Weekend Biggest Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Huawei H12-821_V1.0 Dumps

Page: 1 / 26
Total 264 questions

HCIP-Datacom-Core Technology V1.0 Questions and Answers

Question 1

GRE is a Layer 2 VPN encapsulation technology that encapsulates packets of certain data link layer protocols so that the encapsulated packets can be transmitted over an IP network.

Options:

A.

TRUE

B.

FALSE

Question 2

An enterprise administrator configures route summarization on ASBRs to reduce the number of inter-area Type 3 LSAs, which in turn reduces the routing table size and improves device resource utilization.

Options:

A.

TRUE

B.

FALSE

Question 3

GRE is a VPN technology that can implement packet transmission over heterogeneous networks. Which of the following statements are true about GRE?

Options:

A.

GRE is a Layer 2 VPN encapsulation technology.

B.

GRE enables encapsulated data packets to be transmitted over another network layer protocol, but cannot encapsulate multicast data.

C.

GRE tunnels can work with IPsec to ensure the security of multicast services such as voice and video.

D.

GRE tunnels can extend the working range of network protocols with hop limits.

Question 4

After the administrator of an enterprise deploys a DHCP server, employees complain that their clients cannot obtain IP addresses from the DHCP server. Which of the following may cause this problem?

Options:

A.

Multiple DHCP servers are configured.

B.

STP is enabled on the DHCP server.

C.

The DHCP function is disabled by default, and the administrator forgets to enable the DHCP function.

D.

DHCP clients and the DHCP server are on different network segments, and no DHCP relay agent is configured on the network.

Question 5

There are two BFD operating modes. In_______mode, the local end sends BFD Control packets at specified intervals, and the remote end checks whether the local end periodically sends BFD Control packets. (Use lowercase letters.)

Options:

Question 6

Which of the following statements regarding the display bgp routing-table command output is true?

as

Options:

A.

The route to the destination address 192.168.1.0 is learned through AS 200.

B.

The MED value of the route to the destination address 192.168.1.0 is 100.

C.

The route to the destination address 192.168.1.0 is not the optimal route in the BGP routing table.

D.

The route to the destination address 192.168.1.0 is injected into the BGP routing table using the network command.

Question 7

BFD can quickly detect faults in channels at multiple network layers, ensuring high reliability. To which of the following layers does BFD belong?

Options:

A.

Application layer

B.

Data link layer

C.

Physical layer

D.

Network layer

Question 8

The Origin attribute is used to define the origin of BGP path information. There are three types of Origin attributes. Which of the following lists the Origin attributes in descending order of priority?

Options:

A.

IGP > EGP > Incomplete

B.

Incomplete > IGP > EGP

C.

EGP > IGP > Incomplete

D.

Incomplete > EGP > IGP

Question 9

On a network, some switches are enabled with RSTP and some switches are enabled with STP. What will happen?

Options:

A.

A Huawei switch changes from RSTP to STP. After the STP-enabled switch is removed from the network, the RSTP-enabled switch can be moved back to the RSTP mode.

B.

A Huawei switch changes its mode from STP to RSTP. After the RSTP-enabled switch is removed from the network, the STP-enabled switch can be moved back to the RSTP mode.

C.

STP and RSTP are compatible with each other, but the rapid convergence of RSTP is unavailable.

D.

STP and RSTP calculation are performed independently.

Question 10

GRE is a VPN encapsulation technology that is widely used to transmit packets across heterogeneous networks. Which of the following statements is false about GRE?

Options:

A.

GRE supports encryption and authentication.

B.

GRE supports multicast transmission.

C.

GRE is a Layer 3 VPN encapsulation technology.

D.

GRE can work with other VPN protocols to better ensure data security.

Question 11

On the campus OSPF network shown in the following figure, the interfaces connecting the five routers are GE interfaces, and their costs are not changed. The import-route command is run on R1. After the network converges, the route to the server at 192.168.1.0/24 is queried on R2. Which of the following is the cost of this route?

as

Options:

A.

2

B.

4

C.

3

D.

1

Question 12

When creating a single-hop BFD session for the first time, bind the single-hop BFD session to the peer IP address and the local address. To modify a configured BFD session, delete it and create a new one.

Options:

A.

TRUE

B.

FALSE

Question 13

A switch running a later IGMP version can identify Report messages of an earlier IGMP version, but the switch running an earlier IGMP version cannot identify Report messages of a later IGMP version. To ensure that IGMP runs properly, you are advised to set the IGMP version on the switch to be the same as or later than the IGMP version of member hosts.

Options:

A.

TRUE

B.

FALSE

Question 14

Multiple BGP processes cannot be configured on the same router.

Options:

A.

TRUE

B.

FALSE

Question 15

BGP routes have multiple path attributes. When a router advertises a BGP route to its peers, the route carries multiple path attributes. These attributes describe the characteristics of the BGP route and affect route selection in some scenarios. The attribute is Huawei-specific. It is valid only on the local device and is not transmitted to BGP peers. (Enter the attribute name in lowercase as it appears in the command output about the BGP routing table.)

Options:

Question 16

ACLs are a common matching tool in routing policies. An ACL can be configured on a router to match routes.

Options:

A.

TRUE

B.

FALSE

Question 17

Without a prior version check, an engineer configures IGMP snooping on a device and the version of IGMP snooping is earlier than the IGMP versions on user hosts. In this case, which of the following situations will occur?

Options:

A.

Users cannot receive multicast data because the device forwards received IGMP Report messages only to router ports and does not generate group member ports or forwarding entries.

B.

Users cannot receive multicast data, but the device generates forwarding entries after receiving IGMP Report messages.

C.

The IGMP snooping version of the device is automatically degraded, and users can receive multicast data properly.

D.

The IGMP versions of the hosts are automatically upgraded, and users can receive multicast data properly.

Question 18

Which of the following scenarios is not suitable for deploying interface PBR?

Options:

A.

A core switch needs to forward traffic between the intranet and extranet to an AC device that connects to the core switch in off-path mode.

B.

A core switch needs to forward the traffic between the intranet and extranet to a security detection device that connects to the core switch in off-path mode.

C.

A device needs to modify the next-hop IP address for locally originated traffic.

D.

On an enterprise network with multiple ISP outbound interfaces, each internal network segment accesses the Internet through a particular ISP outbound interface.

Question 19

See the following figure. RTA, RTB, RTC, and RTD are in the same AS and establish IBGP peer relationships through direct links. RTB an RTC are route reflectors (RRs), RTA and RTC are the RR clients of RTB, and RTB and RTD are the RR clients of RTC. If RTA advertises the route 10.1.1.0/24 to the BGP process, the Originator ID of the BGP route received by RTD is------------------.

as

Options:

Question 20

Regarding the route-policy set-cost configuration below, which of the following statements is true?

as

Options:

A.

The route 11.1.0.0/16 is permitted by node 10, and its tost Is set to 300.

B.

The cost of all routes is set to 200.

C.

All the routes that are not permitted by node 10 will be denied.

D.

The route 11.1.0.0/16 will continue to match node 20 after permitted by node 10, and (he final cost is set to 200.

Question 21

An enterprise uses OSPF to implement network communication. To ensure data validity and security, all authentication modes supported by OSPF are enabled on routers. In this case, interface authentication is preferentially used by the routers.

Options:

A.

TRUE

B.

FALSE

Question 22

ACLs are a common tool for matching routes. ACLs are classified into multiple types based on ACL rule functions. An ACL can be identified by a number, and the number range for each type of ACLs is different. Which of the following type of ACLs are numbered from 4000 to 4999?

Options:

A.

User-defined ACL

B.

Basic ACL

C.

Layer 2 ACL

D.

Advance ACL

Question 23

Which of the following statements about multicast packet forwarding is true?

Options:

A.

If a multicast data packet fails the RPF check, the packet must have been received through a sub-optimal interface. However, this interface still receives and forwards the multicast traffic downstream.

B.

IGMP snooping cannot control the scope of multicast traffic flooding on a Layer 2 network.

C.

The source address of a multicast packet is a unicast address.

D.

In multicast transmission, the destination address of a packet can be the unicast address of a host.

Question 24

An OSPF AS-external LSA describes a route to an AS external network. When the field in the LSA is 0.0.0.0, the traffic destined for the external network is sent to the ASBR that imports this external route. (Enter the acronym in uppercase.)

Options:

Question 25

In BGP, Notification messages are used to request peers to resend routing information after routing policies are changed.

Options:

A.

TRUE

B.

FALSE

Question 26

Which of the following statements about stack split is false?

Options:

A.

After a stack splits, the MAC addresses of the two stacks change immediately.

B.

If the master and standby switches are still in the same stack after the stack splits, the slave switches separated from the original master and standby switches re-elect the master and standby switches due to protocol packet timeout.

C.

If the master and standby switches are in two stacks after the split, the stack where the original master switch resides updates the topology and selects a new standby switch. The original standby switch becomes the master switch in the new stack and a new standby switch is elected.

D.

After a stack splits, multiple stacks have the same IP address and MAC address. To prevent network faults, the stacks perform MAD detection. The stack that fails the MAD detection shuts down all physical ports except reserved ports.

Question 27

In inter-AC roaming scenarios, an AC can function as the mobility server of multiple mobility groups, but can be added only to one mobility group.

Options:

A.

TRUE

B.

FALSE

Question 28

The Internet Assigned Numbers Authority (IANA) allocates Class D addresses to IPv4 multicast. An IPv4 address is 32 bits long, and the four most significant bits of a Class D address are 1110.

Options:

A.

TRUE

B.

FALSE

Question 29

Depending on the type of algorithms used, routing protocols are classified into distance-vector protocols and link-state protocols. Which of the following routing protocols are link-state protocols?

Options:

A.

RIP

B.

OSPF

C.

IS-IS

D.

BGP

Question 30

Which of the following statements regarding multicast MAC addresses are false?

Options:

A.

One multicast MAC address maps to 32 multicast IP addresses.

B.

One multicast MAC address maps to only one multicast IP address.

C.

The high 24 bits of the multicast MAC address are 0x01005E, the 25th bit is fixed to 1, and the lower 23 bits of the MAC address map to the lower 23 bits of the multicast IP address.

D.

A multicast MAC address identifies receivers of a multicast group on the data link layer.

Question 31

Similar to the OSPF DR, the IS-IS DIS needs to be elected on a broadcast network. However, the OSPF DR is preemptive by default, whereas the IS-IS DIS is not preemptive by default.

Options:

A.

TRUE

B.

FALSE

Question 32

A router uses an advanced ACL to filter data. The ACL configuration is shown below. Which of the following statements is false about the configuration?

csharp

CopyEdit

[Huawei] acl 3001

[Huawei-acl-adv-3001] rule permit icmp source 192.168.1.3 0 destination 192.168.2.0 0.0.0.255

Options:

A.

The ACL permits ICMP packets from host 192.168.1.3 to host 192.168.2.200.

B.

The ACL denies ICMP packets from host 192.168.1.2 to network segment 192.168.2.0/24.

C.

The ACL permits IP packets from host 192.168.1.3 to network segment 192.168.2.0/24.

D.

The ACL is a numbered ACL whose number is 3001.

Question 33

Which of the following attacks is not the network layer attack?

Options:

A.

IP spoofing attack

B.

ICMP attack

C.

Smurf attack

D.

ARP spoofing attack

Question 34

To prevent inter-area routing loops, OSPF does not allow advertising routing information between two non-backbone areas and allows sing routing information only within an area or between the backbone area and a non-backbone area. Therefore, each ABR must be connected to the backbone area.

Options:

A.

TRUE

B.

FALSE

Question 35

What is the correct procedure for a VLAN pool to assign terminals to VLANs.

as

Options:

Question 36

According to BGP route selection rules, the route with the higher Local_Pref is preferred.

Options:

A.

TRUE

B.

FALSE

Question 37

OSPF neighbors have multiple states, such as Down, Init, 2-way, Loading, or Full. In which of the following states do OSPF routers negotiate the master and slave roles?

Options:

A.

Exchange

B.

Init

C.

2-way

D.

ExStart

Question 38

Which three transmission modes are supported for IPv4 packets?

Options:

A.

Anycast

B.

Broadcast

C.

Unicast

D.

Multicast

Question 39

Compared with RSTP, which of the following port roles are added to MSTP?

Options:

A.

Backup port

B.

Master port

C.

Edge port

D.

Regional edge port

Question 40

An IP prefix list is a common matching tool used in routing policies. Which of the following cannot be configured as matching conditions in an IP prefix list on a Huawei router?

Options:

A.

Port number

B.

Mask

C.

Action

D.

Index

Question 41

BGP can select routes based on the AS_Path attribute. Therefore, in some cases, a route-policy needs to be used to modify the AS_Path attribute for route selection. Which of the following parameters can be specified in the apply as-path command for a route-policy to modify this attribute?

Options:

A.

Delete

B.

Additive

C.

Copy

D.

Overwrite

Question 42

Which of the following statements regarding OSPF route summarization commands are true?

Options:

A.

The asbr-summary command is executed in the OSPF view.

B.

The abr-summary command is executed in the OSPF area view.

C.

Advertise is the default parameter of the abr-summary command. That is, if not-advertise is not specified in the abr-summary command, the advertise parameter takes effect by default.

D.

Not-advertise is the default parameter of the abr-summary command. That is, if advertise is not specified in the abr-summary command, the not-advertise parameter takes effect by default.

Question 43

PBR is a mechanism for selecting routes based on user-defined policies. There are two types of PBR: interface-based PBR and local PBR. Which of the following statements is false about these two types of PBR?

Options:

A.

Interface-based PBR takes effect only for forwarded packets.

B.

Local PBR takes effect only for locally originated packets.

C.

Interface-based PBR is configured on an interface and takes effect only for incoming packets on the interface.

D.

Local PBR is configured in the protocol view.

Question 44

On an OSPF network, LSDBs are used to store LSAs. Common LSAs include router LSAs and network LSAs. Which of the following items is not included in the 3-tuple that is used to uniquely identify an LSA?

Options:

A.

LS Sequence Number

B.

Link State ID

C.

Advertising Router

D.

LSType

Question 45

NETCONF is a network configuration protocol that automates network configuration in a programmable manner, simplifying and accelerating network service deployment. Which of the following operations can be performed by using this protocol?

Options:

A.

Modifying configurations

B.

Deleting configurations

C.

Restoring configurations

D.

Backing up configurations

Question 46

An enterprise uses Huawei routers to deploy an IS-IS network for network-wide communication. An engineer wants to change the interface cost to control route selection. By default, which of the following values is the maximum cost that can be configured?

Options:

A.

67

B.

63

C.

64

D.

68

Question 47

During routine maintenance, an enterprise administrator runs a command to check VRRP group information. Which of the following statements is false about the command output?

yaml

CopyEdit

display vrrp verbose

Vlanif100 | Virtual Router 1 State: Master

Virtual IP: 10.1.1.100

Master IP: 10.1.1.2

PriorityRun: 120 PriorityConfig: 120

DR: None BDR: None MTU: 0

Preempt: YES Delay Time: 20s

Remain: --

Track: YES Priority Reduced: 20

Auth Type: MD5

BFD-session State: UP

Options:

A.

Preemption is enabled for the VRRP group.

B.

This VRRP group is an mVRRP group.

C.

Authentication is enabled for the VRRP group.

D.

The ID of the VRRP group is 1.

Question 48

After which of the following parameters are modified does an IS-IS neighbor relationship need to re-established?

Options:

A.

The cost of an IS-IS interface is changed.

B.

The IP address of an ISIS interface is changed.

C.

The level of an ISIS interface is changed.

D.

The interval at which an IS-IS interface sends IIH packets is changed.

Question 49

The typical characteristics of the AI era are that it focuses on data, explores data value, and improves AI efficiency. Therefore, the core requirement of AI for data center networks is speed, meaning low latency.

Options:

A.

TRUE

B.

FALSE

Question 50

Match the following IPv4 multicast protocols with the corresponding functions.

as

Options:

Question 51

On an OSPF network, if a router functions as an ABR, the router must also be a BR.

Options:

A.

TRUE

B.

FALSE

Question 52

Which of the following is used as the destination port for single-hop BFD?

Options:

A.

UDP port 3784

B.

UDP port 4784

C.

TCP port 3784

D.

TCP port 4784

Question 53

Security policy is the core feature of firewalls. Only valid traffic that complies with security policies can be forwarded by firewalls. Which of the following statements are true about security policy matching rules?

Options:

A.

Multiple values can be configured for a single matching condition, and the values are logically ANDed.

B.

If a security policy contains multiple matching conditions, the relationship between them is AND.

C.

The system has a default security policy named default, where all matching conditions are any and the default action is permit.

D.

When multiple security policy rules are configured, they are sorted in a list by configuration sequence by default. A security policy rule configured earlier is placed higher in the list and has a higher priority.

Question 54

VRF, also called VPN instance, is a network virtualization technology that helps VPN technology to isolate users. In normal cases, multiple VPN instances can be created on a physical device, and each VPN instance has independent entries. Which of the following resources can be independently owned by a VPN instance?

Options:

A.

Interface

B.

Routing table

C.

MAC address table

D.

Routing protocol process

Question 55

When receiving a packet that does not match any session table entry, the firewall discards the packet to prevent external attacks and ensure internal information security.

Options:

A.

TRUE

B.

FALSE

Question 56

In BGP, the Origin attribute is used to identify the origin of a route. Which of the following statements are true about the Origin attribute?

Options:

A.

If a route is imported to BGP by the originator using the network command, the Origin attribute of the BGP route is displayed as i in the BGP routing table.

B.

If a route is learned through EGP, the Origin attribute of this BGP route is displayed as ? in the BGP routing table.

C.

If multiple routes carry the same destination address but different Origin attributes and all other route selection conditions are the same, BGP selects the optimal route according to the Origin attribute in the following order: IGP > EGP > Incomplete.

D.

This attribute is a well-known mandatory attribute.

Question 57

Which of the following statements regarding the LSA age field are true?

Options:

A.

The unit of this field is seconds. In a LSDB, the LS age of a LSA increases with time.

B.

If the LS age of a LSA has reached the LSRefreshTime (30 minutes), any router can regenerate an instance of this LSA again.

C.

The unit of this field is seconds. In a LSDB, the LS age of a LSA decreases with time.

D.

If the LS age of a LSA has reached the LSRefreshTime (30 minutes), the originator of this LSA needs to regenerate an instance of this LSA again.

Question 58

A large shopping mall configures a VLAN pool to prevent network performance deterioration caused by potentially large broadcast domains. A network engineer runs the display vlan pool name STA command to check information about the VLAN pool. The following command output is displayed:

display vlan pool name STA Name : STA Total : 2 Assignment: hash Threshold Notify Count: 3 Threshold Notify time(min): 3 VLAN ID : 2 4

Which of the following statements are true?

Options:

A.

The VLANs with the IDs of 2 and 4 are added to the VLAN pool.

B.

The total number of VLAN pools is 2.

C.

The name of the VLAN pool is STA.

D.

The VLAN pool uses the even VLAN assignment algorithm.

Question 59

As a next-generation wireless technology, Wi-Fi 6 greatly improves bandwidth rate and performance. Which of the following statements is false about the features of Wi-Fi 6?

Options:

A.

Uses OFDMA technology to achieve high concurrency.

B.

Realizes zero latency, ensuring efficient service running.

C.

Provides high bandwidth, up to 9.6 Gbps.

D.

Uses TWT technology to reduce terminal power consumption.

Question 60

IP multicast effectively conserves network bandwidth and reduces network load. Therefore, it is widely used in network services, such as IPTV, real-time data transmission, and multimedia conferencing.

Options:

A.

TRUE

B.

FALSE

Question 61

A session is an entry used to record the connection status of a protocol and is fundamental for the firewall to forward packets. Which of the following protocol packets will the firewall create sessions for?

Options:

A.

Subsequent fragment

B.

ICMP error packet

C.

GRE

D.

TCP

Question 62

Which of the following statements regarding the MED value in BGP are true?

Options:

A.

According to BGP route selection rules, the MED value has a lower priority than AS_Path, Preferred-Value, Local-Preference, and Origin.

B.

The default MED value of BGP routes is 0.

C.

By default, BGP can compare the MED values of routes from different ASs.

D.

By default, if there is no MED value in routes, the value 0 is used. If the bestroute med-none-as-maximum command is configured, the maximum MED value 4294967295 is used.

Question 63

Compared with STP, RSTP defines the different port states. Which of the following statements regarding discarding and learning states are true?

Options:

A.

The port In discarding or learning state does not forward data frames.

B.

The port in discarding state does not learn MAC addresses table.

C.

The port in discarding or learning state does not learn MAC addresses

D.

The port In learning stole docs not learn MAC addresses table.

Question 64

The native AC function allows an agile switch to integrate AC capabilities, achieving wired and wireless convergence. The agile switch centrally manages wired and wireless service traffic.

Options:

A.

TRUE

B.

FALSE

Question 65

When configuring an ACL on a router, you can specify a unique number or name to identify the ACL. Once a named ACL is created, it cannot be modified. You can only delete the named ACL and reconfigure it.

Options:

A.

TRUE

B.

FALSE

Question 66

A wide area network (WAN) is a remote network that connects local area networks (LANs) or metropolitan area networks (MANs) in different areas for communication purposes. It is typically used to interconnect campus networks or data center networks.

Options:

A.

TRUE

B.

FALSE

Question 67

Which of the following statements regarding BGP route advertisement are false?

Options:

A.

All the BGP routes learned from all BGP peer will be advertised to other BGP peers.

B.

Only the optimal routes preferred by BGP can be advertised to other BGP peers.

C.

By default, the routes learned from an IBGP peer will not be forwarded to other IBGP peers.

D.

Only the routes learned from IGPs can be advertised to other BGP peers.

Question 68

The filter-policy 2000 export command is run in an ISIS process. Which of the following statements about the functions of a filter policy is false?

Options:

A.

Is used together with the route import function to advertise some imported external routes to neighbors.

B.

If this command is not run, the device by default advertises all routes that ISIS Imports form external routing protocols.

C.

Controls the advertisement of routes generated by the device.

D.

Filters LSPs to be advertised.

Question 69

Which of the following statements are true about the packet filtering firewall?

Options:

A.

The packet filtering firewall can analyze associated packets to improve security.

B.

The packet filtering firewall supports per-packet detection.

C.

The packet filtering firewall can check application-layer data.

D.

The packet filtering firewall filters data packets based on ACLs.

Question 70

Which of the following PIM protocol packets have unicast destination addresses.

Options:

A.

Register Stop

B.

Bootstrap

C.

Graft

D.

Assert

Question 71

BFD provides fast fault detection independent of media and routing protocols. To use this mechanism to detect link connectivity, devices at both ends must support this feature.

Options:

A.

TRUE

B.

FALSE

Question 72

On the network shown in the following figure, the management VLAN is VLAN 10, and the AP is configured to obtain an IP address on the network segment 10.1.1.0/24 through DHCP. The AP, AC, and AR function as the DHCP client, DHCP relay agent, and DHCP server, respectively. Which of the following configurations for the DHCP relay agent and DHCP server are correct?

as

Options:

A.

[AC] dhcp server group AP

[AC-dhcp-server-group-AP] dhcp-server 172.21.1.2

[AC-dhcp-server-group-AP] quit

[AC] interface Vlanif 10

[AC-Vlanif 10] dhcp select relay

[AC-Vlanif 10] dhcp relay server-select AP

[AC-Vlanif 10] quit

B.

[AR] ip pool AP

[AR-ip-pool-AP] network 10.1.1.0 mask 24

[AR-ip-pool-AP] gateway-list 10.1.1.2

[AR-ip-pool-AP] excluded-ip-address 10.1.1.1

[AR-ip-pool-AP] quit

[AR] interface GigabitEthernet 0/0/1

[AR-GigabitEthernetO/O/1] dhcp select global

[AR-GigabitEthernet0/0/l] quit

[AR] ip route-static 10.1.1.0 255.255.255.0 172.21.1.1

C.

[AR] ip pool AP

[AR-ip-pool-AP] network 172.21.1.0 mask 24

[AR-ip-pool-AP] gateway-list 172.21.1.2

[AR-ip-pool-AP] excluded-ip-address 172.21.1.1

[AR-ip-pool-AP] quit

[AR] interface GigabitEthernet 0/0/1

[AR-GigabitEthernetO/0/1] dhcp select global

[AR-GigabitEthernetO/0/1] quit

[AR] ip route-static 10.1.1.0 255.255.255.0 172.21.1.1

D.

[AC] dhcp server group AP

[AC-dhcp-server-group-AP] dhcp-server 10.1.1.2

[AC-dhcp-server-group-AP] quit

[AC] interface Vlanif 10

[AC-Vlanif 10] dhcp select relay

[AC-Vlanif 10] dhcp relay server-select AP

[AC-VlaniflO] quit

Question 73

The BFD Echo function checks the connectivity of the forwarding link by looping back packets. Which of the following statements are true about this function?

Options:

A.

If URPF is enabled on the peer end, BFD packets may be incorrectly discarded on the peer end.

B.

In the BFD Echo function, the device uses the IP address of the outbound interface as the source IP address by default.

C.

The BFD Echo function applies only to single-hop BFD sessions.

D.

When configuring a BFD session supporting the BFD echo function, you need to configure both the local and remote discriminators.

Question 74

A Huawei firewall by default creates security zones named untrust, dmz, _________ and local. (Use Lowercase letters.)

Options:

Question 75

See the command output of a router below. Which of the following statements is true?

display ospf interface GigabitEthernet 0/0/0 verbose

OSPF Process 1 with Router ID 10.0.2.2

Interface: 10.0.12.2 (GigabitEthernet 0/0/0)

Cost: 1 State: BDR Type: Broadcast MTU: 1500

Priority: 1

Designated Router: 10.0.12.1

Backup Designated Router: 10.0.12.2

Timers: Hello 10 , Dead 40 , Poll 120 , Retransmit 5 , Transmit Delay 1

Options:

A.

The router ID is 10.0.12.2.

B.

The interface cost is 1500.

C.

This router is a BDR.

D.

The interface IP address is 10.1.12.1.

Question 76

During the DHCP interaction process, the DHCP server and client exchange various types of packets. Which of the following packets is not sent from the client to the server?

Options:

A.

DHCP Release

B.

DHCPNAK

C.

DHCP Request

D.

DHCP Discover

Question 77

On an IS-IS network, areas are divided by router, and a router can belong to only one area. Therefore, an IS-IS router only needs to maintain the LSDB of its area.

Options:

A.

TRUE

B.

FALSE

Question 78

When an SSH client accesses an SSH server for the first time and the SSH server's public key is not configured on the SSH client, you can enable first-time authentication on the SSH client. This allows the SSH client to access the SSH server and saves the SSH server's public key on the SSH client. In this way, the next time the SSH client accesses the SSH server, the SSH client can use the saved public key to authenticate the SSH server.

Options:

A.

TRUE

B.

FALSE

Question 79

Which of the following statements regarding Local-Preference in BGP is true?

Options:

A.

Local-Preference affects traffic that enters an AS.

B.

Local-Preference can be transmitted between ASs.

C.

The default Local-Preference value is 100.

D.

Local-Preference is a well-known mandatory attribute.

Page: 1 / 26
Total 264 questions