You are on page 1of 12

DUMPS

BASE
EXAM DUMPS

HUAWEI
H12-891_V1.0-ENU
28% OFF Automatically For You

HCIE-Datacom V1.0
1.The DHCP protocol assigns to clients―some TCPIP-related parameter
information―in the process DHCP defines a variety of messages that are
encapsulated at the transport layer: (sortic).
A. PPP package
B. IP encapsulation
C. TCP Encapsulation
D. UDP Encapsulation
Answer: D

2. In different scenarios, RSTP provides different protection functions, and the wrong
statement about this statement is
A. The root protection feature is enabled for the specified port, and its port role can

ly
th
only remain as the specified port

oo
m
S
B. When the anti-TC-BPDU packet attack feature is enabled, the number of times the

m
xa
switching device processes IC BPDU packets per unit time is configurable

E
U
N
C. after the BPDU protection function is enabled on the switching device, if the edge

0-E
1.
port receives RST BPDU, the edge port will be set to a non-remote port and the

V_
91
-8
spanning tree calculation will be re-performed
12
H
D. Start the specified port of root protection, when the port receives a better
s
as
P

RSTBPDU, the port will enter the Discarding state and is no longer forwarding
o
T
2]

packets. If the port does not receive a better RSTBPD for a period of time then
02
[2
02

automatically revert to the normal Forwarding state


8.
V

Answer: C
s
on
sti
ue
Q
ps
um

3. In a VXLAN network, traffic is connected to the VXLAN network, and it can also be
D
U
N

used to communicate with the same subnet within the same XLAN network
E
0-
1.

A. NVE interface
_V
91
-8

B. VXVAN L2 Gateway
12
H

C. VXLAN L3 Gateway
ei
w
ua

D. VLANIF interface
lH
ea

Answer: B
R

4. SSH uses asymmetric encryption algorithms AES and DES to achieve security for
data transmission, and uses HMAC to ensure the complete integrity of integer data
A. TRUE
B. FALSE
Answer: A

5. Which of the following IEEE standards is specific to Gigabit Ethernet?


A. 8023z
B. 8023ab
C. 8023ad
D. 8023af
Answer: A,B

6. The BSR/RP mechanism described below describes the correct determination?


(Multiple choice questions).
There can be multiple C-BSRs in the
A. PIM-SM domain, but only one BSR can be elected.
B. BSR collects C-RP information by receiving packets of C-RP
C. BSR advertises BSR and C-RP information to all routers in the PIM-SM domain via

ly
th
flood bootstrap messages

oo
m
S
D. A C-BSR can also collect C-RP information by receiving C-RP packets

m
xa
Answer: A,B,C

E
U
N
0-E
1.
V_
91
-8
7. MSTP switches treat RSTP switches as MSTP domains, MSTP, which are formed
12
H
by a single switch The interchange resolves the RSTBPDU to MSTBPDU, where
s
as
P

IRPC is 0
o
T
2]

A. True
02
[2
02

B. False
8.
V

Answer: A
s
on
sti
ue
Q
ps
um

8. CMPv6 uses the Type field to identify the message type, and according to the
D
U
N

value of the type field, we can divide the ICMPv6 message into two categories, one is
E
0-
1.

the error message and the other is the information message


_V
91
-8

A. True
12
H

B. False
ei
w
ua

Answer: A
lH
ea
R

9. As a network administrator, which of the following protocols can I use for network
device configuration?
A. SSH
B. NETCONF
C. LLDP
D. SNMP
Answer: B,D
10. How do 8021w and 8021D handle BPDUs? (Confirmed) The
A. 8021D bridge only forwards BPDU packets received from the root bridge
B. The 8021D bridge does not forward BPDU messages
C. The 8021w bridge forwards only BPDU packets received from the root bridge
D. 8021w Bridge does not forward BPDU packet
Answer: A

11. After BGP introduces routes for other protocols, the next hop in the BGP routing
table is consistent with the next hop of the introduced routing protocol
A. True
B. False
Answer: B

ly
th
oo
m
S
m
xa
12. If the Option field value in the 0SPFv3 Hello message issued by the router's

E
U
N
GIgabit Ethermet0/0 interface is 0x000013, the following description is correct

0-E
1.
A. The Gigabit/thernetO/0/0 interface of Router A adds IPv6 routing to compute

V_
91
-8
B. Router A's Gigabit/thernetO/0/0 interface belongs to the NSSA zone
12
H
C. Router A supports AS-An External-LSA flood
s
as
P

D. Router A is an OSPFv3 device with forwarding capability


o
T
2]

Answer: A,C,D
02
[2
02
8.
V
s
on
ti

13. The following description of the link state protocol is plausible?


s
ue
Q

A. CPU utilization is high and loops are easy to generate


ps
um

B. Slow convergence and low CPU utilization


D
U
N

C. Fast convergence and low CPU utilization


E
0-
1.

D. Fast convergence and high CPU utilization


_V
91
-8

Answer: D
12
H
ei
w
ua
lH
ea

14. CORRECT TEXT


R

The following description of Filter-Policy is correct? (Radio).


A With Filter-Policy, on ASBR in OSPF, type5LSA and type7LSA can be applied The
build is filtered.
B. Prefix lists can be used to filter both routes and packets.
C. Filter-policy filters the link state information received or published, and can modify
the properties of route entries.
D. When filtering routes using the pre-slow list, the table entry ip-prefxldeny0000 0
lese-qual 32 indicates that only the default route matches
Answer: C
15. Which of the following messages does the BGP protocol support?
A. Update
B. Open
C. Hello
D. Keepalive
Answer: A,B,D

16. Is the following description of ospf virtual links correct?


A. A virtual connection can be established in any area, after which it itself belongs to
the region
B. The virtual connection ip is used as the link address

ly
th
C. Virtual links can be used to solve the problem of zone 0 being segmented

oo
m
S
D. The cost of a virtual connection is zero and is the optimal link

m
xa
Answer: C

E
U
N
0-E
1.
V_
91
-8
17. XLAN uses BGP EVPN to establish a tunnel, what type of message is used?
12
H
(Single choice questions).
s
as
P

A. Typel
o
T
2]

B. Type2
02
[2
02

C. Type3
8.
V

D. Type4E. Type5
s
on
ti

Answer: C
s
ue
Q
ps
um
D
U
N

18. In RSTP, which port provides a backup path to reach the root node of the
E
0-
1.

spanning tree?
_V
91
-8

What state is the port in?


12
H

A. Root Port and Listening Status


ei
w
ua

B. Alternate Port and Forwarding Status


lH
ea

C. Alternate Port and Learning Status


R

D. Designated port and Listening status


E. Alternate port and Discarding status
Answer: E

19. IPV6 multicast introduces the concept of multicast scope, which of the following
ways is the multicast scope concept implemented? Multi-select
A. When the group shake source sends IP6 multicast data, the TTL value of the
packet is set to limit the transmission range of the group shake
B. There is a special field in the IPv6 multicast address that specifies the propagation
range of multicast.
C. Multicast scope is just a concept of spreading scope, and there is no specific
technical implementation.
D. During network configuration, the administrator uses the configuration command at
the edge of the network to limit the multicast scope.
Answer: B,D

20. If a DR needs to be elected between multicast routers running PIM-SM to be


responsible for the sending and receiving of source or member multicast data, which
one is described correctly below for the DR election rule?
A. PIM routers with long interface masks are elected dr.
B. Compare the DR priority first; With the same priority, you need to compare the

ly
th
interface IP addresses of the PIM routers to elect dr

oo
m
S
C. PIM routers with small IP addresses are elected DR. PIM routers with low

m
xa
D. DR priority values are elected DR.

E
U
N
Answer: B

0-E
1.
V_
91
-8
12
H
21. For Layer 2 VPN technology, the following statement is correct? Multi-select
s
as
P

A. VPLS is a widely used technology in the live network, which can provide
o
T
2]

transparent transmission of three-layer messages and achieve multi-point access.


02
[2
02

B. The VPLS configuration is complex and the Layer 2 network transmits BUM
8.
V

packets.
s
on
ti

C. BGPEVPN supports features such as tenant isolation, Multi-homing, and broadcast


s
ue
Q

suppression.
ps
um

D. BGPEVPN addresses mac address drift and multi-tenancy that VPLS cannot
D
U
N

support.
E
0-
1.

Answer: B,C
_V
91
-8
12
H
ei
w
ua

22. The following statement about the alliance is correct? (Single choice questions).
lH
ea

A. The consortium divides an AS into sub-AS, and the alliance external AS still
R

considers the consortium to be an AS


B. Subsystems within a consortium can use private AS numbers. Huawei NE/AR
routers, a consortium can be configured with up to 32 subsystems
C. Consortium can easily detect the routing loop within the AS because EBGP is
running between the subAS.
D. The subas number of the consortium, which by default notifies BGP peers outside
the consortium
Answer: D
23. After configuring the VLAN-based MAC address drift detection function, if the
MAC address drifts, you can configure the actions of the interface according to your
needs .
Which of the following is not a configurable action?
A. Send an alert
B. The MAC address blocks
C. Interface blocking
D. Traffic filtering
Answer: D

24. In the use of the CP protocol, the following description is correct?


A. The Eth-Trunk interface can be avoided by frequent oscillation interfaceeth-

ly
th
trunkllacppreemptenablelacppreemptdelaydelay-time by following command

oo
m
S
B. Source A address can be configured for load sharing in an enabled link

m
xa
aggregation group with the following command: interface eth-trunk 110ad-balance src-

E
U
N
dst-ip

0-E
1.
C. A member interface can be removed from an enabled link aggregation group with

V_
91
-8
the following command: interface GigabitEthernet0/0/1 shutdown interface
12
H
GigabitEthernet0/0/1 undo eth-trunk 1 interfaceGigabitEthernet0/0/1undoshutdown
s
as
P

D. The member interface can be joined in the link aggregation group by enabling the
o
T
2]

following command: interface GigabitEthernet0/0/1 shutdown interface


02
[2
02

GigabitEthernet0/0/1 trunkport
8.
V

Answer: A
s
on
sti
ue
Q
ps
um

25. ISIS elects DIS in broadcast multiplexed access networks, and the following
D
U
N

statement about DIS is correct? (Multiple choice)


E
0-
1.

A. ISIS elects dis by comparing priorities, and mac addresses if the priorities are
_V
91
-8

consistent
12
H

B. In a broadcast multiple access network, DIS sends Hello PDUs at three times the
ei
w
ua

frequency
lH
ea

C. DIS guarantees database synchronization by periodically sending CSNP


R

messages
D. DIS supports preemption function, after the new DIS preemption is successful,
there is no need to flood any LSP packet
Answer: A,B,C

26. A switch joins a running stacking system after powering up, a behavior known as
heap overlay.
A. TRUE
B. FALSE
Answer: A

27. In order to reduce the number of OSPF routes in certain areas, the OSPf protocol
has developed special area functions, and the following description of the
characteristics of OSPF special areas is correct
A. ASBR-Sunmary-LSA is allowed to be published to the NSSA region
B. AS-External-LSA is allowed to be published to the Stub region
C. Any OSPF zone can be configured as a special zone
D. Zone can be equipped with zhiyi
Answer: D

ly
th
28. What of the following actions can enable fast failure detection on multicast

oo
m
S
networks?

m
xa
A. Shorten the Holdtime of Join/Prune messages

E
U
N
B. Reduce the interval at which the interface sends Hello messages

0-E
1.
C. A PIM BFD session is established between neighbors

V_
91
-8
D. Reduce the interval between sending Join/Prune messages
12
H
Answer: B
s
as
P
o
T
2]
02
[2
02

29. Router HW enables OSPF and router HW has the role of ABR and is configured
8.
V

with abr-summary, then which class LSA Will it be aggregated?


s
on
ti

A. 1 Class LSA
s
ue
Q

B. 2 kind LSA
ps
um

C. 3 kind LSA
D
U
N

D. 4 kind LSA
E
0-
1.

E. 5 Class LSA
_V
91
-8

Answer: A,B
12
H
ei
w
ua
lH
ea

30. There is an As-path-filter.ip as-path-filter 1 permit*(100l400) $, which As-path-filter


R

can match which of the following AS_PATH Attribute? (Confirmed).


A. 300 4200
B. 1234 1400
C. 3100
D. 100
Answer: B,C,D

31. CORRECT TEXT


The following about BGP routing, describing the error, is?
A, non-aggregate routes take precedence over aggregate routes
B. In PrefVal, Local_ Preference is equal to the case if the route is generated locally,
IBGP Routing, the BGP preference for EBGP routing, is generated effectively
referring to route priority.
C. See the following entry in the BGP routing table:* 172161.11/32 000010 0?
Indicates that the route is available non-optimal
D. For next_hop unreachable routes when invalid routes, do not participate in the
preferred.
Answer: A

32. The switch can suppress traffic by suppressing traffic and extremely other failures
can affect operations, which of the following traffic suppression configurations is the

ly
th
wrong configuration

oo
m
S
m
xa
E
U
N
0-E
1.
V_
91
-8
12
H
s
as
P
o
T
2]
02
[2
02
8.
V
s
on
sti
ue
Q
ps
um
D
U
N
E
0-
1.
_V
91
-8
12

A. [Quidway] wan 10 [Quidway-wan10] multicast-suppression 1000 [Quidway-van10]


H
ei
w

quit
ua
lH

B. [Qudway ineface gigabtethemnet /0'1


ea
R

[Quidway-GigabitEfthemetO0/O/1]multicast-suppression 80TQuidway-
GigabitEthernet0/0/1]quit
C. Quidway inteface gigabiethenet ou0/1
[Quidway-GigabtEthernet/0/1J,broadcast-suppression 80 IQuidway-
GigabitEthernet//1]Jqut
D. [Quidway] icmp rate-limit enable [Quidway] icmp rate-limit total threshold 20
E. [Quidway ] wan 10 [Quidway-wani0] broadcast-suppression 1000 [Quidway-van10]
quit
Answer: A
33. The following description of the characteristics of multi-instance CE is?
A. Since the MCE device is already bound to the VPN, there is no need to bind the
VPN on the PE connected to the MCE device
B. The MCE device can determine the source of the routing information according to
the interface that receives the routing information, and maintain it in the route
forwarding table of the corresponding VP.
C. MCE is implemented by creating their own routing forwarding tables for different
VPNs on the MCE device and binding to the corresponding interface o
D. Configuring MCE enables a CE to connect to multiple VPNs at the same time,
which can
not only completely isolate the service between different VPN users, but also reduce
the input cost of network equipment.

ly
th
Answer: A

oo
m
S
m
xa
E
U
N
34. When a Layer 3 switch sends IP packets originating from one VLAN to another

0-E
1.
LAN, which field in the following options is overridden? (Single choice questions).

V_
91
-8
A. Three layers of TTL
12
H
B. Layer 3 destination address
s
as
P

C. Layer 3 source address


o
T
2]

D. Layer 3 Transport Protocol


02
[2
02

E. Two-tier TTL
8.
V

Answer: A
s
on
sti
ue
Q
ps
um

35. A home user has opened a 1Mb/s bandwidth, and in order to improve the user
D
U
N

experience, the operator can stabilize 2Mb/s when measuring speed If we use the
E
0-
1.

listening bucket technology to achieve this requirement, which of the following


_V
91
-8

methods is optimal.
12
H

A. cir 10000 pir 12000


ei
w
ua

B. cir 10o00 cbs 12000 pbd 12000


lH
ea

C. cir 8000 pir 12000


R

D. cir 10000 cbs 10000 pbs 12000


Answer: A

36. What is the wrong description of the function of OSPFv3 protocol authentication?
A. OSPFv3 can only establish a security alliance SA using manual mode
B. Huawei router OSPFv3 IPSec authentication can not only support transmission
mode, but also support tunnel mode
C. OSPFv3 authentication relies on IPv6 packet authentication headers and
encapsulation
security net load headers
D. The OSPFv3 protocol header removes the Type and Automation fields
Answer: B

37. A VRRP virtual router configuration VRID is 3 and the virtual IP address is 100 1.
1. 10, so what is the virtual MAC address?
A. O0-00-5E-00-01-64
B. 01-00-5E-00-01-03
C. 01-00-5E-00-01-54
D. 00-00-5E-00-01-03
Answer: D

ly
th
oo
m
S
38. To implement the traffic filtering function, you can use trapp-filter or MQC, which

m
xa
can be called in more views than traffic-filter

E
U
N
A. FALSE

0-E
1.
B. TRUE

V_
91
-8
Answer: B
12
H
s
as
P
o
T
2]

39. BGP routing policies can control the publication and acceptance of routes
02
[2
02

A. TRUE
8.
V

B. FLASE
s
on
ti

Answer: A
s
ue
Q
ps
um
D
U
N

40. The following statement about the NSSA area is correct (multiple choice).
E
0-
1.

A. In the NSSA area where the OSPF neighbor sends hello packets, the N position 0,
_V
91
-8

E within the option field Position 1


12
H

B. The NSSA zone must automatically generate a default LSA to access the external
ei
w
ua

network
lH
ea

C. The NSSA zone generates a Category VII LSA to advertise external routing, and
R

the FA address in the Category VII LSA acts to prevent loops


D. In the OSPF neighbor in the NSSA region sends hello packets, position 1 within
the option field, position E
Answer: D
GET FULL VERSION OF H12-891_V1.0-ENU
DUMPS

You might also like