Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Huawei H12-891_V1.0 HCIE-Datacom V1.0 Exam Practice Test

Page: 1 / 28
Total 275 questions

HCIE-Datacom V1.0 Questions and Answers

Question 1

The Ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is _____ IRB forwarding. (Capitalize the first letter.)

Options:

Question 2

In Huawei SD-WAN Solution, which of the following tunneling technologies is used to establish data channels?

Options:

A.

IPsec

B.

GRE over IPsec

C.

VXLAN

D.

MPLS

Question 3

Which of the following statements is correct about 6PE and 6VPE?

Options:

A.

In 6PE networking, VPN instances need to be created on PEs.

B.

In 6PE networking, IPv6 addresses of a CE can be reused.

C.

In 6VPE networking, IPv6 addresses of a CE can be reused.

D.

In 6VPE networking, no VPN instance needs to be created on PEs.

Question 4

As shown in the figure, when PE1 receives an ARP request packet, it forwards the packet to PE4. The packet then carries two labels. The label value 201 is carried by the EVPN Type ____ route. (Enter only digits.)

Options:

Question 5

iMaster NCE-Campus restricts RESTful APIs. If a client sends aGET requestthat invokes a RESTful API to obtain site information from iMaster NCE-Campus, which of the following fields should be included in the request header?

Options:

A.

ACCESS-TOKEN

B.

ACCEPT-TOKEN

C.

X-ACCEPT-TOKEN

D.

X ACCESS TOKEN

Question 6

A network administrator runs the display telemetry subscription command on a device to check telemetry subscription information. The command output is as follows. Which of the following statements is incorrect?

[~CE] display telemetry subscription

Sub name : Sub1

Sensor group:

Sensor-name Sample-interval(ms) State

Sensor1 1000 RESOLVED

Destination group:

Dest-name Dest-IP Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20030 RESOLVED - GRPC

Sub state : PASSIVE

Total subscription number is : 1

Options:

A.

The device sends sampled data every second.

B.

The subscription mode is static subscription.

C.

The IP address of the device is 192.168.56.1.

D.

The subscription name is Sub1.

Question 7

Port isolation can be deployed on an Ethernet network to implement both Layer 2 communication and Layer 3 isolation, making the networking more flexible.

Options:

A.

TRUE

B.

FALSE

Question 8

TheNETCONF content layercontainsdevice configuration data.

Which of the following statements are correct about the followingNETCONF configuration?

merge

rollback-on-error

10

0

Options:

A.

The NETCONF operation is performed to load the configuration data to the startup configuration datastore.

B.

The Huawei-YANG model is used.

C.

VLAN 10 is created on the target device.

D.

The operation contains an operation attribute so that the modified data is merged.

Question 9

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following fields is not carried in BGP EVPN Type 2 routes?

Options:

A.

IP Prefix

B.

IP Address

C.

L3VNI

D.

L2VNI

Question 10

In a scenario whereSR Policiesare dynamically established through thecontroller, which of the following statements about theSR Policy solution architectureis incorrect?

Options:

A.

The controller uses NETCONF to deliver configurations such as service interfaces and routing policies.

B.

The controller uses BGP-LS to collect tunnel topology information and computes SR Policy paths.

C.

The controller uses telemetry to deliver information such as SRv6 SIDs to construct SID entries.

D.

The controller uses BGP IPv6 SR Policy to deliver SR Policy information, such as the color, headend, and endpoint information.

Question 11

The following figure shows some configurations of R1. Based on these configurations, which of the following statements about IS-IS on R1 are correct?

isis 1

is-level level-2

cost-style wide

network-entity 49.0022.ee8c.a0c2.baf1.00

isis 2 vpn-instance tt

is-level level-2

cost-style wide

network-entity 47.00ce.390d.efdc.b3e1.00

isis 3 vpn-instance rr

is-level level-2

cost-style wide

network-entity 47.cc0a.3efb.bbdd.aae1.00

Options:

A.

Process 1 contains the global routing information and routing information of VRFs tt and rr.

B.

Routing information is shared between processes 2 and 3.

C.

Process 1 contains only global routing information.

D.

Routing information of process 2 is isolated from that of process 3.

Question 12

As shown in the figure,ARP broadcast suppression is enabled on VTEP1inBD 20 (VNI 200).

VTEP1 learns ARP informationaboutPC2 through BGP EVPN routes.

WhenVTEP1 forwards the ARP request for PC1’s MAC address to VTEP2,

What is the destination MAC address of the inner data frame?

Question # 12

Options:

A.

MAC B

B.

MAC C

C.

MAC A

D.

MAC D

Question 13

Which of the following languages is integrated into the OPS?

Options:

A.

Python

B.

C programming language

C.

Java

D.

C++

Question 14

In thesmall and midsize campus network designbased on theHuawei CloudCampus Solution, when over100 branchesneed to communicate with each other, which of the following interconnection networking models is recommended?

Options:

A.

Direct networking

B.

Full-mesh networking

C.

Hub-spoke networking

D.

Partial-mesh networking

Question 15

Which of the following can be used to transmit traffic to a VXLAN network and implement intra-subnet communication on the same VXLAN network?

Options:

A.

Layer 3 VXLAN gateway

B.

NVE interface

C.

VLANIF interface

D.

Layer 2 VXLAN gateway

Question 16

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, run the command on the VTEP to view BGP EVPN routes. The route entries shown in the following figure are displayed. Which of the following statements about these routing entries are correct?

Network (EthTagId/IP Prefix/IP PrefixLen)

NextHop

*>i 0:172.16.2.0:24 1.1.1.2

*>i 0:172.16.13.0:24 1.1.1.2

*>i 0:192.168.122.0:30 1.1.1.2

Options:

A.

These routes are Type 5 routes and carry network segment or mask information.

B.

These routes are Type 2 routes and carry host IP addresses.

C.

These routes carry the L2VNI.

D.

These routes carry the L3VNI.

Question 17

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following fields is NOT carried in BGP EVPN Type 5 routes?

Options:

A.

Route Distinguisher

B.

MAC Address

C.

GW IP Address

D.

IP Prefix Length

Question 18

In the Huawei CloudCampus Solution, which of the following deployment modes are supported by Huawei switches?

Options:

A.

DHCP Option 148

B.

CLI

C.

Web interface

D.

Huawei registration center

Question 19

An engineer needs todownload the configuration file vrpcfg.cfgto a local device throughSFTP, rename the configuration file to backup.cfg, and upload it to thedefault directory of the device.

The configuration file is located at /vrpcfg.cfg (default directory of the remote device), and the local directory is C:\.

Which of the followingPython Paramikocode lines can implement the required operations?

Options:

A.

sftp.get('/vrpcfg.cfg', r'C:\')sftp.put(r'C:\backup.cfg', '/')

B.

sftp.get('/vrpcfg.cfg', r'C:\backup.cfg')sftp.put(r'C:\backup.cfg', '/')

C.

sftp.get('/vrpcfg.cfg', r'C:\vrpcfg.cfg')sftp.put('/backup.cfg', r'C:\vrpcfg.cfg')

D.

sftp.get('/vrpcfg.cfg', r'C:\backup.cfg')sftp.put(r'C:\backup.cfg', '/backup.cfg')

Question 20

Which of the following channels are involved in the Huawei SD-WAN Solution?

Options:

A.

Management channel

B.

Control channel

C.

Data channel

D.

Orchestration channel

Question 21

The command can be run to completely isolate Layer 2 and Layer 3 of different interfaces in a VLAN. (Use lowercase letters to supplement the command, which cannot be abbreviated.)

Options:

Question 22

Refer to the following command output on the router R3. Which of the following statements are correct?

display interface Tunnel

Tunnel0/0/0 current state : UP

Line protocol current state : UP

Last line protocol up time : 15:21:26 UTC-08:00

Description: HUAWEI, AR Series, Tunnel0/0/0 Interface

Route Port, The Maximum Transmit Unit is 1500

Internet Address is 20.1.1.2/24

Encapsulation is TUNNEL, loopback not set

Tunnel source 10.0.3.3 (LoopBack0), destination 10.0.1.1

Tunnel protocol/transport GRE/IP, key disabled

keepalive disabled

Checksumming of packets disabled

Options:

A.

The tunnel destination IP address is 10.0.1.1.

B.

The tunnel interface MTU is 1500 bytes.

C.

The tunnel interface IP address is 20.1.1.2/24.

D.

The tunnel source IP address is 10.0.1.1.

Question 23

During the configuration of L3VPNv4 over SRv6 BE, if an RR is deployed in the SR domain, which command must be run on the RR to ensure that the PEs at both ends can correctly learn VPNv4 routes?

Options:

Question 24

In the firewall hot standby scenario, when VGMP works in load balancing mode, which of the following functions must be enabled on the firewalls to prevent the return traffic from being discarded because it does not match any session entry in the case of inconsistent forward and return paths?

Options:

A.

Automatic backup

B.

Manual batch backup

C.

Quick session backup

D.

BFD

Question 25

VLAN-based MAC address flapping detection is configured. If MAC address flapping occurs, actions to be taken on an interface can be configured as required. Which of the following actions cannot be configured?

Options:

A.

Traffic filtering

B.

Alarm sending

C.

MAC address blocking

D.

Interface blocking

Question 26

Which of the following methods can be used to establish IPsec SAs? (Select All that Apply)

Options:

A.

Establish IPsec SAs through template negotiation

B.

Establish IPsec SAs in IKE auto-negotiation mode

C.

Establish IPsec SAs through certificate negotiation

D.

Manually establish IPsec SAs

Question 27

The following figure shows the inter-AS MPLS L3VPN Option C (Solution 2). ASBR-PE2 is connected to CE3 and runs eBGP.

To enable all CEs to communicate with each other, which of the following address families must peer relationships be enabled in the BGP process of ASBR-PE2?

Options:

A.

VPNv4 address family

B.

BGP-LS address family

C.

VPN instance unicast address family

D.

Unicast BGP address family

Question 28

Which of the following number sequences can be matched by the regular expression 100.s?

Options:

A.

100

B.

10000

C.

1000

D.

1001

Question 29

To obtain thetoken IDofiMaster NCE, you need to send anHTTP requestusing the followingPython codeto invoke aniMaster NCE RESTful API:

Which of the following statements isincorrect?

Options:

A.

You can run print(r.json()) to display the response message sent from the server.

B.

Token resources are located at https://139.9.213.72:18002/controller/v2/tokens.

C.

The HTTP request uses the GET method to query the token value.

D.

The request body is inJSON format.

Question 30

In OSPF, an ABR translates all Type 7 LSAs in a Not-So-Stubby Area (NSSA) into Type 5 LSAs.

Options:

A.

TRUE

B.

FALSE

Question 31

As shown in the figure, what is known about the default routes on R4?

Routing Table on R4:

display ip routing-table protocol isis

Destination/Mask Proto Pre Cost Flags NextHop Interface

0.0.0.0/0 ISIS-L1 15 10 D 10.1.24.1 GigabitEthernet0/0/1

ISIS-L1 15 10 D 10.1.34.1 GigabitEthernet0/0/0

172.16.1.2/32 ISIS-L1 15 10 D 10.1.24.1 GigabitEthernet0/0/1

172.16.1.3/32 ISIS-L1 15 10 D 10.1.34.1 GigabitEthernet0/0/0

Options:

A.

Four equal-cost default routes

B.

One default route

C.

Two default routes with different costs

D.

Two equal-cost default routes

Question 32

SR-MPLS uses IGP extensions to advertise labels and reserve bandwidth to support high-bandwidth services.

Options:

A.

TRUE

B.

FALSE

Question 33

Which of the following statements regarding RT are correct?

Options:

A.

Each VPN instance is associated with one or more pairs of VPN Target attributes, used to control VPN routing information advertisement and reception between sites.

B.

Export Target and Import Target are independent of each other and support multiple values to implement flexible VPN routing information advertisement and reception control.

C.

RTs are classified into two types: Export Target and Import Target.

D.

The RT value is advertised to neighbors through the BGP extended community attribute in Update messages.

Question 34

MPLS supports forwarding equivalence class (FEC). Which of the following cannot be used as an FEC allocation standard?

Options:

A.

Fragment offset

B.

Application protocol

C.

Destination address

D.

Class of Service (CoS)

Question 35

In the figure,SR-MPLSis enabled onR1, R2, and R3. TheSRGB (Segment Routing Global Block) rangeonR3is from20000 to 21000, and theprefix SID indexconfigured on theloopback1 interface of R3 is 30.

In this case, theMPLS label corresponding to the loopback1 interface of R3 is _____.

(Enter anArabic numeralwithout symbols.)

Options:

Question 36

AH is an IP-based transport-layer protocol. The protocol number is _____. (Enter only digits.)

Options:

Question 37

Which of the following are carried in the HTTP/1.1 response header?

Options:

A.

Status code

B.

Reason phrase

C.

Protocol version

D.

Response method

Question 38

When static IPsec VPN is used for WAN interconnection in the Huawei CloudCampus Solution, the AP, Router, and _____ can be used as egress devices. (Use full spelling with the first letter capitalized.)

Options:

Question 39

Which of the following statements is incorrect about the user authentication points on the network?

Options:

A.

Deploying user authentication points at the access layer achieves granular permission management and high network security.

B.

Moving user authentication points from the access layer to the aggregation or core layer greatly reduces the number of user authentication points, thereby effectively mitigating the pressure on the AAA server.

C.

Deploying user authentication points at the access layer has both advantages and disadvantages when compared to doing so at the aggregation or core layer. Policy association can be applied if user authentication points are deployed at the access layer.

D.

When user authentication points are moved from the access layer to the aggregation layer, MAC address authentication for users may fail.

Question 40

Congestion management technology can be used to discard data packets in the buffer queue to prevent the buffer queue from being exhausted.

Options:

A.

TRUE

B.

FALSE

Question 41

By default, the domain ID of an OSPF process is the same as the process ID. You can run the domain-id command in the OSPF process view to change a domain ID.

Options:

A.

TRUE

B.

FALSE

Question 42

To deploy a virtual campus network using iMaster NCE-Campus, the following steps are performed. From top to bottom, sort the steps in the order in which they occur during network deployment and management.

Options:

Question 43

Which of the following statements are correct about the command:

ping -aX -cY -sZ -vpn-instance M 10.5.16.2

Options:

A.

The source IP address of the ping packets is X.

B.

The ping packets belong to VPN instance M.

C.

During the ping operation, the quantity of ICMP Request packets is Y.

D.

The size of each ICMP Request packet for the ping operation is Z bytes.

Question 44

On acampus network,iMaster NCE-Campusis used to deploy twoVNs (Virtual Networks):R&D VNandMarketing VN. Users in these two VNs belong to twoseparate security groups.

The campus network requiresR&D personnel and sales personnel to communicate with each other. To meet this requirement, which of the following tasks does a network administrator need to perform?

Options:

A.

Deploy network service resources.

B.

Deploy a policy control matrix.

C.

Configure inter-VN communication.

D.

Deploy an external network.

Question 45

Huawei Open Programmability System (OPS) uses standard HTTP methods to access managed objects to manage network devices. Which of the following HTTP methods is used to configure the value of a network device's managed object?

Options:

A.

PUT

B.

POST

C.

PATCH

D.

GET

Question 46

NAFTIR policing can only be applied to the inbound direction. Its purpose is to monitor the traffic entering the device and ensure that the upstream device does not unnecessarily consume network resources.

Options:

A.

TRUE

B.

FALSE

Question 47

Which of the following statements about IPSG is incorrect?

Options:

A.

IPSG can be used to check the validity of IP packets. If IP packets are invalid, the device reports an alarm to an NMS.

B.

IPSG is a source IP address filtering technology based on Layer 3 interfaces.

C.

IPSG can be used to prevent hosts from changing IP addresses.

D.

IPSG can defend against IP address spoofing attacks.

Question 48

The path of an SR-MPLS TE tunnel can be calculated by the controller or tunnel ingress.

Options:

A.

TRUE

B.

FALSE

Question 49

Which of the following statements are correct about the authentication protocols used inPortal authentication?

Options:

A.

When Portal is used as the authentication protocol, the Portal server needs to exchange authentication information with the access device, which then sends the information to the authentication server for identity authentication.

B.

When Portal is used as the authentication protocol, the Portal server and access device only need to support the Portal protocol, but not the HTTP and HTTPS protocols.

C.

When HTTP or HTTPS is used as the authentication protocol, none of the devices involved in the authentication process need to support the Portal protocol.

D.

When HTTP or HTTPS is used as the authentication protocol, the client needs to send authentication information to the access device, which then sends the information to the authentication server for identity authentication.

Question 50

As shown in the figure, PE1 establishes an EVPN peer relationship with each of PE2 and PE3. When the network is initialized, CE1 sends an ARP request packet.

Which of the following statements are correct about how a PE processes the packet?

Options:

A.

When forwarding the packet to PE3, PE1 needs to add the BUM traffic label allocated by PE3 to the packet.

B.

PE1 sends a MAC/IP advertisement route carrying the MAC address of CE1.

C.

PE2 forwards the packet to CE1.

D.

PE3 forwards the packet to CE1.

Question 51

Which of the following inter-AS MPLS L3VPN solutions need VPN user data packets to carry MPLS labels when being forwarded between ASs?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 52

Refer to the following command output on the router R1. Which of the following statements isincorrect?

display interface Tunnel

Tunnel0/0/0 current state : UP

Line protocol current state : UP

Last line protocol up time : 15:21:23 UTC-08:00

Description: ! 0.0.3.3

Route Port, The Maximum Transmit Unit is 1500

Internet Address is 20.1.1.1/24

Encapsulation is TUNNEL, loopback not set

Tunnel source 10.0.1.1 (LoopBack0), destination 10.0.3.3

Tunnel protocol/transport GRE/IP, key disabled

keepalive disabled

Checksumming of packets disabled

Current system time: 15:21:37-08:00

300 seconds input rate 0 bits/sec, 0 packets/sec

300 seconds output rate 0 bits/sec, 0 packets/sec

13 seconds input rate 0 bits/sec, 0 packets/sec

13 seconds output rate 448 bits/sec, 0 packets/sec

9 packets output, 824 bytes

0 output error

Input bandwidth utilization : -

Output bandwidth utilization : -

Options:

A.

Key authentication is disabled for the tunnel.

B.

The destination IP address of the tunnel is 10.0.3.3.

C.

The tunnel is a GRE tunnel.

D.

Keepalive detection is enabled on the tunnel.

Question 53

In DU label advertisement mode, if the liberal label retention mode is used, the device reserves labels received from all the LDP peers regardless of whether the LDP peer is the optimal next hop for reaching the destination network.

Options:

A.

TRUE

B.

FALSE

Question 54

Whenstatic IPsec VPNis used for WAN interconnection in theHuawei CloudCampus Solution, theAP, Router, and ____can be used as egress devices.

Options:

Question 55

NETCONF provides a set of mechanisms for managing network devices. What layers can NETCONF be conceptually partitioned into?

Options:

A.

Encrypted transport layer, messages layer, operations layer, and content layer

B.

Encrypted transport layer, messages layer, configuration layer, and content layer

C.

Secure transport layer, messages layer, configuration layer, and content layer

D.

Secure transport layer, messages layer, operations layer, and content layer

Question 56

IPsec SAs can be established in either manual mode or IKE auto-negotiation mode. Which of the following statements about the two modes is incorrect?

Options:

A.

The lifetime of an SA established in IKE auto-negotiation mode is controlled by the lifetime parameters configured on both ends of the tunnel.

B.

In manual mode, all parameters (including encryption and authentication keys) required for establishing an IPsec SA need to be manually configured.

C.

In IKE auto-negotiation mode, the encryption and authentication keys required for establishing an SA are generated using the DH algorithm.

D.

SAs established in both manual and IKE auto-negotiation modes can be dynamically updated.

Question 57

In addition to indicating priority, the DSCP value can also indicate the drop probability. Which of the following DSCP values is set with the highest drop probability?

Options:

A.

AF43

B.

AF10

C.

AF12

D.

AF11

Question 58

During WLAN planning and design, channels 1, 6, and 11 are recommended on the 2.4 GHz frequency band, and channels 1, 5, 9, and 13 are recommended in high-density scenarios. On the 5 GHz frequency band, it is recommended thathigh-frequency and low-frequency channels of adjacent APs be staggered to prevent overlapping.

Options:

A.

TRUE

B.

FALSE

Question 59

Drag theIPsec functionson the left to the corresponding function description on the right.

Question # 59

Options:

Question 60

The naming of SRv6 instructions complies with certain rules. You can quickly determine the function of an instruction based on the instruction name. Which of the following statements about the keywords in SRv6 instruction names are correct?

Options:

A.

T: searches a specified routing table to forward packets.

B.

M: searches a Layer 2 forwarding table for unicast forwarding.

C.

V: searches a VPN instance routing table to forward packets.

D.

X: forwards packets through one or a group of specified Layer 3 interfaces.

Question 61

The display current-configuration command displays the running configurations in memory.

Options:

A.

TRUE

B.

FALSE

Question 62

Network Quality Analysis (NQA) is a real-time network performance detection and measurement technology. It monitors the performance of multiple protocols running on a network. Which of the following protocols can be monitored by NQA?

Options:

A.

SNMP

B.

OSPF

C.

ICMP

D.

DHCP

Question 63

The TTL field encapsulated in the MPLS label header can prevent infinite loops of MPLS packets. Which of the following statements regarding the TTL field are correct?

Options:

A.

If TTL copy is disabled, users can use the tracert function to view the LSR of the MPLS domain.

B.

The processing of IP TTL copy hides the LSR in an MPLS domain, improving network security.

C.

MPLS provides two processing modes on the TTL field:TTL in the MPLS header copies the IP TTL value when an IP packet enters the MPLS network.The ingress LER sets the TTL value in the MPLS header to 255.

D.

MPLS encapsulation in frame mode supports the TTL field. MPLS encapsulation in cell mode does not support the TTL field.

Question 64

In the gRPC-based telemetry protocol, the data model layer consists of theRPC layer,telemetry layer, andservice data layer. Drag the.proto fileto the layer where the file should be located.

Options:

Question 65

On a virtualized network deployed using iMaster NCE-Campus, after creating VNs, you need to configure inter-VN communication. Which of the following configurations is used to achieve VN communication?

Options:

A.

Configure traffic filtering.

B.

Create a static route for the VPN instance corresponding to the VN.

C.

Deploy OSPF for the VPN instance corresponding to the VN.

D.

Deploy a routing policy.

Question 66

NETCONF provides a set of mechanisms for managing network devices. NETCONF operations take place on a configuration datastore of network devices. Which of the following statements is incorrect about the configuration datastore?

Options:

A.

The configuration datastore of network devices can be classified into the candidate, running, and startup configuration datastores.

B.

The operation is oriented at the startup configuration datastore.

C.

The operation is oriented at the candidate configuration datastore.

D.

The operation submits the configuration in a startup configuration datastore to a running configuration datastore.

Question 67

On a campus network, which of the following problems may occur when you manually create a static VXLAN tunnel?

Options:

A.

Although the static VXLAN tunnel mode supports the distributed gateway scenario, the configuration involves a heavy workload and is complex to adjust.

B.

Remote MAC addresses can be learned by the VTEP only through data flooding.

C.

A static VXLAN tunnel also uses corresponding protocols on the control plane, which consumes device resources.

D.

If N devices need to establish static VXLAN tunnels, a maximum of N(N -1)/2 tunnels need to be manually configured, which involves a heavy workload.

Question 68

If the number of MAC addresses learned on an interface enabled with port security reaches the upper limit, which of the following actions may the switch take?

Options:

A.

Discards packets with unknown source MAC addresses without generating any alarm.

B.

Sets the interface state to error-down without generating any alarm.

C.

Discards packets with unknown source MAC addresses and generates an alarm.

D.

Sets the interface state to error-down and generates an alarm.

Question 69

Which of the following is the type ofnorthbound APIused byiMaster NCE-WAN?

Options:

A.

NETCONF

B.

SNMP

C.

CLI

D.

RESTful

Question 70

In a BGP/MPLS IP VPN scenario, if a PE and CE use OSPF to exchange routing information, domain IDs are used to identify whether the routes imported to VPN instances are from the same OSPF domain.

Options:

A.

TRUE

B.

FALSE

Question 71

R1 receives a common IPv6 packet from the CE and generates a packet carrying the SRH (Segment Routing Header), as shown in the figure. The packet is forwarded along the path R1 → R2 → R3 → R4. Identify the node type of each device based on their role in SRv6 processing.

Question # 71

Question # 71

Options:

Question 72

On traditional campus networks, network admission control (NAC), VLAN, and ACL technologies are used to control users' network access rights. This results in heavy network O&M workload. Which of the following improvements does the free mobility solution of iMaster NCE-Campus make to traditional campus networks in terms of policy management and control?

Options:

A.

Administrators can use iMaster NCE-Campus to centrally manage service policies on network-wide policy enforcement points.

B.

Administrators can define service policies based on security groups to decouple service policies from IP addresses.

C.

Administrators need to configure service policies multiple times for each policy enforcement point through iMaster NCE-Campus, which then automatically delivers the policies to the corresponding policy enforcement points.

D.

Policy enforcement points on a network can subscribe to IP-security group entries through iMaster NCE-Campus to obtain the mapping between users and IP addresses on the entire network.

Question 73

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following statements about symmetric IRB forwarding are correct?

Options:

A.

Both the ingress VTEP and egress VTEP forward packets based on the Layer 3 forwarding table.

B.

The ingress VTEP forwards packets based only on the Layer 2 forwarding table.

C.

The egress VTEP forwards packets based only on the Layer 2 forwarding table.

D.

When VTEPs forward inter-subnet user communication packets, the VNI carried in the VXLAN header is the L3VNI.

Question 74

BGP routing policies can be used to control the advertisement and acceptance of routes.

Options:

A.

TRUE

B.

FALSE

Question 75

The free mobility function is deployed on the iMaster NCE-Campus on a campus network. Which of the following information should an administrator pay attention to?

Options:

A.

Define security groups.

B.

Deliver the inter-group policy.

C.

Deploy a policy control matrix.

D.

Select the policy enforcement point.

Question 76

Which of the following technologies can be used to measure performance based on actual service traffic in Huawei's CloudWAN solution?

Options:

A.

TWAMP

B.

BGP FlowSpec

C.

Telemetry

D.

iFIT

Question 77

SSH connections are usually established based on TCP/IP connections. In specific cases, SSH connections can be established based on UDP connections.

Options:

A.

TRUE

B.

FALSE

Question 78

At the NETCONF content layer, the operation may contain an operation attribute, which is used to specify an operation type for configuration data. Which of the following operation attributes are supported?

Options:

A.

create: The configuration data identified by the element that contains this attribute is added to the configuration datastore only if the configuration data does not already exist in the configuration datastore. If it already exists in the configuration datastore, with the value being data-exists is returned.

B.

delete: The configuration data identified by the element that contains this attribute is deleted from the configuration datastore. If the configuration data does not exist in the configuration datastore, a deletion success message is returned.

C.

merge: The configuration data identified by the element that contains this attribute is modified if the configuration data already exists in the configuration datastore. If not, the configuration data is created in the datastore.

D.

remove: The configuration data identified by the element that contains this attribute is deleted from the configuration datastore. If the configuration data does not exist in the configuration datastore, a deletion success message is returned.

Question 79

On a CloudCampus virtualized campus network, virtual networks are defined based on services. Each virtual network corresponds to a service, and isolation needs to be manually configured between virtual networks.

Options:

A.

TRUE

B.

FALSE

Question 80

In OSPFv3, which of the following types of LSAs can be flooded in the entire AS?

Options:

A.

AS-external-LSA

B.

Intra-Area-Prefix-LSA

C.

Link-LSA

D.

Inter-Area-Prefix-LSA

Question 81

BFD can implement millisecond-level link status detection.

Options:

A.

TRUE

B.

FALSE

Question 82

To allow only authorized users (users who obtain IP addresses through authorized DHCP servers or use specified static IP addresses) to access the network shown in the figure, which of the following solutions can be used?

Question # 82

Options:

A.

DAI + Port Security

B.

DHCP Snooping + IPSG

C.

DHCP Snooping + DAI

D.

DAI + IPSG

Question 83

A network administrator needs to retrieve atoken IDfromiMaster NCEusing the following Python code:

import requests

nbi_name = "demol3@north.com"

nbi_pwd = "qqcOVcVel@"

host = "139.9.213.72"

port = "18002"

URI = "/controller/v2/tokens"

post_token_url = "https:// " + host + ":" + port + URI

headers_post = {'Content-Type': 'application/json', 'Accept': 'application/json'}

r = requests.post(post_token_url, headers=headers_post, json={"userName": nbi_name, "password": nbi_pwd}, verify=incorrect)

Which of the following statements is incorrect?

Options:

A.

You can run print(r.json()) to display the response message sent from the server.

B.

Token resources are located at https://139.9.213.72:18002/controller/v2/tokens.

C.

The HTTP request uses the GET method to query the token value.

D.

The request body is inJSON format.

Question 84

BGP Link State (BGP-LS) introduces a new NLRI into BGP. The NLRI carries link, node, topology prefix, and other information, and is also referred to as the link state NLRI.

Options:

A.

TRUE

B.

FALSE

Question 85

The telemetry network model is broadly and narrowly defined. Which of the following modules are involved intelemetry in a narrow sense (device-side telemetry)?

Options:

A.

Data generation

B.

Data push

C.

Data source

D.

Data subscription

Question 86

On the campus network shown, IPv6 is deployed for service tests. Four routers are deployed on the network, and these routers use OSPFv3 for network connectivity. Which of the following statements about LSAs generated by the OSPFv3 network is incorrect?

Question # 86

Options:

A.

R1 generates Router-LSAs describing interface information and receives Router-LSAs generated by R2 and R3.

B.

R1 receives two Link-LSAs generated by R2. The two Link-LSAs describe information about the two links connected to R2.

C.

The LSDB of R1 contains Network-LSAs generated by R3, indicating that R3 may be the DR on the local link.

D.

R2 functions as an area border router (ABR), generates Inter-Area-Prefix-LSAs that describe the IPv6 address prefix of area 1, and advertises these Inter-Area-Prefix-LSAs to R1 and R3.

Question 87

Which of the following are potential risks in HTTP communication?

Options:

A.

Eavesdropping: Third parties can obtain communication data.

B.

Pretending: Third parties can impersonate another user.

C.

Tampering: Third parties can tamper with communication data.

D.

Lost: There is a low probability that data is lost during transmission.

Question 88

In the following figure, OSPF is enabled on all router interfaces. The IP addresses marked in the figure belong to Loopback0 of the routers.

Question # 88

The Loopback0 addresses of R1 and R2 are advertised in Area 1, the Loopback0 address of R4 is advertised in Area 0, and the Loopback0 addresses of R3 and R5 are advertised in Area 2. Given this, which of the following IP addresses can ping each other?

Options:

A.

10.0.3.3 and 10.0.5.5

B.

10.0.2.2 and 10.0.5.5

C.

10.0.2.2 and 10.0.3.3

D.

10.0.4.4 and 10.0.2.2

Question 89

SR-MPLS is enabled on all routers. The label information encapsulated byR1into a data packet is shown in the figure.

Which of the following is the forwarding path of the data packet?

Options:

A.

R1-R2-R3-R5-R6

B.

R1-R2-R4-R6

C.

R1-R3-R2-R4-R6

Question 90

If an engineer wants to remotely log in to a Huawei device, the engineer uses the Paramiko library to compile the following code when compiling the SSH Python script:

cli = ssh.invoke_shell()

cli.send("screen-length 0 temporary\n")

What is the function of screen-length 0 temporary?

Options:

A.

Performing automatic word wrap

B.

Performing split-screen display

C.

Canceling split-screen display

D.

Canceling automatic word wrap

Question 91

If SRv6 needs to be deployed on a bearer WAN, which of the following technologies are required? (Select all that apply)

Options:

A.

MPLS

B.

BGP

C.

IGP

D.

BGP-LU

Question 92

Flavors are additional behaviors defined to enhance theEnd series instructionsinSRv6. Which of the followingEnd instructionscan thePSP flavorbe attached to?

Options:

A.

End.X

B.

End.BM

C.

End.T

D.

End

Question 93

In Huawei SD-WAN Solution, which of the following tunneling technologies is used to establish data channels?

Options:

A.

WLAN

B.

IPsec

C.

MPLS

D.

GRE over IPsec

Question 94

Which of the following statements are correct about authentication points and policy enforcement points in Huawei's free mobility solution?

Options:

A.

The policy enforcement point executes inter-group policies based on security groups.

B.

The authentication point and policy enforcement point must be deployed on the same device.

C.

When receiving user traffic, the authentication point enforces a policy to process the traffic based on the source or destination security group corresponding to the source or destination IP address of the traffic.

D.

The authentication point and policy enforcement point can be deployed on different devices.

Question 95

In the following figure, a GRE tunnel is established between R1 and R2. If the command ping -a 10.1.1.1 10.3.1.1 is run on R1, which of the following statements is correct about the ICMP packet sent by GE0/0/1 of R1?

Options:

A.

The packet will be encapsulated using GRE, and the source and destination IP addresses in the outer IP header are10.0.12.1and10.0.12.2, respectively.

B.

The packet will be encapsulated using GRE, and the source and destination IP addresses in the outer IP header are10.0.12.1and10.3.1.1, respectively.

C.

The packet will be encapsulated using GRE, and the source and destination IP addresses in the inner IP header are10.1.1.1and10.3.1.1, respectively.

D.

The packet will be encapsulated using GRE, and the source and destination IP addresses in the inner IP header are10.1.1.1and10.0.12.2, respectively.

Question 96

Which of the following intelligent traffic steering policies can be used to fully utilize link bandwidth and implement link bandwidth-based load balancing on an enterprise network with multiple links?

Options:

A.

Application priority-based traffic steering

B.

Link quality-based traffic steering

C.

Link priority-based traffic steering

D.

Traffic bandwidth-based traffic steering

Page: 1 / 28
Total 275 questions