mac-address xxxx-xxxx-xxxx

B.

arp-proxy enable

C.

arp collect host enable

D.

arp distribute-gateway enable

Question 33

O&M personnel for a large-scale event center receive feedback about Wi-Fi access failures. iMaster NCE-CampusInsight provides the function for personnel to view packet exchange processes and locate the root cause. It is found that IP addresses in the DHCP address pool are exhausted, preventing IP addresses from being assigned to mobile terminals. Which of the following functions is used by O&M personnel in this scenario?

Options:

A.

Simulation feedback

B.

Protocol trace

C.

Issue analysis

D.

Client journey

Question 34

As shown in the figure, SW1 and SW2 use asymmetric IRB (Integrated Routing and Bridging) forwarding, and PC1 and PC2 communicate with each other. Which of the following is the destination MAC address of the original data frame in the packet sent from VTEP1 to VTEP2?

Options:

A.

MAC D

B.

MAC B

C.

MAC C

D.

MAC A

Question 35

Among NETCONF operations, the operation may contain an operation attribute, which is used to specify an operation type for configuration data. Which of the following operation attributes isincorrect?

Options:

A.

remove

B.

merge

C.

create

D.

update

Question 36

When configuring a static VXLAN tunnel, you need to manually configure the _____, VTEP IP address, and ingress replication list. (Enter only uppercase letters.)

Options:

Question 37

Free mobility implements policy management and permission control based on users' VLAN IDs and IP addresses.

Options:

A.

TRUE

B.

FALSE

Question 38

IS-IS supports multi-instance and multi-process. Which of the following statements are correct about IS-IS multi-instance and multi-process?

Options:

A.

One IS-IS process can be associated with only one VPN instance.

B.

One VPN instance can be associated with multiple different IS-IS processes.

C.

One IS-IS process can be associated with multiple different VPN instances.

D.

If multiple IS-IS processes are created on an IS-IS router, these processes are independent of each other.

Question 39

On a virtualized network deployed using iMaster NCE-Campus, after creating VNs, you need to configure inter-VN communication. Which of the following configurations is used to achieve VN communication?

Options:

A.

Configure traffic filtering.

B.

Create a static route for the VPN instance corresponding to the VN.

C.

Deploy OSPF for the VPN instance corresponding to the VN.

D.

Deploy a routing policy.

Question 40

SSH connections are usually established based on TCP/IP connections. In specific cases, SSH connections can be established based on UDP connections.

Options:

A.

TRUE

B.

FALSE

Question 41

With telemetry, certain data can be sampled based on specific sampling paths. Which of the following sampling paths are supported by telemetry?

Options:

A.

Interface statistics

B.

Information about the optical module on an interface

C.

CPU information

D.

Memory information

Question 42

In a VXLAN scenario, which of the following features can be enabled to reduce ARP packet flooding between VTEPs?

Options:

A.

Local proxy ARP

B.

ARP broadcast suppression

C.

Host information collection

D.

Port isolation

Question 43

Which of the following methods can be used to establish IPsec SAs? (Select All that Apply)

Options:

A.

Establish IPsec SAs through template negotiation

B.

Establish IPsec SAs in IKE auto-negotiation mode

C.

Establish IPsec SAs through certificate negotiation

D.

Manually establish IPsec SAs

Question 44

On the network shown in the figure, OSPF-based SR-MPLS TE is enabled on all routers. Which of the following adjacency labels are allocated by P3?

Options:

A.

9006

B.

9002

C.

9003

D.

9005

Question 45

In the firewall hot standby scenario, when VGMP works in load balancing mode, which of the following functions must be enabled on the firewalls to prevent the return traffic from being discarded because it does not match any session entry in the case of inconsistent forward and return paths?

Options:

A.

Automatic backup

B.

Manual batch backup

C.

Quick session backup

D.

BFD

Question 46

An LSR (Label Switching Router) supports various label retention modes. Which of the following statements regarding the liberal mode are correct?

Options:

A.

An LSR retains labels from a neighboring LSR only when the neighbor is its next hop.

B.

This label retention mode saves memory and label space.

C.

An LSR reserves all labels distributed by its neighbor.

D.

The liberal mode requires more memory and label space.

Question 47

New IS-IS TLVs are used to carry IPv6 addresses and reachability information to support IPv6 route processing and calculation.

Options:

A.

TRUE

B.

FALSE

Question 48

Flavors can be used to enhance SRv6 instructions to meet more diversified service requirements. Which of the following are flavors? (Select all that apply)

Options:

A.

Penultimate Segment Pop of the SRH (PSP)

B.

Ultimate Segment Decapsulation (USD)

C.

Ultimate Segment Pop of the SRH (USP)

D.

Penultimate Segment Decapsulation (PSD)

Question 49

Which of the following types of LSAs does OSPF use to support SR-MPLS?

Options:

A.

Type 7 NSSA External LSA

B.

Type 10 Opaque LSA

C.

Type 1 Router LSA

D.

Type 2 Network LSA

Question 50

In DU label advertisement mode, if the liberal label retention mode is used, the device reserves labels received from all the LDP peers regardless of whether the LDP peer is the optimal next hop for reaching the destination network.

Options:

A.

TRUE

B.

FALSE

Question 51

After a wireless user passes Portal authentication, which of the following parameterscannotbe used for authorizing the user?

Options:

A.

free-rule

B.

UCL

C.

IP address

D.

ACL

Question 52

Which of the following community attributes ensure that BGP routes are transmitted only within an AS?

Options:

A.

No Export Subconfed

B.

No_Export

C.

Internet

D.

No_Advertise

Question 53

An Ethernet Segment Identifier (ESI) is 10 bytes long and unique on the entire network.

Options:

A.

TRUE

B.

FALSE

Question 54

Complete the basic processing procedure for DiffServ model-based QoSshown in the figure

Options:

Question 55

Exhibit:

A loop occurs because Spanning Tree Protocol (STP) is not enabled on the network. Which of the following symptoms may occur?

Options:

A.

A loop alarm is generated on the LAN switch.

B.

CPU usage is too high.

C.

MAC entries flap.

D.

Host receives a large number of broadcast packets.

Question 56

MACsec can provide secure services during MAC-layer data transmitting and receiving. Which of the following services isnotprovided by MACsec?

Options:

A.

Controllability check

B.

Integrity check

C.

User data encryption

D.

Data source authenticity verification

Question 57

OSPFv3 link LSAs are advertised in the entire area.

Options:

A.

TRUE

B.

FALSE

Question 58

Which of the following statements is incorrect about MP-BGP?

Options:

A.

MP-BGP uses the MP_REACH_NLRI and MP_UNREACH_NLRI attributes to advertise VPNv4 routes.

B.

When PEs and CEs exchange routes through BGP, you need to create a BGP process for each VPN instance in the CE.

C.

The packet types and VPNv4 route advertisement policies of MP-BGP are the same as those of BGP-4.

D.

MP-BGP needs to allocate private network labels for VPNv4 routes.

Question 59

In the Huawei SD-WAN Solution, which of the following routing protocols is used to advertise VPN routes between CPEs?

Options:

A.

RIP

B.

OSPF

C.

IS-IS

D.

BGP

Question 60

Which of the following statements is incorrect about intranet security design for a large or medium-sized virtualized campus network?

Options:

A.

In addition to terminal access security, interface security must be considered during wireless network security design.

B.

Traffic suppression can be configured on the wired network to block broadcast traffic by shutting down interfaces.

C.

To secure data transmission, the CAPWAP tunnel between the AC and AP supports DTLS encryption.

D.

Intranet security refers to both wired and wireless network security.

Question 61

On a CloudCampus virtualized campus network, service data enters different VNs from physical networks through edge nodes, and the VN that the data will enter is determined by the VLANs to which users belong. Which of the following statements about dynamic VLAN authorization is incorrect?

Options:

A.

When wired users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

B.

When wireless users pass Portal authentication, they join the authorization VLANs delivered to edge nodes.

C.

When wireless users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

D.

When wired users pass MAC address authentication, they join the authorization VLANs delivered to edge nodes.

Question 62

Huawei Open Programmability System (OPS) uses HTTP methods to access managed objects to manage network devices. Drag the HTTP methods to their corresponding functions.

Options:

Question 63

On a VXLAN-based virtualized campus network, BGP EVPN can be used as the control plane protocol. Which of the following EVPN route types are not used in the virtualized campus network scenario?

Options:

A.

Type 3

B.

Type 2

C.

Type 4

D.

Type 1

Question 64

The ________ command can be run to completely isolate Layer 2 and Layer 3 of different interfaces in a VLAN. (Use lowercase letters to supplement the command, which cannot be abbreviated.)

Options:

Question 65

When MPLS/BGP IP VPN is deployed, which of the following statements is incorrect about BGP route exchange between PEs and CEs?

Options:

A.

When PEs and CEs use BGP to exchange routing information, you do not need to import private network routes to BGP on PEs.

B.

In a Hub&Spoke scenario, when Hub-CE and Hub-PE run an IGP for communication, EBGP cannot be configured on Spoke-PE or Spoke-CE.

C.

In a scenario where PEs and CEs use BGP to exchange routing information, if two VPN sites have the same private AS number, the AS number replacement function can be used to replace the AS number in a received private network route with any specified AS number. This prevents routes from being discarded because of repeated AS numbers.

D.

In a CE multi-homing scenario, the BGP AS number replacement function may cause routing loops. BGP SoO can be used to prevent routing loops at a VPN site.

Question 66

Collecting information before a cutover helps you determine whether services are normal before and after the cutover.

Options:

A.

TRUE

B.

FALSE

Question 67

In the Huawei CloudCampus Solution, which of the following deployment modes are supported by Huawei switches?

Options:

A.

DHCP Option 148

B.

CLI

C.

Web interface

D.

Huawei registration center

Demo: 67 questions
Total 275 questions