Pre-Summer Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Huawei H12-891_V1.0 HCIE-Datacom V1.0 Exam Practice Test

Page: 1 / 32
Total 322 questions

HCIE-Datacom V1.0 Questions and Answers

Question 1

If SRv6 needs to be deployed on a bearer WAN, which of the following technologies are required? (Select all that apply)

Options:

A.

MPLS

B.

BGP

C.

IGP

D.

BGP-LU

Question 2

Network administrator A wants to view the BGP peer status of R2. The BGP peer status of R2 is shown in this figure. Obtain the following information: R2 resides in AS _____ (Enter only digits. Do not add punctuations or spaces.)

Question # 2

Options:

Question 3

IPsec uses an asymmetric encryption algorithm to encrypt the symmetric algorithm key, which it uses to encrypt/decrypt data, ensuring security and performance.

Options:

A.

TRUE

B.

FALSE

Question 4

iMaster NCE-Campus provides the terminal identification function to display the terminal type, operating system, and manufacturer information.

Options:

A.

TRUE

B.

FALSE

Question 5

Huawei CloudCampus Solution has multiple application scenarios, and iMaster NCE-Campus provides different APIs for each application scenario. Match the following application scenarios with the open APIs provided by iMaster NCE-Campus.

Question # 5

Options:

Question 6

In the Huawei CloudCampus Solution, which of the following deployment modes are supported by Huawei switches?

Options:

A.

DHCP Option 148

B.

CLI

C.

Web interface

D.

Huawei registration center

Question 7

The following figure shows some configurations of R1. Based on these configurations, which of the following statements about IS-IS on R1 are correct?

isis 1

is-level level-2

cost-style wide

network-entity 49.0022.ee8c.a0c2.baf1.00

isis 2 vpn-instance tt

is-level level-2

cost-style wide

network-entity 47.00ce.390d.efdc.b3e1.00

isis 3 vpn-instance rr

is-level level-2

cost-style wide

network-entity 47.cc0a.3efb.bbdd.aae1.00

Options:

A.

Process 1 contains the global routing information and routing information of VRFs tt and rr.

B.

Routing information is shared between processes 2 and 3.

C.

Process 1 contains only global routing information.

D.

Routing information of process 2 is isolated from that of process 3.

Question 8

Drag the authentication modes on the left into their applicable scenarios on the right.

Question # 8

Options:

Question 9

During the evolution from OSPFv2 to OSPFv3, LSA formats and functions remain unchanged, except that the network layer addresses in LSAs are changed from IPv4 to IPv6.

Options:

A.

TRUE

B.

FALSE

Question 10

Which of the following statements about BGP EVPN principles are correct in a scenario where a VXLAN tunnel is dynamically established through BGP EVPN?

Options:

A.

MP_REACH_NLRI is used to carry routing information.

B.

Several BGP EVPN routes are defined through BGP extension.

C.

MP_REACH_NLRI is used to carry the RD.

D.

MP_REACH_NLRI is used to carry the RT.

Question 11

On an SR-MPLS network, manually configured prefix SIDs on different devices may conflict with each other. Assume that there are four routes (prefix/mask SID) as follows. Which of the following routes will be selected according to the conflict handling principle?

Options:

A.

1.1.1.1/32 → SID 2

B.

1.1.1.1/32 → SID 1

C.

2.2.2.2/32 → SID 3

D.

3.3.3.3/32 → SID 1

Question 12

Which of the following statements is incorrect about the user authentication points on the network?

Options:

A.

Deploying user authentication points at the access layer achieves granular permission management and high network security.

B.

Moving user authentication points from the access layer to the aggregation or core layer greatly reduces the number of user authentication points, thereby effectively mitigating the pressure on the AAA server.

C.

Deploying user authentication points at the access layer has both advantages and disadvantages when compared to doing so at the aggregation or core layer. Policy association can be applied if user authentication points are deployed at the access layer.

D.

When user authentication points are moved from the access layer to the aggregation layer, MAC address authentication for users may fail.

Question 13

Which of the following statements about SR-MPLS Policy path planning are correct?

Options:

A.

When planning paths based on bandwidth, you need to set the available bandwidth of each interface in advance.

B.

When planning paths based on delay, you must deploy TWAMP or iFIT in advance to measure real-time network delay.

C.

If you use the controller to plan SR-MPLS Policy paths, only primary and backup paths can be deployed, and load balancing cannot be implemented for the primary path.

D.

When statically planning SR-MPLS Policy paths, you can plan load balancing for the primary path.

Question 14

What can be determined from the following figure?

< R1 > display ipv6 routing-table protocol isis

Public Routing Table : ISIS

Summary Count: 6

ISIS Routing Table ' s Status : < Active >

Summary Count: 6

Destination : 3000:FDEA::4

NextHop : FE80::2E0:FCFF:FE98:2577

Cost : 20

Interface : GigabitEthernet0/0/1

PrefixLength : 128

Preference : 15

Protocol : ISIS-L2

Flags : D

Options:

A.

R1 has six IS-IS IPv6 routes.

B.

R1 does not have IS-IS IPv6 routes.

C.

IS-IS IPv6 must have been enabled on GigabitEthernet0/0/1 of R1.

D.

R1 is not a Level-1 device.

Question 15

What is the router ID length supported by OSPFv3?

Options:

A.

128 bits

B.

64 bits

C.

100 bits

D.

32 bits

Question 16

Network administrator A wants to use an IP prefix list to match specific routes. Which of the following routes can be matched by the IP prefix list shown in this figure?

ip ip-prefix TEST permit 10.0.0.0 24 less-equal 30

Options:

A.

10.0.2.0/24

B.

10.0.1.0/24

C.

10.0.0.1/30

D.

10.0.0.0/24

Question 17

Which of the following are carried in an HTTP/1.1 response?

Options:

A.

Status line

B.

Response body

C.

Response header

D.

Empty line

Question 18

Which of the following statements are correct about authentication points and policy enforcement points in Huawei ' s free mobility solution?

Options:

A.

The policy enforcement point executes inter-group policies based on security groups.

B.

The authentication point and policy enforcement point must be deployed on the same device.

C.

When receiving user traffic, the authentication point enforces a policy to process the traffic based on the source or destination security group corresponding to the source or destination IP address of the traffic.

D.

The authentication point and policy enforcement point can be deployed on different devices.

Question 19

As shown in the figure, R1, R2, R3, and R4 reside in the same MPLS domain, and LDP (Label Distribution Protocol) is used to distribute MPLS labels.

R4 is the egress LSR (Label Switching Router) for the FEC (Forwarding Equivalence Class) 4.4.4.0/24.

To make R4 aware of QoS forwarding priority of a packet sent from R1 and destined for 4.4.4.0/24,

Without looking up R4’s label forwarding information base,

The outgoing label of the FEC on R3 should be _____ (Enter an Arabic numeral without symbols).

Options:

Question 20

The figure shows an L3VPN over an SRv6 BE (Best Effort) network. According to the information displayed on PE2, which of the following statements is incorrect?

Options:

A.

An IBGP peer relationship is established between PE2 and PE1, and PE2 leams the route to 192.168.1.0/24 over an IBGP peer relationship.

B.

The instruction type corresponding to FO00:2 :: 1:79 is End.DT4.

C.

PE2 imports the route 192.168.1.0/24 through the import-route command.

D.

The router ID of the BGP process on the P is 1.0.0.6.

Question 21

Which of the following are carried in the HTTP/1.1 response header?

Options:

A.

Status code

B.

Reason phrase

C.

Protocol version

D.

Response method

Question 22

Exhibit:

Question # 22

The following figure shows the inter-AS MPLS VPN Option C (solution 2). RRs are deployed, and no traffic passes through the RRs during forwarding. If a data packet sent from PE2 to 192.168.1.1 carries two labels, which of the following statements about the two labels are correct?

Options:

A.

T1 is allocated by RR2.

B.

T1 is allocated by P2.

C.

V1 is allocated by PE1.

D.

V1 is allocated by P2.

Question 23

Which of the following inter-AS MPLS L3VPN solutions needs ASBRs to transmit VPNv4 routes?

Options:

A.

Option C

B.

Option B

C.

Option A

D.

Option D

Question 24

In the small and midsize campus network design based on the Huawei CloudCampus Solution, when over 100 branches need to communicate with each other, which of the following interconnection networking models is recommended?

Options:

A.

Direct networking

B.

Full-mesh networking

C.

Hub-spoke networking

D.

Partial-mesh networking

Question 25

Huawei Open Programmability System (OPS) uses HTTP methods to access managed objects to manage network devices. Drag the HTTP methods to their corresponding functions.

Question # 25

Options:

Question 26

Which of the following is the purpose of configuring IS-IS fragmentation on an IS-IS device?

Options:

A.

Disable the device from establishing IS-IS neighbor relationships.

B.

Enable the device to support more IS-IS routes.

C.

There is no practical purpose.

D.

Disable the device from learning IS-IS link-state information.

Question 27

OSPF is a mature protocol and is unlikely to have route computation errors in a regular networking environment under correct configurations. Which of the following statements are correct about the possible causes preventing an OSPF neighbor relationship from entering Full state?

Options:

A.

A link works abnormally.

B.

The OSPF network types on both ends of the link are inconsistent.

C.

The router IDs of neighbors are the same.

D.

The OSPF MTU values of interfaces on both ends of the link are different.

Question 28

An LSR (Label Switching Router) supports various label retention modes. Which of the following statements regarding the liberal mode are correct?

Options:

A.

An LSR retains labels from a neighboring LSR only when the neighbor is its next hop.

B.

This label retention mode saves memory and label space.

C.

An LSR reserves all labels distributed by its neighbor.

D.

The liberal mode requires more memory and label space.

Question 29

Which of the following statements about prefix segments and adjacency segments are correct?

Options:

A.

A prefix SID is a local SID out of the SRGB range.

B.

An adjacency SID is an offset value within the SRGB range advertised by the source end.

C.

A prefix segment identifies the prefix of a destination address on a network.

D.

An adjacency segment identifies an adjacency on a network.

Question 30

Which of the following statements about DHCP snooping is incorrect?

Options:

A.

After DHCP snooping is enabled in the view of a VLAN, it takes effect for the VLAN ' s DHCP messages received by all the interfaces of the device.

B.

After DHCP snooping is enabled globally, the device processes only DHCPv4 messages by default if no parameter is specified.

C.

DHCP snooping can prevent attacks by configuring trusted interfaces.

D.

After DHCP snooping is enabled in the view of an interface, it takes effect for all DHCP messages on the interface.

Question 31

iMaster NCE-Campus restricts RESTful APIs. If a client sends a GET request that invokes a RESTful API to obtain site information from iMaster NCE-Campus, which of the following fields should be included in the request header?

Options:

A.

ACCESS-TOKEN

B.

ACCEPT-TOKEN

C.

X-ACCEPT-TOKEN

D.

X ACCESS TOKEN

Question 32

In the following figure, OSPF is enabled on all router interfaces. The IP addresses marked in the figure belong to Loopback0 of the routers.

The Loopback0 addresses of R1 and R2 are advertised in Area 1, the Loopback0 address of R4 is advertised in Area 0, and the Loopback0 addresses of R3 and R5 are advertised in Area 2. Given this, which of the following IP addresses can ping each other?

Options:

A.

10.0.3.3 and 10.0.5.5

B.

10.0.2.2 and 10.0.5.5

C.

10.0.2.2 and 10.0.3.3

D.

10.0.4.4 and 10.0.2.2

Question 33

When you configure a virtualized campus network on iMaster NCE-Campus and enable external networks to connect to the Internet, iMaster NCE-Campus will automatically deliver a specific route to direct traffic to the corresponding external network.

Options:

A.

TRUE

B.

FALSE

Question 34

On a small- or medium-sized campus network deployed based on the Huawei CloudCampus Solution, an AR functioning as the egress gateway supports web-based network management, registration center query, and DHCP Option 148-based deployment, but does not support CLI-based deployment.

Options:

A.

TRUE

B.

FALSE

Question 35

When an SSH client logs in to an SSH server that is configured only with username and password authentication in SSH mode, the key exchange phase is not involved (no key is generated).

Options:

A.

TRUE

B.

FALSE

Question 36

When static IPsec VPN is used for WAN interconnection in the Huawei CloudCampus Solution, the AP, Router, and _____ can be used as egress devices. (Use full spelling with the first letter capitalized.)

Options:

Question 37

The following information is displayed during OSPF troubleshooting. Based on this information, which of the following is the cause of the failure in establishing an OSPF adjacency relationship?

< Huawei > display ospf error interface GigabitEthernet 0/0/0

OSPF Process 1 with Router ID 10.0.12.2

OSPF error statistics

Interface: GigabitEthernet0/0/0 (10.0.12.2)

General packet errors:

0 : Bad version 0 : Bad checksum

0 : Bad area id 0 : Bad authentication type

0 : Bad authentication key 0 : Unknown neighbor

0 : Bad net segment 0 : Extern option mismatch

0 : Router id confusion

HELLO packet errors:

2 : Netmask mismatch 0 : Hello timer mismatch

0 : Dead timer mismatch 0 : Invalid Source Address

Options:

A.

The area types are inconsistent.

B.

The authentication passwords are inconsistent.

C.

The IP address masks of the interfaces are inconsistent.

D.

Hello packets are sent at different intervals.

Question 38

By default, the domain ID of an OSPF process is the same as the process ID. You can run the domain-id command in the OSPF process view to change a domain ID.

Options:

A.

TRUE

B.

FALSE

Question 39

The naming of SRv6 instructions complies with certain rules. You can quickly determine the function of an instruction based on the instruction name. Which of the following statements about the keywords in SRv6 instruction names are correct? (Select all that apply)

Options:

A.

X: Forwards packets through one or a group of specified Layer 3 interfaces.

B.

M: Searches a Layer 2 forwarding table for unicast forwarding.

C.

V: Searches a VPN instance routing table to forward packets.

D.

T: Searches a specified routing table to forward packets.

Question 40

Flavors can be used to enhance SRv6 instructions to meet more diversified service requirements. Which of the following are flavors? (Select all that apply)

Options:

A.

Penultimate Segment Pop of the SRH (PSP)

B.

Ultimate Segment Decapsulation (USD)

C.

Ultimate Segment Pop of the SRH (USP)

D.

Penultimate Segment Decapsulation (PSD)

Question 41

Which of the following community attributes ensure that BGP routes are transmitted only within an AS?

Options:

A.

No Export Subconfed

B.

No_Export

C.

Internet

D.

No_Advertise

Question 42

Which of the following statements about SR-MPLS characteristics are correct? (Select all that apply)

Options:

A.

Only the controller can compute paths based on explicit paths.

B.

SR-MPLS supports smooth network evolution by extending existing protocols, such as IGPs.

C.

Efficient TI-LFA FRR protection is provided for fast path fault recovery.

D.

Such networks can quickly interact with upper-layer applications through the source routing technology.

Question 43

Portal authentication is recommended for scenarios with high mobility and numerous terminal types, such as shopping malls and supermarkets. MAC address authentication is recommended for dumb terminals that do not support Portal authentication, such as printers, fax machines, and IP phones.

Options:

A.

TRUE

B.

FALSE

Question 44

BGP EVPN can be used as the VXLAN control plane protocol to completely prevent traffic flooding, such as broadcast ARP packets, on the VXLAN network.

Options:

A.

TRUE

B.

FALSE

Question 45

Refer to the figure.

Question # 45

Which of the following steps are mandatory to enable 802.1X authentication on GE0/0/2 and GE0/0/3 of SW3 and configure a RADIUS server to authenticate and deliver network access rights to users?

Options:

A.

Configure an AAA scheme.

B.

Configure an authentication profile.

C.

Configure an authentication domain.

D.

Configure an 802.1X access profile.

Question 46

MPLS implements data forwarding based on two different planes. Which of the following statements regarding the forwarding mechanism are correct?

Options:

A.

After an IP packet enters an MPLS domain, the MPLS device forwards the packet based on FIB table queries.

B.

If the tunnel ID is 0x0, the MPLS forwarding process starts.

C.

The system automatically assigns an ID to the upper-layer application that uses a tunnel. This ID is also called the tunnel ID.

D.

If the tunnel ID is not 0x0, the normal IP forwarding process starts.

Question 47

The following figure shows the inter-AS MPLS L3VPN Option C (Solution 2). ASBR-PE2 is connected to CE3 and runs eBGP.

To enable all CEs to communicate with each other, which of the following address families must peer relationships be enabled in the BGP process of ASBR-PE2?

Options:

A.

VPNv4 address family

B.

BGP-LS address family

C.

VPN instance unicast address family

D.

Unicast BGP address family

Question 48

Free mobility implements policy management and permission control based on users ' VLAN IDs and IP addresses.

Options:

A.

TRUE

B.

FALSE

Question 49

The Ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is _____ IRB forwarding. (Capitalize the first letter.)

Options:

Question 50

The ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is _____ IRB forwarding. (Capitalize the first letter.)

Options:

Question 51

NETCONF uses an XML-based encoding format. NETCONF uses text files to represent complex hierarchical data. Which of the following statements are correct about the following XML file?

< ?xml version= " 1.0 " encoding= " UTF-8 " ? >

< note >

< to > Learners < /to >

< from > Huawei < /from >

< heading > Reminder < /heading >

< body > Don ' t forget Reading! < /body >

< /note >

Options:

A.

encoding: indicates the character set encoding format. Currently, only UTF-8 encoding is supported.

B.

/: indicates the end of the current tag.

C.

< ?: indicates the start of an instruction.

D.

? > : indicates the end of an instruction.

Question 52

In OSPFv3, which of the following types of LSAs can be flooded in the entire AS?

Options:

A.

AS-external-LSA

B.

Intra-Area-Prefix-LSA

C.

Link-LSA

D.

Inter-Area-Prefix-LSA

Question 53

On a CloudCampus virtualized campus network, virtual networks are defined based on services. Each virtual network corresponds to a service, and isolation needs to be manually configured between virtual networks.

Options:

A.

TRUE

B.

FALSE

Question 54

In the following figure, R1, R2, R3, and R4 all belong to OSPF area 0. The link costs are marked in the figure. The Loopback0 addresses of R1, R2, R3, and R4 are advertised to OSPF. R1, R2, and R3, which are R4 clients, use Loopback0 to establish an iBGP peer relationship with R4. The directly connected network segment 172.20.1.4/32 of R4 is advertised to BGP. Which of the following statements are correct about the direction of traffic from R1 to 172.20.1.4/32?

Question # 54

Options:

A.

The preferred path is R1–R3–R4.

B.

If the stub router on-startup command is run on R3, packet loss occurs during the power-off process of R3 but no packet loss occurs during the startup process of R3.

C.

The preferred path is R1–R2–R4.

D.

Packet loss occurs during both the power-off and startup processes of R3.

Question 55

HTTP/2 is a UDP-based low-delay Internet transport layer protocol.

Options:

A.

TRUE

B.

FALSE

Question 56

Prefix segments and adjacency segments are globally visible and unique.

Options:

A.

TRUE

B.

FALSE

Question 57

Which of the following parameters is not included in an IPsec security association (SA)?

Options:

A.

Security parameter index (SPI)

B.

Destination IP address

C.

Security protocol ID (AH or ESP)

D.

Source IP address

Question 58

Which of the following statements is incorrect about MP-BGP?

Options:

A.

MP-BGP uses the MP_REACH_NLRI and MP_UNREACH_NLRI attributes to advertise VPNv4 routes.

B.

When PEs and CEs exchange routes through BGP, you need to create a BGP process for each VPN instance in the CE.

C.

The packet types and VPNv4 route advertisement policies of MP-BGP are the same as those of BGP-4.

D.

MP-BGP needs to allocate private network labels for VPNv4 routes.

Question 59

IS-IS supports multi-instance and multi-process. Which of the following statements are correct about IS-IS multi-instance and multi-process?

Options:

A.

One IS-IS process can be associated with only one VPN instance.

B.

One VPN instance can be associated with multiple different IS-IS processes.

C.

One IS-IS process can be associated with multiple different VPN instances.

D.

If multiple IS-IS processes are created on an IS-IS router, these processes are independent of each other.

Question 60

Which of the following fields is added to BGP4+ Update packets to advertise IPv6 routes?

Options:

A.

A new path attribute: MP_UNREACH_NLRI

B.

A new path attribute: MP_REACH_NLRI

C.

A new path attribute: IPv6_REACH_NLRI

D.

A new NLRI type: IPv6_NLRI, which carries the IPv6 NLRI prefix length and IPv6 NLRI prefix.

Question 61

On a router, SRv6 is enabled, and the configurations shown below are performed. Which of the following statements about the configurations are correct?

[Router-segment-routing-ipv6] locator srv6_locator1 ipv6-prefix 2001:DB8:ABCD::/64 static 32

Options:

A.

The locator of this node is 2001:DB8:ABCD::.

B.

The static segment of the node occupies 32 bits.

C.

The dynamic segment of the node occupies 32 bits.

D.

The Args field of this node occupies 32 bits.

Question 62

In the Huawei SD-WAN Solution, which of the following routing protocols is used to advertise VPN routes between CPEs?

Options:

A.

RIP

B.

OSPF

C.

IS-IS

D.

BGP

Question 63

When Huawei iMaster NCE-IP is used to configure SR-MPLS TE tunnels, which of the following protocols is used by the controller to collect device running status information?

Options:

A.

Telemetry

B.

Telnet

C.

BGP-LS

D.

IS-IS

Question 64

Complete the basic processing procedure for DiffServ model-based QoS shown in the figure

Question # 64

Question # 64

Options:

Question 65

In 6PE and 6VPE networking, no VPN instance needs to be created on PEs.

Options:

A.

TRUE

B.

FALSE

Question 66

Free mobility is deployed on a campus network through iMaster NCE-Campus. During this deployment, which of the following steps are performed by administrators and which are automatically performed by iMaster NCE-Campus? Drag the administrators and iMaster NCE-Campus icons on the left to the corresponding steps on the right.

Question # 66

Options:

Question 67

In an MPLS VPN network, two-layer MPLS labels are added into data packets before they are transmitted over the public network. Which of the following statements regarding data packet processing are correct?

Options:

A.

The egress PE sends the data packet to the correct VPN based on the inner label.

B.

The penultimate hop removes the outer label before forwarding the data packet to a peer egress PE.

C.

The IP data packet received by egress LSR is without labels.

D.

The penultimate-hop device receives a packet with an outer label.

Question 68

Which of the following statements are correct about the authentication protocols used in Portal authentication?

Options:

A.

When Portal is used as the authentication protocol, the Portal server needs to exchange authentication information with the access device, which then sends the information to the authentication server for identity authentication.

B.

When Portal is used as the authentication protocol, the Portal server and access device only need to support the Portal protocol, but not the HTTP and HTTPS protocols.

C.

When HTTP or HTTPS is used as the authentication protocol, none of the devices involved in the authentication process need to support the Portal protocol.

D.

When HTTP or HTTPS is used as the authentication protocol, the client needs to send authentication information to the access device, which then sends the information to the authentication server for identity authentication.

Question 69

Which of the following technologies can be used to measure performance based on actual service traffic in Huawei ' s CloudWAN solution?

Options:

A.

TWAMP

B.

BGP FlowSpec

C.

Telemetry

D.

iFIT

Question 70

On a VXLAN-based virtualized campus network, BGP EVPN can be used as the control plane protocol. Which of the following EVPN route types are not used in the virtualized campus network scenario?

Options:

A.

Type 3

B.

Type 2

C.

Type 4

D.

Type 1

Question 71

Which of the following protocols is used in the Huawei SD-WAN Solution to report device performance data?

Options:

A.

NetFlow

B.

SNMP

C.

BGP

D.

HTTP/2

Question 72

An enterprise has three types of services. Voice and video services are key services and need to be guaranteed, and FTP services are non-key services. Which of the following scheduling modes is optimal for satisfying the service requirements?

Options:

A.

WFQ scheduling is configured for IP voice, video, and FTP download services.

B.

PQ scheduling is configured for IP voice and video services, and WFQ scheduling is configured for FTP download services.

C.

LPQ scheduling is configured for IP voice services, PQ scheduling is configured for video services, and WFQ scheduling is configured for FTP download services.

D.

PQ scheduling is configured for IP voice, video, and FTP download services.

Question 73

A network administrator runs the display telemetry destination command on a device to check information about a destination group that sampled data is sent to. The command output is as follows. Which of the following statements is incorrect?

[~CE-telemetry-sensor-group-Sensor1]display telemetry destination

Dest-name Dest-addr Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20000 RESOLVED - GRPC

Options:

A.

The IP address of the destination group is 192.168.56.1

B.

The destination group name is Dest1.

C.

VPN encapsulation is used for data push.

D.

The gRPC protocol is used for data push.

Question 74

On a campus network, which of the following problems may occur when you manually create a static VXLAN tunnel?

Options:

A.

Although the static VXLAN tunnel mode supports the distributed gateway scenario, the configuration involves a heavy workload and is complex to adjust.

B.

Remote MAC addresses can be learned by the VTEP only through data flooding.

C.

A static VXLAN tunnel also uses corresponding protocols on the control plane, which consumes device resources.

D.

If N devices need to establish static VXLAN tunnels, a maximum of N(N -1)/2 tunnels need to be manually configured, which involves a heavy workload.

Question 75

In the SD-WAN Solution, which routing protocols can be used by LAN-side devices to connect to a Layer 3 network?

Options:

A.

IS-IS

B.

OSPF

C.

BGP

D.

RIP

Question 76

This figure shows an SRv6 (Segment Routing over IPv6) packet. If the Destination Address field in the IPv6 basic header is FC04::4, the value of the SL (Segment Left) field in the SRv6 header should be ____. (Enter only digits.)

Options:

Question 77

In the firewall hot standby scenario, in which of the following conditions will the local device proactively send VGMP packets?

Options:

A.

Hot standby being disabled

B.

Priority increase

C.

Link detection packet timeout

D.

Hot standby being enabled

Question 78

On a campus network, iMaster NCE-Campus is used to deploy two VNs (Virtual Networks): R & D VN and Marketing VN. Users in these two VNs belong to two separate security groups.

The campus network requires R & D personnel and sales personnel to communicate with each other. To meet this requirement, which of the following tasks does a network administrator need to perform?

Options:

A.

Deploy network service resources.

B.

Deploy a policy control matrix.

C.

Configure inter-VN communication.

D.

Deploy an external network.

Question 79

What can be determined from the following IS-IS peer output?

Peer information for ISIS(1):

    Peer System ID: ee8c.a0c2.baf3

    Interface: GE0/0/0

    State: Up

    HoldTime: 7s

    Type: L1

    PRI: 64

    MT IDs supported: 0(UP), 2(UP)

    Local MT IDs: 0, 2

    Area Address(es): 49.0022

    Peer IP Address(es): 10.1.34.1

    Peer IPv6 Address(es): FE80::2E0:FCFF:FE98:2576

Options:

A.

Both IPv4 and IPv6 IS-IS neighbor relationships are established between R4 and ee8c.a0c2.baf3.

B.

R4 does not have any IS-IS neighbors.

C.

Only an IPv4 IS-IS neighbor relationship is established between R4 and ee8c.a0c2.baf3.

D.

Only an IPv6 IS-IS neighbor relationship is established between R4 and ee8c.a0c2.baf3.

Question 80

The free mobility function is deployed on the iMaster NCE-Campus on a campus network. Which of the following information should an administrator pay attention to?

Options:

A.

Define security groups.

B.

Deliver the inter-group policy.

C.

Deploy a policy control matrix.

D.

Select the policy enforcement point.

Question 81

Refer to the following command output on the router R3. Which of the following statements are correct?

< R3 > display interface Tunnel

Tunnel0/0/0 current state : UP

Line protocol current state : UP

Last line protocol up time : 15:21:26 UTC-08:00

Description: HUAWEI, AR Series, Tunnel0/0/0 Interface

Route Port, The Maximum Transmit Unit is 1500

Internet Address is 20.1.1.2/24

Encapsulation is TUNNEL, loopback not set

Tunnel source 10.0.3.3 (LoopBack0), destination 10.0.1.1

Tunnel protocol/transport GRE/IP, key disabled

keepalive disabled

Checksumming of packets disabled

Options:

A.

The tunnel destination IP address is 10.0.1.1.

B.

The tunnel interface MTU is 1500 bytes.

C.

The tunnel interface IP address is 20.1.1.2/24.

D.

The tunnel source IP address is 10.0.1.1.

Question 82

When an NVE encapsulates a data frame into a VXLAN packet, information of which of the following protocols is encapsulated between the outer IP header and the VXLAN header?

Options:

A.

IP

B.

TCP

C.

UDP

D.

Ethernet

Question 83

Which of the following can be used to transmit traffic to a VXLAN network and implement intra-subnet communication on the same VXLAN network?

Options:

A.

Layer 3 VXLAN gateway

B.

NVE interface

C.

VLANIF interface

D.

Layer 2 VXLAN gateway

Question 84

In Huawei SD-WAN Solution, which of the following tunneling technologies is used to establish data channels?

Options:

A.

IPsec

B.

GRE over IPsec

C.

VXLAN

D.

MPLS

Question 85

The RR (Route Reflector) is critical to the Huawei SD-WAN Solution, and its deployment mode varies based on the scenario. In which of the following modes can an RR be deployed?

Options:

A.

Multi-area deployment of the RR

B.

Independent deployment of the RR

C.

Co-deployment of the RR and hub site

D.

Partially independent deployment of the RR

Question 86

Telemetry data must be encoded in GPB binary format. This format reduces the number of bytes in telemetry messages and improves the transmission efficiency compared with messages encoded in JSON format.

Options:

A.

TRUE

B.

FALSE

Question 87

Which of the following commands are mandatory for configuring an OSPF-based SR-MPLS TE tunnel? (Select All that Apply)

Options:

A.

Configure the LSR ID for routers.

B.

Enable segment routing in the OSPF process view.

C.

Enable the opaque capability of OSPF.

D.

Enable MPLS TE in the OSPF process view.

Question 88

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following BGP EVPN routes is used to advertise MAC addresses, ARP entries, and IRB routes?

Options:

A.

Type 3

B.

Type 4

C.

Type 2

D.

Type 1

Question 89

Which of the following statements regarding RT are correct?

Options:

A.

Each VPN instance is associated with one or more pairs of VPN Target attributes, used to control VPN routing information advertisement and reception between sites.

B.

Export Target and Import Target are independent of each other and support multiple values to implement flexible VPN routing information advertisement and reception control.

C.

RTs are classified into two types: Export Target and Import Target.

D.

The RT value is advertised to neighbors through the BGP extended community attribute in Update messages.

Question 90

A carrier ' s home broadband service requires a maximum downstream bandwidth of 100 Mbit/s during off-peak hours and a guaranteed downstream bandwidth of 50 Mbit/s during peak hours. The home broadband service includes the home IP phone service and the home Internet access service. Which of the following configurations best meets the service requirement?

Options:

A.

qos gts cir 100000

B.

qos car inbound cir 50000 pir 100000

C.

qos car inbound cir 100000 pir 50000

D.

qos car inbound cir 100000

Question 91

A VGMP packet is encapsulated with a UDP header and a VGMP header. By default, a VGMP packet uses UDP port _____.

Options:

Question 92

When a client invokes the iMaster NCE-Campus RESTful API, it sends an HTTP request. The server then returns the status code 401.

Which of the following errors has occurred?

Options:

A.

The service is unavailable.

B.

Access denied.

C.

The requested resource does not exist.

D.

Unauthorized.

Question 93

Which of the following roles is NOT a core role in Huawei ' s Free Mobility solution?

Options:

A.

iMaster NCE-Campus

B.

Policy enforcement device

C.

Authentication device

D.

Policy control device

Question 94

To prevent hackers from attacking user devices or networks using MAC addresses, you can configure MAC addresses of untrusted users as blackhole MAC addresses to filter out such invalid MAC addresses. When receiving a packet whose source or destination MAC address is a blackhole MAC address on a device, the device discards the packet.

Options:

A.

TRUE

B.

FALSE

Question 95

Which of the following number sequences can be matched by the regular expression 100.$?

Options:

A.

1000

B.

1001

C.

10000

D.

100

Question 96

MPLS is located between the data link layer and network layer in the TCP/IP protocol stack and can provide services for all network layer protocols.

Options:

A.

TRUE

B.

FALSE

Page: 1 / 32
Total 322 questions