Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Huawei > Huawei Certification > H12-893_V1.0

H12-893_V1.0 HCIP-Data Center Network V1.0 Question and Answers

Question # 4

M-LAG configuration consistency check classifies device configurations into key configurations (Type 1) and common configurations (Type 2). This check can be performed in strict or loose mode based on the processing mode when key configurations are inconsistent. Which of the following statements is false about M-LAG configuration consistency check?

A.

In loose mode, if Type 1 configurations of the two M-LAG member devices are inconsistent, the member interface on the M-LAG backup device is in Error-Down state and an alarm is generated, indicating that Type 1 configurations on the two devices are inconsistent.

B.

If Type 1 configurations of the two M-LAG member devices are inconsistent, certain problems may occur, such as loops and long-period packet loss when the status is normal.

C.

If Type 2 configurations of the two M-LAG member devices are inconsistent, the M-LAG running status may be abnormal. Compared with Type 1 configuration problems, Type 2 configuration problems are more likely to be detected and have less impact on the network.

D.

If Type 2 configurations of the two M-LAG member devices are inconsistent, an alarm that indicates key and common configuration inconsistencies is generated.

Full Access
Question # 5

Which of the following servers are built into iMaster NCE-Fabric to provide related services? (Select All that Apply)

A.

DNS server

B.

RADIUS authentication server

C.

DHCP server

D.

Version file server

Full Access
Question # 6

Which of the following statements are true about the Easy mode? (Select All that Apply)

A.

This mode has low networking requirements.

B.

iMaster NCE-Fabric automatically generates configuration script files.

C.

On iMaster NCE-Fabric, you need to manually create and configure fabric resource pools, managed devices, device groups, device roles, tenants, and VPCs one by one in the Configuration Wizard menu.

D.

Layer 2 and Layer 3 basic services in a VPC are orchestrated on the Easy page.

Full Access
Question # 7

In the VPC interworking scenario, traffic is checked and filtered only by the firewall in the source or destination VPC.

A.

TRUE

B.

FALSE

Full Access
Question # 8

Which of the following is not included in the physical architecture of a server?

A.

Application

B.

VMmonitor

C.

OS

D.

Hardware

Full Access
Question # 9

Assume that a VXLAN tunnel is monitored on a Huawei CE series switch and that the tunnel status is Down or the tunnel fails to be dynamically established. In this scenario, which of the following statements are true about how to check the cause of the fault? (Select All that Apply)

A.

Run the display vxlan statistics command to check the cause of the fault.

B.

Run the display vxlan peer command to check the cause of the fault on the peer device of the tunnel.

C.

Run the display vxlan troubleshooting command to check the causes of at most the latest five failures to dynamically establish a VXLAN tunnel.

D.

Run the display vxlan troubleshooting command to check at most the latest five reasons why a VXLAN tunnel goes Down.

Full Access
Question # 10

Which of the following statements is false about the overlay technology and VXLAN protocol?

A.

A VXLAN tunnel endpoint that performs encapsulation is called a VNI.

B.

VXLAN uses ECMP of the underlay network to improve network forwarding performance.

C.

A VXLAN network is built based on UDP.

D.

VXLAN expands the number of subnets to 16 million and supports multi-tenancy.

Full Access
Question # 11

Which of the following are advantages of iMaster NCE-FabricInsight's telemetry-based performance metric collection? (Select All that Apply)

A.

Efficient transmission

B.

Quasi-real-time data collection

C.

Intelligent data analysis and automated troubleshooting

D.

One-off subscription and continuous data push

Full Access
Question # 12

In EVPN Type 3 routes, the MPLS Label field carries a Layer 3 VNI.

A.

TRUE

B.

FALSE

Full Access
Question # 13

Which of the following statements is false about M-LAG deployment?

A.

Multi-level M-LAG is mainly used to construct a large Layer 2 network in a DCN or directly connect DCNs at Layer 2.

B.

In multi-level M-LAG networking, you can manually configure the root bridge to prevent STP loops.

C.

Multi-level M-LAG must be configured based on V-STP.

D.

M-LAG networking can be classified into single-level M-LAG networking and multi-level M-LAG networking.

Full Access
Question # 14

In EVPN, Type 5 routes are used only by hosts on a VXLAN network to access external networks.

A.

TRUE

B.

FALSE

Full Access
Question # 15

Which of the following statements are true about the tenant service model? (Select All that Apply)

A.

A tenant can apply for independent compute, storage, and network resources.

B.

One logical router is mapped to one VRF.

C.

An EPG can have only one subnet.

D.

A subnet supports the access of only one VM.

Full Access
Question # 16

Which of the following statements are true about a routing design that employs OSPF on the underlay network of a DC? (Select All that Apply)

A.

Typically, the IP address of Loopback0 is configured as the VTEP IP address and the same IP address is planned for active-active leaf nodes in the same group.

B.

The network type of spine and leaf nodes can be set to P2P in order to accelerate convergence.

C.

This routing design is recommended when the DC has more than 300 switches.

D.

It is recommended that all devices be planned in Area 0.

Full Access
Question # 17

V-STP prevents loops caused by incorrect configurations or connections in an M-LAG.

A.

TRUE

B.

FALSE

Full Access
Question # 18

Which of the following statements is false about VXLAN tunnel establishment?

A.

A VXLAN tunnel is identified by a pair of VTEPs.

B.

After a tunnel is established, if one end of the tunnel goes Down, the other end may not go Down.

C.

For a static tunnel, you need to manually configure the local and remote VNIs.

D.

Dynamic tunnels depend on EVPN Type 5 routes to transmit information.

Full Access