Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Huawei H12-821_V1.0 HCIP-Datacom-Core Technology V1.0 Exam Practice Test

Page: 1 / 22
Total 219 questions

HCIP-Datacom-Core Technology V1.0 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

What parameters can a DHCP6 server assign to a DHCPv6 client?

Options:

A.

Gateway address

B.

DNS server address

C.

IPV6 address/prefix

D.

SNTP server address

Question 2

The typical characteristics of the AI era are that it focuses on data, explores data value, and improves AI efficiency. Therefore, the core requirement of AI for data center networks is speed, meaning low latency.

Options:

A.

TRUE

B.

FALSE

Question 3

Which of the following attributes must be carried when BGP sends route update messages?

Options:

A.

MED

B.

Next_Hop

C.

AS_Path

D.

Local_Preference

Question 4

In an OSPF routing domain, two routers must be specified as one DR and one BDR in a broadcast or NBMA network with at least two routers.

Options:

A.

TRUE

B.

FALSE

Question 5

Similar to the OSPF DR, the IS-IS DIS needs to be elected on a broadcast network. However, the OSPF DR is preemptive by default, whereas the IS-IS DIS is not preemptive by default.

Options:

A.

TRUE

B.

FALSE

Question 6

As shown in the figure, the stateful inspection firewall forwards the packet because the packet matches the session status of the firewall.

Options:

A.

TRUE

B.

FALSE

Question 7

OSPF supports area authentication and interface authentication. If both authentication modes are configured, Interface authentication takes preference over area authentication.

Options:

A.

TRUE

B.

FALSE

Question 8

GRE is a VPN encapsulation technology that is widely used to transmit packets across heterogeneous networks. Which of the following statements is false about GRE?

Options:

A.

GRE supports encryption and authentication.

B.

GRE supports multicast transmission.

C.

GRE is a Layer 3 VPN encapsulation technology.

D.

GRE can work with other VPN protocols to better ensure data security.

Question 9

A route-policy can have multiple nodes, and each node can have multiple if-match and apply clauses. Which of the following statements are false?

Options:

A.

The operator between if-match clauses under a node is AND.

B.

The operator between nodes is AND.

C.

The operator between if-match clauses under a node is OR.

D.

The operator between nodes is OR.

Question 10

Based on IGMP snooping, IGMP snooping proxy enables a switch to act as a substitute for an upstream Layer 3 device to send IGMP Query messages to downstream hosts, and also to act as a substitute for downstream hosts to send IGMP Report/Leave messages to an upstream device. As such, this function conserves bandwidth between the upstream device and the local device.

Options:

A.

TRUE

B.

FALSE

Question 11

Which of the following statement regarding the display ospf peer command output is true?

Options:

A.

Address: 10.1,1.1 Indicates that the local interface address is 10.1.1.1.

B.

Through negotiation during DD packet exchange, the local end becomes the slave.

C.

Router ID indicates that the local router ID Is 10.1.1.1.

D.

The DR address is 10.1.1.1

Question 12

As shown in the figure, data traffic is forwarded in tunnel mode along the path of STA -> HAP -> HAC -> upper-layer network before roaming. What is the flow direction of data traffic after Layer 3 roaming?

Options:

A.

STA -> FAP -> FAC -> HAC -> HAP -> HAC -> Upper-layer network

B.

STA -> FAP -> FAC -> HAC -> Upper-layer network

C.

STA -> FAP -> FAC -> Upper-layer network

D.

STA -> FAP -> FAC -> HAC -> HAP -> Upper-layer network

Question 13

In the OSPF protocol, inter-area route calculation involves only Router LSA, Network LSA, and Summary LSA.

Options:

A.

TRUE

B.

FLASE

Question 14

An IP prefix list is a common matching tool used in routing policies. Which of the following cannot be configured as matching conditions in an IP prefix list on a Huawei router?

Options:

A.

Port number

B.

Mask

C.

Action

D.

Index

Question 15

When two routers exchange LSDB information using DD packets, a master/slave relationship is formed first, the router with a larger router ID is the master, and determine the MS bit.

Options:

A.

TRUE

B.

FALSE

Question 16

Which of the following statements is false?

Options:

A.

If the current DR fails, the current BDR automatically becomes a new DR, and a BDR will be elected again.

B.

A device with a higher router priority has a higher election priority.

C.

When a router with the highest router priority joins an OSPF network, this router will become the new DR.

D.

If two devices have the same router priority, the device with a larger router ID has a higher election priority.

Question 17

When receiving a packet that does not match any session table entry, the firewall discards the packet to prevent external attacks and ensure internal information security.

Options:

A.

TRUE

B.

FALSE

Question 18

Which of the following statements is true about BGP?

Options:

A.

If the export routing policy applied to a BGP peer changes, manual intervention is required so that the device resends Update messages to the peer.

B.

IGP routes can be converted into BGP routes only through the network command.

C.

A router cannot be configured with multiple BGP processes.

D.

Open messages carry only the BGP header.

Question 19

In BGP, Notification messages are used to request peers to resend routing information after routing policies are changed.

Options:

A.

TRUE

B.

FALSE

Question 20

In the VRP, by default, the routes imported by BGP will be automatically summarized.

Options:

A.

TRUE

B.

FALSE

Question 21

The traffic limiting policy feature only supports the number of connections initiated by the specified IP or the number of connections received.

Options:

A.

TRUE

B.

FALSE

Question 22

A large shopping mall configures a VLAN pool to prevent network performance deterioration caused by potentially large broadcast domains. A network engineer runs the display vlan pool name STA command to check information about the VLAN pool. The following command output is displayed:

display vlan pool name STA Name : STA Total : 2 Assignment: hash Threshold Notify Count: 3 Threshold Notify time(min): 3 VLAN ID : 2 4

Which of the following statements are true?

Options:

A.

The VLANs with the IDs of 2 and 4 are added to the VLAN pool.

B.

The total number of VLAN pools is 2.

C.

The name of the VLAN pool is STA.

D.

The VLAN pool uses the even VLAN assignment algorithm.

Question 23

Regarding the route-policy set-cost configuration below, which of the following statements is true?

Options:

A.

The route 11.1.0.0/16 is permitted by node 10, and its tost Is set to 300.

B.

The cost of all routes is set to 200.

C.

All the routes that are not permitted by node 10 will be denied.

D.

The route 11.1.0.0/16 will continue to match node 20 after permitted by node 10, and (he final cost is set to 200.

Question 24

STAs stay on different subnets before and after Layer 3 roaming. To enable the STAs to access the original network after roaming, network engineers need to configure user traffic to be forwarded to the original subnet over a CAPWAP tunnel.

Options:

A.

TRUE

B.

FALSE

Question 25

When two BGP peers support different Hold Time, they will negotiate to support the shortest Hold Time interval they can support.

Options:

A.

TRUE

B.

FALSE

Question 26

On an STP network, the root bridge, root port, and designated port are elected in sequence. The election rules of these ports are different. List the steps for electing the root port in sequence.

Options:

Question 27

The native AC function allows an agile switch to integrate AC capabilities, achieving wired and wireless convergence. The agile switch centrally manages wired and wireless service traffic.

Options:

A.

TRUE

B.

FALSE

Question 28

R1, R2, R3, and R4 run IS-IS, and the DIS priorities of their interfaces are shown in the following figure. If all these devices are started simultaneously, will be elected as the DIS. (Enter the device name, for example, R1.)

Options:

Question 29

ASPF enables the firewall to support multi-channel protocols such as FTP and to define security policies for complex applications.

Options:

A.

TRUE

B.

FALSE

Question 30

Compared with RSTP, which of the following port roles are added to MSTP?

Options:

A.

Backup port

B.

Master port

C.

Edge port

D.

Regional edge port

Question 31

Which of the following parameters are not mandatory during the configuration of a BGP peer?

Options:

A.

password

B.

Peer IP address

C.

as-number

D.

description

Question 32

What is the correct procedure for a VLAN pool to assign terminals to VLANs.

Options:

Question 33

The following figure shows the OSPF network of an enterprise and the OSPF configurations of R1. Which of the following statements is false about the network?

Options:

A.

R2 can access the server.

B.

GE 0/0/1 of R1 cannot send OSPF packets.

C.

The network segment to which GE 0/0/1 of R1 belongs cannot be advertised.

D.

GE 0/0/1 of R1 cannot accept OSPF packets.

Question 34

GRE is a Layer 2 VPN encapsulation technology that encapsulates packets of certain data link layer protocols so that the encapsulated packets can be transmitted over an IP network.

Options:

A.

TRUE

B.

FALSE

Question 35

When a BGP device sends an Open message to establish a peer connection, which of the following information is carried?

Options:

A.

Local AS number

B.

Router ID

C.

NLRI

D.

Hold time

Question 36

ICMPv6 messages are classified as error or informational messages.

Options:

A.

TRUE

B.

FALSE

Question 37

See the following figure. All routers on the network run IS-IS and are in area 49.0001. By referring to the LSDB of R1, the Level-2 DIS is. (Enter the device name, for example, R1.)

Options:

Question 38

Which of the following statements regarding OSPF is true?

Options:

A.

OSPF does not have an acknowledgement mechanism. Therefore, OSPF relies on the upper-layer protocol, TCP, for acknowledgement.

B.

OSPF performs LSDB update every 30 minutes.

C.

OSPF uses the Bellman-Ford algorithm, and each router independently runs this algorithm.

D.

OSPF floods a LSU packet at an interval of 5s.

Question 39

See the network shown in the following figure.

R1 and R2 run IS-IS and establish an adjacency. IS-IS is enabled on Loopback0 of R2 but disabled on Loopback3 of R2. The configurations shown in the figure are performed in the IS-IS process of R2. Which of the following statements are true?

Options:

A.

The routing table of R1 contains the route 10.0.2.3/32.

B.

The routing table of R1 does not contain the route 10.0.2.3/32.

C.

The routing table of R1 does not contain the routes 10.0.2.2/32 and 10.0.2.3/32.

D.

The routing table of R1 contains the route 10.0.2.2/32.

Question 40

During BGP route summarization configuration, the keyword can be used to suppress all specific routes so that only the summary route is advertised. The summary route carries the Atomic-aggregate attribute rather than the community attributes of specific routes.

Options:

Question 41

A Huawei firewall by default creates security zones named untrust, dmz, _________ and local. (Use Lowercase letters.)

Options:

Question 42

Which of the following statements about WLAN roaming are false?

Options:

A.

APs with which a STA is associated before and after roaming can work on different channels.

B.

During roaming, the STA sends a Reassociation Request frame containing home AP information to the foreign AP.

C.

During roaming, the STA sends an Association Request frame containing home AP information to the foreign AP.

D.

APs with which a STA is associated before and after roaming must work on the same channel.

Question 43

Which of the following statements regarding the firewall zone security level is false?

Options:

A.

The configured security level cannot be changed.

B.

Two zones cannot be configured with the same security level.

C.

The default security level of the new zone is 1.

D.

Only the security level of the user-defined zone can be configured.

Question 44

Which of the following statements regarding the OSPF protocol is false?

Options:

A.

Each OSPF router uses only one Router-LSA to describe the local active connection status of an area.

B.

Routing information can be advertised only between backbone and non-backbone areas and cannot be advertised directly between non-backbone areas.

C.

Router-LSA describes four connection types: P2P, TransNet, SubNet, and virtual link.

D.

Link State ID in a Type 3 LSA indicates the router ID of an ABR.

Question 45

In BGP, the origin attribute of the routes imported using the import-route command is incomplete.

Options:

A.

TRUE

B.

FALSE

Question 46

Which of the following statements regarding the BGP error display of a router is false?

Options:

A.

The error occurred at 11:40:39 on March 22, 2010.

B.

The neighbor address of this router is 10.1.1.2.

C.

The error may be caused by the incorrect peer AS number.

D.

Error Type indicates that the BGP error is caused by the neighbor relationship error.

Question 47

On an enterprise network, the directly connected interfaces of two OSPF routers are on different network segments and have different masks. To establish an OSPF neighbor relationship between the two interfaces, you can change their network types to which of the following?

Options:

A.

Point-to-point

B.

NBMA

C.

P2MP

D.

Broadcast

Question 48

OSPF networks are classified into four types of networks by link layer protocol. Drag the following link layer protocols to the corresponding network types.(Token is reusable)

Options:

Question 49

Which three transmission modes are supported for IPv4 packets?

Options:

A.

Anycast

B.

Broadcast

C.

Unicast

D.

Multicast

Question 50

Compared with STP, RSTP defines the different port states. Which of the following statements regarding discarding and learning states are true?

Options:

A.

The port In discarding or learning state does not forward data frames.

B.

The port in discarding state does not learn MAC addresses table.

C.

The port in discarding or learning state does not learn MAC addresses

D.

The port In learning stole docs not learn MAC addresses table.

Question 51

In PIM-DM, which of the following processes are involved in SPT establishment?

Options:

A.

Prune

B.

Graft

C.

Flooding

D.

State-refresh

Question 52

OSPF has five types of packets, which have the same header format. If the Auth Type field in the packet header is 1, which of the following authentication modes is used?

Options:

A.

Non-authentication

B.

MD5 authentication

C.

Plaintext authentication

D.

Hash authentication

Page: 1 / 22
Total 219 questions