Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Huawei > HCIA-Datacom > H12-811_V2.0

H12-811_V2.0 HCIA-Datacom V2.0 Question and Answers

Question # 4

What is the broadcast address of the network that contains a host with IP address 192.168.1.147/28?

A.

192.168.1.157

B.

192.168.1.255

C.

192.168.1.159

D.

192.168.1.145

Full Access
Question # 5

When a Huawei network device functions as an FTP server, which of the following are possible causes of an FTP client failing to log in to the FTP server? (Select all that apply)

A.

The FTP server function is not enabled on the device.

B.

The authorized directory is not specified for FTP users.

C.

The FTP user name and password are not configured.

D.

The network between the device and the FTP client is unreachable.

Full Access
Question # 6

Secure Shell (SSH) is a protocol that uses encryption and authentication mechanisms to implement network services, such as secure access and file transfer, securely over an insecure network. Which of the following protocols use SSH? (Select all that apply)

A.

DNS

B.

NETCONF

C.

SFTP

D.

STelnet

Full Access
Question # 7

On the network shown in the figure, all switches run STP. All links have a path cost of 20, and SW1 is the root bridge. What is the root path cost (RPC) of SW4?

A.

20

B.

40

C.

60

D.

80

Full Access
Question # 8

Both SNMP Trap and Inform Request are used by managed devices to send alarms to the NMS. Inform Request requires an acknowledgment from the NMS, whereas Trap does not.

A.

TRUE

B.

FALSE

Full Access
Question # 9

On the switched network shown in the figure, STP is enabled on all devices. SW1 is the root bridge. The port costs are shown in the figure. Other parameters retain the default values. After the network is stable, which of the following paths is used by SW1 to send traffic to SW4?

A.

SW1 → SW2 → SW4

B.

SW1 → SW3 → SW4

C.

SW1 → SW2 → SW3 → SW4

D.

SW1 → SW4

Full Access
Question # 10

Which of the following statements are true about the Python code shown below? (Select all that apply)

import paramiko

import time

ssh = paramiko.SSHClient()

ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())

ssh.connect('192.168.1.254', username='python', password='Huawei@123')

channel = ssh.invoke_shell()

channel.send('screen-length 0 temporary\n')

time.sleep(1)

output = channel.recv(65535).decode('utf-8')

print(output)

ssh.close()

A.

ssh.close() is used to terminate the SSH connection.

B.

ssh.connect('192.168.1.254', username='python', password='Huawei@123') is used to set up a connection with the device whose IP address is 192.168.1.254.

C.

import paramiko and import time are used to import the modules required by the code.

D.

channel = ssh.invoke_shell() is used to create an interactive shell session.

Full Access
Question # 11

DAD enables a node to detect whether an IPv6 address is already in use by another node before assigning it to an interface. This ensures that duplicate unicast addresses do not exist on a network. Which of the following packets are used for DAD? (Select all that apply)

A.

NS

B.

RS

C.

RA

D.

NA

Full Access
Question # 12

The traditional Fat AP networking usually applies to WLANs of small and micro stores. For a large-scale WLAN, the WAC + Fit AP networking is typically used. Which of the following statements are true about the WAC + Fit AP networking architecture? (Select all that apply)

A.

The WAC controls and manages all APs on the WLAN.

B.

Users need to log in to the Fit AP to configure wireless services.

C.

Layer 2 connectivity is required for the WAC and APs to communicate with each other using the CAPWAP protocol.

D.

Fit APs provide 802.11-based wireless access for STAs and function as bridges between wired and wireless networks.

Full Access
Question # 13

Four links between two switches establish an Eth-Trunk in manual mode, and the bandwidth of each link is 1 Gbit/s. One of the links fails. Which of the following statements are true about this scenario? (Select all that apply)

A.

The Eth-Trunk interfaces on the switches are still in the Up state.

B.

The available link bandwidth between the switches is 3 Gbit/s.

C.

The service traffic originally carried by the faulty link stops being forwarded by the switches until the faulty link recovers.

D.

All TCP sessions established over the Eth-Trunk are immediately interrupted and re-established.

Full Access
Question # 14

OSPF supports the division of a network into areas, each identified by an area ID that ranges from 0 to 255. Area 0 is designated as the backbone area.

A.

TRUE

B.

FALSE

Full Access
Question # 15

With the continuous development of AI, data center application scenarios are gradually divided into general-purpose computing and intelligent computing scenarios. Data centers need to ensure service continuity of general-purpose computing clusters while unleashing the full potential of intelligent computing clusters, so as to guarantee stable and efficient operation in the AI era. Which of the following statements are true about the service requirements of data center networks in the two scenarios? (Select all that apply)

A.

The general-purpose computing network demands a well-defined hierarchy, adopting a core-aggregation-access three-layer architecture.

B.

The general-purpose computing network requires high network stability and efficiency. Technologies such as M-LAG can be used to implement fast failover, and VXLAN can be deployed to build a large Layer 2 network for VM migration.

C.

The intelligent computing network requires zero packet loss, which necessitates the deployment of various lossless network technologies such as PFC and ECN.

D.

The intelligent computing network requires ultra-low latency, including the latency of data transmission within a compute node. The latency can be further reduced by using the RoCE protocol.

Full Access
Question # 16

Which of the following hosts are reachable to the host at 192.168.1.200/27 at Layer 2? (Select all that apply)

A.

192.168.1.221/27

B.

192.168.1.192/27

C.

192.168.1.193/27

D.

192.168.1.222/27

Full Access
Question # 17

On the campus network shown in the figure below, the core switch Core1 functions as a Layer 3 gateway and as a DHCP server to dynamically assign IP addresses to AP1, PC1, PC2, and PC3. The network below Core1 is a Layer 2 network. WAC1 and R1 are connected to Core1 at Layer 3. AP1 goes online through VLAN 100. The wireless service VLAN is VLAN 101, and the wired service VLANs for PC2 and PC3 are VLAN 102 and VLAN 103, respectively. Additionally, the direct forwarding mode is used for wireless traffic forwarding. If no additional VLANs are allowed on device interfaces, which of the following VLANs must be allowed on GE1/0/1 of ACC1? (Select all that apply)

A.

VLAN 100

B.

VLAN 101

C.

VLAN 102

D.

VLAN 200

Full Access
Question # 18

Assume that the IP address of GE0/0/0 on R1 is 10.0.12.1/24. Multiple commands can be used to enable OSPF on this interface. Match the commands with their configuration views.

Full Access