Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

H12-821_V1.0 HCIP-Datacom-Core Technology V1.0 Questions and Answers

Questions 4

On a WLAN, the HSB service sets up an HSB channel between two devices that back up each other, maintains the channel status, and backs up data. Which of the following can HSB back up in real time?

Options:

A.

CAPWAP tunnel information

B.

DHCP address information

C.

AP entries

D.

User data information

Buy Now
Questions 5

Based on IGMP snooping, IGMP snooping proxy enables a switch to act as a substitute for an upstream Layer 3 device to send IGMP Query messages to downstream hosts, and also to act as a substitute for downstream hosts to send IGMP Report/Leave messages to an upstream device. As such, this function conserves bandwidth between the upstream device and the local device.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 6

VRRP is implemented based on thepriority and preemption functionsof VRRP routers.Which of the following statements is false about the VRRP solution?

Options:

A.

When preemption is enabled, a backup device preempts the master role if it has a higher priority than the current master.

B.

When preemption is disabled, a backup device does not preempt the master role even if it has a higher priority than the current master, provided that the current master is working properly.

C.

The master periodically sends VRRP Advertisement packets in the VRRP group to advertise its configurations such as the priority.

D.

Even if the VRRP device is the IP address owner, it still needs to participate in the election and does not directly transition to the Master state when receiving a message indicating that the interface goes Up.

Buy Now
Questions 7

A local router runs IS-IS and its command output is shown in the following figure. Which of the following statements is true?

Options:

A.

The circuit level of S4/0/0 is Level-1.

B.

S4/0/0 supports IPv6.

C.

S4/0/0 sends IIH packets at the interval of 30s.

D.

The cost of S4/0/0 is 20.

Buy Now
Questions 8

IGMP group entries play an important role in multicast forwarding. An administrator runs a command to view information about a multicast entry. The information is as follows:

sql

Copy

display igmp group

Interface group report information

Vlanif100(10.1.6.2):

Total 1 IGMP Group reported

Group Address Last Reporter Uptime Expires

225.1.1.2 10.1.6.10 00:02:04 00:01:17

Given this, which of the following statements are true?

Options:

A.

This entry can be used to construct the corresponding (S, G) entry.

B.

This entry is created when the device receives an IGMP Join message from a user.

C.

Expires indicates the aging time of the IGMP group.

D.

225.1.1.2 is the address of the group that the user joins.

Buy Now
Questions 9

By default, a router interface sends PIM Hello messages at an interval of __________ seconds.

Options:

Buy Now
Questions 10

OSPF routers exchange Hello packets to establish neighbor relationships. The Hello packet sending modes vary by network type. On which of the following types of networks are Hello packets multicast?

Options:

A.

NBMA

B.

P2MP

C.

P2P

D.

Broadcast

Buy Now
Questions 11

In a route-policy, which of the following BGP attributes can be used in apply clauses?

Options:

A.

MED

B.

AS_Path

C.

Tag

D.

Local-Preference

Buy Now
Questions 12

A forwarding information database (FIB) can directly guide packet forwarding on a router.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 13

Which of the following statements regarding an IP prefix are true?

Options:

A.

An IP prefix filter is used to filter IP address prefixes and cannot match an IP prefix number and a prefix length at the same time.

B.

An IP prefix filter cannot be used to filter data packets.

C.

An IP prefix filter is used to filter IP address prefixes and can match an IP prefix number and a prefix length at the same time.

D.

An IP prefix filter can be used to filter data packets.

Buy Now
Questions 14

STAs stay on different subnets before and after Layer 3 roaming. To enable the STAs to access the original network after roaming, network engineers need to configure user traffic to be forwarded to the original subnet over a CAPWAP tunnel.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 15

Four routers run IS-IS and have established adjacencies. The area IDs and router levels are marked in the following figure. R1 and R2 are connected through a PPP link, and R3 is the DIS. Which of the following statements are true?

Options:

A.

If R2 sends a Level-2 LSP, R3 needs to send a PSNP for acknowledgment.

B.

R3 periodically sends CSNPs to implement Level-2 LSDB synchronization.

C.

R2 sends an LSP to R3 and R4 in unicast mode.

D.

If R1 sends an LSP, R2 needs to send a PSNP for acknowledgment.

Buy Now
Questions 16

Which of the following configurations are not mandatory when an administrator configures VRRP?

Options:

A.

Preemption mode

B.

Preemption delay

C.

Virtual router priority

D.

Virtual IP address

Buy Now
Questions 17

According to BGP route selection rules, the route with the higher Local_Pref is preferred.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 18

A wide area network (WAN) is a remote network that connects local area networks (LANs) or metropolitan area networks (MANs) in different areas for communication purposes. It is typically used to interconnect campus networks or data center networks.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 19

Depending on the type of algorithms used, routing protocols are classified into distance-vector protocols and link-state protocols. Which of the following routing protocols are link-state protocols?

Options:

A.

RIP

B.

OSPF

C.

IS-IS

D.

BGP

Buy Now
Questions 20

When receiving a packet, a Huawei router matches the packet against ACL rules. The default ACL matching order used by the Huawei router is.

Options:

Buy Now
Questions 21

On an STP network, only the designated port processes inferior BPDUs. On an RSTP network, a port with any role processes inferior BPDUs.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 22

On a WLAN, engineers can use the VLAN pool mechanism to assign access users to different VLANs, which helps reduce the number of broadcast domains and improve network performance. VLAN pools support two VLAN assignment algorithms: even and hash. Drag the advantages and disadvantages to the two algorithms.(Token is reusable)

Options:

Buy Now
Questions 23

When multiple access channels are set for the same access requirement, the insecure access channels are not used and secure access channels are selected in normal cases. Which of the following are secure access channels?

Options:

A.

HTTPS

B.

Telnet

C.

SNMPv2

D.

SFTP

Buy Now
Questions 24

In addition to numerous normal service packets, the CPUs of devices on a network may also receive large numbers of attack packets. To ensure that the CPUs can properly respond to normal services, the devices provide the local attack defense function.

Which of the following statements are true about this function?(Select all that apply)

Options:

A.

The device can schedule the protocol packets to be sent to the CPU in the attack defense policy based on the protocol priorities so that the packets with higher priorities are processed preferentially.

B.

To ensure that session-based application-layer data runs properly during an attack, you can configure the dynamic link protection function.

C.

Regardless of the packet type, the same rate limit must be set to reduce the number of packets sent to the CPU.

D.

CPU attack defense can also take effect on the management interface of the device.

Buy Now
Questions 25

Which of the following statement regarding the display ospf peer command output is true?

Options:

A.

Address: 10.1,1.1 Indicates that the local interface address is 10.1.1.1.

B.

Through negotiation during DD packet exchange, the local end becomes the slave.

C.

Router ID indicates that the local router ID Is 10.1.1.1.

D.

The DR address is 10.1.1.1

Buy Now
Questions 26

On an OSPF network, one router with P2P as the network type is directly connected to another router with P2MP as the network type. If the Hello intervals on the two routers are changed to be the same, neighbor relationship establishment and LSDB synchronization are not affected.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 27

After BGP initiates a TCP connection, the ConnectRetry timer is disabled if the TCP connection is successfully established. If the TCP connection fails to be established, the device tries to reestablish the TCP connection when the ConnectRetry timer expires.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 28

Four routers run ISIS and have established adjacencies. The area IDs and router levels are marked in the following figure. If route leaking is configured on R3, which of the following is the cost of the route from R4 to 10.0.2.2/32?

Options:

A.

80

B.

50

C.

40

D.

30

Buy Now
Questions 29

By default, some security zones are created when Huawei firewalls are enabled. Which of the following security zones is created by users?

Options:

A.

DMZ

B.

ISP

C.

Trust

D.

Local

Buy Now
Questions 30

Which of the following statements regarding the firewall zone security level is false?

Options:

A.

The configured security level cannot be changed.

B.

Two zones cannot be configured with the same security level.

C.

The default security level of the new zone is 1.

D.

Only the security level of the user-defined zone can be configured.

Buy Now
Questions 31

A campus network uses OSPF for network communication. The display ospf peer command is run on a router, and the command output is as follows:

vbnet

Copy

Edit

display ospf peer

OSPF Process 1 with Router ID 10.0.2.2

Area 0.0.0.0 interface 10.0.235.2 (GigabitEthernet0/0/1)'s neighbors

Router ID: 10.0.5.5 Address: 10.0.235.5

State: Full Mode: Nbr is Master Priority: 1

DR: 10.0.235.5 BDR: 10.0.235.3 MTU: 0

Dead timer due in 40 sec

Area 0.0.0.0 interface 10.0.24.2 (Serial1/0/1)'s neighbors

Router ID: 10.0.4.4 Address: 10.0.24.4

State: Full Mode: Nbr is Master Priority: 1

DR: None BDR: None MTU: 0

Dead timer due in 35 sec

Which of the following statements are true about the device?

Options:

A.

The IP address of the DR on the network where R2 and its neighbor 10.0.5.5 reside is 10.0.235.5.

B.

R2 has established adjacencies with 10.0.5.5 and 10.0.4.4.

C.

The DR/BDR election fails on the network where R2 and its neighbor 10.0.4.4 reside.

D.

Router IDs of the two OSPF neighbors of R2 are 10.0.5.5 and 10.0.4.4.

Buy Now
Questions 32

When configuring an ACL on a router, you can specify a unique number or name to identify the ACL. Once a named ACL is created, it cannot be modified. You can only delete the named ACL and reconfigure it.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 33

This configuration is part of RTA configuration. Which of the following statements regarding the configuration are true?

[RTA] ospf 100

[RTA-ospf-100]silent-interface GigabitEthernet 1/0/0

Options:

A.

RTA cannot establish a neighbor relationship with the neighbor that this interface is directly connected to.

B.

GigabitEthernet 1/0/0 is prohibited from sending OSPF packets.

C.

Direct routes of GigabitEthernet 1/0/0 can still be advertised.

D.

This interface cannot send Hello packets.

Buy Now
Questions 34

A network entity title consists of an area address and a system ID. It is a special NSAP (the SEL has a fixed value of 00) and is mainly used for route calculation.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 35

In special scenarios, when advertising routes to an IBGP peer, a BGP device needs to set the next hop to its IP address to prevent blackhole routes. Which of the following commands can be run in this case?

Options:

A.

peer next-hop-local

B.

peer mpls-local-ifnet

C.

peer private-nexthop

D.

peer next-hop-invariable

Buy Now
Questions 36

Which of the following statements regarding the display bgp routing-table command output is true?

Options:

A.

The route to the destination address 192.168.1.0 is learned through AS 200.

B.

The MED value of the route to the destination address 192.168.1.0 is 100.

C.

The route to the destination address 192.168.1.0 is not the optimal route in the BGP routing table.

D.

The route to the destination address 192.168.1.0 is injected into the BGP routing table using the network command.

Buy Now
Questions 37

As shown in the figure, data traffic is forwarded in tunnel mode along the path of STA -> HAP -> HAC -> upper-layer network before roaming. What is the flow direction of data traffic after Layer 3 roaming?

Options:

A.

STA -> FAP -> FAC -> HAC -> HAP -> HAC -> Upper-layer network

B.

STA -> FAP -> FAC -> HAC -> Upper-layer network

C.

STA -> FAP -> FAC -> Upper-layer network

D.

STA -> FAP -> FAC -> HAC -> HAP -> Upper-layer network

Buy Now
Questions 38

The typical characteristics of the AI era are that it focuses on data, explores data value, and improves AI efficiency. Therefore, the core requirement of AI for data center networks is speed, meaning low latency.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 39

Which of the following is used as the destination port for single-hop BFD?

Options:

A.

UDP port 3784

B.

UDP port 4784

C.

TCP port 3784

D.

TCP port 4784

Buy Now
Questions 40

Which of the following statements are true about theLocal_Prefattribute in BGP? (Choose all that apply)

Options:

A.

The default Local_Pref value is 0.

B.

The Local_Pref attribute can be transmitted to all BGP peers.

C.

The Local_Pref value remains unchanged during transmission unless it is affected by a routing policy.

D.

The greater the value of the Local_Pref attribute, the higher the priority.

Buy Now
Questions 41

Which command is used to configure the VRRP preemption delay?

Options:

A.

vrrp vrid 1 timer delay 20

B.

vrrp vrid 1 preempt-delay 20

C.

vrrp vrid 1 preempt-mode timer delay 20

D.

vrrp vrid 1 preempt-timer 20

Buy Now
Questions 42

A route-policy consists of one or more nodes. What is the maximum number of nodes in a route-policy?

Options:

A.

4096

B.

65535

C.

256

D.

1024

Buy Now
Questions 43

Which of the following statements regarding OSPF route summarization is false?

Options:

A.

OSPF supports two route summarization modes: ABR summarization and ASBR summarization.

B.

Any router in OSPF can summarize routes.

C.

Route summarization is the process of summarizing routes with the same prefix into one route and then advertising only the summarized route to other areas.

D.

Route summarization can reduce routing information, decrease the routing table size, and improve router performance.

Buy Now
Questions 44

On the OSPF network shown in the figure, an adjacency has been established between R1 and R2. An engineer configures the commands in the figure on R2. In this case, which of the following routing entries may exist in the routing table of R2?

Options:

A.

10.1.4.0/24

B.

10.1.3.0/24

C.

10.1.2.0/24

D.

10.1.1.0/24

Buy Now
Questions 45

An engineer sets the CAPWAP heartbeat detection interval to 20 of the active link before an active/standby switchover occurs?

Options:

A.

75s

B.

20s

C.

60s

D.

90s

Buy Now
Questions 46

On aBGP network, aroute-policycan be used to modify route attributes. Which of the following statements isfalseaboutroute-policies?

Options:

A.

When OSPF routes are imported using the import command, aroute-policycan be used to change their defaultMED value.

B.

When direct routes are imported using the import command, aroute-policycan be used to filter out the routes that you do not want to advertise.

C.

When routes are imported using the network command, aroute-policycannot be used to modify the attributes of the imported routes.

D.

In the address family view, the peer command can be run to reference aroute-policyto modify thelocal preferenceof the routes to be advertised.

Buy Now
Questions 47

Which of the following attributes cannot be directly referenced in an apply clause of a route-policy?

Options:

A.

community

B.

IP-prefix

C.

tag

D.

origin

Buy Now
Questions 48

The following figure shows the BGP state switching mechanism. Drag the following BGP states to the corresponding sequence numbers.

Options:

Buy Now
Questions 49

On an IS-IS network, the length and components of aNETare the same as those of anNSAP. Which of the followingNETfields is used to uniquely identify a host or router in an area?

Options:

A.

System ID

B.

IDI

C.

SEL

D.

Area Address

Buy Now
Questions 50

On a network, each router has a local core routing table and protocol routing tables. A routing entry in the local core routing table has multiple key fields. Which of the following are included?

Options:

A.

Destination address of a route

B.

Routing protocol preference of a route

C.

Inbound interface that learns a route

D.

Routing protocol that learns a route

Buy Now
Questions 51

OSPF has multiple types of routes with varying priorities. Which of the following types of routes has the lowest priority when they have the same prefix?

Options:

A.

Type 1 external route

B.

Inter-area route

C.

Type 2 external route

D.

Intra-area route

Buy Now
Questions 52

There are two BFD operating modes. In_______mode, the local end sends BFD Control packets at specified intervals, and the remote end checks whether the local end periodically sends BFD Control packets. (Use lowercase letters.)

Options:

Buy Now
Questions 53

To prevent loops on anSTP network, after adesignated portis elected, it mustwait for a long timeand can forward packetsonly after the status of all ports on the entire network is determined. To solve this problem,RSTP uses the P/A mechanismto speed up thedownstream port's transition to the Forwarding state.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 54

On an IS-IS network, each router can generate LSPs. Which of the following events trigger the generation of a new LSP?

Options:

A.

Related IS-IS interfaces go up or down.

B.

Periodic updates occur.

C.

Inter-area IP routes change.

D.

The IS-IS interface cost is increased.

Buy Now
Questions 55

See the following figure. RTA, RTB, RTC, and RTD are in the same AS and establish IBGP peer relationships through direct links. RTB an RTC are route reflectors (RRs), RTA and RTC are the RR clients of RTB, and RTB and RTD are the RR clients of RTC. If RTA advertises the route 10.1.1.0/24 to the BGP process, the Originator ID of the BGP route received by RTD is------------------.

Options:

Buy Now
Questions 56

On an RSTP network, if a port receives an RST BPDU and finds that its buffered RST BPDU is superior to the received RST BPDU, the port discards the received RST BPDU without responding.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 57

On an OSPF network, an IR in area 0 must be a BR, but an ASBR may not be an ABR.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 58

During the DHCP interaction process, the DHCP server and client exchange various types of packets. Which of the following packets is not sent from the client to the server?

Options:

A.

DHCP Release

B.

DHCPNAK

C.

DHCP Request

D.

DHCP Discover

Buy Now
Questions 59

As shown in the figure, SWA, SWB, SWC, and SWD run the Rapid Spanning Tree Protocol (RSTP). Which of the following statements are true?

Options:

A.

Once receiving OPOUs, the edge port re-partlci pates in the calculation of the spanning tree.

B.

After a port is Configured as an edge port, the port can quickly enter the Forwarding state.

C.

You can enable the edge port on SWD's GEO/0/2 connected to the terminal so that this port can quickly enter the Forwarding state.

D.

You can enable the edge port on SWC's GE0/0/2 connected to the terminal so that this port can quickly enter the forwarding state.

Buy Now
Questions 60

On an RSTP network, port priorities may be compared during root port or designated port election. Which of the following values is the default priority of a port on a Huawei switch?

Options:

A.

1

B.

128

C.

4096

D.

32768

Buy Now
Questions 61

On a broadcast IS-IS network, a DIS needs to be elected to create and update pseudonodes. Which of the following values is the default DIS priority of an IS-IS interface?

Options:

A.

200

B.

64

C.

1

D.

100

Buy Now
Questions 62

On an IS-IS network, routers send LSPs to exchange link state information. LSPs are classified into Level-1 LSPs and Level-2 LSPs and have the same format. Which of the following parts constitute the LSP ID in an LSP?

Options:

A.

LSP Number

B.

Pseudonode ID

C.

System ID

D.

IS Type

Buy Now
Questions 63

On an IS-IS network, each device needs to be configured with anetwork entity title (NET), which consists of three parts, each containing different fields. Which of the following fields are contained in theArea Address part?

Options:

A.

High Order DSP

B.

AFI

C.

IDI

D.

System ID

Buy Now
Questions 64

Which of the following protocols are multi-channel protocols?

Options:

A.

H.323

B.

FTP

C.

Telnet

D.

SMTP

Buy Now
Questions 65

A Layer 2 switch supports multiple types of Ethernet interfaces. Similar to a trunk interface, a hybrid interface allows data frames from multiple VLANs to pass through. In addition, you can determine whether data frames from a VLAN sent out from a hybrid interface are tagged or untagged.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 66

On an OSPF network, if the network type isNBMA, a router unicasts all protocol packets; if the network type isbroadcast, a router multicasts all protocol packets.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 67

The Internet Assigned Numbers Authority (IANA) allocates Class D addresses to IPv4 multicast. An IPv4 address is 32 bits long, and the four most significant bits of a Class D address are 1110.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 68

During BGP route summarization configuration, the keyword can be used to suppress all specific routes so that only the summary route is advertised. The summary route carries the Atomic-aggregate attribute rather than the community attributes of specific routes.

Options:

Buy Now
Questions 69

A router uses an advanced ACL to filter data. The ACL configuration is shown below. Which of the following statements is false about the configuration?

csharp

CopyEdit

[Huawei] acl 3001

[Huawei-acl-adv-3001] rule permit icmp source 192.168.1.3 0 destination 192.168.2.0 0.0.0.255

Options:

A.

The ACL permits ICMP packets from host 192.168.1.3 to host 192.168.2.200.

B.

The ACL denies ICMP packets from host 192.168.1.2 to network segment 192.168.2.0/24.

C.

The ACL permits IP packets from host 192.168.1.3 to network segment 192.168.2.0/24.

D.

The ACL is a numbered ACL whose number is 3001.

Buy Now
Questions 70

On a WLAN, MAC address authentication controls network access rights of a user based on the user's access interface and terminal MAC address.

Which of the following statements is false about MAC address authentication?

Options:

A.

User passwords can be processed using PAP or CHAP.

B.

By default, the MAC address of a terminal is used as the user name and the last 6 hexadecimal digits of the terminal MAC address are used as the password for MAC address authentication.

C.

No client software needs to be installed on user terminals.

D.

A MAC address authentication system consists of three types of entities: terminal, access device, and authentication server.

Buy Now
Questions 71

During routine O&M, an engineer finds that theHold Timeparameters of two devices are inconsistent. In this case, which of the following situations occurs?

Options:

A.

A peer relationship can be established, and the smaller Hold Time is selected after negotiation.

B.

A peer relationship can be established, and the larger Hold Time is selected after negotiation.

C.

No peer relationship can be established.

D.

A peer relationship can be established, and the devices use their own parameter values to send messages.

Buy Now
Questions 72

Security policy is the core feature of firewalls. Only valid traffic that complies with security policies can be forwarded by firewalls. Which of the following statements are true about security policy matching rules?

Options:

A.

Multiple values can be configured for a single matching condition, and the values are logically ANDed.

B.

If a security policy contains multiple matching conditions, the relationship between them is AND.

C.

The system has a default security policy nameddefault, where all matching conditions areanyand the default action ispermit.

D.

When multiple security policy rules are configured, they are sorted in a list by configuration sequence by default. A security policy rule configured earlier is placed higher in the list and has a higher priority.

Buy Now
Questions 73

Which of the following statements isfalseabout thesession table mechanismon firewalls?

Options:

A.

Generally, the default session aging time of the system can be used. To change the aging time, you need to estimate and determine the traffic type and number of connections on the network.

B.

The fast session aging function also takes effect for persistent connection sessions.

C.

A created session entry needs to be matched by packets constantly.

D.

When stateful inspection is disabled, the firewall still creates session tables for non-first packets. This allows services to run properly without the need to enable the persistent connection function.

Buy Now
Questions 74

ACLs are a common matching tool in routing policies. An ACL can be configured on a router to match routes.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 75

An enterprise office network runs OSPF and is divided into multiple OSPF areas. Enterprise network engineers can configure route summarization on ASBRs to reduce the number of inter-area Type 3 LSAs, which in turn reduces the routing table size and improves device resource utilization.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 76

The Origin attribute is used to define the origin of BGP path information. There are three types of Origin attributes. Which of the following lists the Origin attributes in descending order of priority?

Options:

A.

IGP > EGP > Incomplete

B.

Incomplete > IGP > EGP

C.

EGP > IGP > Incomplete

D.

Incomplete > EGP > IGP

Buy Now
Questions 77

A Huawei firewall by default creates security zones named untrust, dmz, _________ and local. (Use Lowercase letters.)

Options:

Buy Now
Questions 78

In BGP, the Origin attribute is used to identify the origin of a route. Which of the following statements are true about the Origin attribute?

Options:

A.

If a route is imported to BGP by the originator using the network command, the Origin attribute of the BGP route is displayed as i in the BGP routing table.

B.

If a route is learned through EGP, the Origin attribute of this BGP route is displayed as ? in the BGP routing table.

C.

If multiple routes carry the same destination address but different Origin attributes and all other route selection conditions are the same, BGP selects the optimal route according to the Origin attribute in the following order: IGP > EGP > Incomplete.

D.

This attribute is a well-known mandatory attribute.

Buy Now
Questions 79

OSPF networks are classified into four types of networks by link layer protocol. Drag the following link layer protocols to the corresponding network types.(Token is reusable)

Options:

Buy Now
Questions 80

On anRSTP network, port roles are optimized to overcome thedisadvantages of STP. Which of the followingport rolesare supported inRSTP?

Options:

A.

Root port

B.

Designated port

C.

Backup port

D.

Alternate port

Buy Now
Questions 81

Which of the following statements regarding multicast MAC addresses are false?

Options:

A.

One multicast MAC address maps to 32 multicast IP addresses.

B.

One multicast MAC address maps to only one multicast IP address.

C.

The high 24 bits of the multicast MAC address are 0x01005E, the 25th bit is fixed to 1, and the lower 23 bits of the MAC address map to the lower 23 bits of the multicast IP address.

D.

A multicast MAC address identifies receivers of a multicast group on the data link layer.

Buy Now
Questions 82

STP ensures a loop-free network but has a slow network topology convergence speed, affecting communication quality. RSTP has made some improvements based on STP. Which of the following improvements is not included?

Options:

A.

If a port does not receive configuration BPDUs from the upstream device within four Hello intervals, the switch considers that the negotiation with the neighbor fails.

B.

The non-root switch running RSTP sends configuration BPDUs at the interval specified by the Hello timer, which is performed independently by each device.

C.

RSTP reduces five port states to three port states based on user traffic forwarding and MAC address learning.

D.

RSTP deletes three port states and adds two port roles.

Buy Now
Questions 83

As shown in the figure, R1 imports the direct route 10.1.1.0/24 to OSPF. An engineer enables bidirectional route re-advertisement on R2 and R3, and configures the following commands on R3. After the network becomes stable, which of the following is thePrevalue of the route 10.1.1.0/24 in the routing table of R4?

[R3]acl 2000

[R3-acl-basic-2000] rule permit source 10.1.1.0 0

[R3-acl-basic-2000] quit

[R3]route-policy hcip permit node 10

[R3-route-policy-10] if-match acl 2000

[R3-route-policy-10] apply preference 14

[R3-route-policy-10] quit

[R3]ospf 1

[R3-ospf-1] preference ase route-policy hcip

Options:

A.

150

B.

14

C.

10

D.

15

Buy Now
Questions 84

A non-client is an IBGP peer that functions as neither an RR nor a client. A non-client must establish fully meshed connections with the RR and all the other non-clients.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 85

ASPF enables the firewall to support multi-channel protocols such as FTP and to define security policies for complex applications.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 86

If a router ID is configured in both the system via and the BGP view, BGP uses the router ID configured in the BGP view because the BGP view takes precedence over the system view.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 87

The VRID of the VRRP virtual router is 3 and the virtual IP address is 100.1.1.10. What is the virtual MAC address?

Options:

A.

01-00-5E-00-01-64

B.

01-00-5E-00-01-03

C.

00-00-5E-00-01-64

D.

00-00-5E-00-01-03

Buy Now
Questions 88

Which of the following statements regarding the BGP error display of a router false?

Options:

A.

The error may be caused by the incorrect neighbor address.

B.

The neighbor address of this router is 10.1.1.5.

C.

Error Type indicates that the BGP error is caused by the neighbor relationship error.

D.

The error occurred at 12:40:39 on March 22, 2010.

Buy Now
Questions 89

Which of the following TLVs is used by ISIS to describe the IP address of an interface?

Options:

A.

129

B.

131

C.

128

D.

132

Buy Now
Questions 90

Compress the 2001:0DBB:B8:0000:C030:0000:0000:09A0:CDEF address.___________(if the answer contains letters, capitalize them.)

Options:

Buy Now
Questions 91

In IPv6, interface IDs can be manually configured, automatically generated by the system, or generated based on the IEEE EUI-64 standard.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 92

After a BGP peer relationship is established between two ends, changing the router ID of one end resets the BGP peer relationship.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 93

After the administrator of an enterprise deploys a DHCP server, employees complain that their clients cannot obtain IP addresses from the DHCP server. Which of the following may cause this problem?

Options:

A.

Multiple DHCP servers are configured.

B.

STP is enabled on the DHCP server.

C.

The DHCP function is disabled by default, and the administrator forgets to enable the DHCP function.

D.

DHCP clients and the DHCP server are on different network segments, and no DHCP relay agent is configured on the network.

Buy Now
Questions 94

In PIM-DM, which of the following processes are involved in SPT establishment?

Options:

A.

Prune

B.

Graft

C.

Flooding

D.

State-refresh

Buy Now
Questions 95

ASBRs cannot exist in an OSPF stub area.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 96

An enterprise uses OSPF to implement network communication. To ensure data validity and security, all authentication modes supported by OSPF are enabled on routers. In this case, interface authentication is preferentially used by the routers.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 97

Route attributes are specific descriptions of routes. BGP route attributes can be classified into four types. Which of the following are well-known discretionary attributes?

Options:

A.

Atomic_Aggregate

B.

Local-Preference

C.

Community

D.

MED

Buy Now
Questions 98

After aBGP deviceestablishes apeer relationship, it advertises routes. Which of the following statements aretrueabout BGP route advertisement?

Options:

A.

Routes obtained from EBGP peers are advertised to all peers.

B.

When routes are updated, the BGP device sends all BGP routes.

C.

When there are multiple valid routes to the same destination, a BGP device advertises only the optimal route to its peers.

D.

Routes obtained from an IBGP peer are not sent to other IBGP peers.

Buy Now
Exam Code: H12-821_V1.0
Exam Name: HCIP-Datacom-Core Technology V1.0
Last Update: Jun 15, 2025
Questions: 329
H12-821_V1.0 pdf

H12-821_V1.0 PDF

$29.75  $84.99
H12-821_V1.0 Engine

H12-821_V1.0 Testing Engine

$35  $99.99
H12-821_V1.0 PDF + Engine

H12-821_V1.0 PDF + Testing Engine

$47.25  $134.99