Professional Documents
Culture Documents
Real Huawei H12 891 V1.0 ENU Dumps Questions V8.02 2022 To Pass H12 891 V1.0 ENU Exam Smoothly PDF
Real Huawei H12 891 V1.0 ENU Dumps Questions V8.02 2022 To Pass H12 891 V1.0 ENU Exam Smoothly PDF
BASE
EXAM DUMPS
HUAWEI
H12-891_V1.0-ENU
28% OFF Automatically For You
HCIE-Datacom V1.0
1.The DHCP protocol assigns to clients―some TCPIP-related parameter
information―in the process DHCP defines a variety of messages that are
encapsulated at the transport layer: (sortic).
A. PPP package
B. IP encapsulation
C. TCP Encapsulation
D. UDP Encapsulation
Answer: D
2. In different scenarios, RSTP provides different protection functions, and the wrong
statement about this statement is
A. The root protection feature is enabled for the specified port, and its port role can
ly
th
only remain as the specified port
oo
m
S
B. When the anti-TC-BPDU packet attack feature is enabled, the number of times the
m
xa
switching device processes IC BPDU packets per unit time is configurable
E
U
N
C. after the BPDU protection function is enabled on the switching device, if the edge
0-E
1.
port receives RST BPDU, the edge port will be set to a non-remote port and the
V_
91
-8
spanning tree calculation will be re-performed
12
H
D. Start the specified port of root protection, when the port receives a better
s
as
P
RSTBPDU, the port will enter the Discarding state and is no longer forwarding
o
T
2]
packets. If the port does not receive a better RSTBPD for a period of time then
02
[2
02
Answer: C
s
on
sti
ue
Q
ps
um
3. In a VXLAN network, traffic is connected to the VXLAN network, and it can also be
D
U
N
used to communicate with the same subnet within the same XLAN network
E
0-
1.
A. NVE interface
_V
91
-8
B. VXVAN L2 Gateway
12
H
C. VXLAN L3 Gateway
ei
w
ua
D. VLANIF interface
lH
ea
Answer: B
R
4. SSH uses asymmetric encryption algorithms AES and DES to achieve security for
data transmission, and uses HMAC to ensure the complete integrity of integer data
A. TRUE
B. FALSE
Answer: A
ly
th
flood bootstrap messages
oo
m
S
D. A C-BSR can also collect C-RP information by receiving C-RP packets
m
xa
Answer: A,B,C
E
U
N
0-E
1.
V_
91
-8
7. MSTP switches treat RSTP switches as MSTP domains, MSTP, which are formed
12
H
by a single switch The interchange resolves the RSTBPDU to MSTBPDU, where
s
as
P
IRPC is 0
o
T
2]
A. True
02
[2
02
B. False
8.
V
Answer: A
s
on
sti
ue
Q
ps
um
8. CMPv6 uses the Type field to identify the message type, and according to the
D
U
N
value of the type field, we can divide the ICMPv6 message into two categories, one is
E
0-
1.
A. True
12
H
B. False
ei
w
ua
Answer: A
lH
ea
R
9. As a network administrator, which of the following protocols can I use for network
device configuration?
A. SSH
B. NETCONF
C. LLDP
D. SNMP
Answer: B,D
10. How do 8021w and 8021D handle BPDUs? (Confirmed) The
A. 8021D bridge only forwards BPDU packets received from the root bridge
B. The 8021D bridge does not forward BPDU messages
C. The 8021w bridge forwards only BPDU packets received from the root bridge
D. 8021w Bridge does not forward BPDU packet
Answer: A
11. After BGP introduces routes for other protocols, the next hop in the BGP routing
table is consistent with the next hop of the introduced routing protocol
A. True
B. False
Answer: B
ly
th
oo
m
S
m
xa
12. If the Option field value in the 0SPFv3 Hello message issued by the router's
E
U
N
GIgabit Ethermet0/0 interface is 0x000013, the following description is correct
0-E
1.
A. The Gigabit/thernetO/0/0 interface of Router A adds IPv6 routing to compute
V_
91
-8
B. Router A's Gigabit/thernetO/0/0 interface belongs to the NSSA zone
12
H
C. Router A supports AS-An External-LSA flood
s
as
P
Answer: A,C,D
02
[2
02
8.
V
s
on
ti
Answer: D
12
H
ei
w
ua
lH
ea
ly
th
C. Virtual links can be used to solve the problem of zone 0 being segmented
oo
m
S
D. The cost of a virtual connection is zero and is the optimal link
m
xa
Answer: C
E
U
N
0-E
1.
V_
91
-8
17. XLAN uses BGP EVPN to establish a tunnel, what type of message is used?
12
H
(Single choice questions).
s
as
P
A. Typel
o
T
2]
B. Type2
02
[2
02
C. Type3
8.
V
D. Type4E. Type5
s
on
ti
Answer: C
s
ue
Q
ps
um
D
U
N
18. In RSTP, which port provides a backup path to reach the root node of the
E
0-
1.
spanning tree?
_V
91
-8
19. IPV6 multicast introduces the concept of multicast scope, which of the following
ways is the multicast scope concept implemented? Multi-select
A. When the group shake source sends IP6 multicast data, the TTL value of the
packet is set to limit the transmission range of the group shake
B. There is a special field in the IPv6 multicast address that specifies the propagation
range of multicast.
C. Multicast scope is just a concept of spreading scope, and there is no specific
technical implementation.
D. During network configuration, the administrator uses the configuration command at
the edge of the network to limit the multicast scope.
Answer: B,D
ly
th
interface IP addresses of the PIM routers to elect dr
oo
m
S
C. PIM routers with small IP addresses are elected DR. PIM routers with low
m
xa
D. DR priority values are elected DR.
E
U
N
Answer: B
0-E
1.
V_
91
-8
12
H
21. For Layer 2 VPN technology, the following statement is correct? Multi-select
s
as
P
A. VPLS is a widely used technology in the live network, which can provide
o
T
2]
B. The VPLS configuration is complex and the Layer 2 network transmits BUM
8.
V
packets.
s
on
ti
suppression.
ps
um
D. BGPEVPN addresses mac address drift and multi-tenancy that VPLS cannot
D
U
N
support.
E
0-
1.
Answer: B,C
_V
91
-8
12
H
ei
w
ua
22. The following statement about the alliance is correct? (Single choice questions).
lH
ea
A. The consortium divides an AS into sub-AS, and the alliance external AS still
R
ly
th
trunkllacppreemptenablelacppreemptdelaydelay-time by following command
oo
m
S
B. Source A address can be configured for load sharing in an enabled link
m
xa
aggregation group with the following command: interface eth-trunk 110ad-balance src-
E
U
N
dst-ip
0-E
1.
C. A member interface can be removed from an enabled link aggregation group with
V_
91
-8
the following command: interface GigabitEthernet0/0/1 shutdown interface
12
H
GigabitEthernet0/0/1 undo eth-trunk 1 interfaceGigabitEthernet0/0/1undoshutdown
s
as
P
D. The member interface can be joined in the link aggregation group by enabling the
o
T
2]
GigabitEthernet0/0/1 trunkport
8.
V
Answer: A
s
on
sti
ue
Q
ps
um
25. ISIS elects DIS in broadcast multiplexed access networks, and the following
D
U
N
A. ISIS elects dis by comparing priorities, and mac addresses if the priorities are
_V
91
-8
consistent
12
H
B. In a broadcast multiple access network, DIS sends Hello PDUs at three times the
ei
w
ua
frequency
lH
ea
messages
D. DIS supports preemption function, after the new DIS preemption is successful,
there is no need to flood any LSP packet
Answer: A,B,C
26. A switch joins a running stacking system after powering up, a behavior known as
heap overlay.
A. TRUE
B. FALSE
Answer: A
27. In order to reduce the number of OSPF routes in certain areas, the OSPf protocol
has developed special area functions, and the following description of the
characteristics of OSPF special areas is correct
A. ASBR-Sunmary-LSA is allowed to be published to the NSSA region
B. AS-External-LSA is allowed to be published to the Stub region
C. Any OSPF zone can be configured as a special zone
D. Zone can be equipped with zhiyi
Answer: D
ly
th
28. What of the following actions can enable fast failure detection on multicast
oo
m
S
networks?
m
xa
A. Shorten the Holdtime of Join/Prune messages
E
U
N
B. Reduce the interval at which the interface sends Hello messages
0-E
1.
C. A PIM BFD session is established between neighbors
V_
91
-8
D. Reduce the interval between sending Join/Prune messages
12
H
Answer: B
s
as
P
o
T
2]
02
[2
02
29. Router HW enables OSPF and router HW has the role of ABR and is configured
8.
V
A. 1 Class LSA
s
ue
Q
B. 2 kind LSA
ps
um
C. 3 kind LSA
D
U
N
D. 4 kind LSA
E
0-
1.
E. 5 Class LSA
_V
91
-8
Answer: A,B
12
H
ei
w
ua
lH
ea
32. The switch can suppress traffic by suppressing traffic and extremely other failures
can affect operations, which of the following traffic suppression configurations is the
ly
th
wrong configuration
oo
m
S
m
xa
E
U
N
0-E
1.
V_
91
-8
12
H
s
as
P
o
T
2]
02
[2
02
8.
V
s
on
sti
ue
Q
ps
um
D
U
N
E
0-
1.
_V
91
-8
12
quit
ua
lH
[Quidway-GigabitEfthemetO0/O/1]multicast-suppression 80TQuidway-
GigabitEthernet0/0/1]quit
C. Quidway inteface gigabiethenet ou0/1
[Quidway-GigabtEthernet/0/1J,broadcast-suppression 80 IQuidway-
GigabitEthernet//1]Jqut
D. [Quidway] icmp rate-limit enable [Quidway] icmp rate-limit total threshold 20
E. [Quidway ] wan 10 [Quidway-wani0] broadcast-suppression 1000 [Quidway-van10]
quit
Answer: A
33. The following description of the characteristics of multi-instance CE is?
A. Since the MCE device is already bound to the VPN, there is no need to bind the
VPN on the PE connected to the MCE device
B. The MCE device can determine the source of the routing information according to
the interface that receives the routing information, and maintain it in the route
forwarding table of the corresponding VP.
C. MCE is implemented by creating their own routing forwarding tables for different
VPNs on the MCE device and binding to the corresponding interface o
D. Configuring MCE enables a CE to connect to multiple VPNs at the same time,
which can
not only completely isolate the service between different VPN users, but also reduce
the input cost of network equipment.
ly
th
Answer: A
oo
m
S
m
xa
E
U
N
34. When a Layer 3 switch sends IP packets originating from one VLAN to another
0-E
1.
LAN, which field in the following options is overridden? (Single choice questions).
V_
91
-8
A. Three layers of TTL
12
H
B. Layer 3 destination address
s
as
P
E. Two-tier TTL
8.
V
Answer: A
s
on
sti
ue
Q
ps
um
35. A home user has opened a 1Mb/s bandwidth, and in order to improve the user
D
U
N
experience, the operator can stabilize 2Mb/s when measuring speed If we use the
E
0-
1.
methods is optimal.
12
H
36. What is the wrong description of the function of OSPFv3 protocol authentication?
A. OSPFv3 can only establish a security alliance SA using manual mode
B. Huawei router OSPFv3 IPSec authentication can not only support transmission
mode, but also support tunnel mode
C. OSPFv3 authentication relies on IPv6 packet authentication headers and
encapsulation
security net load headers
D. The OSPFv3 protocol header removes the Type and Automation fields
Answer: B
37. A VRRP virtual router configuration VRID is 3 and the virtual IP address is 100 1.
1. 10, so what is the virtual MAC address?
A. O0-00-5E-00-01-64
B. 01-00-5E-00-01-03
C. 01-00-5E-00-01-54
D. 00-00-5E-00-01-03
Answer: D
ly
th
oo
m
S
38. To implement the traffic filtering function, you can use trapp-filter or MQC, which
m
xa
can be called in more views than traffic-filter
E
U
N
A. FALSE
0-E
1.
B. TRUE
V_
91
-8
Answer: B
12
H
s
as
P
o
T
2]
39. BGP routing policies can control the publication and acceptance of routes
02
[2
02
A. TRUE
8.
V
B. FLASE
s
on
ti
Answer: A
s
ue
Q
ps
um
D
U
N
40. The following statement about the NSSA area is correct (multiple choice).
E
0-
1.
A. In the NSSA area where the OSPF neighbor sends hello packets, the N position 0,
_V
91
-8
B. The NSSA zone must automatically generate a default LSA to access the external
ei
w
ua
network
lH
ea
C. The NSSA zone generates a Category VII LSA to advertise external routing, and
R