Special Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Huawei H12-222 Dumps Questions Answers

Page: 1 / 11
Total 287 questions

Huawei Certified Network Professional-R&S-IENP Questions and Answers

Question 1

When the virtual router responds to ARP Request packets, the actual MAC address of the master router is used,

Options:

A.

TRUE

B.

FALSE

Buy Now
Question 2

A 32-bit MPLS header consists of a 20-bit label used for packet forwarding; A 3-bit EXP field that identifies the IP packet priority; A 1-bit bottom-of-stack flag that identifies the last label; And an 8-bitTTL field. Which statement regarding the TTL field is true?

Options:

A.

This field is used to prevent packet forwarding loops, similar to the TTL field in an IP header.

B.

This field is used for label management.

C.

This field used to control the upstream device in label distribution.

D.

This field limitation the LSR.

Question 3

MPLS forwards data packets based on labels. How is IP packets passing through the MPLS domain forwarded if they do not carry any label?

Options:

A.

Common IP forwarding

B.

ATM forwarding

C.

Multi-label MPLS forwarding

D.

Single-label MPLS forwarding

Question 4

QoS provides different service quality to meet a variety of different needs. Which of following functions are provided by the QoS? (Multiple Choice)

Options:

A.

Provide dedicated bandwidth.

B.

Reduce the packet loss ratio.

C.

Prevent and manage network congestion.

D.

Setting the source address of packets.

Question 5

A DHCP client needs to obtain an IP address from the DHCP server when accessing a network for

the first time. When the client accesses the network again, which of the following statements are true?

(Multiple Choice)

Options:

A.

The DHCP client broadcasts a DHCP Discover packet. The DHCP server replies to the packet.

B.

The DHCP client only needs to broadcast a DHCP Request packet containing the IP address obtained last time, but does not need to send a DHCP Discover packet again.

C.

After receiving the DHCP Discover packet, the DHCP server sends a DHCP Offer packet containing the leased IP address and other settings to the DHCP client.

D.

After receiving the DHCP Request packet, the DHCP server returns a DHCP ACK packet if the requested IP address is not allocated to another client.

Question 6

Which zones are provided by the Huawei firewall by default? (Multiple Choice)

Options:

A.

Local zone

B.

Trusted zone

C.

Untrusted zone

D.

Security zone

Question 7

In interface queue scheduling, which queue is not fair and different flows in the queue cannot be isolated?

Options:

A.

CQ+WFQ

B.

PQ+WFQ

C.

FIFO

D.

WRR

Question 8

The proxy firewall works at the TCP/IP transport layer and processes services between users of the internal and external networks,

Options:

A.

TRUE

B.

FALSE

Question 9

Which of the following statements regarding United Security of the Agile Controller are true? (Multiple Choice)

Options:

A.

Network devices, security devices, policy servers, and third-party systems can report network information and security logs.

B.

Network information and security logs are generated by customer devices.

C.

A switch can function as the policy execution device to respond to security events by executing security policies to restrict or block insecure access.

D.

The United Security component of the Agile Controller is responsible for log collection, processing, event association, security trend display, and security response.

Question 10

The VRID of the VRRP virtual router is 3 and the virtual IP address is 100.1.1.10. What is the virtual MAC address?

Options:

A.

00-00-5E-00-01-64

B.

00-00-5E-00-01-03

C.

01-00-5E-00-01-64

D.

01-00-5E-00-01-03

Question 11

Which of the following is not the limitation of traditional networks?

Options:

A.

The network protocol implementation is complex, and the O&M is difficult.

B.

The traffic path cannot be adjusted flexibly.

C.

The upgrade of new network services is slow.

D.

Different vendors' devices provide similar implementation, there is less difference in operation commands, and operations are easy.

Question 12

Flow mirroring is divided into local flow mirroring and remote flow mirroring.

Options:

A.

TRUE

B.

FALSE

Question 13

MPLS can forward packets only after an LSP is established. Which of the following statements regarding static LSP establishment are true? (Multiple Choice)

Options:

A.

After a static LSP is established, each node on the LSP can detect the entire LSP.

B.

When MPLS is enabled on the outbound interface of the ingress node and the physical status and the protocol status of the outbound interface are Up, the static LSP is Up regardless of whether there is an egress node or a transit node.

C.

The transit node of a static LSP is configured and MPLS is enabled on both the inbound and outbound interfaces. If the physical status and the protocol status of the inbound and outbound interfaces are Up, the static LSP is Up.

D.

The egress node of the static LSP is configured and MPLS is enabled on the inbound interface. If the physical status and the protocol status of the inbound interface are Up, the static LSP is Up regardless of whether there is an ingress node or a transit node.

Question 14

Which of the following statements regarding the DSCP priority is false?

Options:

A.

The first 6 bits of the ToS field (leftmost 6 bits) mark different types of services, namely, DSCP priority.

B.

The DSCP priority can be used to classify traffic into 32 types.

C.

Each DSCP priority corresponds to a Behavior Aggregate (BA), and a PHB can be specified for each BA.

D.

You can use some QoS mechanisms to implement PHB.

Question 15

What is the characteristic of the packet filtering firewall?

Options:

A.

As the ACL complexity and length increase, the firewall filtering performance deteriorates exponentially.

B.

Static ACL rules cannot adapt to dynamic security filtering requirements.

C.

It is easy for hackers muddle through without check the session state and analyze the data.

D.

It can fully control network information exchange, and Session control is of high security.

Question 16

Which of the following queue scheduling technologies is better in a fair manner?

Options:

A.

WFQ

B.

PQ

C.

FIFO

D.

RR

Question 17

The interface IP address and VRRP virtual IP address can be the same.

Options:

A.

TRUE

B.

FALSE

Question 18

LDP uses different neighbor discovery mechanisms. Which of the following statements regarding the LDP neighbor discovery is false?

Options:

A.

LDP discovery mechanisms include the basic discovery mechanism and extended discovery mechanism.

B.

The LDP basic discovery mechanism discovers directly-connected LDP peers on a link.

C.

The LDP extended discovery mechanism discovers indirectly-connected LDP peers.

D.

LDP discovery mechanisms need to specify LDP Peer.

Question 19

Which of the following statements regarding Free Mobility of the Agile Controller are true? (Multiple Choice)

Options:

A.

When administrators configure Free Mobility, they need to select proper authentication points and policy execution points.

B.

In the Free Mobility, Administrators can add static network segments or server resources to security groups, and manually bind their IP addresses to the security groups.

C.

Free Mobility uses a configuration matrix to define access permissions between two security groups such as users and servers.

D.

Free Mobility defines higher forwarding priorities for the VIP user group to ensure their network experience.

Question 20

Which remote alarm notification modes are supported by eSight? (Multiple Choice)

Options:

A.

Email

B.

Voice

C.

SMS message

D.

WeChat

Question 21

On the DiffServ network, what is the main purpose of defining the service type of the EF classification?

Options:

A.

Preferentially guarantee the services that require short delay, low packet loss, low jitter, and assured bandwidth.

B.

Provide channels for packet forwarding.

C.

Ensure bandwidth for specific traffic.

D.

Ensure that packets are forwarded with the minimum delay.

Question 22

Information security technology problems are mainly technical problems. Information security work can be done well only by using latest technologies and deploying high-performance devices

Options:

A.

TRUE

B.

FALSE

Question 23

What is the broadcast domain of VXLAN called?

Options:

A.

Broadcast domain

B.

Switching domain

C.

Bridge domain

D.

VLAN domain

Question 24

Which statement regarding relationship between 802.IX and RADIUS is true?

Options:

A.

802.IX and RADIUS are different names of the same technology.

B.

802.IX is a technological system, in which RADIUS is included.

C.

RADIUS is a technological system, in which 802.IX is included.

D.

802.IX and RADIUS are different technologies, but they are often used together for user access control.

Question 25

Which of the following is not the default role of Huawei eSight?

Options:

A.

Administrator

B.

Monitor

C.

Operator

D.

End-User

Question 26

Which of the following statements regarding the authentication domain of the Agile Controller are true?

(Multiple Choice)

Options:

A.

Authentication domains are classified into the pre-authentication domain, isolation domain, and post-authentication domain.

B.

A pre-authentication domain defines public network resources that users can access before passing identity authentication in the area, for example, the DNS server, external authentication source, Service Manager, and Service Controller.

C.

An isolation domain defines resources that end users passing identity authentication but failing the security check can access. These resources such as the patch server and antivirus server can help end users eliminate violations.

D.

A post-authentication domain defines controlled network resources that end users can access after passing identity authentication and security check, for example, the ERP system, financial system, and database.

Question 27

VXLAN users can access the Internet through VXLAN interfaces.

Options:

A.

TRUE

B.

FALSE

Question 28

Which of the following statements regarding the switch configuration are true? (Multiple Choice)

Options:

A.

By default, the DHCP service must be enabled when you configure the DHCP server and DHCP relay agent.

B.

VLANIF 100 receives DHCP packets and forwards the packets to the external DHCP server through a relay agent.

C.

Specify VLANIF 100 to the DHCP server group dhcpgroup1.

D.

Create a DHCP server group first and add a DHCP server to the group.

E.

By default, DHCP servers on the network are added to dhcpgroup1 automatically.

Question 29

Flow mirroring is divided into bcal flow mirroring and remote flow mirroring.

Options:

A.

TRUE

B.

FALSE

Question 30

MPLS supports forwarding equivalence class (FEC). Which of the following cannot be used as a FEC allocation standard?

Options:

A.

Fragment offset

B.

Destination address

C.

Application protocol

D.

Class of Service (CoS)

Question 31

Which of the following statements regarding MPLS label encapsulation format are true? (Multiple Choice)

Options:

A.

The total length of an MPLS label is 4 bytes (32 bits).

B.

The TTL field in an MPLS label has the same meaning as that in an IP packet, and can prevent loops.

C.

The S field in an MPLS label has 1 bit and is used to identify whether the label is the bottom-of-stack label. If the value is 1, the label is a penultimate-layer label.

D.

For Ethernet and PPP packets, a label stack is located between the Layer 2 packet header and data. If a VLAN tag is available, the label stack is placed before the VLAN tag.

Question 32

What are the advantages of NFV? (Multiple Choice)

Options:

A.

Reduce device and energy cost.

B.

Shorten the network service innovation period.

C.

Uses the unified software versions for devices and uniformly manage access tenants.

D.

Provide services for different applications and tenants through the single platform.

Question 33

Which are the Agile Controller functional components? (Multiple Choice)

Options:

A.

Free Mobility

B.

Service Chain

C.

Access Control

D.

United Security

E.

Ubiquitous Resources

Question 34

Which of the following statements regarding Free Mobility of the Agile Controller are true? (Multiple Choice)

Options:

A.

When administrators configure Free Mobility, they need to select proper authentication points and policy execution points.

B.

In the Free Mobility, Administrators can add static network segments or server resources to security groups, and manually bind their IP addresses to the security groups.

C.

Free Mobility uses a configuration matrix to define access permissions between two security groups such as users and servers.

D.

Free Mobility defines higher forwarding priorities for the VIP user group to ensure their network experience.

Question 35

On the traditional IP network, the BE mode cannot distinguish communication types or meet requirements of applications. The emergence of QoS technology is committed to solving this problem.

Options:

A.

TRUE

B.

FALSE

Question 36

Which of the following statements regarding Service Chain of the Agile Controller are true? (Multiple Choice)

Options:

A.

The Service Chain component uses a user control list (UCL) to implement access control by user level. The ACL rules are defined based on the source security group, destination security group, and port number.

B.

An orchestration device, usually a switch, directs service flows to a service device.

C.

A service device processes the service flows directed to it by an orchestration device. Generally, firewall, antivirus, and online behavior management devices can function as service devices.

D.

A service chain indicates the service data passing through the GRE tunnel.

Question 37

A MPLS packet contains the TTL field. On a network shown in the following figure, what are the TTL values in the MPLS packet and IP packet sent from SWB to SWC?

Options:

A.

255, 9

B.

254, 10

C.

10, 10

D.

254, 9

Question 38

Which of the following command is used to configure Eth2/0/3 as a local observing port on a Huawei AR router?

Options:

A.

observe-port interface Ethernet2/0/3

B.

mirror-port interface Ethernet2/0/3

C.

monitor-port interface Ethernet2/0/3

D.

server-port interface Ethernet2/0/3

Question 39

On a carrier's MPLS VPN network, PE1 and PE2 transmit data packets between VPNs. After PE1 receives VPN route 172.16.1.0/24 from a client, it converts the route into a VPNv4 route and distributes label 1027 to the packet. After the packet arrives at PE2, PE2 distributes label 1025 to the packet. When a client on PE2 accesses this route, what are the outer and inner labels in the packet transmitted over the carrier network?

Options:

A.

Outer label: 1027; inner label: 1025

B.

Outer label: 1025; inner label: 1025

C.

Outer label: 1027; inner label: 1027

D.

Outer label: 1025; inner label: 1027

Question 40

Single-packet attacks indicate that an attacker controls botnet hosts to send a large number of attack packets, causing link congestion on the attacked network and system resource exhaustion.

Options:

A.

TRUE

B.

FALSE

Question 41

BFD is a universal fast detection technology that can implement fast switchover, so BFD does not need to be used with other fast switching technologies.

Options:

A.

TRUE

B.

FALSE

Question 42

NFV and SDN depend on each other and must be used together.

Options:

A.

TRUE

B.

FALSE

Question 43

Congestion management uses queue scheduling to manage and control traffic when traffic congestion occurs.

Options:

A.

TRUE

B.

FALSE

Page: 1 / 11
Total 287 questions