Huawei H12-891_V1.0 HCIE-Datacom V1.0 Exam Practice Test
HCIE-Datacom V1.0 Questions and Answers
If SRv6 needs to be deployed on a bearer WAN, which of the following technologies are required? (Select all that apply)
Network administrator A wants to view the BGP peer status of R2. The BGP peer status of R2 is shown in this figure. Obtain the following information: R2 resides in AS _____ (Enter only digits. Do not add punctuations or spaces.)
IPsec uses an asymmetric encryption algorithm to encrypt the symmetric algorithm key, which it uses to encrypt/decrypt data, ensuring security and performance.
iMaster NCE-Campus provides the terminal identification function to display the terminal type, operating system, and manufacturer information.
Huawei CloudCampus Solution has multiple application scenarios, and iMaster NCE-Campus provides different APIs for each application scenario. Match the following application scenarios with the open APIs provided by iMaster NCE-Campus.
In the Huawei CloudCampus Solution, which of the following deployment modes are supported by Huawei switches?
The following figure shows some configurations of R1. Based on these configurations, which of the following statements about IS-IS on R1 are correct?
isis 1
is-level level-2
cost-style wide
network-entity 49.0022.ee8c.a0c2.baf1.00
isis 2 vpn-instance tt
is-level level-2
cost-style wide
network-entity 47.00ce.390d.efdc.b3e1.00
isis 3 vpn-instance rr
is-level level-2
cost-style wide
network-entity 47.cc0a.3efb.bbdd.aae1.00
Drag the authentication modes on the left into their applicable scenarios on the right.
During the evolution from OSPFv2 to OSPFv3, LSA formats and functions remain unchanged, except that the network layer addresses in LSAs are changed from IPv4 to IPv6.
Which of the following statements about BGP EVPN principles are correct in a scenario where a VXLAN tunnel is dynamically established through BGP EVPN?
On an SR-MPLS network, manually configured prefix SIDs on different devices may conflict with each other. Assume that there are four routes (prefix/mask SID) as follows. Which of the following routes will be selected according to the conflict handling principle?
Which of the following statements is incorrect about the user authentication points on the network?
Which of the following statements about SR-MPLS Policy path planning are correct?
What can be determined from the following figure?
< R1 > display ipv6 routing-table protocol isis
Public Routing Table : ISIS
Summary Count: 6
ISIS Routing Table ' s Status : < Active >
Summary Count: 6
Destination : 3000:FDEA::4
NextHop : FE80::2E0:FCFF:FE98:2577
Cost : 20
Interface : GigabitEthernet0/0/1
PrefixLength : 128
Preference : 15
Protocol : ISIS-L2
Flags : D
What is the router ID length supported by OSPFv3?
Network administrator A wants to use an IP prefix list to match specific routes. Which of the following routes can be matched by the IP prefix list shown in this figure?
ip ip-prefix TEST permit 10.0.0.0 24 less-equal 30
Which of the following are carried in an HTTP/1.1 response?
Which of the following statements are correct about authentication points and policy enforcement points in Huawei ' s free mobility solution?
As shown in the figure, R1, R2, R3, and R4 reside in the same MPLS domain, and LDP (Label Distribution Protocol) is used to distribute MPLS labels.
R4 is the egress LSR (Label Switching Router) for the FEC (Forwarding Equivalence Class) 4.4.4.0/24.
To make R4 aware of QoS forwarding priority of a packet sent from R1 and destined for 4.4.4.0/24,
Without looking up R4’s label forwarding information base,
The outgoing label of the FEC on R3 should be _____ (Enter an Arabic numeral without symbols).
The figure shows an L3VPN over an SRv6 BE (Best Effort) network. According to the information displayed on PE2, which of the following statements is incorrect?
Which of the following are carried in the HTTP/1.1 response header?
Exhibit:
The following figure shows the inter-AS MPLS VPN Option C (solution 2). RRs are deployed, and no traffic passes through the RRs during forwarding. If a data packet sent from PE2 to 192.168.1.1 carries two labels, which of the following statements about the two labels are correct?
Which of the following inter-AS MPLS L3VPN solutions needs ASBRs to transmit VPNv4 routes?
In the small and midsize campus network design based on the Huawei CloudCampus Solution, when over 100 branches need to communicate with each other, which of the following interconnection networking models is recommended?
Huawei Open Programmability System (OPS) uses HTTP methods to access managed objects to manage network devices. Drag the HTTP methods to their corresponding functions.
Which of the following is the purpose of configuring IS-IS fragmentation on an IS-IS device?
OSPF is a mature protocol and is unlikely to have route computation errors in a regular networking environment under correct configurations. Which of the following statements are correct about the possible causes preventing an OSPF neighbor relationship from entering Full state?
An LSR (Label Switching Router) supports various label retention modes. Which of the following statements regarding the liberal mode are correct?
Which of the following statements about prefix segments and adjacency segments are correct?
Which of the following statements about DHCP snooping is incorrect?
iMaster NCE-Campus restricts RESTful APIs. If a client sends a GET request that invokes a RESTful API to obtain site information from iMaster NCE-Campus, which of the following fields should be included in the request header?
In the following figure, OSPF is enabled on all router interfaces. The IP addresses marked in the figure belong to Loopback0 of the routers.
The Loopback0 addresses of R1 and R2 are advertised in Area 1, the Loopback0 address of R4 is advertised in Area 0, and the Loopback0 addresses of R3 and R5 are advertised in Area 2. Given this, which of the following IP addresses can ping each other?
When you configure a virtualized campus network on iMaster NCE-Campus and enable external networks to connect to the Internet, iMaster NCE-Campus will automatically deliver a specific route to direct traffic to the corresponding external network.
On a small- or medium-sized campus network deployed based on the Huawei CloudCampus Solution, an AR functioning as the egress gateway supports web-based network management, registration center query, and DHCP Option 148-based deployment, but does not support CLI-based deployment.
When an SSH client logs in to an SSH server that is configured only with username and password authentication in SSH mode, the key exchange phase is not involved (no key is generated).
When static IPsec VPN is used for WAN interconnection in the Huawei CloudCampus Solution, the AP, Router, and _____ can be used as egress devices. (Use full spelling with the first letter capitalized.)
The following information is displayed during OSPF troubleshooting. Based on this information, which of the following is the cause of the failure in establishing an OSPF adjacency relationship?
< Huawei > display ospf error interface GigabitEthernet 0/0/0
OSPF Process 1 with Router ID 10.0.12.2
OSPF error statistics
Interface: GigabitEthernet0/0/0 (10.0.12.2)
General packet errors:
0 : Bad version 0 : Bad checksum
0 : Bad area id 0 : Bad authentication type
0 : Bad authentication key 0 : Unknown neighbor
0 : Bad net segment 0 : Extern option mismatch
0 : Router id confusion
HELLO packet errors:
2 : Netmask mismatch 0 : Hello timer mismatch
0 : Dead timer mismatch 0 : Invalid Source Address
By default, the domain ID of an OSPF process is the same as the process ID. You can run the domain-id command in the OSPF process view to change a domain ID.
The naming of SRv6 instructions complies with certain rules. You can quickly determine the function of an instruction based on the instruction name. Which of the following statements about the keywords in SRv6 instruction names are correct? (Select all that apply)
Flavors can be used to enhance SRv6 instructions to meet more diversified service requirements. Which of the following are flavors? (Select all that apply)
Which of the following community attributes ensure that BGP routes are transmitted only within an AS?
Which of the following statements about SR-MPLS characteristics are correct? (Select all that apply)
Portal authentication is recommended for scenarios with high mobility and numerous terminal types, such as shopping malls and supermarkets. MAC address authentication is recommended for dumb terminals that do not support Portal authentication, such as printers, fax machines, and IP phones.
BGP EVPN can be used as the VXLAN control plane protocol to completely prevent traffic flooding, such as broadcast ARP packets, on the VXLAN network.
Refer to the figure.
Which of the following steps are mandatory to enable 802.1X authentication on GE0/0/2 and GE0/0/3 of SW3 and configure a RADIUS server to authenticate and deliver network access rights to users?
MPLS implements data forwarding based on two different planes. Which of the following statements regarding the forwarding mechanism are correct?
The following figure shows the inter-AS MPLS L3VPN Option C (Solution 2). ASBR-PE2 is connected to CE3 and runs eBGP.
To enable all CEs to communicate with each other, which of the following address families must peer relationships be enabled in the BGP process of ASBR-PE2?
Free mobility implements policy management and permission control based on users ' VLAN IDs and IP addresses.
The Ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is _____ IRB forwarding. (Capitalize the first letter.)
The ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is _____ IRB forwarding. (Capitalize the first letter.)
NETCONF uses an XML-based encoding format. NETCONF uses text files to represent complex hierarchical data. Which of the following statements are correct about the following XML file?
< ?xml version= " 1.0 " encoding= " UTF-8 " ? >
< note >
< to > Learners < /to >
< from > Huawei < /from >
< heading > Reminder < /heading >
< body > Don ' t forget Reading! < /body >
< /note >
In OSPFv3, which of the following types of LSAs can be flooded in the entire AS?
On a CloudCampus virtualized campus network, virtual networks are defined based on services. Each virtual network corresponds to a service, and isolation needs to be manually configured between virtual networks.
In the following figure, R1, R2, R3, and R4 all belong to OSPF area 0. The link costs are marked in the figure. The Loopback0 addresses of R1, R2, R3, and R4 are advertised to OSPF. R1, R2, and R3, which are R4 clients, use Loopback0 to establish an iBGP peer relationship with R4. The directly connected network segment 172.20.1.4/32 of R4 is advertised to BGP. Which of the following statements are correct about the direction of traffic from R1 to 172.20.1.4/32?
HTTP/2 is a UDP-based low-delay Internet transport layer protocol.
Prefix segments and adjacency segments are globally visible and unique.
Which of the following parameters is not included in an IPsec security association (SA)?
Which of the following statements is incorrect about MP-BGP?
IS-IS supports multi-instance and multi-process. Which of the following statements are correct about IS-IS multi-instance and multi-process?
Which of the following fields is added to BGP4+ Update packets to advertise IPv6 routes?
On a router, SRv6 is enabled, and the configurations shown below are performed. Which of the following statements about the configurations are correct?
[Router-segment-routing-ipv6] locator srv6_locator1 ipv6-prefix 2001:DB8:ABCD::/64 static 32
In the Huawei SD-WAN Solution, which of the following routing protocols is used to advertise VPN routes between CPEs?
When Huawei iMaster NCE-IP is used to configure SR-MPLS TE tunnels, which of the following protocols is used by the controller to collect device running status information?
Complete the basic processing procedure for DiffServ model-based QoS shown in the figure
In 6PE and 6VPE networking, no VPN instance needs to be created on PEs.
Free mobility is deployed on a campus network through iMaster NCE-Campus. During this deployment, which of the following steps are performed by administrators and which are automatically performed by iMaster NCE-Campus? Drag the administrators and iMaster NCE-Campus icons on the left to the corresponding steps on the right.
In an MPLS VPN network, two-layer MPLS labels are added into data packets before they are transmitted over the public network. Which of the following statements regarding data packet processing are correct?
Which of the following statements are correct about the authentication protocols used in Portal authentication?
Which of the following technologies can be used to measure performance based on actual service traffic in Huawei ' s CloudWAN solution?
On a VXLAN-based virtualized campus network, BGP EVPN can be used as the control plane protocol. Which of the following EVPN route types are not used in the virtualized campus network scenario?
Which of the following protocols is used in the Huawei SD-WAN Solution to report device performance data?
An enterprise has three types of services. Voice and video services are key services and need to be guaranteed, and FTP services are non-key services. Which of the following scheduling modes is optimal for satisfying the service requirements?
A network administrator runs the display telemetry destination command on a device to check information about a destination group that sampled data is sent to. The command output is as follows. Which of the following statements is incorrect?
[~CE-telemetry-sensor-group-Sensor1]display telemetry destination
Dest-name Dest-addr Dest-port State Vpn-name Protocol
Dest1 192.168.56.1 20000 RESOLVED - GRPC
On a campus network, which of the following problems may occur when you manually create a static VXLAN tunnel?
In the SD-WAN Solution, which routing protocols can be used by LAN-side devices to connect to a Layer 3 network?
This figure shows an SRv6 (Segment Routing over IPv6) packet. If the Destination Address field in the IPv6 basic header is FC04::4, the value of the SL (Segment Left) field in the SRv6 header should be ____. (Enter only digits.)
In the firewall hot standby scenario, in which of the following conditions will the local device proactively send VGMP packets?
On a campus network, iMaster NCE-Campus is used to deploy two VNs (Virtual Networks): R & D VN and Marketing VN. Users in these two VNs belong to two separate security groups.
The campus network requires R & D personnel and sales personnel to communicate with each other. To meet this requirement, which of the following tasks does a network administrator need to perform?
What can be determined from the following IS-IS peer output?
Peer information for ISIS(1):
Peer System ID: ee8c.a0c2.baf3
Interface: GE0/0/0
State: Up
HoldTime: 7s
Type: L1
PRI: 64
MT IDs supported: 0(UP), 2(UP)
Local MT IDs: 0, 2
Area Address(es): 49.0022
Peer IP Address(es): 10.1.34.1
Peer IPv6 Address(es): FE80::2E0:FCFF:FE98:2576
The free mobility function is deployed on the iMaster NCE-Campus on a campus network. Which of the following information should an administrator pay attention to?
Refer to the following command output on the router R3. Which of the following statements are correct?
< R3 > display interface Tunnel
Tunnel0/0/0 current state : UP
Line protocol current state : UP
Last line protocol up time : 15:21:26 UTC-08:00
Description: HUAWEI, AR Series, Tunnel0/0/0 Interface
Route Port, The Maximum Transmit Unit is 1500
Internet Address is 20.1.1.2/24
Encapsulation is TUNNEL, loopback not set
Tunnel source 10.0.3.3 (LoopBack0), destination 10.0.1.1
Tunnel protocol/transport GRE/IP, key disabled
keepalive disabled
Checksumming of packets disabled
When an NVE encapsulates a data frame into a VXLAN packet, information of which of the following protocols is encapsulated between the outer IP header and the VXLAN header?
Which of the following can be used to transmit traffic to a VXLAN network and implement intra-subnet communication on the same VXLAN network?
In Huawei SD-WAN Solution, which of the following tunneling technologies is used to establish data channels?
The RR (Route Reflector) is critical to the Huawei SD-WAN Solution, and its deployment mode varies based on the scenario. In which of the following modes can an RR be deployed?
Telemetry data must be encoded in GPB binary format. This format reduces the number of bytes in telemetry messages and improves the transmission efficiency compared with messages encoded in JSON format.
Which of the following commands are mandatory for configuring an OSPF-based SR-MPLS TE tunnel? (Select All that Apply)
In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following BGP EVPN routes is used to advertise MAC addresses, ARP entries, and IRB routes?
Which of the following statements regarding RT are correct?
A carrier ' s home broadband service requires a maximum downstream bandwidth of 100 Mbit/s during off-peak hours and a guaranteed downstream bandwidth of 50 Mbit/s during peak hours. The home broadband service includes the home IP phone service and the home Internet access service. Which of the following configurations best meets the service requirement?
A VGMP packet is encapsulated with a UDP header and a VGMP header. By default, a VGMP packet uses UDP port _____.
When a client invokes the iMaster NCE-Campus RESTful API, it sends an HTTP request. The server then returns the status code 401.
Which of the following errors has occurred?
Which of the following roles is NOT a core role in Huawei ' s Free Mobility solution?
To prevent hackers from attacking user devices or networks using MAC addresses, you can configure MAC addresses of untrusted users as blackhole MAC addresses to filter out such invalid MAC addresses. When receiving a packet whose source or destination MAC address is a blackhole MAC address on a device, the device discards the packet.
Which of the following number sequences can be matched by the regular expression 100.$?
MPLS is located between the data link layer and network layer in the TCP/IP protocol stack and can provide services for all network layer protocols.




