Labour Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

H12-261_V3.0 Sample Questions Answers

Questions 4

As shown below,R1 and R2 have established a Level 2 neighbor relationship. The key configuration is as follows. The following statement about the routing entry of R2 is correct

Options:

A.

2020: The /64 router will appear in the IP routing table

B.

The 2022:/64 router will appear in the IP routing table

C.

2019: The /64 router will appear in the IP routing table

D.

The 2021:/64 router will appear in the IP routing table

Buy Now
Questions 5

ISIS protocol in broadcast network and P2P network, when router receives LSP, it needs to use PSNP confirms to ensure the synchronization of LSDB.

Options:

A.

True

B.

false

Buy Now
Questions 6

When the source IAT is allocated and there is a no-pat allocation parameter, which of the following statements is correct?

Options:

A.

Perform source IP address and source port conversion at the same time

B.

Only perform source IP address translation

C.

Only perform destination IP address translation

D.

Convert destination IP address and destination port

Buy Now
Questions 7

In the process of using the LACP protocol, which of the following descriptions is correct? (multiple choice)

Eth can be avoided by-Trunk interface frequently flaps interface due to physical link eth-trunk 1

lacp preempt enable

lacp preempt delay delay-time

You can configure the source IP address for load balancing in an enabled link aggregation group through the following commands: interface eth-trunk 1

load-balance src-dst-ip

Member interfaces can be removed from an enabled link aggregation group with the following command: interface GigabitEthermet0/0/1 shutdownwn

Options:

A.

interface GigabitEthernet0/0/1 undo eth-trunk 1

B.

interface GigabitEthernet0/0/1 undo shutdownwn

C.

Member interfaces can be added to a link aggregation group enabled by the following command: interface GigabitEthermet0/0/1 shutdownwn

D.

interface GigabitEthernet0/0/1 trunkport GigabitEthernet0/0/1 interface GigabitEthermet0/0/1 undo shutdownwn

Buy Now
Questions 8

Two VTEPs in a VXLAN can determine a VXLAN tunnel, and the VXLAN tunnel between the VTEPs will be shared by all VNIs between the two NVEs.

Options:

A.

True

B.

false

Buy Now
Questions 9

Which of the following options use tunneling to communicate between IPv6 addresses?

Options:

A.

Dual Stack

B.

6 to 4

C.

ISATAP

D.

NAT64

Buy Now
Questions 10

As shown in the figure, there are three switches S1, SW2 and SW3, of which SW1 is the root bridge. The link between S1 and SW2 is congested, and SW2 cannot receive the configuration BPDU sent by the root bridge. What kind of spanning tree does the administrator need to configure? Protection mechanisms to prevent problems caused by link congestion?

Options:

A.

root protection

B.

DefendTC-BPDU attack

C.

BPDU protection

D.

loop protection

Buy Now
Questions 11

Which of the following descriptions about the process of sending and receiving data frames in switch interface Access mode is correct?

Options:

A.

In Access mode, the data frame with the label is directly discarded when it is received.

B.

In Access mode, the VLAN tag of the data frame will be stripped off when sending.

C.

Only data frames without labels are received in Access mode.

D.

When the data frame enters the switch interface, the switch will learn the destination MAC address in the data frame.

Buy Now
Questions 12

The HW device network administrator plans to migrate the multicast network from IGMPv2 to IGMPv3. What is the improvement of IGMPv3 compared to IGMPv2? .

Options:

A.

IGMPv3 adds the function of specifying a multicast group not to join a specific multicast source for a host

B.

IGMPv3 adds the function of specifying a multicast group for a host to join a specific multicast source

C.

IGMPv3 adds between source and local IGMP queriersRequest-to-send andClear-to-send

D.

IGMPv3 removed for membership reportingReport-suppression Features

E.

IGMPv3 removes the ability to join all sources with a wildcard in a multicast group

Buy Now
Questions 13

Regarding the sham link, which of the following descriptions is wrong?

Options:

A.

Sham link is regarded as a link between two VPI instances, each VPN instance must have an endpoint address of sham1irk, which must be a Loopback interface with a 32-bit mask in the VPN address space on the PE router address

B.

The endpoint address of the Sham link is published by BGP as the VPNv4 address. Routes that have passed through the sham link can also be imported into BGP in the form of VPNv4 routes.

C.

In order to forward VPN traffic through the MPLS backbone network, the routing cost of the sham link should be less than the OSPF routing cost of the backdoor link

D.

Sham link can be advertised in any area, it needs to be configured manually, and the local VPN instance must have a route to the destination address of the sham link (the sham link endpoint address of the peer PE)

Buy Now
Questions 14

In BGP4+, what is the content of the next hop network address field carried by the MP REACH NLRI attribute in the Update message?

Options:

A.

It can carry both link-local address and global unicast address at the same time.

B.

It can only be global unicast address.

C.

Can be just a link-local address

D.

can only be the local address of the cone road

Buy Now
Questions 15

Which type of address prefix in the following options indicates that the address is globally unique and globally routable among IPv6 unicast addresses, similar to the public address in IPv4?web address?

Options:

A.

::1/128

B.

FE80::/10

C.

C00::/7

D.

2000::/3

Buy Now
Questions 16

On a newly deployed routerWRED is configured on HW., which of the following descriptions about WRED features is correct? (multiple choice) ( confirmed)

Options:

A.

WREDDifferent drop thresholds and packet loss rates can be set for packets with different priorities

B.

When traffic exceeds a minimum threshold, WRED starts dropping all ingress traffic (tail drop)

C.

Avoid global synchronization by selectively dropping multiple TCP streams

D.

Low-bandwidth traffic is more likely to drop than high-bandwidth traffic

Buy Now
Questions 17

When configuring ISIS area authentication, which ISIS packet will carry the authentication information?

Options:

A.

Level of ISIS-1 for SNPs and LSPs.

B.

Level of ISIS-2 SNPs and LSPs.

C.

ISIS Level-1 ofHello message.

D.

ISIS Level-2Hello message.

Buy Now
Questions 18

The RSTP protocol provides a variety of protection functions. For example, when the edge port is configured in the protection state, the processing method after the edge port receives the BPDU message is:

Options:

A.

Obtain relevant information after parsing the BPD service

B.

Close the port

C.

Forward BPDUs as required

D.

Directly discard the BPDUs

Buy Now
Questions 19

Cross-device link aggregation enables reliable transmission of data traffic and mutual backup of stack member switches. However, due to the limited bandwidth of stack cables between stack devices, which of the following methods can be used to improve forwarding efficiency? (Single Choice)

Options:

A.

Enable local preferential forwarding of traffic

B.

Connect stacking devices via stacking cards

C.

Configuring the MAC Address Switching of the Stacking System

D.

Enabling the Stacked Multi-Master Checking Function

Buy Now
Questions 20

Which of the following statements about the multicast address used by 0SPFv3 is correct? (Multiple choice)

Options:

A.

DR routers use FF08::6

B.

DR routers use FF02::6

C.

All OSPsF Router uses FFO2::5

D.

All OSPsF Router uses FF08:5

Buy Now
Questions 21

As shown in the figure, the ISIS overload bit is set in the configuration of router R3. Which of the following statements is correct?

Options:

A.

When the router's memory is insufficient, the system automatically sets the overload flag in the sent LSP message, regardless of whether the user has configured the set-overload command.

B.

The routes imported by R3 through import-route cannot be published.

C.

R3 starts the overload state, R1 and R2 will not calculate the LSP generated by R3 in the SPF tree. The direct route of D, R3 will be ignored by R1 and R2 because the setting of the overload bit will be ignored.

D.

The LSP of R3 will not be able to diffuse to R1 and R2

Buy Now
Questions 22

the following aboutWhat are the wrong technical claims about URPF, IPSG and DAI?

Options:

A.

DAI does not support manual configuration of binding tables.

B.

A. IPSG checks the source IP address and source MA of IP packetsC address, DAI only checks the correspondence between IP and MAC.

C.

URPF can be used to prevent DDoS false origin attacks.

D.

IPSG technology checks IP packets to prevent source IP spoofing attacks.DAI checks the source of ARP packet filtering attacks.

Buy Now
Questions 23

When running 0SPFv3 on a Huawei router, the OSPFv3 process will automatically select an interface address as the

for the processRouter ID.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 24

As shown in the figure, the router load shares the communication traffic between branch network 1 and branch network 2. In this case, configure the configuration on the physical interface of the router.

URPF must use loose mode to prevent source IP address spoofing attacks.

Options:

A.

True

B.

false

Buy Now
Questions 25

Which of the following statements about OSPF route filtering is incorrect?

Options:

A.

In the NSSA area, filtering for external route import and advertisement can be configured on ASBR or ABR.

B.

Filtering for three types of LSAs needs to be configured on ABRs between OSPF areas

C.

Filter LSA based on interface, can filter in and out direction, except Grace All LS except LSAA

D.

When calculating routes based on the link state database, use filter-policy import command, this filtering method only affects the routing entries in the routing table. plus, for OSPF the link state database has no effect

Buy Now
Questions 26

BGP routing policy can control the publishing and receiving of routes

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 27

The MAC address table of the switch with default configuration is empty at this time, and the host A connected to the switch sends the first unicast data frame, then what operation will the switch perform after receiving the instruction?

Options:

A.

The switch will drop the frame

B.

The switch will record the source MAC address of the data frame and flood the data frame

C.

The switch will forward the data out an interface according to the destination MAC address of the data frame

D.

The switch will buffer the data frame and forward it after waiting for the destination host to send the data frame

Buy Now
Questions 28

Which of the following are used in Ethernet? (Multiple Choice)

Options:

A.

MAC address in non-canonical format

B.

in multiple accessCSMA/CD

C.

Canonical format of the MAC address

D.

802.5 encapsulated frame

E.

802.3 encapsulated frames

Buy Now
Questions 29

RD is used to distinguish the same IP address in different VPNs. How many bits does RD contain?

Options:

A.

64

B.

32

C.

16

D.

128

Buy Now
Questions 30

Which properties meet the following two conditions:

BGP router A can choose toWhether the Update packet carries this attribute.

If Router B receives aAfter the Update message, Router B does not recognize the attribute, but also advertises the Update message containing this attribute to Router C. Router C may recognize and use this attribute. (multiple choice) ( confirmed)

Options:

A.

Aggregator

B.

Local-Pref

C.

Multi Exit-Disc

D.

Community

Buy Now
Questions 31

OSPF fast convergence is an extended feature to improve the convergence speed of routing. The working principle of PRC (Partial Route Calculation) is that when the network topology changes, only the affected nodes are calculated. , so as to speed up the routing calculation

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 32

man-in-the-middle attack or IP/MAC SpoofingAttacks can lead to information leakage and other hazards, and are more common in intranets. To prevent man-in-the-middle attacks or IP/MAC SpoofingAttack, the configuration methods that can be taken are:

Options:

A.

turn onDHCP Snooping checkDHCP Function of the CHADDR field in the REQUEST message

B.

configureTrusted/Untrusted interface

C.

Configuration on the master switchDHCP Snooping withDAL or IPSG for linkage

D.

Limit the maximum number of learning allowed on a switch interfaceMACnumber of addresses

Buy Now
Questions 33

The following are about 802.1x authentication. What are the correct statements about RADIUS authentication and HWTACACS authentication?

Options:

A.

Users can use 802.1x authentication to access the network, RADIUS completes authentication.

B.

RADIUS authentication and WTACACS authentication are mutually exclusive, and dual authentication cannot be performed for the same user at the same time.

C.

RADIUS authentication and HWTACACS authentication can perform dual authentication for the same user at the same time, which is more secure.

D.

RADIUS authentication and 802.1x authentication are mutually exclusive.

Buy Now
Questions 34

When the ACL in the RP has multiple matching rules (rules) , which of the following statements is true about the matching order? ( confirmed)

Options:

A.

By default, matching is performed according to the "depth first" principle.

B.

By default, match pe first rmit, then match the order of deny.

C.

By default, according to Rule-ID, matching from small to large.

D.

There is only one matching order and cannot be modified.

Buy Now
Questions 35

In the intra-domain MPLS VPNI network, when the data packet enters the public network and is forwarded, it will be encapsulated with two layers of MPLS labels. The description of the two layers of labels in the following options is wrong?

Options:

A.

The outer label of MPLS VPN is called the private network label, and the inner label is called the public network label.

B.

By default, the outer label is popped before the data packet is forwarded to the last hop device.

C.

The outer label is used for Correctly send packets to the corresponding VPN on the PE device

D.

The outer label of MPLS VPN is assigned by the LDP protocol or statically, and the inner label is assigned by the MP-BGP neighbor of the opposite end

Buy Now
Questions 36

BGP4+ is running between the two routers, and the neighbor relationship is normal, but the BGP routing table of the local router does not have any neighbor routing entries. The following possible reasons are:

Options:

A.

The routing entry in the peer BGP routing table is not optimal.

B.

The next hop address of the BGP route entry is unreachable?

C.

The peer is configured with peer ignore

D.

The peer is configured with active-route-advertise

Buy Now
Questions 37

What is the protocol number of the IP header of the VRRP packet?

Options:

A.

116

B.

118

C.

112

D.

114

Buy Now
Questions 38

A medium-sized campus network manages the network through the SNMP protocol. The campus has high network security. Which version of SMMP is recommended for management?

Options:

A.

SNMPV1

B.

SNMPV2C

C.

SNMPV3

D.

All versions can be implemented

Buy Now
Questions 39

Which of the following descriptions about OSPFv3 packets is correct?

Options:

A.

The Hello packet must contain the interface ID of the sending interface

B.

The LSACK message contains the LSA header information to confirm receipt of the LSU message

C.

The LSR packet contains the complete LSA header information and is used to request to update the LSA

D.

The Option field of Hello and DD packets is extended to 24 bits

Buy Now
Questions 40

Which of the following statements about routing control is correct?

Options:

A.

use import-route BGP commands can import IBGP routes

B.

AS-path-filter is the needle to AS-path, thus affecting the route selection.

C.

OSPF, ISIS, and BGP can all deliver default routes.

D.

in node 10, if-match community-filter 1 and if-match as-path-filter 1 is"with" relationship

Buy Now
Questions 41

In an operator's MPLS VPN network, there are two devices PE1 and PE2 for MPLS VPN data forwarding. PE1 receives a private network route of 172.16.1.0/24 from the client, converts it to a VPNv4 route on PE1 and converts it to a VPNv4 route. Assign label 1027 to publish to PE2. The outgoing label of the MPLS LSR-ID from PE2 to PE1 is 1025. When the client on PE2 accesses back to 172.16.1.0/24, the frame sent by PE2, the inner and outer labels should be the combination of which of the following options?

Options:

A.

Outer label: 1025: Inner label: 1027

B.

Outer label: 1025; Inner label: 1025

C.

Outer label: 1027; Inner label: 1025

D.

Outer label: 1027; Inner label: 1027

Buy Now
Questions 42

Which of the following functions will affect the establishment of BGP neighbors?

Options:

A.

ebgp max hop

B.

BGP certification

C.

BGP route filtering

D.

BGP GSTM

Buy Now
Questions 43

Which of the following statements about the tail of ISIS protocol LSP packets is correct?

Options:

A.

LSP fast diffusion feature, first diffuse LSPs less than the specified number to speed up the synchronization process of LSDB

B.

by configurationAn intelligent timer generated by LSP, which can automatically adjust the delay time according to the changing frequency of routing information

C.

When the link state information increases, the packet length of the LSP can be increased, so that each LSP can carry more information.

D.

Decreasing the minimum time interval for sending LSPs by port can speed up the diffusion of LSPs.

Buy Now
Questions 44

Which of the following statements about BGP route reflectors is correct?

Options:

A.

Cluster-List is an optional non-transition attribute used to prevent loops within a cluster.

B.

Routes learned from clients, advertised to all non-clients and clients of this RR.

C.

A backbone network is divided into multiple reflection clusters, eachRR configures her RRs as non-clients, and establishes IBGP full connections between RRs.

D.

The trigger-ID attribute is generated by a route reflector (RR) and is used to prevent loops between clusters.

Buy Now
Questions 45

If the PIM-SM protocol is run in the multicast network, RP needs to be configured. The configuration methods of RP are divided into dynamic RP and static RP. The following description of RP configuration is correct:

Options:

A.

configure dynamicWhen the RP is used, the BSR needs to be configured as the backup of the RP.

B.

configure staticWhen an RP is used, the BSR needs to be configured to advertise RP information.

C.

configure staticRP information needs to be specified on all PIM routers.

D.

configure dynamicWhen the RP is used, no BSR needs to be configured.

Buy Now
Questions 46

In which of the following scenarios will gratuitous ARP packets be sent?

Options:

A.

After the VRRP protocol master and backup role elections are completed

B.

After the DHCP client receives the confirmation message sent by the server

C.

When a new host with an IP address is connected to the network

D.

When a host connected to the switch sends a Ping after the message

Buy Now
Questions 47

In an intra-domain MPLS BGP VPN network, when a data packet enters the public network for forwarding, it will be encapsulated with two layers of MPLS labels. Which of the following descriptions about the two layers of labels is wrong? (single choice)

Options:

A.

Private network label by MP-BGP carries and distributes routes when delivering routes, and public network labels are distributed by LDP.

B.

MPLS BGP VPNTwo layers of labels are used in the network: public network labels (also called outer labels) and private network labels (also called inner labels).

C.

By default, the router assigns the same label value to all VPNv4 routes destined for the peer end.

D.

exitThe PE uses the inner label when judging which egress CE the packet should be sent to.

Buy Now
Questions 48

The host HW1 in the HW device network wants to join a video conference, what will the host do?

Options:

A.

Unicast IGMPv2 membership report to the default router on the local network

B.

TowardsRP sends unicast IGMPv2 membership report

C.

Send the IGMPv2 membership report through multicast in the local network, and the multicast address carried in the IGMPv2 membership report is the desiredincoming multicast address

D.

The IGMPv2 membership report is sent through multicast on the local network, and the destination multicast address for sending the IGMPv2 membership report is"All PIM routers" 2240.0.2 multicast address

Buy Now
Questions 49

What is the multicast protocol that can generate a multicast distribution tree?

Options:

A.

IGMPv2

B.

BGP

C.

OSPF

D.

PIMv2

Buy Now
Questions 50

As shown in the figure, an enterprise hopes to realize the secure mutual access between the head office and each branch through MPLS/VPN, and requires that the VPN traffic of the branches must be forwarded through the head office to monitor the traffic. Which of the options described in this solution is wrong?

Options:

A.

BGP packets can be used to exchange VPN routing information between CEs and PEs

B.

Hub-CE and When the Hub-PE transmits routing information, the Hub-PE It is necessary to configure a route that allows the receiving AS number to be repeated once to receiveRoutes advertised by the Hub-CE

C.

Hub-CE and Hub-PE, Spoke-PE with Spoke-CEs can use OSPF to exchange routing information

D.

Spoke- Establish an MP-IBGP peer relationship between PEs to exchange VPN routing information.

Buy Now
Questions 51

Which of the following statements about the format of OSPFv3 packets is correct?? (multiple choice)

Options:

A.

OSPF version number changed from 2 to 3

B.

There is no change in the option field of the He11o packet

C.

Hello packets no longer contain address information and carry Interface ID

D.

Removed Authentication, Auth Type field

Buy Now
Questions 52

run SNMS for NMPv1 ( Network Managementt What messages will Station) send to the Agent?

Options:

A.

Trap, Get and Set

B.

Get, Set and Getnext

C.

Get, Set, Getnext and GetBulk

D.

Get, Set and GetBulk

E.

Trap only

Buy Now
Questions 53

Protocols using TCP ports 443, 179, 137, 110 and 23 are

Options:

A.

BGP. POP3. SNMP, TFTP. Telnet B. HTTPS.SNMP.POP3.DNS.Telnet

B.

HTTPS.BGP NetbiosNameServer POP3.Telnet

C.

Finger, DHCP Server, Netbios Name Server, POP3, Telnet E. LDAP. SNMP TFTP. POP3. Telnet

Buy Now
Questions 54

TION NO: 3

BGP EVPNWhich of the following types of packets are required to implement virtual machine migration in a distributed gateway scenario?

Options:

A.

Type5

B.

Type4

C.

Type1

D.

Type2

E.

Type3

Buy Now
Questions 55

The OSPFv3 protocol is a separately developed protocol. It is somewhat different from OSPFv2. Regarding OSPFv3 is based on links rather than network segments, which of the following statements is wrong?

Options:

A.

For two OSPs connected to the link F routers, even if their IPv6 address prefixes are different, can still establish neighbor relationships

B.

OSP the routing information obtained by Fv3 routers from neighbors will use the neighbor's Link-Local address as the next hop for forwarding packets.

C.

For two OSPs connected to the link F routers can establish neighbor relationships even without configuring a unicast IPv6 address

D.

All OSPs except virtual connections All Fv3 interfaces use the Link-Local address as the destination address of the packet

Buy Now
Questions 56

Which of the following descriptions about BGP load sharing is wrong?

Options:

A.

ASs that form load-balancing equal-cost routes. The -Path property must be different.

B.

If the destination network segment is the same, load balancing can be formed between BGP routes from different sources.

C.

If BGP load balancing is implemented, pee needs to be configured when the local device advertises routes to the IBGP peer grouprnext-hop-local command only Change the next hop address to own address.

D.

IBGP routes and EBGP routes to the same destination on the public network can form load balancing.

Buy Now
Questions 57

In the dual network, the correct statement about the ISIS protocol routing is:

Options:

A.

The routing priority in ISIS IPv4 and ISIS IPY6 cannot be adjusted independently.

B.

The cost of ISIS in IPv4 and IPv6 can be adjusted independently.

C.

To support dual stack, the ISIS protocol must be changed to version 2.

D.

By default, the routing priority of the ISIS protocol in IPv6 is 25

Buy Now
Questions 58

A company's two-layer phase network signature is shown in the figure. After the engineer has completed the configuration, it is found that the business between departments cannot communicate. The device status can be checked through the command as follows. Please determine the possible causes?

Options:

A.

Inconsistent BPDU interval configuration between switches

B.

Instanc between transfer machinese VLAInconsistent N mapping configuration

C.

between switchesRevislon Level configuration is inconsistent

D.

between text changersRegion Name configuration is inconsistent

Buy Now
Questions 59

Subnets under different VPNs of VXLAN need to be accessed in the same way. The information of one of the subnets is as follows, RT 10:10 both under EVPN, RT 1000:1000 export, and RT 100:100 under VPN. Another subnet can be configured as ?

Options:

A.

Configure 1000:1000 both under EVPN

B.

Configure 10:10 both under VPN

C.

Configure 1000: 1000 both evpn under VPN

D.

Configure 1000: 1000 export under EVPN

Buy Now
Questions 60

O: 10

A digital certificate does not contain which of the following?

Options:

A.

digital envelope

B.

Issuer

C.

digital signature

D.

public key information

Buy Now
Questions 61

Which of the following descriptions is wrong about the address resolution function of NDP?

Options:

A.

When sending a neighbor solicitation packet, the source address must be the link-local address of the end interface

B.

When sending a Neighbor Solicitation message, the destination address must be the neighbor's requested node multicast address. C. Two ICMPv6 messages, Neighbor Solicitation and Neighbor Advertisement, are used in the address resolution process.

C.

Address resolution realizes the function of resolving from IPv6 address to link layer address

Buy Now
Questions 62

Which of the following statements about IPSG technology is correct?

Options:

A.

ip source checkk user bind checkk The item command is used to configure IP packet inspection items based on VLAN or interface.All static entries take effect.

B.

If an interface is configured asDHCP Snooping Trust interface, the interface can normally receive the DHCP response from the DHCP server. ACK, DHCP NAK and DHCP Offer packets, other untrusted ports cannot receive these packets normally.

C.

On Huawei routers, IPSG can be configured on VlanifFeatures.

D.

IPSG can perform binding table matching check on IP packets entering and leaving the interface.

Buy Now
Questions 63

Which of the following is a single-packet attack?

Options:

A.

Special Control Packet Attack

B.

Scanning to detect attacks

C.

DDos attack

D.

Malformed Packet Attack

Buy Now
Questions 64

VLAN L3 Gateway is used to implement different V?The three-layer logical interface of ANW virtual network communication is?

Options:

A.

VBDIF interface

B.

Layer 2 sub-interface

C.

VLANIF interface

D.

NVE interface

Buy Now
Questions 65

NO: 236

As shown in the figure, redundant links are used to establish IPse between the branch and the headquartersc VPN, and enable traffic from branch 1 on Router_B at the same time URPF, which of the following statements is true?

Options:

A.

When using IPsec master and backup link redundancy backup, enable it on the physical interfaceURPF function, it is recommended to use URPF loose mode.

B.

When using IPsec multi-link redundancy backup, it is possible toURPF function, you can use URPF strict mode

C.

When using IPsec multi-link redundancy backup, enable it on the tunnel interfaceURPF function, you can use URPF strict mode.

D.

When using IPsec master and backup link redundancy backup, enable it on the physical interfaceURPF function, you can use URPF strict mode.

Buy Now
Questions 66

Which scenarios can use AS-path-filter?

Options:

A.

A carried by routeSPATH attribute to filter routes received from BGP neighbors. For example the command peer xxxx as-path-fliter import

B.

Route apply clause in policy

C.

A carried by routeSPATH attribute to filter routes sent to BGP neighbors. For example the command peer xxxx as-path-ilter export

D.

if-match clause in Route-policy

Buy Now
Questions 67

The following about OSPLink-LSA of Fv3, is the statement correct?

Options:

A.

It includes both the link-local address of this interface and all the addresses in the same area on this router.TPv6 prefix.

B.

Contains the link-local address of this interface, and also includes all IPv6 on this interfaceprefix.

C.

The option field exists in the header of the LSA, not the Link LSAdata area

D.

like Link-LSA one of Prefix of Prefix Options Field is 0x00, then the Prefix Not included in IPv6 unicast calculations.

Buy Now
Questions 68

Use dual-bucket and dual-speed in traffic monitoring, the number of tokens in bucket C is TC,The number of tokens in the P bucket is TP. When a packet of length B comes in, which of the following statements is true?

Options:

A.

ifTP-B>0 and TC-B<0, the packet is marked in green

B.

ifTP-B<0 and TC-B<0, the message is marked in red

C.

ifTP-B>0 and TC-B<0, the packet is marked in yellow

D.

ifTP-B>0 and TC-B>0, the packet is marked green

Buy Now
Questions 69

[R1]ospf 1

[R1-ospf-1]area 2

[R1-ospf-1-area-0.0.0 2] network 10.0.13.1 0.0.0.0

As shown in the configuration, the administrator has configured OSPF on R1, but R1 cannot learn the routes of other routers, so the possible reason is ().

Options:

A.

This router does not have an OSPF process ID configured

B.

The area ID configured by this router and the area I of its neighbor routersD is different

C.

This router is not configured with the authentication function, but the neighbor router is configured with the authentication function

D.

This router's advertised network address does not match the interface mask

Buy Now
Questions 70

ION NO: 41

The following G about ISISIs R's description correct?

Options:

A.

ISIS GThe R feature is enabled by default.

B.

ISIS GR has a total of four timers.

C.

ISIS GR notifies events and maintains neighbor relationships through CSNP messages.

D.

ISIS GR defines a whole new TLV structure to support this feature.

Buy Now
Questions 71

In Huawei equipment, when ISIS imports external routes and sets the external route label of the routing information, the ISIS MetThe ric type does not need to be modified, keep silentAccept it. ( confirmed)

Options:

A.

True

B.

false

Buy Now
Status:
Expired
Exam Code: H12-261_V3.0
Exam Name: HCIE-Routing & Switching (Written) V3.0
Last Update: Apr 14, 2023
Questions: 479
$64  $159.99
$48  $119.99
$40  $99.99
buy now H12-261_V3.0