Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Huawei > HCIE-Datacom > H12-891_V1.0

H12-891_V1.0 HCIE-Datacom V1.0 Question and Answers

Question # 4

Which of the following intelligent traffic steering policies can be used to fully utilize link bandwidth and implement link bandwidth-based load balancing on an enterprise network with multiple links?

A.

Application priority-based traffic steering

B.

Link quality-based traffic steering

C.

Link priority-based traffic steering

D.

Traffic bandwidth-based traffic steering

Full Access
Question # 5

On a campus network, which of the following problems may occur when you manually create a static VXLAN tunnel?

A.

Although the static VXLAN tunnel mode supports the distributed gateway scenario, the configuration involves a heavy workload and is complex to adjust.

B.

Remote MAC addresses can be learned by the VTEP only through data flooding.

C.

A static VXLAN tunnel also uses corresponding protocols on the control plane, which consumes device resources.

D.

If N devices need to establish static VXLAN tunnels, a maximum of N(N -1)/2 tunnels need to be manually configured, which involves a heavy workload.

Full Access
Question # 6

HTTP is an application layer protocol for distributed, collaborative, and hypermedia information systems.

A.

TRUE

B.

FALSE

Full Access
Question # 7

K company has two types of network services: UDP-based real-time video streaming services and TCP-based FTP download services. The company's network administrator often receives complaints that the FTP download speed is slow or unstable. What are the possible causes?

A.

The device uses the tail drop technology. As a result, global TCP synchronization affects the FTP rate.

B.

The device performs PQ scheduling for FTP services and WFQ scheduling for video services. As a result, the FTP service bandwidth is preempted.

C.

The device limits the FTP traffic rate to a small value.

D.

The video service has a higher priority and preempts the bandwidth of the FTP service.

Full Access
Question # 8

An SRLB is a set of user-specified local labels reserved for SR-MPLS. These labels are locally configured and have only local significance. Therefore, they are not advertised through the IGP.

A.

TRUE

B.

FALSE

Full Access
Question # 9

Before connecting an SSH client to an SSH server in public key authentication mode, a client needs to create a key pair. Which of the following commands is used to create a DSS key pair on the client using Git Bash?

A.

ssh-keygen -t dss

B.

ssh-keygen -t ecc

C.

ssh-keygen -t dsa

D.

ssh-keygen -t rsa

Full Access
Question # 10

In thefirewall hot standby scenario, in which of the following conditions will the local deviceproactively send VGMP packets?

A.

Hot standby being disabled

B.

Priority increase

C.

Link detection packet timeout

D.

Hot standby being enabled

Full Access
Question # 11

Which of the following statements about 802.1X authentication are correct?

A.

802.1X authentication uses EAPoL to exchange authentication information between the client, device, and authentication server.

B.

In EAP termination mode, EAP packets are terminated and re-encapsulated into RADIUS packets on the network access device. The network access device and AAA server use the standard RADIUS protocol to implement authentication, authorization, and accounting.

C.

EAPoL implements EAP encapsulation on an IEEE 802.3 network, whereas EAPoW implements EAP encapsulation on an IEEE 802.11 network.

D.

In EAP relay mode, EAP packets are directly encapsulated by the network access device into RADIUS packets (that is, EAP over RADIUS, or EAPoR). The network access device and AAA server use EAPoR to perform authentication, authorization, and accounting.

Full Access
Question # 12

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following statements about symmetric IRB forwarding are correct?

A.

Both the ingress VTEP and egress VTEP forward packets based on the Layer 3 forwarding table.

B.

The ingress VTEP forwards packets based only on the Layer 2 forwarding table.

C.

The egress VTEP forwards packets based only on the Layer 2 forwarding table.

D.

When VTEPs forward inter-subnet user communication packets, the VNI carried in the VXLAN header is the L3VNI.

Full Access
Question # 13

In the following figure, all routers are running OSPF. Given this, which of the following statements is correct?

A.

R2 forwards the Router-LSAs generated by R1 to R3.

B.

R2 forwards the Router-LSAs generated by R3 to R1.

C.

R2 generates Router-LSAs only in area 0.

D.

R2 generates Router-LSAs in both area 1 and area 0.

Full Access
Question # 14

Huawei Open Programmability System (OPS) uses HTTP methods to access managed objects to manage network devices. To facilitate script compilation, Huawei OPS provides the Python script template. In the Python script template, what are the contents of the Content-type and Accept fields in the header of an HTTP request packet?

A.

text/xml, text/json

B.

text/json, text/json

C.

text/xml, text/xml

D.

text/json, text/xml

Full Access
Question # 15

Which of the following fields is added to BGP4+ Update packets to advertise IPv6 routes?

A.

A new path attribute: MP_UNREACH_NLRI

B.

A new path attribute: MP_REACH_NLRI

C.

A new path attribute: IPv6_REACH_NLRI

D.

A new NLRI type: IPv6_NLRI, which carries the IPv6 NLRI prefix length and IPv6 NLRI prefix.

Full Access
Question # 16

NETCONF provides a set of mechanisms for managing network devices. What layers can NETCONF be conceptually partitioned into?

A.

Encrypted transport layer, messages layer, operations layer, and content layer

B.

Encrypted transport layer, messages layer, configuration layer, and content layer

C.

Secure transport layer, messages layer, configuration layer, and content layer

D.

Secure transport layer, messages layer, operations layer, and content layer

Full Access
Question # 17

Which of the following parameters is not included in an IPsec security association (SA)?

A.

Security parameter index (SPI)

B.

Destination IP address

C.

Security protocol ID (AH or ESP)

D.

Source IP address

Full Access
Question # 18

Which of the following functions can be provided by iMaster NCE-Campus when it functions as a relay agent for authentication?

A.

User accounting

B.

User authentication

C.

User analysis

D.

Marketing

Full Access
Question # 19

In addition to indicating priority, the DSCP value can also indicate the drop probability. Which of the following DSCP values is set with the highest drop probability?

A.

AF43

B.

AF10

C.

AF12

D.

AF11

Full Access
Question # 20

On the network shown in the figure, OSPF-based SR-MPLS TE is enabled on all routers. Which of the following adjacency labels are allocated by P3?

A.

9006

B.

9002

C.

9003

D.

9005

Full Access
Question # 21

According to the following information displayed on a router, which of the following are the causes of the failure in establishing an OSPF adjacency relationship?

OSPF error statistics:

1: Hello timer mismatch

0: Netmask mismatch

0: Bad checksum

0: Bad authentication type

0: Unknown neighbor

0: Extern option mismatch

A.

Hello packets are sent at different intervals.

B.

The area IDs are inconsistent.

C.

The IP address masks of the interfaces are inconsistent.

D.

The area types are inconsistent.

Full Access
Question # 22

If ISIS is used to transmit SIDs on an SR network, the node SIDs advertised by a Level-2 router are transmitted only within the same area.

A.

TRUE

B.

FALSE

Full Access
Question # 23

Which of the following languages is integrated into the OPS?

A.

Python

B.

C programming language

C.

Java

D.

C++

Full Access
Question # 24

What can be determined from the following figure?

display bgp ipv6 routing-table

Total Number of Routes: 2

*>i Network : 3002::3

NextHop : 3000:FDEA::3

MED : 0

Path/Orgn : i

*>i Network : 3002::4

NextHop : 3000:FDEA::3

MED : 0

PrefixLen : 128

LocPrf : 100

PrefVal : 0

Path/Orgn : 65001 i

A.

If no routing policy is configured for the AS Path attribute, 3002::4/128 does not originate from AS 65001.

B.

R1 does not have routes 3002::3/128 and 3002::4/128.

C.

If no routing policy is configured for the AS_Path attribute, 3002::4/128 originates from AS 65001.

D.

R1 has routes 3002::3/128 and 3002::4/128.

Full Access
Question # 25

On a virtualized network deployed using iMaster NCE-Campus, after creating VNs, you need to configure inter-VN communication. Which of the following configurations is used to achieve VN communication?

A.

Configure traffic filtering.

B.

Create a static route for the VPN instance corresponding to the VN.

C.

Deploy OSPF for the VPN instance corresponding to the VN.

D.

Deploy a routing policy.

Full Access
Question # 26

In OSPFv3, which of the following LSAs can be flooded within an area?

A.

Inter-Area-Router-LSA

B.

Intra-Area-Prefix-LSA

C.

Link-LSA

D.

Inter-Area-Prefix-LSA

Full Access
Question # 27

Which of the following are carried in an HTTP/1.1 response?

A.

Status line

B.

Response body

C.

Response header

D.

Empty line

Full Access
Question # 28

Whenstatic IPsec VPNis used for WAN interconnection in theHuawei CloudCampus Solution, theAP, Router, and ____can be used as egress devices.

Full Access
Question # 29

Which of the following statements isincorrectabout adding devices on a virtualized network deployed using iMaster NCE-Campus?

A.

iMaster NCE-Campus allows users to add devices in batches.

B.

iMaster NCE-Campus allows users to add devices by device role.

C.

iMaster NCE-Campus allows users to add devices by device ESN.

D.

iMaster NCE-Campus allows users to add devices by device model.

Full Access
Question # 30

iMaster NCE-Campus restricts RESTful APIs. If a client sends aGET requestthat invokes a RESTful API to obtain site information from iMaster NCE-Campus, which of the following fields should be included in the request header?

A.

ACCESS-TOKEN

B.

ACCEPT-TOKEN

C.

X-ACCEPT-TOKEN

D.

X ACCESS TOKEN

Full Access
Question # 31

On acampus network,iMaster NCE-Campusis used to deploy twoVNs (Virtual Networks):R&D VNandMarketing VN. Users in these two VNs belong to twoseparate security groups.

The campus network requiresR&D personnel and sales personnel to communicate with each other. To meet this requirement, which of the following tasks does a network administrator need to perform?

A.

Deploy network service resources.

B.

Deploy a policy control matrix.

C.

Configure inter-VN communication.

D.

Deploy an external network.

Full Access
Question # 32

To enhance reliability, you can deploy Huawei iMaster NCE-WAN controllers in active/standby mode. Which of the following IP addresses must be configured to be the same for the active and standby controllers so that the controllers can be accessed properly? (Select All that Apply)

A.

Southbound public IP addresses

B.

Internal interconnection addresses

C.

Southbound private IP addresses

D.

Northbound IP addresses

Full Access
Question # 33

Collecting information before a cutover helps you determine whether services are normal before and after the cutover.

A.

TRUE

B.

FALSE

Full Access
Question # 34

When designing IGP routes for an enterprise bearer WAN, ensure that the metric of aggregation-layer links is smaller than that of access-layer links, so that data can be preferentially forwarded over aggregation-layer links.

A.

TRUE

B.

FALSE

Full Access
Question # 35

The channelized sub-interface and FlexE technologies both can be used to implement network slicing, but the application scenarios of the two technologies are slightly different. Which of the following statements about the two technologies are correct?

A.

It is recommended that channelized sub-interface be used to reserve resources for interfaces with a bandwidth of less than 50 Gbit/s.

B.

It is recommended that FlexE be used to reserve resources for 50GE and higher-rate interfaces.

C.

Only FlexE-based network slicing can be deployed across OTN devices.

D.

Only network slicing based on channelized sub-interface can be deployed across MSTP devices.

Full Access
Question # 36

Which of the following statements aboutSR-MPLS Policy path planningare correct?

A.

When planning paths based on bandwidth, you need to set the available bandwidth of each interface in advance.

B.

When planning paths based on delay, you must deploy TWAMP or iFIT in advance to measure real-time network delay.

C.

If you use the controller to plan SR-MPLS Policy paths, only primary and backup paths can be deployed, and load balancing cannot be implemented for the primary path.

D.

When statically planning SR-MPLS Policy paths, you can plan load balancing for the primary path.

Full Access
Question # 37

Refer to the output information of a device below. According to the information, which of the following MPLS labels is carried in a data packet forwarded by the device to 10.0.1.1?

A.

36100

B.

36200

C.

40100

D.

40200

Full Access
Question # 38

Which of the following are application optimization functions in the Huawei SD-WAN Solution?

A.

Application identification

B.

Intelligent traffic steering

C.

WAN optimization

D.

QoS

Full Access
Question # 39

Flavors are additional behaviors defined to enhance theEnd series instructionsinSRv6. Which of the followingEnd instructionscan thePSP flavorbe attached to?

A.

End.X

B.

End.BM

C.

End.T

D.

End

Full Access
Question # 40

When you configure avirtualized campus networkoniMaster NCE-Campus, Fit APs can immediately go online after you add them toiMaster NCE-Campus.

A.

TRUE

B.

FALSE

Full Access
Question # 41

This figure shows anSRv6 (Segment Routing over IPv6)packet. If theDestination Addressfield in the IPv6 basic header isFC04::4, the value of theSL (Segment Left)field in the SRv6 header should be____.(Enter only digits.)

Full Access
Question # 42

In Huawei SD-WAN Solution, which of the following tunneling technologies is used to establish data channels?

A.

WLAN

B.

IPsec

C.

MPLS

D.

GRE over IPsec

Full Access
Question # 43

In the figure,SR-MPLSis enabled onR1, R2, and R3. TheSRGB (Segment Routing Global Block) rangeonR3is from20000 to 21000, and theprefix SID indexconfigured on theloopback1 interface of R3 is 30.

In this case, theMPLS label corresponding to the loopback1 interface of R3 is _____.

(Enter anArabic numeralwithout symbols.)

Full Access
Question # 44

TheNETCONF content layercontainsdevice configuration data.

Which of the following statements are correct about the followingNETCONF configuration?

merge

rollback-on-error

10

0

A.

The NETCONF operation is performed to load the configuration data to the startup configuration datastore.

B.

The Huawei-YANG model is used.

C.

VLAN 10 is created on the target device.

D.

The operation contains an operation attribute so that the modified data is merged.

Full Access
Question # 45

To obtain thetoken IDofiMaster NCE, you need to send anHTTP requestusing the followingPython codeto invoke aniMaster NCE RESTful API:

Which of the following statements isincorrect?

A.

You can run print(r.json()) to display the response message sent from the server.

B.

Token resources are located at https://139.9.213.72:18002/controller/v2/tokens.

C.

The HTTP request uses the GET method to query the token value.

D.

The request body is inJSON format.

Full Access
Question # 46

The following figure shows the inter-AS MPLS L3VPN Option C (Solution 2). ASBR-PE2 is connected to CE3 and runs eBGP.

To enable all CEs to communicate with each other, which of the following address families must peer relationships be enabled in the BGP process of ASBR-PE2?

A.

VPNv4 address family

B.

BGP-LS address family

C.

VPN instance unicast address family

D.

Unicast BGP address family

Full Access
Question # 47

Flavors can be used to enhance SRv6 instructions to meet more diversified service requirements. Which of the following are flavors? (Select all that apply)

A.

Penultimate Segment Pop of the SRH (PSP)

B.

Ultimate Segment Decapsulation (USD)

C.

Ultimate Segment Pop of the SRH (USP)

D.

Penultimate Segment Decapsulation (PSD)

Full Access
Question # 48

An engineer needs todownload the configuration file vrpcfg.cfgto a local device throughSFTP, rename the configuration file to backup.cfg, and upload it to thedefault directory of the device.

The configuration file is located at /vrpcfg.cfg (default directory of the remote device), and the local directory is C:\.

Which of the followingPython Paramikocode lines can implement the required operations?

A.

sftp.get('/vrpcfg.cfg', r'C:\')sftp.put(r'C:\backup.cfg', '/')

B.

sftp.get('/vrpcfg.cfg', r'C:\backup.cfg')sftp.put(r'C:\backup.cfg', '/')

C.

sftp.get('/vrpcfg.cfg', r'C:\vrpcfg.cfg')sftp.put('/backup.cfg', r'C:\vrpcfg.cfg')

D.

sftp.get('/vrpcfg.cfg', r'C:\backup.cfg')sftp.put(r'C:\backup.cfg', '/backup.cfg')

Full Access
Question # 49

MPLS supports forwarding equivalence class (FEC). Which of the following cannot be used as an FEC allocation standard?

A.

Fragment offset

B.

Application protocol

C.

Destination address

D.

Class of Service (CoS)

Full Access
Question # 50

In the Huawei SD-WAN Solution, which of the following routing protocols is used to advertise VPN routes between CPEs?

A.

RIP

B.

OSPF

C.

IS-IS

D.

BGP

Full Access
Question # 51

The IS-IS Level-1 neighbor relationship is not established betweenR3andR4. Referring to the following information, what is the possible cause?

A.

The IIH authentication betweenR3andR1fails.

B.

The IS-IS levels ofR3andR4do not match.

C.

The circuit types of the interfaces connectingR3andR4do not match.

D.

The area IDs ofR3andR4are different.

Full Access
Question # 52

On a router,SRv6is enabled, and the configurations shown below are performed. Which of the following statements about the configurations are correct?

[Router-segment-routing-ipv6] locator srv6_locator1 ipv6-prefix 2001:DB8:ABCD::/64 static 32

A.

The locator of this node is2001:DB8:ABCD::.

B.

The static segment of the node occupies32 bits.

C.

The dynamic segment of the node occupies32 bits.

D.

The Args field of this node occupies32 bits.

Full Access
Question # 53

If an engineer wants to remotely log in to a Huawei device, the engineer uses the Paramiko library to compile the following code when compiling the SSH Python script:

cli = ssh.invoke_shell()

cli.send("screen-length 0 temporary\n")

What is the function of screen-length 0 temporary?

A.

Performing automatic word wrap

B.

Performing split-screen display

C.

Canceling split-screen display

D.

Canceling automatic word wrap

Full Access
Question # 54

Which of the following is the drop probability of packets exceeding the upper threshold in WRED?

A.

0.2

B.

0.5

C.

1

D.

0.8

Full Access
Question # 55

SSH connections are usually established based on TCP/IP connections. In specific cases, SSH connections can be established based on UDP connections.

A.

TRUE

B.

FALSE

Full Access
Question # 56

Prefix segments and adjacency segments are globally visible and unique.

A.

TRUE

B.

FALSE

Full Access
Question # 57

In 6PE and 6VPE networking, no VPN instance needs to be created on PEs.

A.

TRUE

B.

FALSE

Full Access
Question # 58

O&M personnel for a large-scale event center receive feedback about Wi-Fi access failures. iMaster NCE-CampusInsight provides the function for personnel to view packet exchange processes and locate the root cause. It is found that IP addresses in the DHCP address pool are exhausted, preventing IP addresses from being assigned to mobile terminals. Which of the following functions is used by O&M personnel in this scenario?

A.

Simulation feedback

B.

Protocol trace

C.

Issue analysis

D.

Client journey

Full Access
Question # 59

An LSR supports various label retention modes. Which of the following statements regarding the liberal mode are correct?

A.

This label retention mode saves the memory and label space.

B.

An LSR retains labels from a neighboring LSR only when the neighbor is its next hop.

C.

An LSR reserves all labels distributed by its neighbor.

D.

Liberal mode allows the device to retain labels from all LSRs, not just the next hop.

Full Access
Question # 60

Based on the figure, which of the following statements are correct?

tracert 172.17.1.5

1 10.1.12.2 40 ms 10 ms 10 ms

2 10.1.24.2 30 ms 20 ms 20 ms

3 10.1.34.1 20 ms 20 ms 20 ms

4 10.1.13.1 20 ms 20 ms 10 ms

5 10.1.12.2 20 ms 30 ms 20 ms

6 10.1.24.2 30 ms 30 ms 30 ms

7 10.1.34.1 50 ms 40 ms 40 ms

8 10.1.13.1 20 ms 30 ms 30 ms

A.

A. R1 does not have a route to 172.17.1.5.

B.

B. R1 has a route to 172.17.1.5.

C.

C. The path for R1 to access 172.17.1.5 is normal.

D.

D. A loop occurs when R1 accesses 172.17.1.5.

Full Access
Question # 61

Which of the following statements is correct about 6PE and 6VPE?

A.

In 6PE networking, VPN instances need to be created on PEs.

B.

In 6PE networking, IPv6 addresses of a CE can be reused.

C.

In 6VPE networking, IPv6 addresses of a CE can be reused.

D.

In 6VPE networking, no VPN instance needs to be created on PEs.

Full Access
Question # 62

When configuring a static VXLAN tunnel, you need to manually configure the _____, VTEP IP address, and ingress replication list. (Enter only uppercase letters.)

Full Access
Question # 63

Which of the following community attributes ensure that BGP routes are transmitted only within an AS?

A.

No Export Subconfed

B.

No_Export

C.

Internet

D.

No_Advertise

Full Access
Question # 64

Which of the following statements about the multicast address used by OSPFv3 are correct?

A.

All OSPF routers use FF08::5.

B.

The DR uses FF08::6.

C.

All OSPF routers use FF02::5.

D.

The DR uses FF02::6.

Full Access
Question # 65

What is the router ID length supported by OSPFv3?

A.

128 bits

B.

64 bits

C.

100 bits

D.

32 bits

Full Access
Question # 66

Which of the following is the type ofnorthbound APIused byiMaster NCE-WAN?

A.

NETCONF

B.

SNMP

C.

CLI

D.

RESTful

Full Access
Question # 67

SR-MPLS uses IGP extensions to advertise labels and reserve bandwidth to support high-bandwidth services.

A.

TRUE

B.

FALSE

Full Access
Question # 68

Network Quality Analysis (NQA) is a real-time network performance detection and measurement technology. It monitors the performance of multiple protocols running on a network. Which of the following protocols can be monitored by NQA?

A.

SNMP

B.

OSPF

C.

ICMP

D.

DHCP

Full Access
Question # 69

Which of the following can be used to transmit traffic to a VXLAN network and implement intra-subnet communication on the same VXLAN network?

A.

Layer 3 VXLAN gateway

B.

NVE interface

C.

VLANIF interface

D.

Layer 2 VXLAN gateway

Full Access
Question # 70

During telemetry static subscription, the NMS delivers subscription configuration to devices for data sampling. Which of the following statements is incorrect about the sampling path huawei-debug:debug/cpu-infos/cpu-info?

A.

cpu-info may be a list node of the YANG model.

B.

The sampling path uses the YANG model structure.

C.

debug may be the top node of the YANG model.

D.

cpu-infos may be a container node of the YANG model.

Full Access
Question # 71

As shown in the figure, a sham link is established between PE1 and PE2 through the loopback interfaces. CE2 can learn the 192.168.1.0/24 route (directed route on CE1) through the sham link and backdoor link. If other parameters use their default settings, the cost of the 192.168.1.0/24 route on CE2 should be ______. (Enter an Arabic numeral without symbols.)

Full Access
Question # 72

Huawei Open Programmability System (OPS) provides openness and programmability capabilities for network devices and enables users to perform secondary development. To facilitate script completion, Huawei OPS provides the Python script template in which the OPSConnection class is created. The member function for creating device resources is def post(self, uri, req_data).

A.

TRUE

B.

FALSE

Full Access
Question # 73

NAFTIR policing can only be applied to the inbound direction. Its purpose is to monitor the traffic entering the device and ensure that the upstream device does not unnecessarily consume network resources.

A.

TRUE

B.

FALSE

Full Access
Question # 74

Huawei Open Programmability System (OPS)usesstandard HTTP methodsto accessmanaged objectsand manage network devices.

Which of the followingHTTP methodsis used toconfigure the value of a network device’s managed object?

A.

PUT

B.

POST

C.

GET

D.

PATCH

Full Access
Question # 75

Which of the following items are included in static information collection and analysis?

A.

Device types

B.

Interface types

C.

License

D.

Packet loss rate

Full Access
Question # 76

As shown in the figure, when PE1 receives an ARP request packet, it forwards the packet to PE4. The packet then carries two labels. The label value 201 is carried by the EVPN Type ____ route. (Enter only digits.)

Full Access
Question # 77

Telemetry data must be encoded in GPB binary format. This format reduces the number of bytes in telemetry messages and improves the transmission efficiency compared with messages encoded in JSON format.

A.

TRUE

B.

FALSE

Full Access
Question # 78

InSRv6, each time a packet passes through anSRv6 endpoint node, theSegments Leftfield valuedecrements by 1, and theIPv6 DA changes.

A.

TRUE

B.

FALSE

Full Access
Question # 79

Which of the following statements aboutSR-MPLS Policy candidate pathsare correct?

A.

A candidate path can contain multiple segment lists, with each segment list carrying the weight attribute.

B.

Load balancing can be implemented among candidate paths and among segment lists.

C.

An SR-MPLS policy can contain multiple candidate paths with the preference attribute.

D.

The valid candidate path with the highest preference functions as the primary path of the SR-MPLS Policy.

Full Access
Question # 80

MPLS supports Forwarding Equivalence Class (FEC). Which of the following cannot be used as a FEC allocation standard?

A.

Application protocol

B.

Fragment offset

C.

Class of Service (CoS)

D.

Destination address

Full Access
Question # 81

In theHuawei CloudCampus Solution, which of the following devices can go online through theregistration query center?

A.

Switch

B.

AR

C.

AP

D.

Firewall

Full Access
Question # 82

During WLAN planning and design, channels 1, 6, and 11 are recommended on the 2.4 GHz frequency band, and channels 1, 5, 9, and 13 are recommended in high-density scenarios. On the 5 GHz frequency band, it is recommended thathigh-frequency and low-frequency channels of adjacent APs be staggered to prevent overlapping.

A.

TRUE

B.

FALSE

Full Access
Question # 83

In a VXLAN scenario, which of the following features can be enabled to reduce ARP packet flooding between VTEPs?

A.

Local proxy ARP

B.

ARP broadcast suppression

C.

Host information collection

D.

Port isolation

Full Access
Question # 84

Telemetry is a technology that remotely collects data from physical or virtual devices at high speed, and has a layered protocol stack. Which of the following layers isnotincluded in the telemetry protocol stack?

A.

Communication layer

B.

Transport layer

C.

Data encoding layer

D.

Data analysis layer

Full Access
Question # 85

Drag the IPsec functions on the left to the corresponding function description on the right.

Full Access
Question # 86

When an SSH client logs in to an SSH server that is configured only with username and password authentication in SSH mode, the key exchange phase is not involved (no key is generated).

A.

TRUE

B.

FALSE

Full Access
Question # 87

When an NVE encapsulates a data frame into a VXLAN packet, information of which of the following protocols is encapsulated between the outer IP header and the VXLAN header?

A.

IP

B.

TCP

C.

UDP

D.

Ethernet

Full Access
Question # 88

A network administrator needs to retrieve atoken IDfromiMaster NCEusing the following Python code:

import requests

nbi_name = "demol3@north.com"

nbi_pwd = "qqcOVcVel@"

host = "139.9.213.72"

port = "18002"

URI = "/controller/v2/tokens"

post_token_url = "https:// " + host + ":" + port + URI

headers_post = {'Content-Type': 'application/json', 'Accept': 'application/json'}

r = requests.post(post_token_url, headers=headers_post, json={"userName": nbi_name, "password": nbi_pwd}, verify=incorrect)

Which of the following statements is incorrect?

A.

You can run print(r.json()) to display the response message sent from the server.

B.

Token resources are located at https://139.9.213.72:18002/controller/v2/tokens.

C.

The HTTP request uses the GET method to query the token value.

D.

The request body is inJSON format.

Full Access
Question # 89

Which of the following statements aboutOPS (Open Programmability System) application scenariosisincorrect?

A.

To enable a network device to automatically send a configuration file to the server after the device configuration is saved, users can use the maintenance assistant to create a timer trigger condition and periodically run the Python script.

B.

When the OPS is used to automatically deploy unconfigured devices, a Python script is used to obtain the IP addresses of the software and configuration file server and download the system software and configuration file.

C.

The OPS can reduce the impact of the network environment in some cases. For example, when collected information is transmitted to a server, the Python script can be used to temporarily store the execution result to the device when the network is disconnected. After the network is reconnected, the execution result is transmitted to the server.

D.

The OPS can be used to automatically check the health status of devices.

Full Access
Question # 90

In the firewall hot standby scenario, which of the following status information can be backed up between the active and standby firewalls?

A.

Server mapping table

B.

AAA user table (excluding the default user admin)

C.

Session table

D.

Dynamic MAC address table

Full Access
Question # 91

In OSPF, an ABR translates all Type 7 LSAs in a Not-So-Stubby Area (NSSA) into Type 5 LSAs.

A.

TRUE

B.

FALSE

Full Access
Question # 92

Which of the following is not the function of OSPFv3 Link-LSAs?

A.

Advertises the interface ID of the local router to other routers attached to the link.

B.

Advertises the link-local address of the local interface to other routers attached to the link.

C.

Advertises a list of IPv6 prefixes of the local interface to other routers attached to the link.

D.

Advertises the Options field in the Network-LSA originated on the local link to other routers attached to the link.

Full Access
Question # 93

The Ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is _____ IRB forwarding. (Capitalize the first letter.)

Full Access
Question # 94

Which of the following statements about IPSG is incorrect?

A.

IPSG can be used to check the validity of IP packets. If IP packets are invalid, the device reports an alarm to an NMS.

B.

IPSG is a source IP address filtering technology based on Layer 3 interfaces.

C.

IPSG can be used to prevent hosts from changing IP addresses.

D.

IPSG can defend against IP address spoofing attacks.

Full Access
Question # 95

On a CloudCampus virtualized campus network, service data enters different VNs from physical networks through edge nodes, and the VN that the data will enter is determined by the VLANs to which users belong. Which of the following statements about dynamic VLAN authorization is incorrect?

A.

When wired users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

B.

When wireless users pass Portal authentication, they join the authorization VLANs delivered to edge nodes.

C.

When wireless users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

D.

When wired users pass MAC address authentication, they join the authorization VLANs delivered to edge nodes.

Full Access
Question # 96

Which of the following channels are involved in the Huawei SD-WAN Solution?

A.

Management channel

B.

Control channel

C.

Data channel

D.

Orchestration channel

Full Access