Winter Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Huawei H12-821_V1.0 HCIP-Datacom-Core Technology V1.0 Exam Practice Test

Page: 1 / 6
Total 60 questions

HCIP-Datacom-Core Technology V1.0 Questions and Answers

Question 1

An edge port is a new port role added to RSTP to overcome the disadvantages of STP. Which of the following statements is false about this port role?

Options:

A.

The port does not participate in RSTP calculation.

B.

The port can directly enter the Forwarding state from the Discarding state.

C.

After receiving a configuration BPDU, the port is still in the Forwarding state.

D.

The Up and Down states of the port do not cause network topology changes.

Question 2

In IPv6, interface IDs can be manually configured, automatically generated by the system, or generated based on the IEEE EUI-64 standard.

Options:

A.

TRUE

B.

FALSE

Question 3

When receiving a packet, a Huawei router matches the packet against ACL rules. The default ACL matching order used by the Huawei router is.

Options:

Question 4

Access control lists can be classified into which types as follows?

Options:

A.

Basic ACL

B.

User-defined ACL

C.

Advanced ACL

D.

Layer 2 ACL

Question 5

A route-policy can have multiple nodes, and each node can have multiple if-match and apply clauses. Which of the following statements are false?

Options:

A.

The operator between if-match clauses under a node is AND.

B.

The operator between nodes is AND.

C.

The operator between if-match clauses under a node is OR.

D.

The operator between nodes is OR.

Question 6

On an RSTP network, if a port receives an RST BPDU and finds that its buffered RST BPDU is superior to the received RST BPDU, the port discards the received RST BPDU without responding.

Options:

A.

TRUE

B.

FALSE

Question 7

Which of the following routing protocols support the default route through command configuration?

Options:

A.

BGP

B.

IS-IS

C.

OSPF

D.

ICMP

Question 8

Which of the following statements regarding the OSPF protocol is false?

Options:

A.

Each OSPF router uses only one Router-LSA to describe the local active connection status of an area.

B.

Routing information can be advertised only between backbone and non-backbone areas and cannot be advertised directly between non-backbone areas.

C.

Router-LSA describes four connection types: P2P, TransNet, SubNet, and virtual link.

D.

Link State ID in a Type 3 LSA indicates the router ID of an ABR.

Question 9

Which of the following statements is false?

Options:

A.

If the current DR fails, the current BDR automatically becomes a new DR, and a BDR will be elected again.

B.

A device with a higher router priority has a higher election priority.

C.

When a router with the highest router priority joins an OSPF network, this router will become the new DR.

D.

If two devices have the same router priority, the device with a larger router ID has a higher election priority.

Question 10

In VRRP networking, devices assume the Master and Backup roles after election. Match the two roles with their working mechanisms.(Token is reusable)

Question # 10

Options:

Question 11

Compress the 2001:0DB8:0000:C030:0000:0000:09A0 address.

Options:

Question 12

In an OSPF routing domain, two routers must be specified as one DR and one BDR in a broadcast or NBMA network with at least two routers.

Options:

A.

TRUE

B.

FALSE

Question 13

ON a stateful inspection Firewall where there is no session table, when the status detection mechanism is enabled and the second packet (CYN+ACK) of 3-way hadshakes reaches the firewall. Which of the following statements is true?

Options:

A.

If the firewall security policy permits packets to pass, the session table is created.

B.

By default, when status detection is disabled and the permit policy is configured packets can pass.

C.

Packets must pass the firewall, and a session table is established.

D.

If the firewall security policy permits packets to pass, the packets can pass the firewall.

Question 14

Which of the following statements regarding different LSA types is false?

Options:

A.

LS Request packets contain only LS Type, LS ID, and Advertising Router.

B.

LS Ack packets contain complete LSA information.

C.

DD packets contain only LSA summary information, including LS Type, LS ID, Advertising Router, and LS Sequence Number.

D.

LS Update packets contain complete LSA information.

Question 15

Four routers run ISIS and have established adjacencies. The area IDs and router levels are marked in the following figure. If route leaking is configured on R3, which of the following is the cost of the route from R4 to 10.0.2.2/32?

Question # 15

Options:

A.

80

B.

50

C.

40

D.

30

Question 16

On an STP network, the root bridge, root port, and designated port are elected in sequence. The election rules of these ports are different. List the steps for electing the root port in sequence.

Question # 16

Options:

Question 17

Which of the following statements is false about the default processing of the next hop address when a BGP device advertises a route?

Options:

A.

When advertising a locally originated route to an IBGP peer, a BGP device sets the next hop address to the IP address of its interface connected to the peer.

B.

When advertising a non-labeled route received from an EBGP peer to an IBGP peer, a BGP device changes the next hop address to the IP address of its interface connected to the IBGP peer.

C.

When advertising a route to an EBGP peer, a BGP device sets the next hop address to the IP address of its interface connected to the peer.

D.

A BGP device does not change the next hop address of a route if the route is received from an IBGP peer and is to be sent to another IBGP peer.

Question 18

When creating a single-hop BFD session for the first time, bind the single-hop BFD session to the peer IP address and the local address. To modify a configured BFD session, delete it and create a new one.

Options:

A.

TRUE

B.

FALSE

Question 19

In an IPv4 address space, Class D addresses are used for multicast. Among Class D addresses, which of the following is the permanent group address range reserved for routing protocols?

Options:

A.

232.0.0.0 to 232.255.255.255

B.

239.0.0.0 to 239.255.255.255

C.

224.0.0.0 to 224.0.0.255

D.

224.0.1.0 to 231.255.255.255

Question 20

A switch runs MSTP. The configuration is shown in the figure. What is the role of this switch in MSTI 1?

Question # 20

Options:

A.

Uncertain

B.

Root switch

C.

Non-root switch

D.

Secondary root switch

Question 21

ACLs are a common matching tool in routing policies. An ACL can be configured on a router to match routes.

Options:

A.

TRUE

B.

FALSE

Question 22

An OSPF AS-external LSA describes a route to an AS external network. When the field in the LSA is 0.0.0.0, the traffic destined for the external network is sent to the ASBR that imports this external route. (Enter the acronym in uppercase.)

Options:

Question 23

After HSB is configured, the HSB channel fails to be established and cannot back up information on the active device to the standby device. What are the possible causes for this HSB function failure?

Options:

A.

The TCP channel is not established.

B.

The retransmission count and interval for HSB service packets are different on the two devices.

C.

The two ACs have the same priority.

D.

The source IP address and port number of the local end are different from the destination IP address and port number of the remote end.

Question 24

BFD can quickly detect faults in channels at multiple network layers, ensuring high reliability. To which of the following layers does BFD belong?

Options:

A.

Application layer

B.

Data link layer

C.

Physical layer

D.

Network layer

Question 25

An enterprise administrator views the following details about a BGP route during routine O&M:

yaml

CopyEdit

display bgp routing-table 192.168.1.1

BGP local router ID: 10.1.1.1

Local AS number: 100

Paths: 2 available, 0 best, 0 select

BGP routing table entry information of 192.168.1.1/32:

From: 10.1.1.2 (10.1.1.2)

Route Duration: 00h01m31s

Relay IP Nexthop: 0.0.0.0

Relay IP Out-Interface: --

Original nexthop: 172.16.1.2

AS-path: 200, origin incomplete, MED 0, localpref 100, pref-val 0, internal, pre 255, invalid for IP unreachable

Not advertised to any peer yet

Which of the following statements are true about the BGP route?

Options:

A.

The original next hop of the route is 172.16.1.2.

B.

The local BGP router ID is 10.1.1.1.

C.

The local AS number is 100.

D.

The route is preferentially selected because its Local_Pref has a higher priority.

Question 26

When a packet passes through a firewall, the firewall creates a session connection for the packet to guide subsequent forwarding of the packet. However, the firewall does not create session entries for all packets. For which of the following packets does the firewall not create session entries when the packet reaches the firewall?

Options:

A.

ICMP ping packet

B.

GRE packet

C.

Subsequent fragment

D.

UDP packet

Question 27

Which of the following statements regarding the BGP error display of a router false?

Question # 27

Options:

A.

The error may be caused by the incorrect neighbor address.

B.

The neighbor address of this router is 10.1.1.5.

C.

Error Type indicates that the BGP error is caused by the neighbor relationship error.

D.

The error occurred at 12:40:39 on March 22, 2010.

Question 28

On the campus OSPF network shown in the following figure, the interfaces connecting the five routers are GE interfaces, and their costs are not changed. The import-route command is run on R1. After the network converges, the route to the server at 192.168.1.0/24 is queried on R2. Which of the following is the cost of this route?

Question # 28

Options:

A.

2

B.

4

C.

3

D.

1

Question 29

On an enterprise WLAN where Portal authentication is deployed, an AC functions as an access device and communicates with a Portal server using the Portal protocol. Which of the following statements are true about the Portal protocol?

Options:

A.

The HTTP or HTTPS protocol can be used as the Portal access or authentication protocol.

B.

By default, the access device processes Portal protocol packets through port 2000.

C.

By default, the device uses the destination port number 50100 to proactively send packets to the Portal server.

D.

Portal protocol packets are transmitted over TCP.

Question 30

Depending on the type of algorithms used, routing protocols are classified into distance-vector protocols and link-state protocols. Which of the following routing protocols are link-state protocols?

Options:

A.

RIP

B.

OSPF

C.

IS-IS

D.

BGP

Question 31

Which of the following statements regarding BGP route advertisement are false?

Options:

A.

All the BGP routes learned from all BGP peer will be advertised to other BGP peers.

B.

Only the optimal routes preferred by BGP can be advertised to other BGP peers.

C.

By default, the routes learned from an IBGP peer will not be forwarded to other IBGP peers.

D.

Only the routes learned from IGPs can be advertised to other BGP peers.

Question 32

IP multicast effectively conserves network bandwidth and reduces network load. Therefore, it is widely used in network services, such as IPTV, real-time data transmission, and multimedia conferencing.

Options:

A.

TRUE

B.

FALSE

Question 33

Which of the following statements about WLAN roaming are false?

Options:

A.

APs with which a STA is associated before and after roaming can work on different channels.

B.

During roaming, the STA sends a Reassociation Request frame containing home AP information to the foreign AP.

C.

During roaming, the STA sends an Association Request frame containing home AP information to the foreign AP.

D.

APs with which a STA is associated before and after roaming must work on the same channel.

Question 34

R1, R2, R3, and R4 run IS-IS, and the DIS priorities of their interfaces are shown in the following figure. If all these devices are started simultaneously, will be elected as the DIS. (Enter the device name, for example, R1.)Question # 34

Options:

Question 35

Security policy is the core feature of firewalls. Only valid traffic that complies with security policies can be forwarded by firewalls. Which of the following statements are true about security policy matching rules?

Options:

A.

Multiple values can be configured for a single matching condition, and the values are logically ANDed.

B.

If a security policy contains multiple matching conditions, the relationship between them is AND.

C.

The system has a default security policy named default, where all matching conditions are any and the default action is permit.

D.

When multiple security policy rules are configured, they are sorted in a list by configuration sequence by default. A security policy rule configured earlier is placed higher in the list and has a higher priority.

Question 36

On a P2P IS-IS network, after a neighbor relationship is established between R1 and R2, R2 finds that its LSDB is not synchronized. Then, R2 requests corresponding LSPs from R1 for LSDB synchronization. The following figure shows the synchronization process. Drag the following packet types to the steps in which they are used.(Token is reusable)

Question # 36

Options:

Question 37

During BGP route summarization configuration, the keyword can be used to suppress all specific routes so that only the summary route is advertised. The summary route carries the Atomic-aggregate attribute rather than the community attributes of specific routes.

Options:

Question 38

A monitoring plane usually comprises the monitoring units of main control boards and interface boards. This plane can monitor the system environment independently. Which of the following environment monitoring functions can be provided by the monitoring plane?

Options:

A.

Voltage monitoring

B.

Temperature monitoring

C.

Fan control

D.

System power-on and power-off control

Question 39

An enterprise uses OSPF to implement network communication. To ensure data validity and security, all authentication modes supported by OSPF are enabled on routers. In this case, interface authentication is preferentially used by the routers.

Options:

A.

TRUE

B.

FALSE

Question 40

When a BGP device sends an Open message to establish a peer connection, which of the following information is carried?

Options:

A.

Local AS number

B.

Router ID

C.

NLRI

D.

Hold time

Question 41

An IP prefix list is configured on a router using the following command:

ip ip-prefix huawei index 10 permit 10.1.1.0 24 greater-equal 26

In this case, the value of greater-equal-value is ____, and the value of less-equal-value is ____.

Options:

Question 42

OSPF supports area authentication and interface authentication. If both authentication modes are configured, Interface authentication takes preference over area authentication.

Options:

A.

TRUE

B.

FALSE

Question 43

L2TP does not provide security encryption. Therefore, other security measures, such as IPsec, are required to ensure the security of the entire tunnel for data transmission.

Options:

A.

TRUE

B.

FALSE

Question 44

Which of the following attributes cannot be directly referenced in an apply clause of a route-policy?

Options:

A.

community

B.

IP-prefix

C.

tag

D.

origin

Question 45

When two BGP peers support different Hold Time, they will negotiate to support the shortest Hold Time interval they can support.

Options:

A.

TRUE

B.

FALSE

Question 46

By default, a router interface sends PIM Hello messages at an interval of __________ seconds.

Options:

Question 47

Huawei modular devices have multiple hardware modules that provide different functions. Match the following hardware modules with their functions.

Question # 47

Options:

Question 48

Which of the following attribute must be carried in an Update message?

Options:

A.

Local-pref

B.

Prefval

C.

MED

D.

AS-Path

Question 49

OSPF has multiple types of routes with varying priorities. Which of the following types of routes has the lowest priority when they have the same prefix?

Options:

A.

Type 1 external route

B.

Inter-area route

C.

Type 2 external route

D.

Intra-area route

Question 50

Compared with RSTP, which of the following port roles are added to MSTP?

Options:

A.

Backup port

B.

Master port

C.

Edge port

D.

Regional edge port

Question 51

Which of the following PIM protocol packets have unicast destination addresses.

Options:

A.

Register Stop

B.

Bootstrap

C.

Graft

D.

Assert

Question 52

Which of the following LSAs are advertised only within a single area?

Options:

A.

Network LSA

B.

Router LSA

C.

Summary LSA

D.

AS External LSA

Question 53

Typically, a protocol that occupies two ports during communication is called a multi-channel protocol. For such protocols, the ASPF function must be enabled on the firewall to ensure smooth setup of the data channel and reduce the risk of attacks. Which of the following protocols is not a multi-channel protocol?

Options:

A.

FTP

B.

SIP

C.

SMTP

D.

H.323

Question 54

As shown in the figure, data traffic is forwarded in tunnel mode along the path of STA -> HAP -> HAC -> upper-layer network before roaming. What is the flow direction of data traffic after Layer 3 roaming?

Question # 54

Options:

A.

STA -> FAP -> FAC -> HAC -> HAP -> HAC -> Upper-layer network

B.

STA -> FAP -> FAC -> HAC -> Upper-layer network

C.

STA -> FAP -> FAC -> Upper-layer network

D.

STA -> FAP -> FAC -> HAC -> HAP -> Upper-layer network

Question 55

Compress the 2001:0DBB:B8:0000:C030:0000:0000:09A0:CDEF address.___________(if the answer contains letters, capitalize them.)

Options:

Question 56

GRE is a VPN encapsulation technology that is widely used to transmit packets across heterogeneous networks. Which of the following statements is false about GRE?

Options:

A.

GRE supports encryption and authentication.

B.

GRE supports multicast transmission.

C.

GRE is a Layer 3 VPN encapsulation technology.

D.

GRE can work with other VPN protocols to better ensure data security.

Question 57

Which of the following methods is usually used by a network administrator to configure a newly purchased device for the first time?

Options:

A.

Telnet

B.

SNMP

C.

Login through the Console port

D.

FTP

Question 58

As a next-generation wireless technology, Wi-Fi 6 greatly improves bandwidth rate and performance. Which of the following statements is false about the features of Wi-Fi 6?

Options:

A.

Uses OFDMA technology to achieve high concurrency.

B.

Realizes zero latency, ensuring efficient service running.

C.

Provides high bandwidth, up to 9.6 Gbps.

D.

Uses TWT technology to reduce terminal power consumption.

Question 59

When two routers exchange LSDB information using DD packets, a master/slave relationship is formed first, the router with a larger router ID is the master, and determine the MS bit.

Options:

A.

TRUE

B.

FALSE

Question 60

Which of the following statements are true about the packet filtering firewall?

Options:

A.

The packet filtering firewall can analyze associated packets to improve security.

B.

The packet filtering firewall supports per-packet detection.

C.

The packet filtering firewall can check application-layer data.

D.

The packet filtering firewall filters data packets based on ACLs.

Question 61

On an OSPF network, LSDBs are used to store LSAs. Common LSAs include router LSAs and network LSAs. Which of the following items is not included in the 3-tuple that is used to uniquely identify an LSA?

Options:

A.

LS Sequence Number

B.

Link State ID

C.

Advertising Router

D.

LSType

Question 62

The native AC function allows an agile switch to integrate AC capabilities, achieving wired and wireless convergence. The agile switch centrally manages wired and wireless service traffic.

Options:

A.

TRUE

B.

FALSE

Question 63

If the interval for two consecutive packets of a TCP session reaching the firewall is longer than the aging time of the session, the firewall deletes the session information from the session table to ensure network security.

Options:

A.

TRUE

B.

FALSE

Question 64

The Internet Assigned Numbers Authority (IANA) allocates Class D addresses to IPv4 multicast. An IPv4 address is 32 bits long, and the four most significant bits of a Class D address are 1110.

Options:

A.

TRUE

B.

FALSE

Question 65

Which of the following statements about stack split is false?

Options:

A.

After a stack splits, the MAC addresses of the two stacks change immediately.

B.

If the master and standby switches are still in the same stack after the stack splits, the slave switches separated from the original master and standby switches re-elect the master and standby switches due to protocol packet timeout.

C.

If the master and standby switches are in two stacks after the split, the stack where the original master switch resides updates the topology and selects a new standby switch. The original standby switch becomes the master switch in the new stack and a new standby switch is elected.

D.

After a stack splits, multiple stacks have the same IP address and MAC address. To prevent network faults, the stacks perform MAD detection. The stack that fails the MAD detection shuts down all physical ports except reserved ports.

Question 66

On Huawei switches, which of the following planes provides network information and forwarding entries that are mandatory for data plane forwarding?

Options:

A.

Forwarding plane

B.

Control plane

C.

Data plane

D.

Monitoring plane

Question 67

On an IS-IS network, areas are divided by router, and a router can belong to only one area. Therefore, an IS-IS router only needs to maintain the LSDB of its area.

Options:

A.

TRUE

B.

FALSE

Question 68

When multiple access channels are set for the same access requirement, the insecure access channels are not used and secure access channels are selected in normal cases. Which of the following are secure access channels?

Options:

A.

HTTPS

B.

Telnet

C.

SNMPv2

D.

SFTP

Question 69

The VRID of the VRRP virtual router is 3 and the virtual IP address is 100.1.1.10. What is the virtual MAC address?

Options:

A.

01-00-5E-00-01-64

B.

01-00-5E-00-01-03

C.

00-00-5E-00-01-64

D.

00-00-5E-00-01-03

Question 70

Which of the following statements regarding Local-Preference in BGP is true?

Options:

A.

Local-Preference affects traffic that enters an AS.

B.

Local-Preference can be transmitted between ASs.

C.

The default Local-Preference value is 100.

D.

Local-Preference is a well-known mandatory attribute.

Question 71

What is the default sending interval of BFD packets?

Options:

A.

10s

B.

5s

C.

100ms

D.

1000ms

Question 72

If a router ID is configured in both the system via and the BGP view, BGP uses the router ID configured in the BGP view because the BGP view takes precedence over the system view.

Options:

A.

TRUE

B.

FALSE

Question 73

When deploying BFD, you need to adjust some parameters so that it can better detect the network status. Which of the following statements is false about BFD optimization?

Options:

A.

After a high priority is configured for BFD packets, BFD packets are preferentially forwarded.

B.

To quickly learn about the network status and performance requirements, you can set the interval for sending BFD packets to the minimum value.

C.

On a live network, some devices switch traffic only when a BFD session changes to the Up state. If a routing protocol goes Up later than an interface, no route is available for switching traffic back, leading to traffic loss. To resolve this issue, configure a delay to compensate for the time difference caused when the routing protocol goes Up later than the interface.

D.

If a BFD session flaps, master/backup switchovers are frequently performed on the application associated with the BFD session. To prevent this, set the WTR time of the BFD session.

Question 74

BGP confederations are widely used because they can reduce the number of IBGP connections in an AS. Which of the following statements is false about confederations?

Options:

A.

The ASs outside a confederation still consider the confederation as one AS.

B.

After a confederation is configured, the original IBGP attributes can be retained.

C.

After a confederation is configured, the original AS number is used as the confederation ID of each router.

D.

A confederation divides an AS into several sub-ASs, and EBGP full-mesh connections are established in each sub-AS.

Question 75

Route attributes are specific descriptions of routes. BGP route attributes can be classified into four types. Which of the following are well-known discretionary attributes?

Options:

A.

Atomic_Aggregate

B.

Local-Preference

C.

Community

D.

MED

Question 76

On an office network of an enterprise, OSPF is enabled on two directly connected routers. During adjacency establishment, the state machine stays in the 2-way state. Which of the following statements are not possible causes?

Options:

A.

Hello time values are different.

B.

Area IDs are different.

C.

Router IDs conflict.

D.

The N-bit and E-bit of Hello packets are the same.

Question 77

Which of the following attributes must be carried when BGP sends route update messages?

Options:

A.

MED

B.

Next_Hop

C.

AS_Path

D.

Local_Preference

Question 78

The typical characteristics of the AI era are that it focuses on data, explores data value, and improves AI efficiency. Therefore, the core requirement of AI for data center networks is speed, meaning low latency.

Options:

A.

TRUE

B.

FALSE

Question 79

A network entity title consists of an area address and a system ID. It is a special NSAP (the SEL has a fixed value of 00) and is mainly used for route calculation.

Options:

A.

TRUE

B.

FALSE

Page: 1 / 6
Total 60 questions