Huawei H12-891_V1.0 -ENU HCIE-Datacom V1.0 1. Assuming that there are 5 segment IDs in the SRH of an SRv6 packet, when the packet reaches the third router on the forwarding path, the node will set the segment ID numbered by which of the following as the IPv6 destination address? A.5 B.2 C. Not sure D.3 Answer: D 2.Switch stacking and cross-device link aggregation can be deployed to achieve link reliability in small and medium-sized campus scenarios. A. TRUE 2] B. FALSE 02 [2 Answer: A ps um D m xa E 3.The GRE tunnel supports the MPLS LDP function. 0 1. A. TRUE V _ 91 B. FALSE -8 12 Answer: A H ei w ua H h 4.When the user encounters different events during the authentication process, the it W m user is in an unsuccessful authentication state. At this time, you can configure the xa E authentication event authorization to meet the needs of these users to access specific 0 1. network resources. V _ 91 Which of the following descriptions about authentication event authorization is wrong? -8 12 A. If the user's network access rights are not configured when the authentication fails H s or the authentication server is Down, after the user authentication fails, the user as P remains in the pre-connected state and has the network access rights of the pre- y tl en connected user i ic ff B. Authentication event authorization can support authorization parameters including E VLAN, user group and business scheme C. Events that can trigger authentication event authorization include authentication server Down, authentication server unresponsive, and pre-connection, etc. Authentication failure cannot trigger authentication event authorization D. Authorization of a non-authentication success state, also known as escape. For different authentication methods, there are different escape schemes. Some escape schemes are shared, and some escape schemes are only supported by specific authentication methods. Answer: C 5.When MPLS is deployed in the network and the network layer protocol is IP, the route corresponding to the FEC must exist in the IP routing table of the LSR, otherwise the label forwarding entry of the FEC will not take effect. A. TRUE B. FALSE Answer: A 6.Which of the following descriptions about traffic policing is correct? A. Traffic policing can only be used in the inbound direction B. Traffic policing will cache traffic that exceeds the limit C. Traffic policing can only be done in the outbound direction 2] D. Traffic policing will drop traffic that exceeds the limit 02 [2 Answer: D ps um D m xa E 7.Which of the following regular expressions can match only the BGP route entries 0 1. that pass through AS300 and then AS200? V _ 91 A. ^200|^300 -8 12 B. 200$|300$ H ei C. _200 (200 300) _ w ua D. _200[200 300]_ H h Answer: C it W m xa E 0 1. 8.Which of the following descriptions about "security group" and "resource group" is V _ 91 wrong in Business Travel? -8 12 A. The resource group supports static binding of IP addresses or address segments H s B. On iMaster NCE-Campus, the UCL group is the security group as P C. The any group can be used as both a source group and a destination group y tl en D. The security group supports static binding of IP addresses or address segments i ic ff Answer: C E 9.BIER, as a new forwarding technology, adopts the basic IGP routing protocol and unicast routing forwarding mechanism, so that there is no need to run IGMP between the multicast receiver and the multicast router. A. TRUE B. FALSE Answer: B 10.Which of the following does not belong to the scope of dynamic data collection on the live network before cutover? A. Routing Protocol Status B. ARP entry C. Port Status D. SNMP version Answer: C 11.Compared with traditional networks, SD-WAN can better ensure application experience. Which of the following is the main reason? A. SD-WAN can use IPsec technology to realize encrypted transmission of packets B. SD-WAN can provide different routing strategies and different QoS strategies for 2] different applications 02 [2 C. SD-WAN can build various networking types such as Full Mesh, Hub-Spoke, ps um Partial Mesh, etc. D m D. SD-WAN can realize multi-department business isolation based on VRF xa E Answer: B 0 1. V _ 91 -8 12 12.Using BGP EVPN as the control plane of VXLAN can completely avoid traffic H ei flooding in the VXLAN network, such as ARP broadcast packets. w ua A. TRUE H h B. FALSE it W m Answer: B xa E 0 1. V _ 91 13.Which of the following statements about the difference between NSR and NSF is -8 12 correct? H s A. NSF must rely on neighbor routers to complete as P B. Both NSR and NSF require neighbor routers to complete y tl en C. NSF can be done without neighbor routers i ic ff D. NSR must rely on neighbor routers to complete E Answer: A 14.Which of the following descriptions about the difference between SPFv2 and SPFv3 are correct? A. Both SPFv2 and SPFv3 support interface authentication, and OSPFv3 authentication is still implemented based on the fields in the SPF packet header B. SPFv3 is similar to SPFv2 and uses the multicast address as the destination address of SPF packets C. SPEv2 and OSPFv3 have the same type of packets: Hello, ODD, LSR, LSU, LSAack, and their packet formats are the same D. The protocol number of SPFv2 in the IPv4 header is 89, and the next header number of OSPFv3 in the IPv6 header is 89 Answer: B 15.When the switch is deployed with DHCP option 148, which of the following information will not be provided by the DHCP server to the switch to be deployed? A. The IP address of the cloud management platform B. The port number of the cloud management platform C. The port number of the device to be deployed D. The IP address of the device to be deployed Answer: D 2] 02 [2 ps um 16.In the scenario of establishing a VXLAN tunnel in the BGP EVPN state, which of D m the following descriptions about the role of BGP EVPN Type 3 routes is wrong? xa E A. If the VTEP IP address carried by the received Type3 route is reachable by the 0 1. Layer 3 route, a VXLAN tunnel to the peer will be established. V _ 91 B. Type3 routing will carry L3 VNI -8 12 C. Type3 routing transmits Layer 2 and VTEP IP address information H ei D. In the case where the VTEP IP address of the Type3 route is reachable at Layer 3, w ua if the peer end is the same as the local end, a headend replication table is created for H h subsequent BUM packet forwarding it W m Answer: B xa E 0 1. V _ 91 17.In the campus VXLAN network, which of the following equipment is used to -8 12 connect the Fabric and the external network of the Fabric? H s A. Extended as P B. Brder y tl en C. Transparent i ic ff D. Edge E Answer: B 18.If the configuration of IS-IS can be found through the display current-configuration command, but the configuration of IS-IS cannot be found through the display saved- configuration command, which of the following is the possible reason? A. The running IS-IS configuration in the memory is not saved to Flash B. No IS-IS command entered C. Flash running IS-IS configuration, not saved to memory D. The running IS-IS configuration in memory has been saved to Flash Answer: A Test H12-891_V1.0-ENU
Enter the password to open this PDF file:
-
-
-
-
-
-
-
-
-
-
-
-