HCIE H12-891 Written0208

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

1. A network administrator fails to access devices on the internal network through Telnet.

Which of the following causes is the most impossible?


A. The route is unreachable, and the client fails to establish a TCP connection with the
server.
B. The number of login users reaches the upper limit.
C. An ACL is bound in the VTY user interface view.
D. The protocol inbound all command is configured in the VTY user interface view.
Answer: D
2. When EVPN carries L2VPN services, which of the following types of routes does not carry
CE information?
A. Ethernet A-D route
B. MAC/IP advertisement route
C. Inclusive multicast route
D. Ethernet segment route
Answer: C
3. The Huawei CloudCampus Solution supports various rate limiting modes for wireless
users in small-and medium-sized campus scenarios. Which of the following modes is
suitable for refined traffic control of each user?
A. User-based rate limiting
B. SSID-based rate limiting
C. ACL-based rate limiting
D. Radio-based rate limiting
Answer: A
4. Which of the following is the drop probability of packets exceeding the upper threshold
in WRED?
A.0.2
B.0.5
C.0.8
D.1
Answer: D
5. MPLS performs different actions on labels. What is the meaning of the pop action?
A. The top label is removed from the MPLS label stack.
B. The top label is added to the MPLS label stack.
C. The top label is replaced with another value.
D. The top label is replaced with the label of another group.
Answer: A
6. SR-MPLS is enabled on all routers. The label information encapsulated by R1 into a data
packet is shown in the figure. Which of the following MPLS labels is carried in the data
packet when it is sent from R2 to R4?
A.2032
B. 2024
C.2046
D. No label
Answer: B
7. Which of the following methods cannot be used to improve device reliability for effective
network operation?
A.1+1 active/standby protection for main control boards
B. Load balancing among multiple microengines for interface boards
C. Maximum backup for power supplies
D. Periodic backup of device alarm logs
Answer:D
8. Which of the following statements is incorrect about a sham link?
A. To ensure that VPN traffic is forwarded through an MPLS backbone network the route
cost of a sham link must be smaller than the OSPF route cost of a backdoor link
B. A sham link is considered a link between two VPN instances. Each VPN instance must
have an endpoint address of a sham link which must be a loopback interface address
with a 32 bit mask in the VPN address space on a PE.
C. The endpoint address of a sham link is advertised by BGP as a VPNv4 address. Routes
that pass through a sham link can also be imported to BGP as VPNv4 routes.
D. A sham link can be configured in any area and needs to be manually configured. In
addition, a local VPN instance must have a route to the destination address of the sham
link (the endpoint address of the sham link on the remote PE).
Answer: D
9. In the topology shown in the following figure, OSPFv3 runs on the entire network. If no
external routes are imported, which of the following types of LSAs will not be generated
on R1?
A. Inter-Area-Router LSA
B. Link-LSA
C. Intra-Area-Prefix-LSA
D. Inter-Area-Prefix-LSA
Answer: A
10. Which of the following tools cannot be used to match the number of BGP routes?
A. Basic ACL
B. Advanced ACL
C. IP prefix-list
D. Community filter
Answer: B
11. In Huawei SD-WAN Solution, which of the following protocols is used by control
channels?
A. BGP4
B. BGP VPNv4
C. BGP EVPN
D. Static route
Answer: C
12. On a VXLAN network, which of the following is used by VXLAN to identify broadcast
domains locally?
A. BD
B. VRF
C. NVE
D. VNI
Answer: A
13. In the Huawei SD-WAN Solution, which of the following channels is established between
CPEs and a standalone RR?
A. Management channel
B. Control channel
C. Data channel
D. Authentication channel
Answer: B
14. Which of the following devices can be selected as the egress device in a multi-uplink
scenario where advanced security functions, such as URL filtering, IPS, security protection,
and antivirus required?
A AP
B.AR
C AC
D. Firewall
Answer: D
15. Huawei OPS provides the Python script template. The code of the main method in the
Python script template is as follows. Which of the following statements is incorrect?
def main ():
host = "localhost"
try:
ops. .conn = OPSConnection(host)
rsp_ data = get _startup. info(ops. .conn)
ops. .conn.close0
return
except:
errinfo = traceback.format, exc0)
printerrinfo)
return
A. When a python script is run on the local PC, set the host to the IP address of the
network device.
B. ops_conn= OPSConnection(host) indicates that the instance ops .conn of the
OPSConnection class is created.
C. rsp_data=get. startup info(ops. conn) indicates that the get startup. jinfo methodis
invoked. This method sends an HTTP request to the device and saves the response data
of the device to rsp. _data.
D. cops, connclose0 indicates that an HTTP connectionsclosed.
Answer: D
16. Which of the following statements about DHCP principle is incorrect?
A DHCP supports static IP address allocation, in which it assigns fixed IP addresses to
specified terminals.
B. When a DHCP client and a DHCP server are located on diferentLayer3 networks, a
DHCP relay agent is needed for forwarding packets between the DHCP client and server.
C. If only the gateway and DNS sever information needs to be delivered toa DHCP client
the DHCP Offer message sent by the DHCP sever to the client does not carry the Options
field.
D. The Options field in DHCP messages uses the type-length-value (TLV) structure and
can carry parameters such as the NTP server address, AC address, and log server address
Answer: C
17. In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which
of the following statements is correct when BGP EVPN Type 2 routes are used to
advertise host MAC addresses?
A. The IP Address and IP Address Length feds do not carry specific content.
B. BGP EVPN Type2 routes carry specific L2VNs and L3VNs.
C. BGP EVPN Type 2 routes carry specific L3VNIs.
D. The RT carried in the routes is the export RT of the IP VPN instance
Answer: A
18. YANG is a data modeling language. Which of the following statements is incorrect about
YANG?
A. The YANG model is presented as a yang file.
B. The YANG model can be converted to an XML syntax-based YANG Independent
Notation (MIN) model without any loss.
C. YANG is a modular language representing data structures in a hierarchical tree format.
D. YANG only supports built-in data types, while extended data types are not allowed.
Answer: D
19. Which of the following statements about OPS application scenarios is incorrect?
A. When the OPS is used to automatically deploy unconfigured devices, a Python script
is used to obtain the IP addresses of the software and configuration file server and
download the system software and configuration file。
B. To enable a network device to automatically send a configuration file to the sever after
the device configuration is saved, users can use the maintenance assistant to create a
timer trigger condition and periodically run the Python script.
C. The OPS can be used to automatically check the health status of devices.
D. The OPS can reduce the impact of the network environment in some cases For
example, when collected information is transmitted to a sever, the python script can be
used to temporarily store the execution result to the device when the network is
disconnected. Ater the network is reconnected, the execution result is transmitted to the
server.
Answer: B
20. In a MPLS VPN network, two-layer MPLS labels are added into data packets before they
are transmitted over the public network. Which of the following statements regarding
data packet processing are correct?
A The penultimate hop removes the outer label before forwarding the data packet to a
peer egress PE.
B. The IP data packet received by egress LSR is without of labels.
C The penultimate-hop device receives a packet withanouterlabelof3.
D. The egress PE sends the data packet to the correct VPN based on the inner label.
Answer:
21. Which of the following statements are correct about the MP. _REACH_ NLRI attribute of
BGP4+?
A. The length of the next hop address can be 16 or 32.
B. When the length of the next hop address is 16, the Network Address of Next Hop field
carries the link-local address.
C. The NLRI field carries the IPv6 route prefix and mask.
D. The value of the address family identifier (AFI) is 2, indicating IPv6.
Answer: ACD
22. SR-MPLS uses the MPLS forwarding plane, and therefore requires MPLS to be enabled.
Which of the following conditions must be met for MPLS to be automatically enabled on
an interface?
A. Segment routing is enabled for IGP, and IGP is enabled on the interface.
B. The static adjacency label of the corresponding interface is configured in the
segment routing view.
C. Segment routing is enabled in the system view.
D. The SRGB is configured for the IGP process
Answer: A
23. Port security changes some MAC addresses learned by an interface into secure MAC
addresses so that only hosts with secure MAC addresses can communicate with the
device through the interface, thereby enhancing device security. Which of the following
types of MAC address are secure MAC addresses?
A Dynamic secure MAC address
B. Static secure MAC address
C. Sticky MAC address
D. Protected MAC address
Answer: ABC
24. OSPF isa mature protocol and is unlikely to have route computation errors in a regular
networking environment under correct configurations. Which of the following
statements are correct?
A. A link works abnormally.
B. The OSPF network types on both ends of the link are inconsistent.
C. The OSPF MTU values of interfaces on both ends of the link are different.
D. The router IDs of neighbors are the same.
Answer: BC
25. In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which
of the following statements about the functions of BGP EVPN Type 2 routes are correct?
A BGP EVPN Type2 routes are used to a0vertise MAC addresses.
B. Host ARP advertisement can be used to suppress ARP broadcast packets
C ARP routes contain host route information.
D.IRB routes contain ARP information.
Answer: AC
26. Which of the following number sequences can be matched by the regular expression
100.$?
A.100
B.1000
C.1001
D.10000
Answer: ABC
27. On a VXLAN campus network, which of the following resources can be invoked for VNs?
A. Network service resource
B. IP address segment and VLAN of terminal users belonging to the VN
C. External network
D. Wired access ports and/or wireless access devices
Answer: ABCD
28. Which of the following are carried in an HTTP/1.1 response?
A. Status line
B. Response header
C Empty line
D. Response body
Answer: ABCD
29. The architecture of the Huawei SD-WAN Solution consists of the management layer,
control layer, and network layer. Which of the follwing devices are deployed at the
network layer?
A. RR
B. EDGE
C Firewall
D. GW
Answer: BD
30. On a VXLAN-based virtualized campus network, terminals communicate with each other
through VXLAN tunnels. When the campus network needs to communicate with external
networks, the data must pass through border nodes.
A. True
B. False
Answer: A
31. Port isolation can be deployed on an Ethernet network to implement both Layer 2
communication and Layer 3 isolation, making the networking more flexible.
A. True
B. False
Answer: B
32. To prevent hackers from attacking user devices or networks using MAC addresses, you
can configure MAC addresses of untrusted users as blackhole MAC addresses to filter
out such invalid MAC addresses. When receiving a packet whose source or destination
MAC address is a blackhole MAC address on a device, the device discards the packet.
A. True
B. False
Answer: A
33. iMaster NCE-Campus cannot manage devices through SNMP.
A. True
B. False
Answer: B

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy