Easter Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Huawei H12-891_V1.0 HCIE-Datacom V1.0 Exam Practice Test

Page: 1 / 28
Total 275 questions

HCIE-Datacom V1.0 Questions and Answers

Question 1

Which of the following user logout modes are supported by 802.1X authentication?

Options:

A.

An authentication server forces a user to log out.

B.

A user logs out manually.

C.

An access device forces a user to log out.

D.

An accounting server forces a user to log out.

Question 2

With telemetry, certain data can be sampled based on specific sampling paths. Which of the following sampling paths are supported by telemetry?

Options:

A.

Interface statistics

B.

Information about the optical module on an interface

C.

CPU information

D.

Memory information

Question 3

Exhibit:

Question # 3

A loop occurs because Spanning Tree Protocol (STP) is not enabled on the network. Which of the following symptoms may occur?

Options:

A.

A loop alarm is generated on the LAN switch.

B.

CPU usage is too high.

C.

MAC entries flap.

D.

Host receives a large number of broadcast packets.

Question 4

Which of the following are potential risks in HTTP communication?

Options:

A.

Eavesdropping: Third parties can obtain communication data.

B.

Pretending: Third parties can impersonate another user.

C.

Tampering: Third parties can tamper with communication data.

D.

Lost: There is a low probability that data is lost during transmission.

Question 5

The display current-configuration command displays the running configurations in memory.

Options:

A.

TRUE

B.

FALSE

Question 6

According to the following information displayed on a router, which of the following are the causes of the failure in establishing an OSPF adjacency relationship?

OSPF error statistics:

    1: Hello timer mismatch

    0: Netmask mismatch

    0: Bad checksum

    0: Bad authentication type

    0: Unknown neighbor

    0: Extern option mismatch

Options:

A.

Hello packets are sent at different intervals.

B.

The area IDs are inconsistent.

C.

The IP address masks of the interfaces are inconsistent.

D.

The area types are inconsistent.

Question 7

IPsec SAs can be established in either manual mode or IKE auto-negotiation mode. Which of the following statements about the two modes is incorrect?

Options:

A.

The lifetime of an SA established in IKE auto-negotiation mode is controlled by the lifetime parameters configured on both ends of the tunnel.

B.

In manual mode, all parameters (including encryption and authentication keys) required for establishing an IPsec SA need to be manually configured.

C.

In IKE auto-negotiation mode, the encryption and authentication keys required for establishing an SA are generated using the DH algorithm.

D.

SAs established in both manual and IKE auto-negotiation modes can be dynamically updated.

Question 8

Which of the following statements is incorrect about access control on small and midsize campus networks based on the Huawei CloudCampus solution?

Options:

A.

iMaster NCE can function as an authentication server.

B.

Cloud APs support local Portal authentication.

C.

iMaster NCE can function as a Portal relay device.

D.

iMaster NCE can interconnect with a third-party RADIUS server.

Question 9

A network administrator needs to retrieve a token ID from iMaster NCE using the following Python code:

python

CopyEdit

import requests

nbi_name = "demol3@north.com"

nbi_pwd = "qqcOVcVel@"

host = "139.9.213.72"

port = "18002"

URI = "/controller/v2/tokens"

post_token_url = "https:// " + host + ":" + port + URI

headers_post = {'Content-Type': 'application/json', 'Accept': 'application/json'}

r = requests.post(post_token_url, headers=headers_post, json={"userName": nbi_name, "password": nbi_pwd}, verify=incorrect)

Which of the following statements is incorrect?

Options:

A.

You can run print(r.json()) to display the response message sent from the server.

B.

Token resources are located at https://139.9.213.72:18002/controller/v2/tokens.

C.

The HTTP request uses the GET method to query the token value.

D.

The request body is in JSON format.

Question 10

On a CloudCampus virtualized campus network, virtual networks are defined based on services. Each virtual network corresponds to a service, and isolation needs to be manually configured between virtual networks.

Options:

A.

TRUE

B.

FALSE

Question 11

Which of the following statements is correct about 6PE and 6VPE?

Options:

A.

In 6VPE networking, IPv6 addresses of a CE can be reused.

B.

In 6PE networking, VPN instances need to be created on PEs.

C.

In 6PE networking, IPv6 addresses of a CE can be reused.

D.

In 6VPE networking, no VPN instance needs to be created on PEs.

Question 12

Which of the following languages is integrated into the OPS?

Options:

A.

Python

B.

C programming language

C.

Java

D.

C++

Question 13

gRPC (Google Remote Procedure Call) is a language-neutral, platform-neutral, and open-source remote RPC system that supports unary RPCs and streaming RPCs.

Which of the following service methods are NOT supported by gRPC?

Options:

A.

rpc Subscribe(SubsArgs) stream returns(SubsReply) {};

B.

rpc dataPublish(stream serviceArgs) returns(stream serviceArgs) {};

C.

rpc stream LotsOfGreetings(HelloRequest) returns (HelloResponse) {};

D.

rpc Cancel(CancelArgs) returns(CancelReply) {};

Question 14

Congestion avoidance technology can prevent congestion on an interface.

Options:

A.

TRUE

B.

FALSE

Question 15

The TTL field encapsulated in the MPLS label header can prevent infinite loops of MPLS packets. Which of the following statements regarding the TTL field are correct?

Options:

A.

If TTL copy is disabled, users can use the tracert function to view the LSR of the MPLS domain.

B.

The processing of IP TTL copy hides the LSR in an MPLS domain, improving network security.

C.

MPLS provides two processing modes on the TTL field:

TTL in the MPLS header copies the IP TTL value when an IP packet enters the MPLS network.

The ingress LER sets the TTL value in the MPLS header to 255.

D.

MPLS encapsulation in frame mode supports the TTL field. MPLS encapsulation in cell mode does not support the TTL field.

Question 16

Which of the following is the type of northbound API used by iMaster NCE-WAN?

Options:

A.

NETCONF

B.

SNMP

C.

CLI

D.

RESTful

Question 17

The channelized sub-interface and FlexE technologies both can be used to implement network slicing, but the application scenarios of the two technologies are slightly different. Which of the following statements about the two technologies are correct?

Options:

A.

It is recommended that channelized sub-interface be used to reserve resources for interfaces with a bandwidth of less than 50 Gbit/s.

B.

It is recommended that FlexE be used to reserve resources for 50GE and higher-rate interfaces.

C.

Only FlexE-based network slicing can be deployed across OTN devices.

D.

Only network slicing based on channelized sub-interface can be deployed across MSTP devices.

Question 18

Port isolation can be deployed on an Ethernet network to implement both Layer 2 communication and Layer 3 isolation, making the networking more flexible.

Options:

A.

TRUE

B.

FALSE

Question 19

To allow only authorized users (users who obtain IP addresses through authorized DHCP servers or use specified static IP addresses) to access the network shown in the figure, which of the following solutions can be used?

Question # 19

Options:

A.

DAI + Port Security

B.

DHCP Snooping + IPSG

C.

DHCP Snooping + DAI

D.

DAI + IPSG

Question 20

Which of the following intelligent traffic steering policies can be used to fully utilize link bandwidth and implement link bandwidth-based load balancing on an enterprise network with multiple links?

Options:

A.

Application priority-based traffic steering

B.

Link quality-based traffic steering

C.

Link priority-based traffic steering

D.

Traffic bandwidth-based traffic steering

Question 21

A network administrator runs the display telemetry destination command on a device to check information about a destination group that sampled data is sent to. The command output is as follows. Which of the following statements is incorrect?

[~CE-telemetry-sensor-group-Sensor1]display telemetry destination

Dest-name Dest-addr Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20000 RESOLVED - GRPC

Options:

A.

The IP address of the destination group is 192.168.56.1

B.

The destination group name is Dest1.

C.

VPN encapsulation is used for data push.

D.

The gRPC protocol is used for data push.

Question 22

In the Huawei CloudCampus Solution, which of the following devices can go online through the registration query center?

Options:

A.

Switch

B.

AR

C.

AP

D.

Firewall

Question 23

In OSPFv3, which of the following types of LSAs can be flooded in the entire AS?

Options:

A.

Link-LSA

B.

AS-external-LSA

C.

Inter-Area-Prefix-LSA

D.

Intra-Area-Prefix-LSA

Question 24

In the small and midsize campus network design based on the Huawei CloudCampus Solution, when over 100 branches need to communicate with each other, which of the following interconnection networking models is recommended?

Options:

A.

Direct networking

B.

Full-mesh networking

C.

Hub-spoke networking

D.

Partial-mesh networking

Question 25

An SR-MPLS Policy needs to divert service traffic to a tunnel for forwarding. If traffic from various services is destined for the same address, which of the following traffic diversion modes is recommended to ensure the quality of each service?

Options:

A.

Endpoint-based traffic diversion

B.

Color-based traffic diversion

C.

5-tuple-based traffic diversion

D.

DSCP-based traffic diversion

Question 26

A network administrator runs the display telemetry subscription command on a device to check telemetry subscription information. The command output is as follows:

[~CE]display telemetry subscription

Sub-name : Sub1

Sensor group:

Sensor-name Sample-interval(ms) State

Sensor1 1000 RESOLVED

Destination group:

Dest-name Dest-IP Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20000 RESOLVED - GRPC

Sub-state : PASSIVE

Total subscription number is : 1

Which of the following statements is incorrect?

Options:

A.

The subscription name is Sub1.

B.

The IP address of the device is 192.168.56.1.

C.

The subscription mode is static subscription.

D.

The device sends sampled data every second.

Question 27

Exhibit:

Question # 27

The following figure shows the inter-AS MPLS VPN Option C (solution 2). RRs are deployed, and no traffic passes through the RRs during forwarding. If a data packet sent from PE2 to 192.168.1.1 carries two labels, which of the following statements about the two labels are correct?

Options:

A.

T1 is allocated by RR2.

B.

T1 is allocated by P2.

C.

V1 is allocated by PE1.

D.

V1 is allocated by P2.

Question 28

In the Huawei SD-WAN Solution, the topologies of different VNs must be the same.

Options:

A.

TRUE

B.

FALSE

Question 29

OSPFv2 is an IGP running on IPv4 networks, whereas OSPFv3 is an IGP running on IPv6 networks. OSPFv2 and OSPFv3 have similar LSA types, but their LSA functions are slightly different. Which of the following is not an OSPFv3 LSA type?

Options:

A.

ASBR-Summary-LSA

B.

AS-External-LSA

C.

Router-LSA

D.

Network-LSA

Question 30

The RR (Route Reflector) is critical to the Huawei SD-WAN Solution, and its deployment mode varies based on the scenario. In which of the following modes can an RR be deployed?

Options:

A.

Multi-area deployment of the RR

B.

Independent deployment of the RR

C.

Co-deployment of the RR and hub site

D.

Partially independent deployment of the RR

Question 31

BGP EVPN can be used as the VXLAN control plane protocol to completely prevent traffic flooding, such as broadcast ARP packets, on the VXLAN network.

Options:

A.

TRUE

B.

FALSE

Question 32

Which of the following statements regarding RT are correct?

Options:

A.

Each VPN instance is associated with one or more pairs of VPN Target attributes, used to control VPN routing information advertisement and reception between sites.

B.

Export Target and Import Target are independent of each other and support multiple values to implement flexible VPN routing information advertisement and reception control.

C.

RTs are classified into two types: Export Target and Import Target.

D.

The RT value is advertised to neighbors through the BGP extended community attribute in Update messages.

Question 33

IPsec uses an asymmetric encryption algorithm to encrypt the symmetric algorithm key, which it uses to encrypt/decrypt data, ensuring security and performance.

Options:

A.

TRUE

B.

FALSE

Question 34

In 6PE and 6VPE networking, no VPN instance needs to be created on PEs.

Options:

A.

TRUE

B.

FALSE

Question 35

BFD can implement millisecond-level link status detection.

Options:

A.

TRUE

B.

FALSE

Question 36

In the firewall hot standby scenario, which of the following status information can be backed up between the active and standby firewalls?

Options:

A.

Server mapping table

B.

AAA user table (excluding the default user admin)

C.

Session table

D.

Dynamic MAC address table

Question 37

Refer to the output information of a device below. According to the information, which of the following MPLS labels is carried in a data packet forwarded by the device to 10.0.1.1?

Question # 37

Options:

A.

36100

B.

36200

C.

40100

D.

40200

Question 38

Which of the following items are included in static information collection and analysis?

Options:

A.

Device types

B.

Interface types

C.

License

D.

Packet loss rate

Question 39

K company has two types of network services: UDP-based real-time video streaming services and TCP-based FTP download services. The company's network administrator often receives complaints that the FTP download speed is slow or unstable. What are the possible causes?

Options:

A.

The device uses the tail drop technology. As a result, global TCP synchronization affects the FTP rate.

B.

The device performs PQ scheduling for FTP services and WFQ scheduling for video services. As a result, the FTP service bandwidth is preempted.

C.

The device limits the FTP traffic rate to a small value.

D.

The video service has a higher priority and preempts the bandwidth of the FTP service.

Question 40

Telemetry data must be encoded in GPB binary format. This format reduces the number of bytes in telemetry messages and improves the transmission efficiency compared with messages encoded in JSON format.

Options:

A.

TRUE

B.

FALSE

Question 41

BGP Link State (BGP-LS) introduces a new NLRI into BGP. The NLRI carries link, node, topology prefix, and other information, and is also referred to as the link state NLRI.

Options:

A.

TRUE

B.

FALSE

Question 42

On a CloudCampus virtualized campus network, which of the following modes can be used by a fabric to connect to external networks?

Options:

A.

Layer 3 shared egress

B.

Layer 2 shared egress

C.

Layer 3 exclusive egress

D.

Layer 2 exclusive egress

Question 43

An HTTP request line consists of three fields. Select the fields to form a complete HTTP request message.

Question # 43

Options:

Question 44

Question # 44

As shown in the following figure, an engineer tests network interconnection between two branches. To implement network interconnection, OSPF is deployed on R1, R2, and R3 of branch 1, and IS-IS is deployed on R2, R3, and R4 of branch 2. Which of the following operations needs to be performed to allow R1 to access R4's loopback interface address?

Options:

A.

Run the default-route-advertise command in both the OSPF and IS-IS views on R2.

B.

No configuration is required.

C.

Run the default-route-advertise command only in the OSPF view on R2.

D.

Run the default-route-advertise command only in the IS-IS view on R2.

Question 45

In Huawei SD-WAN Solution, which of the following tunneling technologies is used to establish data channels?

Options:

A.

WLAN

B.

IPsec

C.

MPLS

D.

GRE over IPsec

Question 46

In the Huawei SD-WAN Solution, which of the following routing protocols is used to advertise VPN routes between CPEs?

Options:

A.

RIP

B.

OSPF

C.

IS-IS

D.

BGP

Question 47

Which of the following statements are correct about the command:

ping -aX -cY -sZ -vpn-instance M 10.5.16.2

Options:

A.

The source IP address of the ping packets is X.

B.

The ping packets belong to VPN instance M.

C.

During the ping operation, the quantity of ICMP Request packets is Y.

D.

The size of each ICMP Request packet for the ping operation is Z bytes.

Question 48

An LSR (Label Switching Router) supports various label retention modes. Which of the following statements regarding the liberal mode are correct?

Options:

A.

An LSR retains labels from a neighboring LSR only when the neighbor is its next hop.

B.

This label retention mode saves memory and label space.

C.

An LSR reserves all labels distributed by its neighbor.

D.

The liberal mode requires more memory and label space.

Question 49

As shown in the figure, ARP broadcast suppression is enabled on VTEP1 in BD 20 (VNI 200).

    VTEP1 learns ARP information about PC2 through BGP EVPN routes.

    When VTEP1 forwards the ARP request for PC1’s MAC address to VTEP2,

    What is the destination MAC address of the inner data frame?

Question # 49

Options:

A.

MAC B

B.

MAC C

C.

MAC A

D.

MAC D

Question 50

An SRv6 Policy can be either statically configured on a device or dynamically generated by the controller and then delivered to the device.

Options:

A.

TRUE

B.

FALSE

Question 51

Which of the following statements about SR-MPLS Policy candidate paths are correct?

Options:

A.

A candidate path can contain multiple segment lists, with each segment list carrying the weight attribute.

B.

Load balancing can be implemented among candidate paths and among segment lists.

C.

An SR-MPLS policy can contain multiple candidate paths with the preference attribute.

D.

The valid candidate path with the highest preference functions as the primary path of the SR-MPLS Policy.

Question 52

Which of the following inter-AS MPLS L3VPN solutions needs ASBRs to transmit VPNv4 routes?

Options:

A.

Option C

B.

Option B

C.

Option A

D.

Option D

Question 53

The following figure shows the inter-AS MPLS L3VPN Option C (Solution 2). ASBR-PE2 is connected to CE3 and runs eBGP.

Question # 53

To enable all CEs to communicate with each other, which of the following address families must peer relationships be enabled in the BGP process of ASBR-PE2?

Options:

A.

VPNv4 address family

B.

BGP-LS address family

C.

VPN instance unicast address family

D.

Unicast BGP address family

Page: 1 / 28
Total 275 questions