Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

H12-891_V1.0 HCIE-Datacom V1.0 Questions and Answers

Questions 4

In thefirewall hot standby scenario, in which of the following conditions will the local deviceproactively send VGMP packets?

Options:

A.

Hot standby being disabled

B.

Priority increase

C.

Link detection packet timeout

D.

Hot standby being enabled

Buy Now
Questions 5

OSPFv3 link LSAs are advertised in the entire area.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 6

On a router,SRv6is enabled, and the configurations shown below are performed. Which of the following statements about the configurations are correct?

[Router-segment-routing-ipv6] locator srv6_locator1 ipv6-prefix 2001:DB8:ABCD::/64 static 32

Options:

A.

The locator of this node is2001:DB8:ABCD::.

B.

The static segment of the node occupies32 bits.

C.

The dynamic segment of the node occupies32 bits.

D.

The Args field of this node occupies32 bits.

Buy Now
Questions 7

Whenstatic IPsec VPNis used for WAN interconnection in theHuawei CloudCampus Solution, theAP, Router, and ____can be used as egress devices.

Options:

Buy Now
Questions 8

Exhibit:

The following figure shows the inter-AS MPLS VPN Option C (solution 2). RRs are deployed, and no traffic passes through the RRs during forwarding. If a data packet sent from PE2 to192.168.1.1carries two labels, which of the following statements about the two labels are correct?

Options:

A.

T1 is allocated by RR2.

B.

T1 is allocated by P2.

C.

V1 is allocated by PE1.

D.

V1 is allocated by P2.

Buy Now
Questions 9

A network administrator runs thedisplay telemetry subscriptioncommand on a device to check telemetry subscription information. The command output is as follows:

[~CE] display telemetry subscription

Sub-name : Sub1

Sensor group:

Sensor-name Sample-interval(ms) State

Sensor1 1000 RESOLVED

Destination group:

Dest-name Dest-IP Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20000 RESOLVED - GRPC

Sub-state : PASSIVE

Total subscription number is : 1

Which of the following statements is incorrect?

Options:

A.

The device sends sampled data every second.

B.

The subscription name is Sub1.

C.

The subscription mode is static subscription.

D.

The IP address of the device is 192.168.56.1.

Buy Now
Questions 10

As shown in the following figure, an engineer tests network interconnection between two branches. To implement network interconnection,OSPFis deployed onR1, R2, and R3of branch 1, andIS-ISis deployed onR2, R3, and R4of branch 2. Which of the following operations needs to be performed to allowR1 to access R4's loopback interface address?

Options:

A.

Run the default-route-advertise command in both the OSPF and IS-IS views on R2.

B.

No configuration is required.

C.

Run the default-route-advertise commandonly in the OSPF viewon R2.

D.

Run the default-route-advertise commandonly in the IS-IS viewon R2.

Buy Now
Questions 11

In the Huawei SD-WAN Solution, the topologies of different VNs must be the same.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 12

Which of the following statements is incorrect about Authentication Header (AH)?

Options:

A.

AH provides packet encryption.

B.

AH provides data origin authentication.

C.

AH provides anti-replay protection.

D.

AH provides data integrity authentication.

Buy Now
Questions 13

In Huawei SD-WAN Solution, which of the following tunneling technologies is used to establish data channels?

Options:

A.

IPsec

B.

GRE over IPsec

C.

VXLAN

D.

MPLS

Buy Now
Questions 14

The figure shows a packet that contains three label headers. Select the values (in decimal notation) of the X, Y, and Z fields, respectively.

Options:

Buy Now
Questions 15

Which of the following roles is NOT a core role in Huawei's Free Mobility solution?

Options:

A.

iMaster NCE-Campus

B.

Policy enforcement device

C.

Authentication device

D.

Policy control device

Buy Now
Questions 16

OSPF is deployed on a campus network to implement network interconnection. The LSDB of R2 is shown in the figure.

What can be determined from the LSDB?

Options:

A.

Area 1 is an NSSA.

B.

R2 translates Type 7 default route into Type 5 default route.

C.

R2 advertises the default route in the OSPF process.

D.

Area 1 does not have Type 3 LSAs. The possible cause is that R2 filters Type 3 LSAs in the outbound direction of area 1.

Buy Now
Questions 17

An engineer often remotely logs in to the device to check the device status. The engineer can use the Python Paramiko and telnetlib libraries to implement automatic remote login through Python scripts. The remote login implemented using telnetlib is more secure.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 18

At the NETCONF content layer, the operation may contain an operation attribute, which is used to specify an operation type for configuration data. Which of the following operation attributes are supported?

Options:

A.

create: The configuration data identified by the element that contains this attribute is added to the configuration datastore only if the configuration data does not already exist in the configuration datastore. If it already exists in the configuration datastore, with the value being data-exists is returned.

B.

delete: The configuration data identified by the element that contains this attribute is deleted from the configuration datastore. If the configuration data does not exist in the configuration datastore, a deletion success message is returned.

C.

merge: The configuration data identified by the element that contains this attribute is modified if the configuration data already exists in the configuration datastore. If not, the configuration data is created in the datastore.

D.

remove: The configuration data identified by the element that contains this attribute is deleted from the configuration datastore. If the configuration data does not exist in the configuration datastore, a deletion success message is returned.

Buy Now
Questions 19

In OSPFv3, which of the following LSAs can be flooded within an area?

Options:

A.

Inter-Area-Router-LSA

B.

Intra-Area-Prefix-LSA

C.

Link-LSA

D.

Inter-Area-Prefix-LSA

Buy Now
Questions 20

Which of the following types of LSAs does OSPF use to support SR-MPLS?

Options:

A.

Type 7 NSSA External LSA

B.

Type 10 Opaque LSA

C.

Type 1 Router LSA

D.

Type 2 Network LSA

Buy Now
Questions 21

In the following figure, all routers are running OSPF. Given this, which of the following statements is correct?

Options:

A.

R2 forwards the Router-LSAs generated by R1 to R3.

B.

R2 forwards the Router-LSAs generated by R3 to R1.

C.

R2 generates Router-LSAs only in area 0.

D.

R2 generates Router-LSAs in both area 1 and area 0.

Buy Now
Questions 22

In thesmall and midsize campus network designbased on theHuawei CloudCampus Solution, when over100 branchesneed to communicate with each other, which of the following interconnection networking models is recommended?

Options:

A.

Direct networking

B.

Full-mesh networking

C.

Hub-spoke networking

D.

Partial-mesh networking

Buy Now
Questions 23

An SRv6 Policy can be either statically configured on a device or dynamically generated by the controller and then delivered to the device.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 24

Which of the following fields is added to BGP4+ Update packets to advertise IPv6 routes?

Options:

A.

A new path attribute: MP_UNREACH_NLRI

B.

A new path attribute: MP_REACH_NLRI

C.

A new path attribute: IPv6_REACH_NLRI

D.

A new NLRI type: IPv6_NLRI, which carries the IPv6 NLRI prefix length and IPv6 NLRI prefix.

Buy Now
Questions 25

Port isolation can be deployed on an Ethernet network to implement both Layer 2 communication and Layer 3 isolation, making the networking more flexible.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 26

On a campus network, which of the following problems may occur when you manually create a static VXLAN tunnel?

Options:

A.

Although the static VXLAN tunnel mode supports the distributed gateway scenario, the configuration involves a heavy workload and is complex to adjust.

B.

Remote MAC addresses can be learned by the VTEP only through data flooding.

C.

A static VXLAN tunnel also uses corresponding protocols on the control plane, which consumes device resources.

D.

If N devices need to establish static VXLAN tunnels, a maximum of N(N -1)/2 tunnels need to be manually configured, which involves a heavy workload.

Buy Now
Questions 27

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following statements about symmetric IRB forwarding are correct?

Options:

A.

Both the ingress VTEP and egress VTEP forward packets based on the Layer 3 forwarding table.

B.

The ingress VTEP forwards packets based only on the Layer 2 forwarding table.

C.

The egress VTEP forwards packets based only on the Layer 2 forwarding table.

D.

When VTEPs forward inter-subnet user communication packets, the VNI carried in the VXLAN header is the L3VNI.

Buy Now
Questions 28

On a virtualized network deployed using iMaster NCE-Campus, after creating VNs, you need to configure inter-VN communication. Which of the following configurations is used to achieve VN communication?

Options:

A.

Configure traffic filtering.

B.

Create a static route for the VPN instance corresponding to the VN.

C.

Deploy OSPF for the VPN instance corresponding to the VN.

D.

Deploy a routing policy.

Buy Now
Questions 29

To allow only authorized users (users who obtain IP addresses through authorized DHCP servers or use specified static IP addresses) to access the network shown in the figure, which of the following solutions can be used?

Options:

A.

DAI + Port Security

B.

DHCP Snooping + IPSG

C.

DHCP Snooping + DAI

D.

DAI + IPSG

Buy Now
Questions 30

Which of the following intelligent traffic steering policies can be used to fully utilize link bandwidth and implement link bandwidth-based load balancing on an enterprise network with multiple links?

Options:

A.

Application priority-based traffic steering

B.

Link quality-based traffic steering

C.

Link priority-based traffic steering

D.

Traffic bandwidth-based traffic steering

Buy Now
Questions 31

In the figure,SR-MPLSis enabled onR1, R2, and R3. TheSRGB (Segment Routing Global Block) rangeonR3is from20000 to 21000, and theprefix SID indexconfigured on theloopback1 interface of R3 is 30.

In this case, theMPLS label corresponding to the loopback1 interface of R3 is _____.

(Enter anArabic numeralwithout symbols.)

Options:

Buy Now
Questions 32

AH is an IP-based transport-layer protocol. The protocol number is _____. (Enter only digits.)

Options:

Buy Now
Questions 33

Which of the following statements are correct about the authentication protocols used inPortal authentication?

Options:

A.

When Portal is used as the authentication protocol, the Portal server needs to exchange authentication information with the access device, which then sends the information to the authentication server for identity authentication.

B.

When Portal is used as the authentication protocol, the Portal server and access device only need to support the Portal protocol, but not the HTTP and HTTPS protocols.

C.

When HTTP or HTTPS is used as the authentication protocol, none of the devices involved in the authentication process need to support the Portal protocol.

D.

When HTTP or HTTPS is used as the authentication protocol, the client needs to send authentication information to the access device, which then sends the information to the authentication server for identity authentication.

Buy Now
Questions 34

As shown in the figure,ARP broadcast suppression is enabled on VTEP1inBD 20 (VNI 200).

VTEP1 learns ARP informationaboutPC2 through BGP EVPN routes.

WhenVTEP1 forwards the ARP request for PC1’s MAC address to VTEP2,

What is the destination MAC address of the inner data frame?

Options:

A.

MAC B

B.

MAC C

C.

MAC A

D.

MAC D

Buy Now
Questions 35

Which of the following statements regarding OSPF neighbor relationship faults is incorrect?

Options:

A.

For non-DR and non-BDR routers on an Ethernet link, the 2-Way state is acceptable.

B.

The Init state indicates that the router has received Hello packets from its neighbors, but the received Hello packets do not contain the OSPF RID of the receiving router.

C.

The ExStart state indicates that two neighbor routers have inconsistent MTUs or the same OSPF Router ID (RID).

D.

The Attempt state indicates that the router does not send unicast Hello packets to configured neighbors.

Buy Now
Questions 36

MPLS supports Forwarding Equivalence Class (FEC). Which of the following cannot be used as a FEC allocation standard?

Options:

A.

Application protocol

B.

Fragment offset

C.

Class of Service (CoS)

D.

Destination address

Buy Now
Questions 37

IPsec uses an asymmetric encryption algorithm to encrypt the symmetric algorithm key, which it uses to encrypt/decrypt data, ensuring security and performance.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 38

The BGP ORF function can be used to control the maximum number of routes that can be sent by a BGP peer. To achieve this, which of the following tools is used to send such a route list to BGP peers?

Options:

A.

Filter-policy

B.

Route-policy

C.

ACL

D.

IP prefix-list

Buy Now
Questions 39

Which of the following statements is correct about the differences between NSR and NSF?

Options:

A.

NSR requires the collaboration of neighboring routers.

B.

NSF requires the collaboration of neighboring routers.

C.

NSF does not require the collaboration of neighboring routers.

D.

Both NSR and NSF require the collaboration of neighboring routers.

Buy Now
Questions 40

iMaster NCE-CampusInsightuses SNMP technology to collect metrics and logs of network devices and detects network exceptions based on real service traffic.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 41

The channelized sub-interface and FlexE technologies both can be used to implement network slicing, but the application scenarios of the two technologies are slightly different. Which of the following statements about the two technologies are correct?

Options:

A.

It is recommended that channelized sub-interface be used to reserve resources for interfaces with a bandwidth of less than 50 Gbit/s.

B.

It is recommended that FlexE be used to reserve resources for 50GE and higher-rate interfaces.

C.

Only FlexE-based network slicing can be deployed across OTN devices.

D.

Only network slicing based on channelized sub-interface can be deployed across MSTP devices.

Buy Now
Questions 42

Which of the following are carried in the HTTP/1.1 response header?

Options:

A.

Status code

B.

Reason phrase

C.

Protocol version

D.

Response method

Buy Now
Questions 43

IS-IS supports multi-instance and multi-process. Which of the following statements are correct about IS-IS multi-instance and multi-process?

Options:

A.

One IS-IS process can be associated with only one VPN instance.

B.

One VPN instance can be associated with multiple different IS-IS processes.

C.

One IS-IS process can be associated with multiple different VPN instances.

D.

If multiple IS-IS processes are created on an IS-IS router, these processes are independent of each other.

Buy Now
Questions 44

As shown in the figure, when PE1 receives an ARP request packet, it forwards the packet to PE4. The packet then carries two labels. The label value 201 is carried by the EVPN Type ____ route. (Enter only digits.)

Options:

Buy Now
Questions 45

What can be determined from the following figure?

display ipv6 routing-table protocol isis

Public Routing Table : ISIS

Summary Count: 6

ISIS Routing Table's Status : < Active >

Summary Count: 6

Destination : 3000:FDEA::4

NextHop : FE80::2E0:FCFF:FE98:2577

Cost : 20

Interface : GigabitEthernet0/0/1

PrefixLength : 128

Preference : 15

Protocol : ISIS-L2

Flags : D

Options:

A.

R1 has six IS-IS IPv6 routes.

B.

R1 does not have IS-IS IPv6 routes.

C.

IS-IS IPv6 must have been enabled on GigabitEthernet0/0/1 of R1.

D.

R1 is not a Level-1 device.

Buy Now
Questions 46

Which of the following protocols is used in the Huawei SD-WAN Solution to report device performance data?

Options:

A.

NetFlow

B.

SNMP

C.

BGP

D.

HTTP/2

Buy Now
Questions 47

In the gRPC-based telemetry protocol, the data model layer consists of theRPC layer,telemetry layer, andservice data layer. Drag the.proto fileto the layer where the file should be located.

Options:

Buy Now
Questions 48

What can be determined from the following figure?

Options:

A.

R3 must be a Level-2 device.

B.

The device role of R3 cannot be determined.

C.

R3 must be a Level-1-2 device.

D.

R3 must be a Level-1 device.

Buy Now
Questions 49

On a small- or medium-sized campus network deployed based on the Huawei CloudCampus Solution, an AR functioning as the egress gateway supports web-based network management, registration center query, and DHCP Option 148-based deployment, but does not support CLI-based deployment.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 50

BGP EVPN can be used as the VXLAN control plane protocol to completely prevent traffic flooding, such as broadcast ARP packets, on the VXLAN network.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 51

Which of the following channels are involved in the Huawei SD-WAN Solution?

Options:

A.

Management channel

B.

Control channel

C.

Data channel

D.

Orchestration channel

Buy Now
Questions 52

In an MPLS VPN network, two-layer MPLS labels are added into data packets before they are transmitted over the public network. Which of the following statements regarding data packet processing are correct?

Options:

A.

The egress PE sends the data packet to the correct VPN based on the inner label.

B.

The penultimate hop removes the outer label before forwarding the data packet to a peer egress PE.

C.

The IP data packet received by egress LSR is without labels.

D.

The penultimate-hop device receives a packet with an outer label.

Buy Now
Questions 53

Which of the following statements is incorrect about a BGP/MPLS IP VPN?

Options:

A.

In most cases, CEs are unaware of VPNs and do not need to support MPLS or MP-BGP.

B.

A BGP/MPLS IP VPN consists of customer edges (CEs), provider edges (PEs), and providers (Ps). PEs and Ps are carrier devices, whereas CEs are BGP/MPLS IP VPN customer devices.

C.

Inter-site communication can be implemented through VPN. A site can only belong to only one VPN.

D.

Ps only need to provide basic MPLS forwarding capabilities and do not need to maintain VPN-related information.

Buy Now
Questions 54

The IS-IS Level-1 neighbor relationship is not established betweenR3andR4. Referring to the following information, what is the possible cause?

Options:

A.

The IIH authentication betweenR3andR1fails.

B.

The IS-IS levels ofR3andR4do not match.

C.

The circuit types of the interfaces connectingR3andR4do not match.

D.

The area IDs ofR3andR4are different.

Buy Now
Questions 55

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following BGP EVPN routes is used to advertise MAC addresses, ARP entries, and IRB routes?

Options:

A.

Type 3

B.

Type 4

C.

Type 2

D.

Type 1

Buy Now
Questions 56

On an SR-MPLS network, manually configured prefix SIDs on different devices may conflict with each other. Assume that there are four routes (prefix/mask SID) as follows. Which of the following routes will be selected according to the conflict handling principle?

Options:

A.

1.1.1.1/32 → SID 2

B.

1.1.1.1/32 → SID 1

C.

2.2.2.2/32 → SID 3

D.

3.3.3.3/32 → SID 1

Buy Now
Questions 57

Which of the following statements aboutOPS (Open Programmability System) application scenariosisincorrect?

Options:

A.

To enable a network device to automatically send a configuration file to the server after the device configuration is saved, users can use the maintenance assistant to create a timer trigger condition and periodically run the Python script.

B.

When the OPS is used to automatically deploy unconfigured devices, a Python script is used to obtain the IP addresses of the software and configuration file server and download the system software and configuration file.

C.

The OPS can reduce the impact of the network environment in some cases. For example, when collected information is transmitted to a server, the Python script can be used to temporarily store the execution result to the device when the network is disconnected. After the network is reconnected, the execution result is transmitted to the server.

D.

The OPS can be used to automatically check the health status of devices.

Buy Now
Questions 58

MPLS supports forwarding equivalence class (FEC). Which of the following cannot be used as an FEC allocation standard?

Options:

A.

Fragment offset

B.

Application protocol

C.

Destination address

D.

Class of Service (CoS)

Buy Now
Questions 59

Which of the following statements about DHCP snooping isincorrect?

Options:

A.

After DHCP snooping is enabled in the view of a VLAN, it takes effect for the VLAN's DHCP messages received by all the interfaces of the device.

B.

After DHCP snooping is enabled globally, the device processes only DHCPv4 messages by default if no parameter is specified.

C.

DHCP snooping can prevent attacks by configuring trusted interfaces.

D.

After DHCP snooping is enabled in the view of an interface, it takes effect for all DHCP messages on the interface.

Buy Now
Questions 60

An engineer uses two routers to perform IPv6 tests and wants to use OSPFv3 for IPv6 network connectivity. Which of the following OSPFv3 configurations for R1 are correct?

Options:

A.

[R1-GigabitEthernet0/0/1] ospfv3 1 area 0

B.

[R1-ospfv3-1] router-id 10.1.1.1

C.

[R1-ospfv3-1-area-0.0.0.0] network 2001:DB8:2345:12::1 ::

D.

[R1] router id 10.1.1.1

Buy Now
Questions 61

The path of an SR-MPLS TE tunnel can be calculated by the controller or tunnel ingress.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 62

SSH connections are usually established based on TCP/IP connections. In specific cases, SSH connections can be established based on UDP connections.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 63

Which of the following statements is correct about 6PE and 6VPE?

Options:

A.

In 6PE networking, VPN instances need to be created on PEs.

B.

In 6PE networking, IPv6 addresses of a CE can be reused.

C.

In 6VPE networking, IPv6 addresses of a CE can be reused.

D.

In 6VPE networking, no VPN instance needs to be created on PEs.

Buy Now
Questions 64

In DU label advertisement mode, if the liberal label retention mode is used, the device reserves labels received from all the LDP peers regardless of whether the LDP peer is the optimal next hop for reaching the destination network.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 65

On a VXLAN-based virtualized campus network, BGP EVPN can be used as the control plane protocol. Which of the following EVPN route types are not used in the virtualized campus network scenario?

Options:

A.

Type 3

B.

Type 2

C.

Type 4

D.

Type 1

Buy Now
Questions 66

Telemetry data must be encoded in GPB binary format. This format reduces the number of bytes in telemetry messages and improves the transmission efficiency compared with messages encoded in JSON format.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 67

In theHuawei CloudCampus Solution, which of the following devices can go online through theregistration query center?

Options:

A.

Switch

B.

AR

C.

AP

D.

Firewall

Buy Now
Questions 68

If ISIS is used to transmit SIDs on an SR network, the node SIDs advertised by a Level-2 router are transmitted only within the same area.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 69

In the firewall hot standby scenario, when VGMP works in load balancing mode, which of the following functions must be enabled on the firewalls to prevent the return traffic from being discarded because it does not match any session entry in the case of inconsistent forward and return paths?

Options:

A.

Automatic backup

B.

Manual batch backup

C.

Quick session backup

D.

BFD

Buy Now
Questions 70

Which of the following statements aboutBIER (Bit Index Explicit Replication) and PIM (Protocol Independent Multicast)are correct?

Options:

A.

On a BIER-based multicast network, packets sent by the multicast source must be encapsulated with the Bitstring field.

B.

On a PIM-based multicast network, an MDT covering all nodes that multicast traffic traverses needs to be established.

C.

On a BIER-based multicast network, an MDT covering all nodes that multicast traffic traverses does not need to be established.

D.

On a BIER-based multicast network, multicast users must send group join messages hop by hop.

Buy Now
Questions 71

The ________ command can be run to completely isolate Layer 2 and Layer 3 of different interfaces in a VLAN. (Use lowercase letters to supplement the command, which cannot be abbreviated.)

Options:

Buy Now
Questions 72

SR-MPLS uses IGP extensions to advertise labels and reserve bandwidth to support high-bandwidth services.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 73

A network administrator runs the display telemetry destination command on a device to check information about a destination group that sampled data is sent to. The command output is as follows. Which of the following statements is incorrect?

[~CE-telemetry-sensor-group-Sensor1]display telemetry destination

Dest-name Dest-addr Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20000 RESOLVED - GRPC

Options:

A.

The IP address of the destination group is 192.168.56.1

B.

The destination group name is Dest1.

C.

VPN encapsulation is used for data push.

D.

The gRPC protocol is used for data push.

Buy Now
Questions 74

When static IPsec VPN is used for WAN interconnection in the Huawei CloudCampus Solution, the AP, Router, and _____ can be used as egress devices. (Use full spelling with the first letter capitalized.)

Options:

Buy Now
Questions 75

Which of the following headend behaviors can insert SRHs into IPv6 packets? (Select All that Apply)

Options:

A.

H.Encaps.Red

B.

H.Insert

C.

H.Encaps

D.

H.Insert.Red

Buy Now
Questions 76

Which of the following commands are mandatory for configuring an OSPF-based SR-MPLS TE tunnel? (Select All that Apply)

Options:

A.

Configure the LSR ID for routers.

B.

Enable segment routing in the OSPF process view.

C.

Enable the opaque capability of OSPF.

D.

Enable MPLS TE in the OSPF process view.

Buy Now
Questions 77

On acampus network,iMaster NCE-Campusis used to deploy twoVNs (Virtual Networks):R&D VNandMarketing VN. Users in these two VNs belong to twoseparate security groups.

The campus network requiresR&D personnel and sales personnel to communicate with each other. To meet this requirement, which of the following tasks does a network administrator need to perform?

Options:

A.

Deploy network service resources.

B.

Deploy a policy control matrix.

C.

Configure inter-VN communication.

D.

Deploy an external network.

Buy Now
Questions 78

OSPF is deployed on a campus network to implement network interconnection. An engineer configures R2 as shown in the figure. Which of the following statements is incorrect about LSAs on the OSPF network?

Options:

A.

Type 5 LSAs are flooded in Area 1.

B.

Type 3 LSAs are not flooded in Area 1.

C.

Type 3 LSAs are not flooded in Area 2.

D.

Type 5 LSAs are flooded in Area 2.

Buy Now
Questions 79

Which of the following statements about the multicast address used by OSPFv3 are correct?

Options:

A.

All OSPF routers use FF08::5.

B.

The DR uses FF08::6.

C.

All OSPF routers use FF02::5.

D.

The DR uses FF02::6.

Buy Now
Questions 80

Congestion management technology can be used to discard data packets in the buffer queue to prevent the buffer queue from being exhausted.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 81

Which of the following are application optimization functions in the Huawei SD-WAN Solution?

Options:

A.

Application identification

B.

Intelligent traffic steering

C.

WAN optimization

D.

QoS

Buy Now
Questions 82

When an NVE encapsulates a data frame into a VXLAN packet, information of which of the following protocols is encapsulated between the outer IP header and the VXLAN header?

Options:

A.

IP

B.

TCP

C.

UDP

D.

Ethernet

Buy Now
Questions 83

Which of the following statements about IPSG is incorrect?

Options:

A.

IPSG can be used to check the validity of IP packets. If IP packets are invalid, the device reports an alarm to an NMS.

B.

IPSG is a source IP address filtering technology based on Layer 3 interfaces.

C.

IPSG can be used to prevent hosts from changing IP addresses.

D.

IPSG can defend against IP address spoofing attacks.

Buy Now
Questions 84

Among NETCONF operations, the operation may contain an operation attribute, which is used to specify an operation type for configuration data. Which of the following operation attributes isincorrect?

Options:

A.

remove

B.

merge

C.

create

D.

update

Buy Now
Questions 85

On a VXLAN-based virtualized network, if the fabric networking mode is centralized gateway networking, the gateway is located on the _____ device. (Capitalize the first letter.)

Options:

Buy Now
Questions 86

Node segments in SR-MPLS must be manually configured.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 87

New IS-IS TLVs are used to carry IPv6 addresses and reachability information to support IPv6 route processing and calculation.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 88

Which of the following statements is incorrect about the user authentication points on the network?

Options:

A.

Deploying user authentication points at the access layer achieves granular permission management and high network security.

B.

Moving user authentication points from the access layer to the aggregation or core layer greatly reduces the number of user authentication points, thereby effectively mitigating the pressure on the AAA server.

C.

Deploying user authentication points at the access layer has both advantages and disadvantages when compared to doing so at the aggregation or core layer. Policy association can be applied if user authentication points are deployed at the access layer.

D.

When user authentication points are moved from the access layer to the aggregation layer, MAC address authentication for users may fail.

Buy Now
Questions 89

When you configure a virtualized campus network on iMaster NCE-Campus and enable external networks to connect to the Internet, iMaster NCE-Campus will automatically deliver a specific route to direct traffic to the corresponding external network.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 90

Huawei Open Programmability System (OPS)usesstandard HTTP methodsto accessmanaged objectsand manage network devices.

Which of the followingHTTP methodsis used toconfigure the value of a network device’s managed object?

Options:

A.

PUT

B.

POST

C.

GET

D.

PATCH

Buy Now
Questions 91

What can be determined from the following figure?

display bgp ipv6 routing-table

Total Number of Routes: 2

*>i Network : 3002::3

NextHop : 3000:FDEA::3

MED : 0

Path/Orgn : i

*>i Network : 3002::4

NextHop : 3000:FDEA::3

MED : 0

PrefixLen : 128

LocPrf : 100

PrefVal : 0

Path/Orgn : 65001 i

Options:

A.

If no routing policy is configured for the AS Path attribute, 3002::4/128 does not originate from AS 65001.

B.

R1 does not have routes 3002::3/128 and 3002::4/128.

C.

If no routing policy is configured for the AS_Path attribute, 3002::4/128 originates from AS 65001.

D.

R1 has routes 3002::3/128 and 3002::4/128.

Buy Now
Questions 92

An enterprise has three types of services. Voice and video services are key services and need to be guaranteed, and FTP services are non-key services. Which of the following scheduling modes is optimal for satisfying the service requirements?

Options:

A.

WFQ scheduling is configured for IP voice, video, and FTP download services.

B.

PQ scheduling is configured for IP voice and video services, and WFQ scheduling is configured for FTP download services.

C.

LPQ scheduling is configured for IP voice services, PQ scheduling is configured for video services, and WFQ scheduling is configured for FTP download services.

D.

PQ scheduling is configured for IP voice, video, and FTP download services.

Buy Now
Questions 93

Which of the following statements about static VXLAN tunnel configuration are correct?

Options:

A.

On an NVE interface, the destination address of a VXLAN tunnel is specified based on the address in the ingress replication list. You can create one NVE interface for multiple VXLAN tunnels.

B.

An NVE interface can be associated with multiple VNIs. Therefore, you can create one NVE interface when there are multiple BDs.

C.

One NVE interface must be created for each VXLAN tunnel, and the source and destination IP addresses must be specified for the NVE interface. Therefore, the number of NVE interfaces is the same as the number of VXLAN tunnels on the VTEP.

D.

One NVE interface must be created for each BD. If there are multiple BDs, multiple NVE interfaces must be created.

Buy Now
Questions 94

Exhibit:

A loop occurs because Spanning Tree Protocol (STP) is not enabled on the network. Which of the following symptoms may occur?

Options:

A.

A loop alarm is generated on the LAN switch.

B.

CPU usage is too high.

C.

MAC entries flap.

D.

Host receives a large number of broadcast packets.

Buy Now
Questions 95

R1 receives a common IPv6 packet from the CE and generates a packet carrying the SRH (Segment Routing Header), as shown in the figure. The packet is forwarded along the path R1 → R2 → R3 → R4. Identify the node type of each device based on their role in SRv6 processing.

Options:

Buy Now
Questions 96

On the bearer WAN shown in the figure,SR (Segment Routing)is deployed, and the controller is used to compute paths. Drag network technologies on the left to the corresponding application locations on the right.

Options:

Buy Now
Exam Code: H12-891_V1.0
Exam Name: HCIE-Datacom V1.0
Last Update: Apr 30, 2025
Questions: 275
H12-891_V1.0 pdf

H12-891_V1.0 PDF

$25.5  $84.99
H12-891_V1.0 Engine

H12-891_V1.0 Testing Engine

$30  $99.99
H12-891_V1.0 PDF + Engine

H12-891_V1.0 PDF + Testing Engine

$40.5  $134.99