Pre-Summer Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

H12-891_V1.0 Sample Questions Answers

Questions 4

The following figure shows the inter-AS MPLS VPN Option B solution. If ASBR-PE1 and ASBR-PE2 only transmit VPNv4 routes, you can run the following command on ASBR-PE1:

[ASBR-PE1-bgp-af-vpnv4] undo peer 10.0.34.4 enable

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 5

Which of the following statements about SR-MPLS characteristics are correct? (Select all that apply)

Options:

A.

Only the controller can compute paths based on explicit paths.

B.

SR-MPLS supports smooth network evolution by extending existing protocols, such as IGPs.

C.

Efficient TI-LFA FRR protection is provided for fast path fault recovery.

D.

Such networks can quickly interact with upper-layer applications through the source routing technology.

Buy Now
Questions 6

On a VXLAN-based virtualized campus network, BGP EVPN can be used as the control plane protocol. Which of the following EVPN route types are not used in the virtualized campus network scenario?

Options:

A.

Type 3

B.

Type 2

C.

Type 4

D.

Type 1

Buy Now
Questions 7

Which of the following statements about prefix segments and adjacency segments are correct?

Options:

A.

A prefix SID is a local SID out of the SRGB range.

B.

An adjacency SID is an offset value within the SRGB range advertised by the source end.

C.

A prefix segment identifies the prefix of a destination address on a network.

D.

An adjacency segment identifies an adjacency on a network.

Buy Now
Questions 8

What can be determined from the following IS-IS peer output?

Peer information for ISIS(1):

    Peer System ID: ee8c.a0c2.baf3

    Interface: GE0/0/0

    State: Up

    HoldTime: 7s

    Type: L1

    PRI: 64

    MT IDs supported: 0(UP), 2(UP)

    Local MT IDs: 0, 2

    Area Address(es): 49.0022

    Peer IP Address(es): 10.1.34.1

    Peer IPv6 Address(es): FE80::2E0:FCFF:FE98:2576

Options:

A.

Both IPv4 and IPv6 IS-IS neighbor relationships are established between R4 and ee8c.a0c2.baf3.

B.

R4 does not have any IS-IS neighbors.

C.

Only an IPv4 IS-IS neighbor relationship is established between R4 and ee8c.a0c2.baf3.

D.

Only an IPv6 IS-IS neighbor relationship is established between R4 and ee8c.a0c2.baf3.

Buy Now
Questions 9

Which of the following statements is incorrect about adding devices on a virtualized network deployed using iMaster NCE-Campus?

Options:

A.

iMaster NCE-Campus allows users to add devices in batches.

B.

iMaster NCE-Campus allows users to add devices by device role.

C.

iMaster NCE-Campus allows users to add devices by device ESN.

D.

iMaster NCE-Campus allows users to add devices by device model.

Buy Now
Questions 10

As shown in the figure, what is known about the default routes on R4?

Routing Table on R4:

< R4 > display ip routing-table protocol isis

Destination/Mask Proto Pre Cost Flags NextHop Interface

0.0.0.0/0 ISIS-L1 15 10 D 10.1.24.1 GigabitEthernet0/0/1

ISIS-L1 15 10 D 10.1.34.1 GigabitEthernet0/0/0

172.16.1.2/32 ISIS-L1 15 10 D 10.1.24.1 GigabitEthernet0/0/1

172.16.1.3/32 ISIS-L1 15 10 D 10.1.34.1 GigabitEthernet0/0/0

Options:

A.

Four equal-cost default routes

B.

One default route

C.

Two default routes with different costs

D.

Two equal-cost default routes

Buy Now
Questions 11

BGP EVPN can be used as the VXLAN control plane protocol to completely prevent traffic flooding, such as broadcast ARP packets, on the VXLAN network.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 12

Which of the following statements about SR-MPLS Policy candidate paths are correct?

Options:

A.

A candidate path can contain multiple segment lists, with each segment list carrying the weight attribute.

B.

Load balancing can be implemented among candidate paths and among segment lists.

C.

An SR-MPLS policy can contain multiple candidate paths with the preference attribute.

D.

The valid candidate path with the highest preference functions as the primary path of the SR-MPLS Policy.

Buy Now
Questions 13

HTTP is an application layer protocol for distributed, collaborative, and hypermedia information systems.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 14

If SRv6 needs to be deployed on a bearer WAN, which of the following technologies are required? (Select all that apply)

Options:

A.

MPLS

B.

BGP

C.

IGP

D.

BGP-LU

Buy Now
Questions 15

An Ethernet Segment Identifier (ESI) is 10 bytes long and unique on the entire network.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 16

During the migration test, which of the following indicates that the test is completed?

Options:

A.

Tested network services are running properly.

B.

Command outputs are correct.

C.

The network is running properly.

D.

Tested upper-layer application services are running properly on the network.

Buy Now
Questions 17

Telemetry is a technology that remotely collects data from physical or virtual devices at high speed, and has a layered protocol stack. Which of the following layers is not included in the telemetry protocol stack?

Options:

A.

Communication layer

B.

Transport layer

C.

Data encoding layer

D.

Data analysis layer

Buy Now
Questions 18

An LSR (Label Switching Router) supports various label retention modes. Which of the following statements regarding the liberal mode are correct?

Options:

A.

An LSR retains labels from a neighboring LSR only when the neighbor is its next hop.

B.

This label retention mode saves memory and label space.

C.

An LSR reserves all labels distributed by its neighbor.

D.

The liberal mode requires more memory and label space.

Buy Now
Questions 19

Before connecting an SSH client to an SSH server in public key authentication mode, a client needs to create a key pair. Which of the following commands is used to create a DSS key pair on the client using Git Bash?

Options:

A.

ssh-keygen -t dss

B.

ssh-keygen -t ecc

C.

ssh-keygen -t dsa

D.

ssh-keygen -t rsa

Buy Now
Questions 20

What is the router ID length supported by OSPFv3?

Options:

A.

128 bits

B.

64 bits

C.

100 bits

D.

32 bits

Buy Now
Questions 21

Which of the following statements are correct about the authentication protocols used in Portal authentication?

Options:

A.

When Portal is used as the authentication protocol, the Portal server needs to exchange authentication information with the access device, which then sends the information to the authentication server for identity authentication.

B.

When Portal is used as the authentication protocol, the Portal server and access device only need to support the Portal protocol, but not the HTTP and HTTPS protocols.

C.

When HTTP or HTTPS is used as the authentication protocol, none of the devices involved in the authentication process need to support the Portal protocol.

D.

When HTTP or HTTPS is used as the authentication protocol, the client needs to send authentication information to the access device, which then sends the information to the authentication server for identity authentication.

Buy Now
Questions 22

In the firewall hot standby scenario, when VGMP works in load balancing mode, which of the following functions must be enabled on the firewalls to prevent the return traffic from being discarded because it does not match any session entry in the case of inconsistent forward and return paths?

Options:

A.

Automatic backup

B.

Manual batch backup

C.

Quick session backup

D.

BFD

Buy Now
Questions 23

Collecting information before a cutover helps you determine whether services are normal before and after the cutover.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 24

In SRv6, each time a packet passes through an SRv6 endpoint node, the Segments Left field value decrements by 1, and the IPv6 DA changes.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 25

In the following figure, all routers are running OSPF. Given this, which of the following statements is correct?

Options:

A.

R2 forwards the Router-LSAs generated by R1 to R3.

B.

R2 forwards the Router-LSAs generated by R3 to R1.

C.

R2 generates Router-LSAs only in area 0.

D.

R2 generates Router-LSAs in both area 1 and area 0.

Buy Now
Questions 26

You write the following Python code to invoke a RESTful API to obtain the token ID of iMaster NCE. Which of the following statements are correct?

import requests

response = requests.get( " https://139.9.213.72 " )

print(response.json())

Error returned:

requests.exceptions.SSLError: HTTPSConnectionPool(host= ' 139.9.213.72 ' , port=18002): Max retries exceeded with url: /controller/v2/tokens (Caused by SSLError(CertificateError( ' hostname ' 139.9.213.72 ' doesn ' t match ' devzone.huawei.com ' )))

Options:

Options:

A.

The client does not trust the SSL certificate of the server.

B.

The SSL certificate verification fails.

C.

The code can be modified as follows:import requestsresponse = requests.get( " https://139.9.213.72 " , verify=False)print(response.json())

D.

The code can be modified as follows:import requestsresponse = requests.post( " http://139.9.213.72 " , verify=False)print(response.json())

Buy Now
Questions 27

A network administrator runs the display telemetry destination command on a device to check information about a destination group that sampled data is sent to. The command output is as follows. Which of the following statements is incorrect?

[~CE-telemetry-sensor-group-Sensor1]display telemetry destination

Dest-name Dest-addr Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20000 RESOLVED - GRPC

Options:

A.

The IP address of the destination group is 192.168.56.1

B.

The destination group name is Dest1.

C.

VPN encapsulation is used for data push.

D.

The gRPC protocol is used for data push.

Buy Now
Questions 28

Which of the following link types may appear in OSPF Router-LSAs?

Options:

A.

TransNet

B.

P-2-P

C.

Vlink

D.

StubNet

Buy Now
Questions 29

SSH connections are usually established based on TCP/IP connections. In specific cases, SSH connections can be established based on UDP connections.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 30

Which of the following statements is correct about 6PE and 6VPE?

Options:

A.

In 6PE networking, VPN instances need to be created on PEs.

B.

In 6PE networking, IPv6 addresses of a CE can be reused.

C.

In 6VPE networking, IPv6 addresses of a CE can be reused.

D.

In 6VPE networking, no VPN instance needs to be created on PEs.

Buy Now
Questions 31

In 6PE networking, the shared explicit null label function can be enabled on routers to reduce the number of required MPLS labels. With this function, a router assigns a label with the value (enter only digits) to all 6PE routes.

Options:

Buy Now
Questions 32

A network administrator runs the display telemetry subscription command on a device to check telemetry subscription information. The command output is as follows. Which of the following statements is incorrect?

[~CE] display telemetry subscription

Sub name : Sub1

Sensor group:

Sensor-name Sample-interval(ms) State

Sensor1 1000 RESOLVED

Destination group:

Dest-name Dest-IP Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20030 RESOLVED - GRPC

Sub state : PASSIVE

Total subscription number is : 1

Options:

A.

The device sends sampled data every second.

B.

The subscription mode is static subscription.

C.

The IP address of the device is 192.168.56.1.

D.

The subscription name is Sub1.

Buy Now
Questions 33

Which of the following statements regarding OSPF neighbor relationship faults is incorrect?

Options:

A.

For non-DR and non-BDR routers on an Ethernet link, the 2-Way state is acceptable.

B.

The Init state indicates that the router has received Hello packets from its neighbors, but the received Hello packets do not contain the OSPF RID of the receiving router.

C.

The ExStart state indicates that two neighbor routers have inconsistent MTUs or the same OSPF Router ID (RID).

D.

The Attempt state indicates that the router does not send unicast Hello packets to configured neighbors.

Buy Now
Questions 34

Drag the OSPFv3 LSAs to map them to their corresponding transmission ranges.

Options:

Buy Now
Questions 35

The display current-configuration command displays the running configurations in memory.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 36

In the Huawei CloudCampus Solution, which of the following devices can go online through the registration query center?

Options:

A.

Switch

B.

AR

C.

AP

D.

Firewall

Buy Now
Questions 37

The RR (Route Reflector) is critical to the Huawei SD-WAN Solution, and its deployment mode varies based on the scenario. In which of the following modes can an RR be deployed?

Options:

A.

Multi-area deployment of the RR

B.

Independent deployment of the RR

C.

Co-deployment of the RR and hub site

D.

Partially independent deployment of the RR

Buy Now
Questions 38

Which of the following number sequences can be matched by the regular expression 100.s?

Options:

A.

100

B.

10000

C.

1000

D.

1001

Buy Now
Questions 39

On a small- or medium-sized campus network deployed based on the Huawei CloudCampus Solution, an AR functioning as the egress gateway supports web-based network management, registration center query, and DHCP Option 148-based deployment, but does not support CLI-based deployment.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 40

BFD can implement millisecond-level link status detection.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 41

Among NETCONF operations, the < config > operation may contain an operation attribute, which is used to specify an operation type for configuration data. Which of the following operation attributes is incorrect?

Options:

A.

remove

B.

merge

C.

create

D.

update

Buy Now
Questions 42

Flavors can be used to enhance SRv6 instructions to meet more diversified service requirements. Which of the following are flavors? (Select all that apply)

Options:

A.

Penultimate Segment Pop of the SRH (PSP)

B.

Ultimate Segment Decapsulation (USD)

C.

Ultimate Segment Pop of the SRH (USP)

D.

Penultimate Segment Decapsulation (PSD)

Buy Now
Questions 43

On traditional campus networks, network admission control (NAC), VLAN, and ACL technologies are used to control users ' network access rights. This results in heavy network O & M workload. Which of the following improvements does the free mobility solution of iMaster NCE-Campus make to traditional campus networks in terms of policy management and control?

Options:

A.

Administrators can use iMaster NCE-Campus to centrally manage service policies on network-wide policy enforcement points.

B.

Administrators can define service policies based on security groups to decouple service policies from IP addresses.

C.

Administrators need to configure service policies multiple times for each policy enforcement point through iMaster NCE-Campus, which then automatically delivers the policies to the corresponding policy enforcement points.

D.

Policy enforcement points on a network can subscribe to IP-security group entries through iMaster NCE-Campus to obtain the mapping between users and IP addresses on the entire network.

Buy Now
Questions 44

At the NETCONF content layer, the < config > operation may contain an operation attribute, which is used to specify an operation type for configuration data. Which of the following operation attributes are supported?

Options:

A.

create: The configuration data identified by the element that contains this attribute is added to the configuration datastore only if the configuration data does not already exist in the configuration datastore. If it already exists in the configuration datastore, < rpc-error > with the < error-tag > value being data-exists is returned.

B.

delete: The configuration data identified by the element that contains this attribute is deleted from the configuration datastore. If the configuration data does not exist in the configuration datastore, a deletion success message is returned.

C.

merge: The configuration data identified by the element that contains this attribute is modified if the configuration data already exists in the configuration datastore. If not, the configuration data is created in the datastore.

D.

remove: The configuration data identified by the element that contains this attribute is deleted from the configuration datastore. If the configuration data does not exist in the configuration datastore, a deletion success message is returned.

Buy Now
Questions 45

In Huawei Open Programmability System (OPS), /ifm/interfaces/interface is the URL used to identify a device ' s managed object.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 46

As shown in the figure, PE1 establishes an EVPN peer relationship with each of PE2 and PE3. When the network is initialized, CE1 sends an ARP request packet.

Which of the following statements are correct about how a PE processes the packet?

Options:

A.

When forwarding the packet to PE3, PE1 needs to add the BUM traffic label allocated by PE3 to the packet.

B.

PE1 sends a MAC/IP advertisement route carrying the MAC address of CE1.

C.

PE2 forwards the packet to CE1.

D.

PE3 forwards the packet to CE1.

Buy Now
Questions 47

Refer to the following command output on the router R1. Which of the following statements is incorrect?

< R1 > display interface Tunnel

Tunnel0/0/0 current state : UP

Line protocol current state : UP

Last line protocol up time : 15:21:23 UTC-08:00

Description: ! 0.0.3.3

Route Port, The Maximum Transmit Unit is 1500

Internet Address is 20.1.1.1/24

Encapsulation is TUNNEL, loopback not set

Tunnel source 10.0.1.1 (LoopBack0), destination 10.0.3.3

Tunnel protocol/transport GRE/IP, key disabled

keepalive disabled

Checksumming of packets disabled

Current system time: 15:21:37-08:00

300 seconds input rate 0 bits/sec, 0 packets/sec

300 seconds output rate 0 bits/sec, 0 packets/sec

13 seconds input rate 0 bits/sec, 0 packets/sec

13 seconds output rate 448 bits/sec, 0 packets/sec

9 packets output, 824 bytes

0 output error

Input bandwidth utilization : -

Output bandwidth utilization : -

Options:

A.

Key authentication is disabled for the tunnel.

B.

The destination IP address of the tunnel is 10.0.3.3.

C.

The tunnel is a GRE tunnel.

D.

Keepalive detection is enabled on the tunnel.

Buy Now
Questions 48

The IS-IS Level-1 neighbor relationship is not established between R3 and R4. Referring to the following information, what is the possible cause?

Options:

A.

The IIH authentication between R3 and R1 fails.

B.

The IS-IS levels of R3 and R4 do not match.

C.

The circuit types of the interfaces connecting R3 and R4 do not match.

D.

The area IDs of R3 and R4 are different.

Buy Now
Questions 49

The naming of SRv6 instructions complies with certain rules. You can quickly determine the function of an instruction based on the instruction name. Which of the following statements about the keywords in SRv6 instruction names are correct?

Options:

A.

T: searches a specified routing table to forward packets.

B.

M: searches a Layer 2 forwarding table for unicast forwarding.

C.

V: searches a VPN instance routing table to forward packets.

D.

X: forwards packets through one or a group of specified Layer 3 interfaces.

Buy Now
Questions 50

MPLS implements data forwarding based on two different planes. Which of the following statements regarding the forwarding mechanism are correct?

Options:

A.

After an IP packet enters an MPLS domain, the MPLS device forwards the packet based on FIB table queries.

B.

If the tunnel ID is 0x0, the MPLS forwarding process starts.

C.

The system automatically assigns an ID to the upper-layer application that uses a tunnel. This ID is also called the tunnel ID.

D.

If the tunnel ID is not 0x0, the normal IP forwarding process starts.

Buy Now
Questions 51

The free mobility function is deployed on the iMaster NCE-Campus on a campus network. Which of the following information should an administrator pay attention to?

Options:

A.

Define security groups.

B.

Deliver the inter-group policy.

C.

Deploy a policy control matrix.

D.

Select the policy enforcement point.

Buy Now
Questions 52

SR-MPLS is enabled on all routers. The label information encapsulated by R1 into a data packet is shown in the figure.

Which of the following is the forwarding path of the data packet?

Options:

A.

R1-R2-R3-R5-R6

B.

R1-R2-R4-R6

C.

R1-R3-R2-R4-R6

Buy Now
Questions 53

Huawei Open Programmability System (OPS) uses standard HTTP methods to access managed objects and manage network devices.

Which of the following HTTP methods is used to configure the value of a network device’s managed object?

Options:

A.

PUT

B.

POST

C.

GET

D.

PATCH

Buy Now
Questions 54

Telemetry data must be encoded in GPB binary format. This format reduces the number of bytes in telemetry messages and improves the transmission efficiency compared with messages encoded in JSON format.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 55

IPsec SAs can be established in either manual mode or IKE auto-negotiation mode. Which of the following statements about the two modes is incorrect?

Options:

A.

The lifetime of an SA established in IKE auto-negotiation mode is controlled by the lifetime parameters configured on both ends of the tunnel.

B.

In manual mode, all parameters (including encryption and authentication keys) required for establishing an IPsec SA need to be manually configured.

C.

In IKE auto-negotiation mode, the encryption and authentication keys required for establishing an SA are generated using the DH algorithm.

D.

SAs established in both manual and IKE auto-negotiation modes can be dynamically updated.

Buy Now
Questions 56

In the firewall hot standby scenario, which of the following status information can be backed up between the active and standby firewalls?

Options:

A.

Server mapping table

B.

AAA user table (excluding the default user admin)

C.

Session table

D.

Dynamic MAC address table

Buy Now
Questions 57

Exhibit:

A loop occurs because Spanning Tree Protocol (STP) is not enabled on the network. Which of the following symptoms may occur?

Options:

A.

A loop alarm is generated on the LAN switch.

B.

CPU usage is too high.

C.

MAC entries flap.

D.

Host receives a large number of broadcast packets.

Buy Now
Questions 58

During WLAN planning and design, channels 1, 6, and 11 are recommended on the 2.4 GHz frequency band, and channels 1, 5, 9, and 13 are recommended in high-density scenarios. On the 5 GHz frequency band, it is recommended that high-frequency and low-frequency channels of adjacent APs be staggered to prevent overlapping.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 59

Which of the following statements about configuring user access authentication is incorrect?

Options:

A.

To implement network access control on users, you need to determine the domains to which they belong and the AAA schemes that they use.

B.

You can configure an 802.1X access profile, a MAC access profile, a Portal access profile, or a multi-mode authentication profile based on the actual authentication requirements on the network.

C.

If the RADIUS or HWTACACS server is used for authentication, you need to configure parameters for interconnection with the authentication server in the AAA scheme.

D.

You need to bind an access profile to an authentication profile to specify the user authentication mode. Then, apply the authentication profile to an interface to enable network access control.

Buy Now
Questions 60

To obtain the token ID of iMaster NCE, you need to send an HTTP request using the following Python code to invoke an iMaster NCE RESTful API:

Which of the following statements is incorrect?

Options:

A.

You can run print(r.json()) to display the response message sent from the server.

B.

Token resources are located at https://139.9.213.72:18002/controller/v2/tokens.

C.

The HTTP request uses the GET method to query the token value.

D.

The request body is in JSON format.

Buy Now
Questions 61

The on-premise mode is recommended for controller deployment on small and midsize campus networks.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 62

To prevent hackers from attacking user devices or networks using MAC addresses, you can configure MAC addresses of untrusted users as blackhole MAC addresses to filter out such invalid MAC addresses. When receiving a packet whose source or destination MAC address is a blackhole MAC address on a device, the device discards the packet.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 63

Which of the following number sequences can be matched by the regular expression 100.$?

Options:

A.

1000

B.

1001

C.

10000

D.

100

Buy Now
Questions 64

Which of the following fields is added to BGP4+ Update packets to advertise IPv6 routes?

Options:

A.

A new path attribute: MP_UNREACH_NLRI

B.

A new path attribute: MP_REACH_NLRI

C.

A new path attribute: IPv6_REACH_NLRI

D.

A new NLRI type: IPv6_NLRI, which carries the IPv6 NLRI prefix length and IPv6 NLRI prefix.

Buy Now
Questions 65

On a campus network, iMaster NCE-Campus is used to deploy two VNs (Virtual Networks): R & D VN and Marketing VN. Users in these two VNs belong to two separate security groups.

The campus network requires R & D personnel and sales personnel to communicate with each other. To meet this requirement, which of the following tasks does a network administrator need to perform?

Options:

A.

Deploy network service resources.

B.

Deploy a policy control matrix.

C.

Configure inter-VN communication.

D.

Deploy an external network.

Buy Now
Questions 66

MPLS is located between the data link layer and network layer in the TCP/IP protocol stack and can provide services for all network layer protocols.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 67

In the firewall hot standby scenario, in which of the following conditions will the local device proactively send VGMP packets?

Options:

A.

Hot standby being disabled

B.

Priority increase

C.

Link detection packet timeout

D.

Hot standby being enabled

Buy Now
Questions 68

OSPFv2 is an IGP running on IPv4 networks, whereas OSPFv3 is an IGP running on IPv6 networks. OSPFv2 and OSPFv3 have similar LSA types, but their LSA functions are slightly different. Which of the following is not an OSPFv3 LSA type?

Options:

A.

ASBR-Summary-LSA

B.

AS-External-LSA

C.

Router-LSA

D.

Network-LSA

Buy Now
Questions 69

OSPFv3 link LSAs are advertised in the entire area.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 70

In DU label advertisement mode, if the liberal label retention mode is used, the device reserves labels received from all the LDP peers regardless of whether the LDP peer is the optimal next hop for reaching the destination network.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 71

In the small and midsize campus network design based on the Huawei CloudCampus Solution, when over 100 branches need to communicate with each other, which of the following interconnection networking models is recommended?

Options:

A.

Direct networking

B.

Full-mesh networking

C.

Hub-spoke networking

D.

Partial-mesh networking

Buy Now
Questions 72

An engineer uses two routers to perform IPv6 tests and wants to use OSPFv3 for IPv6 network connectivity. Which of the following OSPFv3 configurations for R1 are correct?

Options:

A.

[R1-GigabitEthernet0/0/1] ospfv3 1 area 0

B.

[R1-ospfv3-1] router-id 10.1.1.1

C.

[R1-ospfv3-1-area-0.0.0.0] network 2001:DB8:2345:12::1 ::

D.

[R1] router id 10.1.1.1

Buy Now
Questions 73

Free mobility implements policy management and permission control based on users ' VLAN IDs and IP addresses.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 74

Which of the following user logout modes are supported by 802.1X authentication?

Options:

A.

An authentication server forces a user to log out.

B.

A user logs out manually.

C.

An access device forces a user to log out.

D.

An accounting server forces a user to log out.

Buy Now
Questions 75

iMaster NCE-CampusInsight uses SNMP technology to collect metrics and logs of network devices and detects network exceptions based on real service traffic.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 76

After a wireless user passes Portal authentication, which of the following parameters cannot be used for authorizing the user?

Options:

A.

free-rule

B.

UCL

C.

IP address

D.

ACL

Buy Now
Questions 77

OSPF is deployed on a campus network to implement network interconnection. An engineer configures R2 as shown in the figure. Which of the following statements is incorrect about LSAs on the OSPF network?

Options:

A.

Type 5 LSAs are flooded in Area 1.

B.

Type 3 LSAs are not flooded in Area 1.

C.

Type 3 LSAs are not flooded in Area 2.

D.

Type 5 LSAs are flooded in Area 2.

Buy Now
Questions 78

Which of the following statements regarding RT are correct?

Options:

A.

Each VPN instance is associated with one or more pairs of VPN Target attributes, used to control VPN routing information advertisement and reception between sites.

B.

Export Target and Import Target are independent of each other and support multiple values to implement flexible VPN routing information advertisement and reception control.

C.

RTs are classified into two types: Export Target and Import Target.

D.

The RT value is advertised to neighbors through the BGP extended community attribute in Update messages.

Buy Now
Questions 79

Which of the following inter-AS MPLS L3VPN solutions does not require MPLS to run between ASBRs?

Options:

A.

Option C

B.

Option D

C.

Option A

D.

Option B

Buy Now
Questions 80

An enterprise has three types of services. Voice and video services are key services and need to be guaranteed, and FTP services are non-key services. Which of the following scheduling modes is optimal for satisfying the service requirements?

Options:

A.

WFQ scheduling is configured for IP voice, video, and FTP download services.

B.

PQ scheduling is configured for IP voice and video services, and WFQ scheduling is configured for FTP download services.

C.

LPQ scheduling is configured for IP voice services, PQ scheduling is configured for video services, and WFQ scheduling is configured for FTP download services.

D.

PQ scheduling is configured for IP voice, video, and FTP download services.

Buy Now
Questions 81

The telemetry network model is broadly and narrowly defined. Which of the following modules are involved in telemetry in a narrow sense (device-side telemetry)?

Options:

A.

Data generation

B.

Data push

C.

Data source

D.

Data subscription

Buy Now
Questions 82

On the campus network shown, IPv6 is deployed for service tests. Four routers are deployed on the network, and OSPFv3 is used for IPv6 network connectivity. An engineer checks the LSDB of R2 and obtains a Link-LSA. Which of the following statements about the LSA are correct?

Options:

A.

The link-local address of R2’s GE0/0/0 is FE80::2E0:FCFF:FECD:4F79.

B.

The IPv6 address prefix of R2’s GE0/0/0 is 2001:DB8:2345:23::/64.

C.

This LSA indicates that R2 does not support external routes but can participate in IPv6 route calculation.

D.

This LSA is generated by R2.

Buy Now
Questions 83

Congestion avoidance technology can prevent congestion on an interface.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 84

Complete the basic processing procedure for DiffServ model-based QoS shown in the figure

Options:

Buy Now
Questions 85

Refer to the figure.

Which of the following steps are mandatory to enable 802.1X authentication on GE0/0/2 and GE0/0/3 of SW3 and configure a RADIUS server to authenticate and deliver network access rights to users?

Options:

A.

Configure an AAA scheme.

B.

Configure an authentication profile.

C.

Configure an authentication domain.

D.

Configure an 802.1X access profile.

Buy Now
Questions 86

Which of the following items are included in static information collection and analysis?

Options:

A.

Device types

B.

Interface types

C.

License

D.

Packet loss rate

Buy Now
Questions 87

Which of the following statements is incorrect about access control on small and midsize campus networks based on the Huawei CloudCampus solution?

Options:

A.

iMaster NCE can function as an authentication server.

B.

Cloud APs support local Portal authentication.

C.

iMaster NCE can function as a Portal relay device.

D.

iMaster NCE can interconnect with a third-party RADIUS server.

Buy Now
Questions 88

As shown in the following figure, OSPF is deployed on a campus network to implement network interconnection, and Area 1 is deployed as an NSSA. To enable R1 to access R4’s loopback interface address, an engineer imports a direct route to R4’s OSPF process. Which of the following statements about this scenario are correct?

[R4-ospf-1] import-route direct

Loopback0: 10.1.4.4/32

Options:

A.

R2 is an ABR and translates Type 7 LSAs carrying the default route information into Type 5 LSAs.

B.

R2 is an ABR and translates Type 7 LSAs that describe external routes into Type 5 LSAs.

C.

R4 is an ASBR in the NSSA and generates Type 7 LSAs carrying the default route information.

D.

R4 is an ASBR in the NSSA and generates Type 7 LSAs to describe external routes.

Buy Now
Questions 89

Which of the following statements are correct about the command:

ping -aX -cY -sZ -vpn-instance M 10.5.16.2

Options:

A.

The source IP address of the ping packets is X.

B.

The ping packets belong to VPN instance M.

C.

During the ping operation, the quantity of ICMP Request packets is Y.

D.

The size of each ICMP Request packet for the ping operation is Z bytes.

Buy Now
Questions 90

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following fields is not carried in BGP EVPN Type 2 routes?

Options:

A.

IP Prefix

B.

IP Address

C.

L3VNI

D.

L2VNI

Buy Now
Questions 91

The BGP ORF function can be used to control the maximum number of routes that can be sent by a BGP peer. To achieve this, which of the following tools is used to send such a route list to BGP peers?

Options:

A.

Filter-policy

B.

Route-policy

C.

ACL

D.

IP prefix-list

Buy Now
Questions 92

Which of the following inter-AS MPLS L3VPN solutions needs ASBRs to transmit VPNv4 routes?

Options:

A.

Option C

B.

Option B

C.

Option A

D.

Option D

Buy Now
Questions 93

An O & M platform mainly provides unified monitoring and performance management for network devices. Which of the following is NOT device monitoring data?

Options:

A.

Management-plane data

B.

Data-plane data

C.

Control-plane data

D.

Monitoring-plane data

Buy Now
Questions 94

Which of the following technologies can be used to isolate users in the same VLAN?

Options:

A.

Super VLAN

B.

Port isolation

C.

IPSG

D.

Ethernet port security

Buy Now
Questions 95

Which of the following are application optimization functions in the Huawei SD-WAN Solution?

Options:

A.

Application identification

B.

Intelligent traffic steering

C.

WAN optimization

D.

QoS

Buy Now
Questions 96

During the evolution from OSPFv2 to OSPFv3, LSA formats and functions remain unchanged, except that the network layer addresses in LSAs are changed from IPv4 to IPv6.

Options:

A.

TRUE

B.

FALSE

Buy Now
Exam Code: H12-891_V1.0
Exam Name: HCIE-Datacom V1.0
Last Update: Apr 14, 2026
Questions: 322
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now H12-891_V1.0