Weekend Biggest Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Huawei H12-811_V1.0 Dumps

Page: 1 / 30
Total 304 questions

HCIA-Datacom V1.0 Exam Questions and Answers

Question 1

On the network shown in the figure, the router receives a data packet with the destination IP address 11.0.12.1 from Host A.

as

After the packet is forwarded by the router, which of the following are the destination MAC address and destination IP address of the data packet?

Options:

A.

MAC-C, 11.0.12.1

B.

MAC-D, 11.0.12.1

C.

MAC-B, 11.0.12.1

D.

MAC-D, 10.0.12.2

Question 2

What is the total length of the port ID in STP?

Options:

A.

8 bits

B.

4 bits

C.

16 bits

D.

2 bits

Question 3

The users who log on the router through Telnet are not permitted to configure an IP address. What is the possible reason?

Options:

A.

Privilege level of Telnet is set incorrectly.

B.

SNMP parameters are set incorrectly.

C.

The authentication mode of Telnet is set incorrectly.

D.

Communication failures occur between the user and the router.

Question 4

Which of the following commands sets the data forwarding mode on an AC to direct forwarding?

Options:

A.

forward mode tunnel

B.

forward-mode direct-forward

C.

forward-mode capwap-forward

D.

forward-mode direct

Question 5

(Each network device running SNMP runs an agent process locally.)

Options:

A.

TRUE

B.

FALSE

Question 6

Which of the following parameters is used to elect the root bridge in STP?

Options:

A.

Bridge ID

B.

Port ID

C.

Root path cost

D.

System name of the switch

Question 7

Fit APs can work independently of an AC.

Options:

A.

TRUE

B.

FALSE

Question 8

Which of the following protocols can be used to prevent Layer 2 loops on a campus network?

Options:

A.

SNMP

B.

RSTP

C.

NAT

D.

OSPF

Question 9

Which of the following configurations can prevent Host A and Host B from communicating with each other?

as

Options:

A.

acl number 2000

rule 5 deny source 100.0.12.0 0.0.0.255

interface GigabitEthernet0/0/1

traffic-filter inbound acl 2000

B.

acl number 2000

rule 5 deny source 100.0.12.0 0.0.0.255

interface GigabitEthernet0/0/2

traffic-filter inbound acl 2000

C.

acl number 2000

rule 5 deny source 100.0.12.0 0.0.0.255

interface GigabitEthernet0/0/3

traffic-filter inbound acl 2000

D.

acl number 2000

rule 5 deny source 100.0.12.0 0.0.0.255

interface GigabitEthernet0/0/1

traffic-filter outbound acl 2000

Question 10

The router that runs OSPF first enters the Full state and then synchronizes the LSDB.

Options:

A.

TRUE

B.

FALSE

Question 11

On the network shown in the following figure, assuming that SWA, SWB, and SWC retain factory defaults, which of the following ports will be selected as a designated port?

as

Options:

A.

G0/0/2 on SWC

B.

G0/0/3 on SWA

C.

G0/0/1 on SWB

D.

G0/0/1 on SWC

Question 12

Which of the following statements is true about the Forward Delay timer of STP?

Options:

A.

Reduce the interval for sending BPDUs.

B.

Improve the STP convergence speed.

C.

Improve the configuration BPDU lifetime, ensuring that the configuration BPDUs can be forwarded to more switches.

D.

Prevent temporary loops.

E.

Delay is required when a port transitions between Blocking and Disabled.

Question 13

If the broadcast address of a network is 172.16.1.255, which of the following addresses is the network address?

Options:

A.

172.16.1.128

B.

172.16.1.1

C.

172.16.2.0

D.

172.16.1.253

Question 14

Which of the following packets are OSPF packets?

Options:

A.

LSA

B.

HELLO

C.

LSR

D.

LSU

Question 15

Which of the following descriptions regarding the TTL field of the IP packet is correct?

Options:

A.

The TTL value will decrement by 1 each time the packet is routed.

B.

The TTL defines the duration during which the source can send packets.

C.

The TTL defines how many packets the source can send.

D.

The TTL value will increment by 1 each time the packet is routed.

Question 16

A network administrator wishes to assign an IP address to a router interface G0/0/0. Which of the following IP addresses can be assigned?

Options:

A.

237.6.1.2/24

B.

127.3.1.4/28

C.

145.4.2.55/26

D.

192.168.10.112/30

Question 17

By referring to the topology and the configurations of G0/0/1 interfaces on LSW1 and LSW2 shown in the figure, it can be determined that data frames tagged with VLAN 10 can be normally forwarded between LSW1 and LSW2.

Options:

A.

TRUE

B.

FALSE

Question 18

The tree topology is a hierarchical star topology, facilitating network expansion. A consequence of this topology is that faults on a node at a higher layer are more severe.

Options:

A.

TRUE

B.

FALSE

Question 19

If the transport-layer protocol is UDP, the value of the "Protocol" field at the network layer is 6.

Options:

A.

TRUE

B.

FALSE

Question 20

< Huawei > system-view

[Huawei]command-privilege level 3 view user save

Refer to the command output. What is the result of the shown command?

Options:

A.

The command adjusts the save command in the user view to privilege level 3.

B.

The command adjusts the save command of a user to privilege level 3.

C.

The command adjusts the user view command privilege level to 3, and saves the configuration.

D.

The command adjusts the privilege level of a user to 3, and saves the configuration.

Question 21

Network Address and Port Translation (NAPT) allows multiple private IP addresses to be mapped to the same public IP address through different port numbers. Which of the following statements about port numbers in NAPT is true?

Options:

A.

Only the port number range needs to be configured.

B.

The mappings between port numbers and private IP addresses must be manually configured.

C.

An ACL is required to allocate port numbers.

D.

No port number needs to be configured.

Question 22

Which of the following parameters is used to elect the root bridge in STP?

Options:

A.

Bridge ID

B.

System name of the switch

C.

Port ID

D.

Root path cost

Question 23

What function does Ctrl+Z have in the VRP system?

Options:

A.

Exits the console interface view.

B.

Exits the interface view.

C.

Returns from any view to the user view.

D.

Exits the current view.

E.

Returns from the system view to the user view.

Question 24

Which of the following statements regarding static routing and dynamic routing is incorrect?

Options:

A.

Dynamic routing will use more resources than static routes.

B.

The static routing can automatically recover when a link failure is encountered.

C.

The use of dynamic routing is more convenient for the administrator to manage the network following network convergence.

D.

The static routing can be easily configured and managed on the enterprise network.

Question 25

If the application-layer protocol is Telnet, what is the value of the "Protocol" field in the IPv4 header?

Options:

A.

67

B.

53

C.

6

D.

17

Question 26

Only the WPA2-PSK security policy supports TKIP data encryption.

Options:

A.

TRUE

B.

FALSE

Question 27

Refer to the following configuration of an interface on a switch. What is the PVID of the interface?

interface GigabitEthernet0/0/1

port hybrid tagged vlan 2 to 3 100

port hybrid untagged vlan 4 6

Options:

A.

2

B.

100

C.

1

D.

4

Question 28

The priority of static routes cannot be manually specified.

Options:

A.

TRUE

B.

FALSE

Question 29

While inspecting packets in the network, a network administrator discovers a frame with the destination MAC address of 01-00-5E-A0-B1-C3. What can the administrator determine from this?

Options:

A.

The MAC address is incorrect.

B.

The MAC address is a multicast address.

C.

The MAC address is a broadcast address.

D.

The MAC address is a unicast address.

Question 30

With what kind of routers does a DRother router exchange link state information and route information?

Options:

A.

DRother

B.

DR

C.

BDR

D.

All OSPF neighbors

Question 31

For STP, the default root path cost of the root bridge is 0.

Options:

A.

TRUE

B.

FALSE

Question 32

On the network shown in the figure, router A adopts link aggregation in manual load balancing mode, and G0/0/1 and G0/0/2 are added to link aggregation group (LAG) 1. Which of the following statements is false about Eth-Trunk 1 on router A?

as

Options:

A.

If both G0/0/1 and G0/0/2 on router B are disabled, Eth-Trunk 1 is Up.

B.

If only G0/0/2 on router B is disabled, Eth-Trunk 1 is Up.

C.

If only G0/0/1 on router B is disabled, Eth-Trunk 1 is Up.

D.

If both G0/0/1 and G0/0/2 on router B are disabled, Eth-Trunk 1 is Down.

Question 33

(Network Functions Virtualization (NFV) implements software-based network application deployment.)

Options:

A.

TRUE

B.

FALSE

Question 34

Which of the following port statuses may exist on an STP-enabled switch?

Options:

A.

Discarding

B.

Listening

C.

Disabled

D.

Forwarding

Question 35

On the Huawei VRP, what is the default preference of different route types, in descending order?

Options:

A.

Direct > Static > RIP > OSPF

B.

Direct > OSPF > RIP > Static

C.

Direct > RIP > Static > OSPF

D.

Direct > OSPF > Static > RIP

Question 36

When a switch receives a unicast data frame, if the destination MAC address of the data frame can be found in the MAC address table of the switch, the data frame is definitely forwarded through the port corresponding to the MAC address.

Options:

A.

TRUE

B.

FALSE

Question 37

More than two switches can be stacked into one logical device.

Options:

A.

TRUE

B.

FALSE

Question 38

(An administrator cannot log in to a Huawei router through Telnet, but other administrators can log in to the router. Which of the following are possible causes?)

Options:

A.

The administrator account has been disabled.

B.

The Telnet service has been disabled on the AR2200 router.

C.

The administrator account has been deleted.

D.

The user level of the administrator account has been changed to 0.

Question 39

When a host uses the stateless address autoconfiguration solution to obtain an IPv6 address, the host cannot obtain the DNS server address.

Options:

A.

TRUE

B.

FALSE

Question 40

For an Eth-Trunk in LACP mode, what is the default LACP system priority of a Huawei switch?

Options:

A.

4096

B.

36864

C.

32768

D.

24576

Question 41

Which of the following statements is true about root bridge election in STP?

Options:

A.

The device with the largest bridge priority becomes the root bridge.

B.

If the bridge priorities of devices are the same, the device with the largest MAC address becomes the root bridge.

C.

The device with the smallest bridge priority becomes the root bridge.

D.

If the bridge priorities are the same, the device with the largest number of ports becomes the root bridge.

Question 42

The load balancing modes at both ends of an Eth-Trunk can be different.

Options:

A.

TRUE

B.

FALSE

Question 43

How many port states are involved in RSTP?

Options:

A.

1

B.

2

C.

4

D.

3

Question 44

Which of the following parts compose SNMP?

Options:

A.

Management Information Base (MIB)

B.

Managed object

C.

Agent process

D.

NMS

Question 45

Which of the following is not a type of OSPF LSA?

Options:

A.

LSA

B.

LSU

C.

LSR

D.

LSACK

Question 46

What is the TPID value defined by IEEE 802.1Q?

Options:

A.

0x9100

B.

0x8100

C.

0x8200

D.

0x7200

Question 47

A router in the backbone area has complete LSDBs of routers in other areas.

Options:

A.

TRUE

B.

FALSE

Question 48

How many bytes are there in a basic IPv6 header?

Options:

A.

40

B.

48

C.

32

D.

64

Question 49

What are the components of the OSI reference model from top to bottom?

Options:

A.

Application layer, presentation layer, session layer, network layer, transport layer, data link layer, and physical layer

B.

Application layer, presentation layer, session layer, transport layer, network layer, data link layer, and physical layer

C.

Application layer, transport layer, network layer, data link layer, and physical layer

D.

Application layer, session layer, presentation layer, transport layer, network layer, data link layer, and physical layer

Question 50

In the case of Huawei routers, what is the "-i" parameter in a Ping command issued on a VRP operating system used to set?

Options:

A.

Destination IP address for receiving an Echo Reply packet.

B.

Interface for receiving an Echo Reply packet.

C.

Source IP address for sending an Echo Request packet.

D.

Interface for sending an Echo Request packet.

Question 51

Which of the following planes does a network device have?

Options:

A.

Control plane

B.

Management plane

C.

Data plane

D.

Service plane

Question 52

On Huawei AR G3 Series routers, which authentication modes does AAA support?

Options:

A.

Radius

B.

None

C.

Local

D.

802.1X

Question 53

Which of the following VRP commands can be used to enter area 0 view?

Options:

A.

[Huawei-ospf-1] area 0.0.0.0

B.

[Huawei-ospf-1] area 0 enable

C.

[Huawei-ospf-1] area 0

D.

[Huawei] ospf area 0

Question 54

When a host uses the IP address 192.168.1.2 to access the Internet, NAT must be performed.

Options:

A.

TRUE

B.

FALSE

Question 55

Loops may cause broadcast storms on a Layer 2 network.

Options:

A.

TRUE

B.

FALSE

Question 56

Which of the following statements about the routing table shown in the figure are true?

Options:

A.

The local router forwards data packets destined for 10.0.2.2 from Ethernet0/0/0.

B.

The next hop in the route to the destination network 10.0.3.3/32 is not directly connected. Therefore, the local router does not forward data packets destined for 10.0.3.3.

C.

The local router forwards data packets destined for 10.0.12.1 from Ethernet0/0/0.

D.

The local router forwards data packets destined for 10.0.3.3 from Ethernet0/0/0.

Question 57

Which of the following statements about encapsulation and decapsulation are true?

Options:

A.

Encapsulation and decapsulation can locate network faults.

B.

Encapsulation and decapsulation shorten the packet length.

C.

Encapsulation and decapsulation participate in achieving different network protocol functions.

D.

Encapsulation and decapsulation can implement network communication.

Question 58

The router ID of the OSPF process takes effect immediately after being changed.

Options:

A.

TRUE

B.

FALSE

Question 59

Which of the following statements is true?

Options:

A.

Routers work at the physical layer.

B.

Switches work at the network layer.

C.

Switches work at the physical layer.

D.

Routers work at the network layer.

Question 60

A switch receives a unicast data frame with a VLAN tag but cannot find the destination MAC address of the data frame in its MAC address table. In this case, which action will the switch take?

Options:

A.

The switch broadcasts the data frame on all interfaces.

B.

The switch broadcasts the data frame on all interfaces (except that on which it was received) in the VLAN to which the data frame belongs.

C.

The switch discards the data frame.

D.

The switch broadcasts the data frame on all access interfaces.

Question 61

In RSTP, an edge port becomes a common STP port after receiving a configuration BPDU.

Options:

A.

TRUE

B.

FALSE

Question 62

In RSTP mode, both alternate and backup ports cannot forward user traffic and cannot receive, process, and send BPDU.

Options:

A.

TRUE

B.

FALSE

Question 63

In RSTP, a backup port can replace a faulty root port.

Options:

A.

TRUE

B.

FALSE

Question 64

Which of the following statements about hybrid interfaces is true?

Options:

A.

Hybrid interfaces can remove VLAN tags from some outgoing VLAN frames.

B.

Hybrid interfaces do not require PVIDs.

C.

Hybrid interfaces must carry VLAN tags when sending data frames.

D.

Hybrid interfaces receive only data frames with VLAN tags.

Question 65

The following figure shows the display interface Eth-Trunk 1 command output on a switch. Which of the following commands can be used to delete Eth-Trunk 1?

as

Options:

A.

inte GigabitEthernet 0/0/1 undo eth-trunk quit inte GigabitEthernet 0/0/2 undo eth-trunk quit undo interface Eth-Trunk 1

B.

inte GigabitEthernet 0/0/2 undo eth-trunk quit undo interface Eth-Trunk 1

C.

undo interface Eth-Trunk 1

D.

inte GigabitEthernet 0/0/1 undo eth-trunk quit undo interface Eth-Trunk 1

Question 66

On the VRP CLI, files cannot be permanently deleted using the delete or delete /unreserved command. To permanently delete them, you need to delete the files in the recycle bin.

Options:

A.

TRUE

B.

FALSE

Question 67

As shown in the figure, all switches run STP. Assume that the path cost of all ports is 200. What is the root path cost contained in the configuration BPDU received by G0/0/4 on SWD?

as

Options:

A.

200

B.

600

C.

400

D.

0

Question 68

(By default, in the SNMP protocol, which port number is used by the proxy process to send alarm messages to the NMS?)

Options:

A.

164

B.

163

C.

161

D.

162

Question 69

As shown in the figure, which of the following ports will be in a blocking state?

as

Options:

A.

G0/0/2 of SWC

B.

G0/0/3 of SWB

C.

G0/0/1 of SWC

D.

G0/0/3 of SWA

Question 70

Which of the following network types does OSPF support?

Options:

A.

Broadcast.

B.

Point-to-Point.

C.

Non-Broadcast Multi-Access (NBMA).

D.

Point-to-Multipoint.

Question 71

During STP calculation, the port cost is associated with the port bandwidth by default. Which of the following statements about the relationship between port cost and port bandwidth is true?

Options:

A.

The port cost varies randomly according to port bandwidth.

B.

A higher port bandwidth indicates a smaller port cost.

C.

The port bandwidth is equal to the port cost.

D.

A higher port bandwidth indicates a larger port cost.

Question 72

Which of the following IEEE 802.11 standards supports the 2.4 GHz frequency band only?

Options:

A.

802.11a

B.

802.11g

C.

802.11n

D.

802.11ax

Question 73

Which of the following statements are true about the dynamic MAC address table?

Options:

A.

Dynamic MAC address entries are obtained by learning the source MAC addresses of packets received by an interface and can be aged out.

B.

After a device is reset, an interface card is hot-swapped, or an interface card is reset, dynamic MAC address entries on the device or interface card are lost.

C.

You can obtain the number of users communicating on an interface by checking the number of specified dynamic MAC address entries.

D.

After a device is reset, an interface card is hot-swapped, or an interface card is reset, the saved entries on the device or interface card are not lost.

Question 74

Wi-Fi 6 is also known as the IEEE 802.11ax standard.

Options:

A.

TRUE

B.

FALSE

Question 75

(When a network engineer enters a command, the following information is displayed:

Error: Unrecognized command found at 'A' position. Which of the following statements is true about such information?)

Options:

A.

The entered parameter is not specified.

B.

The entered command is incomplete.

C.

The parameter type is incorrect.

D.

No keyword is found.

Question 76

According to OSI reference model, which layer is responsible for end-to-end error checking and flow control?

Options:

A.

Network layer

B.

Physical layer

C.

Data link layer

D.

Transport layer

Question 77

The Network Management Station uses SNMP to manage devices. Which SNMP message is sent when an SNMP-registered abnormal event occurs?

Options:

A.

trap

B.

get-request

C.

set-request

D.

get-response

Question 78

(Loops may cause broadcast storms on a Layer 2 network.)

Options:

A.

TRUE

B.

FALSE

Question 79

Only one SSID can be bound to each radio of an AP.

Options:

A.

TRUE

B.

FALSE

Question 80

Refer to the following display vlan command output on SWA. Which of the following interfaces can forward untagged data frames from VLAN 40?

as

Options:

A.

GE0/0/2

B.

GE0/0/3

C.

GE0/0/4

D.

GE0/0/5

Question 81

On the network shown in the figure, host A logs in to router A through Telnet and obtains the configuration file of router B through FTP on the remote CLI. How many TCP connections exist on router A?

as

Options:

A.

1

B.

3

C.

4

D.

2

Question 82

In STP, the bridge ID on the switching network is as follows. With which of the following bridge IDs is the switch selected as the root bridge?

Options:

A.

32768 00-01-02-03-04-BB

B.

4096 00-01-02-03-04-DD

C.

32768 00-01-02-03-04-CC

D.

32768 00-01-02-03-04-AA

Question 83

What is used as the data link-layer MAC address that identifies each VAP on an AP?

Options:

A.

BSSID

B.

SSID

C.

BSS

D.

ESS

Question 84

The network administrator performs the configuration shown in the following figure on RTA. If a user needs to be authenticated in the authentication domain named huawei, which of the following statements is true?

Options:

A.

The authentication scheme au2 is used for authentication.

B.

The authentication scheme aul is used for authentication.

C.

The authentication scheme au2 is used for authentication. If the authentication scheme au2 is deleted, the authentication scheme aul is used.

D.

The authentication scheme aul is used for authentication. If the authentication scheme aul is deleted, the authentication scheme au2 is used.

Page: 1 / 30
Total 304 questions