HCIE-Datacom V1.0 Questions and Answers
Which of the following statements aboutSR-MPLS Policy candidate pathsare correct?
Which of the following statements about DHCP snooping isincorrect?
A network administrator runs the display telemetry subscription command on a device to check telemetry subscription information. The command output is as follows. Which of the following statements is incorrect?
[~CE] display telemetry subscription
Sub name : Sub1
Sensor group:
Sensor-name Sample-interval(ms) State
Sensor1 1000 RESOLVED
Destination group:
Dest-name Dest-IP Dest-port State Vpn-name Protocol
Dest1 192.168.56.1 20030 RESOLVED - GRPC
Sub state : PASSIVE
Total subscription number is : 1
In the following figure, all routers are running OSPF. Given this, which of the following statements is correct?
In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following command needs to be run on the VBDIF interface to enable the VTEP peer to generate BGP EVPN Type 2 routes based on ARP information of the local terminal?
Which of the following statements is incorrect about intranet security design for a large or medium-sized virtualized campus network?
A network administrator runs the display telemetry destination command on a device to check information about a destination group that sampled data is sent to. The command output is as follows. Which of the following statements is incorrect?
[~CE-telemetry-sensor-group-Sensor1]display telemetry destination
Dest-name Dest-addr Dest-port State Vpn-name Protocol
Dest1 192.168.56.1 20000 RESOLVED - GRPC
Node segments in SR-MPLS must be manually configured.
Which of the following link types may appear in OSPF Router-LSAs?
OSPFv2 is an IGP running on IPv4 networks, whereas OSPFv3 is an IGP running on IPv6 networks. OSPFv2 and OSPFv3 have similar LSA types, but their LSA functions are slightly different. Which of the following is not an OSPFv3 LSA type?
Based on the configuration in the following figure, how many interfaces on R4 are advertised into IS-IS?
plaintext
CopyEdit
Interface information for ISIS(1)
Interface Id IPV4.State IPV6.State MTU Type DIS
GE0/0/0 001 Up Down 1497 L1/L2 No/No
GE0/0/1 002 Up Down 1497 L1/L2 No/No
Loop0 001 Up Down 1500 L1/L2 -
Which of the following statements isincorrectaboutintranet security designfor a large or medium-sizedvirtualized campus network?
Which of the following statements about configuring user access authentication is incorrect?
In a scenario where aVXLAN tunnelis dynamically established throughBGP EVPN, which of the following statements about the functions ofBGP EVPN Type 3 routesis incorrect?
In BGP4+, what is the content of the next hop network address field carried in the MP_REACH_NLRI attribute of an Update packet?
Which of the following are carried in an HTTP/1.1 response?
MPLS supports both static and dynamic LSP establishment. Which of the following protocols cannot dynamically establish LSPs in MPLS TE scenarios? (Select all that apply)
Which of the following statements about the SP scheduling algorithm isincorrect?
Which of the following parameters is not included in an IPsec security association (SA)?
As shown in the following figure, an engineer tests network interconnection between two branches. To implement network interconnection,OSPFis deployed onR1, R2, and R3of branch 1, andIS-ISis deployed onR2, R3, and R4of branch 2. Which of the following operations needs to be performed to allowR1 to access R4's loopback interface address?
Refer to the configuration in the figure. Which queue on R2 do packets of PC1 enter by default?
On the network shown in the following figure, a remote LDP session needs to be established between SWA and SWC. Which of the following statements is correct?
[SWA] mpls lsr-id 1.1.1.1
[SWA] mpls
[SWA-mpls] mpls ldp
[SWC] mpls lsr-id 33.3.3.3
[SWC] mpls
[SWC-mpls] mpls ldp
SWA ---- SWB ---- SWC
<------ Remote LDP Session ------>
Which of the following statements is incorrect about MP-BGP?
In the firewall hot standby scenario, when VGMP works in load balancing mode, which of the following functions must be enabled on the firewalls to prevent the return traffic from being discarded because it does not match any session entry in the case of inconsistent forward and return paths?
On acampus network,iMaster NCE-Campusis used to deploy twoVNs (Virtual Networks):R&D VNandMarketing VN. Users in these two VNs belong to twoseparate security groups.
The campus network requiresR&D personnel and sales personnel to communicate with each other. To meet this requirement, which of the following tasks does a network administrator need to perform?
The figure shows an L3VPN over an SRv6 BE (Best Effort) network. According to the information displayed on PE2, which of the following statements is incorrect?
On a CloudCampus virtualized campus network, virtual networks are defined based on services. Each virtual network corresponds to a service, and isolation needs to be manually configured between virtual networks.
Huawei Open Programmability System (OPS) uses HTTP methods to access managed objects to manage network devices. HTTP is the most widely used network transmission protocol on the Internet. By default, which TCP port number is used?
OSPF is a mature protocol and is unlikely to have route computation errors in a regular networking environment under correct configurations. Which of the following statements are correct about the possible causes preventing an OSPF neighbor relationship from entering Full state?
Portal authentication is recommended for scenarios with high mobility and numerous terminal types, such as shopping malls and supermarkets. MAC address authentication is recommended for dumb terminals that do not support Portal authentication, such as printers, fax machines, and IP phones.
TheNETCONF content layercontainsdevice configuration data.
Which of the following statements are correct about the followingNETCONF configuration?
During WLAN planning and design, channels 1, 6, and 11 are recommended on the 2.4 GHz frequency band, and channels 1, 5, 9, and 13 are recommended in high-density scenarios. On the 5 GHz frequency band, it is recommended thathigh-frequency and low-frequency channels of adjacent APs be staggered to prevent overlapping.
In an MPLS VPN network, two-layer MPLS labels are added into data packets before they are transmitted over the public network. Which of the following statements regarding data packet processing are correct?
An enterprise has three types of services. Voice and video services are key services and need to be guaranteed, and FTP services are non-key services. Which of the following scheduling modes is optimal for satisfying the service requirements?
Which of the following statements does not cause the flapping of a VRRP group?
Which of the following languages is integrated into the OPS?
Which of the following statements about GRE is incorrect?
IS-IS supports multi-instance and multi-process. Which of the following statements are correct about IS-IS multi-instance and multi-process?
The free mobility function is deployed on the iMaster NCE-Campus on a campus network. Which of the following information should an administrator pay attention to?
An LSR (Label Switching Router) supports various label retention modes. Which of the following statements regarding the liberal mode are correct?
MPLS supports Forwarding Equivalence Class (FEC). Which of the following cannot be used as a FEC allocation standard?
In a VXLAN scenario, which of the following features can be enabled to reduce ARP packet flooding between VTEPs?
On traditional campus networks, network admission control (NAC), VLAN, and ACL technologies are used to control users' network access rights. This results in heavy network O&M workload. Which of the following improvements does the free mobility solution of iMaster NCE-Campus make to traditional campus networks in terms of policy management and control?
Which MPLS label will be used by PE2 for forwarding traffic to 10.0.1.1 based on the following SR-MPLS database?
Given Data (LSDB Information):
Prefix-SID:100
SRGB Base:40000
Network Admission Control (NAC) needs to be deployed on the network shown in the figure. Drag a proper authentication mode to each authentication point.
The channelized sub-interface and FlexE technologies both can be used to implement network slicing, but the application scenarios of the two technologies are slightly different. Which of the following statements about the two technologies are correct?
Drag the authentication modes on the left into their applicable scenarios on the right.
On the campus network shown, IPv6 is deployed for service tests. Four routers are deployed on the network, and OSPFv3 is used for IPv6 network connectivity. An engineer checks the LSDB of R2 and obtains a Link-LSA. Which of the following statements about the LSA are correct?
The command can be run to completely isolate Layer 2 and Layer 3 of different interfaces in a VLAN. (Use lowercase letters to supplement the command, which cannot be abbreviated.)
Which of the following intelligent traffic steering policies can be used to fully utilize link bandwidth and implement link bandwidth-based load balancing on an enterprise network with multiple links?
The Ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is _____ IRB forwarding. (Capitalize the first letter.)
To prevent hackers from attacking user devices or networks using MAC addresses, you can configure MAC addresses of untrusted users as blackhole MAC addresses to filter out such invalid MAC addresses. When receiving a packet whose source or destination MAC address is a blackhole MAC address on a device, the device discards the packet.
For telemetry data push, data can be transferred between devices and collectors using the TLS protocol. TLS must be configured for data encryption if data is pushed based on gRPC.
InSRv6, each time a packet passes through anSRv6 endpoint node, theSegments Leftfield valuedecrements by 1, and theIPv6 DA changes.
Which of the following channels are involved in the Huawei SD-WAN Solution?
/ifm/interfaces/interface in Huawei Open Programmability System (OPS) is the URL used to identify a device's managed object.
Whenstatic IPsec VPNis used for WAN interconnection in theHuawei CloudCampus Solution, theAP, Router, and ____can be used as egress devices.
Which of the following is the mapping between VNIs and BDs in VXLAN implementation?
AH is an IP-based transport-layer protocol. The protocol number is _____. (Enter only digits.)
Which of the following statements about SR-MPLS characteristics are correct? (Select all that apply)
Which of the following are carried in the HTTP/1.1 response header?
What can be determined from the following figure?
Total Number of Routes: 2
*>i Network : 3002::3
NextHop : 3000:FDEA::3
MED : 0
Path/Orgn : i
*>i Network : 3002::4
NextHop : 3000:FDEA::3
MED : 0
PrefixLen : 128
LocPrf : 100
PrefVal : 0
Path/Orgn : 65001 i
Network administrator A wants to view the BGP peer status of R2. The BGP peer status of R2 is shown in this figure. Obtain the following information: R2 resides in AS _____ (Enter only digits. Do not add punctuations or spaces.)
As shown in the figure, R1, R2, R3, and R4 reside in the same MPLS domain, and LDP (Label Distribution Protocol) is used to distribute MPLS labels.
R4 is the egress LSR (Label Switching Router) for the FEC (Forwarding Equivalence Class) 4.4.4.0/24.
To make R4 aware of QoS forwarding priority of a packet sent from R1 and destined for 4.4.4.0/24,
Without looking up R4’s label forwarding information base,
The outgoing label of the FEC on R3 should be _____ (Enter an Arabic numeral without symbols).
The naming of SRv6 instructions complies with certain rules. You can quickly determine the function of an instruction based on the instruction name. Which of the following statements about the keywords in SRv6 instruction names are correct?
When a client invokes the iMaster NCE-Campus RESTful API, it sends an HTTP request. The server then returns the status code 401. Which of the following errors has occurred?
An engineer often remotely logs in to the device to check the device status. The engineer can use the Python Paramiko and telnetlib libraries to implement automatic remote login through Python scripts. The remote login implemented using telnetlib is more secure.
During the implementation of iMaster NCE-Campus Wi-Fi location-based services (LBS), terminal location data is sent to an LBS platform through HTTP requests. Which of the following data formats is used in such HTTP requests?
In Huawei's NAC solution, which of the following cannot be used for Portal authentication?
Drag the OSPFv3 LSAs to map them to their corresponding transmission ranges.
In a scenario whereSR Policiesare dynamically established through thecontroller, which of the following statements about theSR Policy solution architectureis incorrect?
In 6PE and 6VPE networking, no VPN instance needs to be created on PEs.
Which of the following statements is incorrect about the user authentication points on the network?
On a broadcast network, if the DR priorities of two interfaces connecting two routers are set to 0, in which of the following states will the OSPF neighbor relationship stay?
A network administrator needs to retrieve atoken IDfromiMaster NCEusing the following Python code:
import requests
nbi_name = "demol3@north.com"
nbi_pwd = "qqcOVcVel@"
host = "139.9.213.72"
port = "18002"
URI = "/controller/v2/tokens"
post_token_url = " " + host + ":" + port + URI
headers_post = {'Content-Type': 'application/json', 'Accept': 'application/json'}
r = requests.post(post_token_url, headers=headers_post, json={"userName": nbi_name, "password": nbi_pwd}, verify=incorrect)
Which of the following statements is incorrect?
The Huawei SD-WAN solution has three types of channels. Drag the channel names to their corresponding callouts.
As shown in the figure, SW1 and SW2 use asymmetric IRB (Integrated Routing and Bridging) forwarding, and PC1 and PC2 communicate with each other. Which of the following is the destination MAC address of the original data frame in the packet sent from VTEP1 to VTEP2?
Which of the following statements is incorrect about a BGP/MPLS IP VPN?
Congestion management technology can be used to discard data packets in the buffer queue to prevent the buffer queue from being exhausted.
On the campus network shown, IPv6 is deployed for service tests. Four routers are deployed on the network, and these routers use OSPFv3 for network connectivity. Which of the following statements about LSAs generated by the OSPFv3 network is incorrect?
On a router,SRv6is enabled, and the configurations shown below are performed. Which of the following statements about the configurations are correct?
[Router-segment-routing-ipv6] locator srv6_locator1 ipv6-prefix 2001:DB8:ABCD::/64 static 32
In OSPFv3, which of the following LSAs can be flooded within an area?
Which of the following statements are correct about the authentication protocols used inPortal authentication?
The Ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is ______ IRB forwarding. (Capitalize the first letter.)
During telemetry static subscription, the NMS delivers subscription configuration to devices for data sampling. Which of the following statements is incorrect about the sampling path huawei-debug:debug/cpu-infos/cpu-info?
During the configuration of L3VPNv4 over SRv6 BE, if an RR is deployed in the SR domain, which command must be run on the RR to ensure that the PEs at both ends can correctly learn VPNv4 routes?
Which of the following statements about VXLAN principles is incorrect?
Free mobility implements policy management and permission control based on users' VLAN IDs and IP addresses.
Telemetry is a technology that remotely collects data from physical or virtual devices at high speed, and has a layered protocol stack. Which of the following layers isnotincluded in the telemetry protocol stack?
On an SR-MPLS network, manually configured prefix SIDs on different devices may conflict with each other. Assume that there are four routes (prefix/mask SID) as follows.Which of the following routes will be selected according to the conflict handling principle?
MPLS supports forwarding equivalence class (FEC). Which of the following cannot be used as an FEC allocation standard?
The ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is _____ IRB forwarding. (Capitalize the first letter.)
In the SD-WAN Solution, which routing protocols can be used by LAN-side devices to connect to a Layer 3 network?
Which of the following statements are correct about authentication points and policy enforcement points in Huawei's free mobility solution?
When designing IGP routes for an enterprise bearer WAN, ensure that the metric of aggregation-layer links is smaller than that of access-layer links, so that data can be preferentially forwarded over aggregation-layer links.
On a campus network, which of the following problems may occur when you manually create a static VXLAN tunnel?