Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Huawei H12-891_V1.0 Dumps Questions Answers

Page: 1 / 15
Total 275 questions

HCIE-Datacom V1.0 Questions and Answers

Question 1

Which of the following statements about GRE is incorrect?

Options:

A.

GRE can encapsulate IPv6 unicast packets.

B.

GRE can encapsulate IPv4 unicast packets.

C.

GRE can encapsulate IPv6 broadcast packets.

D.

GRE is easy to implement and puts little burden on devices at both ends of a tunnel.

Buy Now
Question 2

In the Huawei SD-WAN Solution, which of the following routing protocols is used to advertise VPN routes between CPEs?

Options:

A.

RIP

B.

OSPF

C.

IS-IS

D.

BGP

Question 3

Flavors can be used to enhance SRv6 instructions to meet more diversified service requirements. Which of the following are flavors? (Select all that apply)

Options:

A.

Penultimate Segment Pop of the SRH (PSP)

B.

Ultimate Segment Decapsulation (USD)

C.

Ultimate Segment Pop of the SRH (USP)

D.

Penultimate Segment Decapsulation (PSD)

Question 4

Which of the following can be used to transmit traffic to a VXLAN network and implement intra-subnet communication on the same VXLAN network?

Options:

A.

Layer 3 VXLAN gateway

B.

NVE interface

C.

VLANIF interface

D.

Layer 2 VXLAN gateway

Question 5

In OSPFv3, which of the following types of LSAs can be flooded in the entire AS?

Options:

A.

AS-external-LSA

B.

Intra-Area-Prefix-LSA

C.

Link-LSA

D.

Inter-Area-Prefix-LSA

Question 6

On a CloudCampus virtualized campus network, service data enters different VNs from physical networks through edge nodes, and the VN that the data will enter is determined by the VLANs to which users belong. Which of the following statements about dynamic VLAN authorization is incorrect?

Options:

A.

When wired users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

B.

When wireless users pass Portal authentication, they join the authorization VLANs delivered to edge nodes.

C.

When wireless users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

D.

When wired users pass MAC address authentication, they join the authorization VLANs delivered to edge nodes.

Question 7

In OSPFv3, which of the following LSAs can be flooded within an area?

Options:

A.

Inter-Area-Router-LSA

B.

Intra-Area-Prefix-LSA

C.

Link-LSA

D.

Inter-Area-Prefix-LSA

Question 8

When you configure a virtualized campus network on iMaster NCE-Campus and enable external networks to connect to the Internet, iMaster NCE-Campus will automatically deliver a specific route to direct traffic to the corresponding external network.

Options:

A.

TRUE

B.

FALSE

Question 9

YANG is a data modeling language for the definition of data sent over network management protocols such as NETCONF. Which of the following are basic YANG data models? (Select all that Apply)

Options:

A.

Set node

B.

Leaf node

C.

List node

D.

Tree node

Question 10

Which of the following functions can be provided by iMaster NCE-Campus when it functions as a relay agent for authentication?

Options:

A.

User accounting

B.

User authentication

C.

User analysis

D.

Marketing

Question 11

An Ethernet Segment Identifier (ESI) is 10 bytes long and unique on the entire network.

Options:

A.

TRUE

B.

FALSE

Question 12

This figure shows anSRv6 (Segment Routing over IPv6)packet. If theDestination Addressfield in the IPv6 basic header isFC04::4, the value of theSL (Segment Left)field in the SRv6 header should be____.(Enter only digits.)

Options:

Question 13

On traditional campus networks, network admission control (NAC), VLAN, and ACL technologies are used to control users' network access rights. This results in heavy network O&M workload. Which of the following improvements does the free mobility solution of iMaster NCE-Campus make to traditional campus networks in terms of policy management and control?

Options:

A.

Administrators can use iMaster NCE-Campus to centrally manage service policies on network-wide policy enforcement points.

B.

Administrators can define service policies based on security groups to decouple service policies from IP addresses.

C.

Administrators need to configure service policies multiple times for each policy enforcement point through iMaster NCE-Campus, which then automatically delivers the policies to the corresponding policy enforcement points.

D.

Policy enforcement points on a network can subscribe to IP-security group entries through iMaster NCE-Campus to obtain the mapping between users and IP addresses on the entire network.

Question 14

Which of the following technologies can be used to isolate users in the same VLAN?

Options:

A.

Super VLAN

B.

Port isolation

C.

IPSG

D.

Ethernet port security

Question 15

In the CloudCampus public cloud scenario, if deployment through the Huawei registration query center is used, you do not need to configure DHCP Option 148 on the DHCP server of the campus network.

Options:

A.

TRUE

B.

FALSE

Question 16

SR-MPLS uses the MPLS forwarding plane, and therefore requires MPLS to be enabled. Which of the following conditions must be met for MPLS to be automatically enabled on an interface? (Select all that apply)

Options:

A.

The SRGB is configured for the IGP process.

B.

Segment routing is enabled for IGP, and IGP is enabled on the interface.

C.

The static adjacency label of the corresponding interface is configured in the segment routing view.

D.

Segment routing is enabled in the system view.

Question 17

The BGP ORF function can be used to control the maximum number of routes that can be sent by a BGP peer. To achieve this, which of the following tools is used to send such a route list to BGP peers?

Options:

A.

Filter-policy

B.

Route-policy

C.

ACL

D.

IP prefix-list

Question 18

In the admission design for large- and medium-sized campus networks, which of the following authentication modes can be used for PCs connected to IP phones?

Options:

A.

MAC address authentication

B.

802.1X authentication

C.

Multi-mode authentication

D.

Portal authentication

Question 19

If SRv6 needs to be deployed on a bearer WAN, which of the following technologies are required? (Select all that apply)

Options:

A.

MPLS

B.

BGP

C.

IGP

D.

BGP-LU

Question 20

Which of the following statements is correct about the differences between NSR and NSF?

Options:

A.

NSR requires the collaboration of neighboring routers.

B.

NSF requires the collaboration of neighboring routers.

C.

NSF does not require the collaboration of neighboring routers.

D.

Both NSR and NSF require the collaboration of neighboring routers.

Question 21

If ISIS is used to transmit SIDs on an SR network, the node SIDs advertised by a Level-2 router are transmitted only within the same area.

Options:

A.

TRUE

B.

FALSE

Question 22

Which of the following commands needs to be run in the BGP view to enable a VPN instance to advertise IP routes to the BGP-EVPN address family?

Options:

A.

advertise irbvfi

B.

advertise vpnv4

C.

advertise irb

D.

advertise l2vpn evpn

Question 23

When an NVE encapsulates a data frame into a VXLAN packet, information of which of the following protocols is encapsulated between the outer IP header and the VXLAN header?

Options:

A.

IP

B.

TCP

C.

UDP

D.

Ethernet

Question 24

On a VXLAN-based virtualized network, if the fabric networking mode is centralized gateway networking, the gateway is located on the _____ device. (Capitalize the first letter.)

Options:

Question 25

Huawei Open Programmability System (OPS) provides openness and programmability capabilities for network devices and enables users to perform secondary development. To facilitate script completion, Huawei OPS provides the Python script template in which the OPSConnection class is created. The member function for creating device resources is def post(self, uri, req_data).

Options:

A.

TRUE

B.

FALSE

Question 26

The free mobility function is deployed on the iMaster NCE-Campus on a campus network. Which of the following information should an administrator pay attention to?

Options:

A.

Define security groups.

B.

Deliver the inter-group policy.

C.

Deploy a policy control matrix.

D.

Select the policy enforcement point.

Question 27

IS-IS supports multi-instance and multi-process. Which of the following statements are correct about IS-IS multi-instance and multi-process?

Options:

A.

One IS-IS process can be associated with only one VPN instance.

B.

One VPN instance can be associated with multiple different IS-IS processes.

C.

One IS-IS process can be associated with multiple different VPN instances.

D.

If multiple IS-IS processes are created on an IS-IS router, these processes are independent of each other.

Question 28

Which of the following community attributes ensure that BGP routes are transmitted only within an AS?

Options:

A.

No Export Subconfed

B.

No_Export

C.

Internet

D.

No_Advertise

Question 29

On a CloudCampus virtualized campus network, virtual networks are defined based on services. Each virtual network corresponds to a service, and isolation needs to be manually configured between virtual networks.

Options:

A.

TRUE

B.

FALSE

Question 30

An LSR supports various label retention modes. Which of the following statements regarding the liberal mode are correct?

Options:

A.

This label retention mode saves the memory and label space.

B.

An LSR retains labels from a neighboring LSR only when the neighbor is its next hop.

C.

An LSR reserves all labels distributed by its neighbor.

D.

Liberal mode allows the device to retain labels from all LSRs, not just the next hop.

Question 31

Drag theIPsec functionson the left to the corresponding function description on the right.

Options:

Question 32

Network administrator A wants to use an IP prefix list to match specific routes. Which of the following routes can be matched by the IP prefix list shown in this figure?

ip ip-prefix TEST permit 10.0.0.0 24 less-equal 30

Options:

A.

10.0.2.0/24

B.

10.0.1.0/24

C.

10.0.0.1/30

D.

10.0.0.0/24

Question 33

Congestion management technology can be used to discard data packets in the buffer queue to prevent the buffer queue from being exhausted.

Options:

A.

TRUE

B.

FALSE

Question 34

What can be determined from the following figure?

display bgp ipv6 routing-table

Total Number of Routes: 2

*>i Network : 3002::3

NextHop : 3000:FDEA::3

MED : 0

Path/Orgn : i

*>i Network : 3002::4

NextHop : 3000:FDEA::3

MED : 0

PrefixLen : 128

LocPrf : 100

PrefVal : 0

Path/Orgn : 65001 i

Options:

A.

If no routing policy is configured for the AS Path attribute, 3002::4/128 does not originate from AS 65001.

B.

R1 does not have routes 3002::3/128 and 3002::4/128.

C.

If no routing policy is configured for the AS_Path attribute, 3002::4/128 originates from AS 65001.

D.

R1 has routes 3002::3/128 and 3002::4/128.

Question 35

MPLS supports Forwarding Equivalence Class (FEC). Which of the following cannot be used as a FEC allocation standard?

Options:

A.

Application protocol

B.

Fragment offset

C.

Class of Service (CoS)

D.

Destination address

Question 36

MPLS is located between the data link layer and network layer in the TCP/IP protocol stack and can provide services for all network layer protocols.

Options:

A.

TRUE

B.

FALSE

Question 37

A network administrator runs the display telemetry destination command on a device to check information about a destination group that sampled data is sent to. The command output is as follows. Which of the following statements is incorrect?

[~CE-telemetry-sensor-group-Sensor1]display telemetry destination

Dest-name Dest-addr Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20000 RESOLVED - GRPC

Options:

A.

The IP address of the destination group is 192.168.56.1

B.

The destination group name is Dest1.

C.

VPN encapsulation is used for data push.

D.

The gRPC protocol is used for data push.

Question 38

The following information is displayed during OSPF troubleshooting. Based on this information, which of the following is the cause of the failure in establishing an OSPF adjacency relationship?

display ospf error interface GigabitEthernet 0/0/0

OSPF Process 1 with Router ID 10.0.12.2

OSPF error statistics

Interface: GigabitEthernet0/0/0 (10.0.12.2)

General packet errors:

0 : Bad version 0 : Bad checksum

0 : Bad area id 0 : Bad authentication type

0 : Bad authentication key 0 : Unknown neighbor

0 : Bad net segment 0 : Extern option mismatch

0 : Router id confusion

HELLO packet errors:

2 : Netmask mismatch 0 : Hello timer mismatch

0 : Dead timer mismatch 0 : Invalid Source Address

Options:

A.

The area types are inconsistent.

B.

The authentication passwords are inconsistent.

C.

The IP address masks of the interfaces are inconsistent.

D.

Hello packets are sent at different intervals.

Question 39

OSPF is deployed on a campus network to implement network interconnection. The LSDB of R2 is shown in the figure.

What can be determined from the LSDB?

Options:

A.

Area 1 is an NSSA.

B.

R2 translates Type 7 default route into Type 5 default route.

C.

R2 advertises the default route in the OSPF process.

D.

Area 1 does not have Type 3 LSAs. The possible cause is that R2 filters Type 3 LSAs in the outbound direction of area 1.

Question 40

Network administrator A wants to view the BGP peer status of R2. The BGP peer status of R2 is shown in this figure. Obtain the following information: R2 resides in AS _____ (Enter only digits. Do not add punctuations or spaces.)

Options:

Question 41

The channelized sub-interface and FlexE technologies both can be used to implement network slicing, but the application scenarios of the two technologies are slightly different. Which of the following statements about the two technologies are correct?

Options:

A.

It is recommended that channelized sub-interface be used to reserve resources for interfaces with a bandwidth of less than 50 Gbit/s.

B.

It is recommended that FlexE be used to reserve resources for 50GE and higher-rate interfaces.

C.

Only FlexE-based network slicing can be deployed across OTN devices.

D.

Only network slicing based on channelized sub-interface can be deployed across MSTP devices.

Question 42

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following command needs to be run on the VBDIF interface to enable the VTEP peer to generate BGP EVPN Type 2 routes based on ARP information of the local terminal?

Options:

A.

mac-address xxxx-xxxx-xxxx

B.

arp-proxy enable

C.

arp collect host enable

D.

arp distribute-gateway enable

Question 43

By default, the domain ID of an OSPF process is the same as the process ID. You can run the domain-id command in the OSPF process view to change a domain ID.

Options:

A.

TRUE

B.

FALSE

Question 44

Network Quality Analysis (NQA) is a real-time network performance detection and measurement technology. It monitors the performance of multiple protocols running on a network. Which of the following protocols can be monitored by NQA?

Options:

A.

SNMP

B.

OSPF

C.

ICMP

D.

DHCP

Question 45

Huawei Open Programmability System (OPS) uses HTTP methods to access managed objects to manage network devices. Drag the HTTP methods to their corresponding functions.

Options:

Question 46

Which of the following issues do DiffServ model-based QoS have?

Options:

A.

It involves only single-hop behaviors and does not change the network topology.

B.

Independent resources cannot be provided for users.

C.

It does not change service behaviors. If bursty traffic in a single flow is too heavy, congestion still occurs.

D.

The number of queues is small, and SLA assurance cannot be provided for specific users. As a result, deterministic delay assurance cannot be provided.

Question 47

Drag the OSPFv3 LSAs to map them to their corresponding transmission ranges.

Options:

Question 48

Which of the following methods can be used to establish IPsec SAs? (Select All that Apply)

Options:

A.

Establish IPsec SAs through template negotiation

B.

Establish IPsec SAs in IKE auto-negotiation mode

C.

Establish IPsec SAs through certificate negotiation

D.

Manually establish IPsec SAs

Question 49

Which of the following are application optimization functions in the Huawei SD-WAN Solution?

Options:

A.

Application identification

B.

Intelligent traffic steering

C.

WAN optimization

D.

QoS

Question 50

Which of the following statements about the multicast address used by OSPFv3 are correct?

Options:

A.

All OSPF routers use FF08::5.

B.

The DR uses FF08::6.

C.

All OSPF routers use FF02::5.

D.

The DR uses FF02::6.

Question 51

An engineer often remotely logs in to the device to check the device status. The engineer can use the Python Paramiko and telnetlib libraries to implement automatic remote login through Python scripts. The remote login implemented using telnetlib is more secure.

Options:

A.

TRUE

B.

FALSE

Question 52

The ________ command can be run to completely isolate Layer 2 and Layer 3 of different interfaces in a VLAN. (Use lowercase letters to supplement the command, which cannot be abbreviated.)

Options:

Question 53

Based on the configuration in the following figure, how many interfaces on R4 are advertised into IS-IS?

plaintext

CopyEdit

display isis interface

Interface information for ISIS(1)

Interface Id IPV4.State IPV6.State MTU Type DIS

GE0/0/0 001 Up Down 1497 L1/L2 No/No

GE0/0/1 002 Up Down 1497 L1/L2 No/No

Loop0 001 Up Down 1500 L1/L2 -

Options:

A.

2

B.

1

C.

3

D.

0

Question 54

A carrier's home broadband service requires a maximum downstream bandwidth of 100 Mbit/s during off-peak hours and a guaranteed downstream bandwidth of 50 Mbit/s during peak hours. The home broadband service includes the home IP phone service and the home Internet access service. Which of the following configurations best meets the service requirement?

Options:

A.

qos gts cir 100000

B.

qos car inbound cir 50000 pir 100000

C.

qos car inbound cir 100000 pir 50000

D.

qos car inbound cir 100000

Question 55

Which of the following statements about DHCP snooping isincorrect?

Options:

A.

After DHCP snooping is enabled in the view of a VLAN, it takes effect for the VLAN's DHCP messages received by all the interfaces of the device.

B.

After DHCP snooping is enabled globally, the device processes only DHCPv4 messages by default if no parameter is specified.

C.

DHCP snooping can prevent attacks by configuring trusted interfaces.

D.

After DHCP snooping is enabled in the view of an interface, it takes effect for all DHCP messages on the interface.

Question 56

iMaster NCE-Campus restricts RESTful APIs. If a client sends aGET requestthat invokes a RESTful API to obtain site information from iMaster NCE-Campus, which of the following fields should be included in the request header?

Options:

A.

ACCESS-TOKEN

B.

ACCEPT-TOKEN

C.

X-ACCEPT-TOKEN

D.

X ACCESS TOKEN

Question 57

How long is an IPv6 prefix assigned to a host when an IPv6 address is configured for the host in SLAAC mode?

Options:

A.

64 bits

B.

32 bits

C.

96 bits

D.

128 bits

Question 58

You write the following Python code to invoke a RESTful API to obtain the token ID of iMaster NCE. Which of the following statements are correct?

import requests

response = requests.get(" ")

print(response.json())

Error returned:

requests.exceptions.SSLError: HTTPSConnectionPool(host='139.9.213.72', port=18002): Max retries exceeded with url: /controller/v2/tokens (Caused by SSLError(CertificateError('hostname '139.9.213.72' doesn't match 'devzone.huawei.com')))

Options:

Options:

A.

The client does not trust the SSL certificate of the server.

B.

The SSL certificate verification fails.

C.

The code can be modified as follows:import requestsresponse = requests.get("https://139.9.213.72 ", verify=False)print(response.json())

D.

The code can be modified as follows:import requestsresponse = requests.post("http://139.9.213.72 ", verify=False)print(response.json())

Question 59

Which of the following inter-AS MPLS L3VPN solutions need VPN user data packets to carry MPLS labels when being forwarded between ASs?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 60

Exhibit:

A loop occurs because Spanning Tree Protocol (STP) is not enabled on the network. Which of the following symptoms may occur?

Options:

A.

A loop alarm is generated on the LAN switch.

B.

CPU usage is too high.

C.

MAC entries flap.

D.

Host receives a large number of broadcast packets.

Page: 1 / 15
Total 275 questions