Labour Day Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Huawei H12-222 Huawei Certified Network Professional-R&S-IENP Exam Practice Test

Demo: 43 questions
Total 287 questions

Huawei Certified Network Professional-R&S-IENP Questions and Answers

Question 1

How many service types are classified based on the IP precedence, MPLS EXP priority, or 802.1p priority?

Options:

A.

2

B.

4

C.

6

D.

8

Question 2

Which of the following statements regarding different types of firewalls is false?

Options:

A.

The packet filtering firewall checks each data packet against ACL rules.

B.

The stateful inspection firewall uses security policies to check only the first packet of non-matched sessions.

C.

The security policies in two directions need to be configured on the stateful inspection firewall.

D.

The proxy firewall processes services of users on internal and external networks.

Question 3

MPLS VPN is used to solve some limitations of traditional VPN technology. Which are the major limitation that MPLS VPN solves?

Options:

A.

Private routes cannot communicate with each other.

B.

Leased lines are expensive.

C.

Bandwidth resources cannot be fully used.

D.

The address space is overlapping.

Question 4

Besides resource discovery, allocation, and management, which function else does the VIM management module of NFV provide?

Options:

A.

Resource scheduling

B.

Resource monitoring

C.

Resource reclaiming

D.

Troubleshooting

Question 5

On the MPLS network shown in the following figure, which of the following statements are true? (Multiple Choice)

Options:

A.

The switch uses the directly-connected interface to set up a TCP connection.

B.

The switch's peer LDP ID is an interface IP address of the peer device.

C.

The switch's peer LDP ID is the MPLS LSR ID of the peer device.

D.

The switch uses the LSR ID to set up a TCP connection.

Question 6

Which QoS indicator are affected by network congestion? (Multiple Choice)

Options:

A.

Transmission delay

B.

Transmission jitter

C.

Transmission bandwidth

D.

Transmission distance

Question 7

Which of the following statements regarding Huawei eSight network management software is false?

Options:

A.

eSight is a lightweight system and a wizard is available for eSight installation.

B.

eSight adopts the C/S architecture, so users can access eSight using a browser anytime, anywhere.

C.

eSight provides corresponding solutions for different customers.

D.

eSight can uniformly manage devices from multiple vendors.

Question 8

LSRs use various label distribution control modes to set up LSPs. Which of the following statements is false?

Options:

A.

There are two label distribution control modes: independent and ordered.

B.

If the label advertisement mode is DU and the label distribution control mode is Independent, an LSR distributes labels without waiting for labels from the downstream device.

C.

If the label advertisement mode is DoD and the label distribution control mode is Independent, the transit device distributes labels only after receiving a label mapping message from the egress device.

D.

If the label advertisement mode is DU and the label distribution control mode is Ordered, the transit LSR distributes labels to the ingress device only after receiving a label mapping message from the egress device.

Question 9

LDP has two different mechanisms for discovering peers. Which of the following statements are true?

(Multiple Choice)

Options:

A.

The two mechanisms are basic discovery mechanism and extended discovery mechanism.

B.

The basic discovery mechanism periodically sends Hello messages to discover LDP peers.

C.

The basic discovery mechanism is used to discover directly-connected LSR peers on a link.

D.

The extended discovery mechanism periodically sends Hello messages to specified addresses to discover LDP peers.

E.

The extended discovery mechanism is used to discover indirectly-connected LSR peers on a link.

Question 10

If the DHCP client IP address is not extended after 87.5% of the lease is reached, which packet is used by the client to extend the IP address lease?

Options:

A.

DHCP Discover broadcast packet

B.

DHCP Release unicast packet

C.

DHCP Request broadcast packet

D.

DHCP Request unicast packet

Question 11

MPLS performs different actions on labels. What is the meaning of the pop action?

Options:

A.

The top label is removed from the MPLS label stack.

B.

The top label is added to the MPLS label stack.

C.

The top label is replaced with another value.

D.

The top label is replaced with the label of another group.

Question 12

Which of the following is not overlay VPN technology?

Options:

A.

GRE

B.

IPSec VPN

C.

SSL VPN

D.

L2TPVPN

Question 13

When the IP address of an interface on a firewall is pinged/ ping packets are processed by the internal module of the firewall but are not forwarded,

Options:

A.

TRUE

B.

FALSE

Question 14

To avoid global TCP synchronization, which congestion avoidance mechanisms can be used? (Multiple Choice)

Options:

A.

RED

B.

WRED

C.

Tail drop

D.

WFQ

Question 15

Which statement regarding the following configuration is false?

Configure GigabitEthernet 0/0/1 as a trusted interface.

Options:

A.

If the DHCP request packet received by GigabitEthernet 0/0/1 does not contain the SubOptionl information of Option 82, the B. device generates Option 82 and inserts it into the packet.

B.

Enable DHCP snooping to defend against bogus DHCP server attacks.

C.

Enable DHCP snooping to defend against bogus ARP spoofing attacks.

Question 16

When BFD is not used, the OSPF neighbor relationship that is established through the Ethernet link is terminated after 40s upon a link fault.

Options:

A.

TRUE

B.

FALSE

Question 17

The QoS service model includes? (Multiple Choice)

Options:

A.

BE service model

B.

IntServ model

C.

DiffServ model

D.

FIFO model

Question 18

The session-based stateful detection firewall processes the first packet and subsequent packets in different manners. Which of the following statements are true? (Multiple Choice)

Options:

A.

When a packet reaches the firewall the firewall searches for a session table. If the packet does not match any entry, the firewall uses the process of the first packet.

B.

When a packet reaches the firewall, the firewall searches for a session table. If the packet matches an entry, the firewall uses the process of subsequent packets.

C.

When status detection is enabled, the firewall establishes sessions for only SYN packets during TCP packet processing.

D.

When status detection is enabled, the firewall checks subsequent packets against security policies.

Question 19

When hosts and servers in the same zone communicate with each other, NAT is not required.

Options:

A.

TRUE

B.

FALSE

Question 20

Which zones are provided by the Huawei firewall by default? (Multiple Choice)

Options:

A.

Local zone

B.

Trusted zone

C.

Untrusted zone

D.

Security zone

Question 21

What are the mainly methods of data collection? (Multiple Choice)

Options:

A.

Collection by physical optical splitter

B.

Collection through port mirroring

C.

Centralized collection by NMS

D.

Automatic collection

Question 22

VPN models are classified into two types: overlay VPN and peer-to-peer VPN.

Options:

A.

TRUE

B.

FALSE

Question 23

IP packets are marked with the ToS field for QoS, and the first 6 bits of the ToS field mark the DSCP priority.

Options:

A.

TRUE

B.

FALSE

Question 24

Assume that the bandwidths of flows a, b, c, and d are all 100 Mbit/s. The total interface bandwidth is 200 Mbit/s. When network congestion occurs, congestion management is required. If flows a, b, c, and d belong to WFQ queues and the weight ratio is 1:2:3:4, what are traffic volumes of the four flows?

Options:

A.

The bandwidths of flows a, b, c, and d are 20 Mbit/s, 40 Mbit/s, 60 Mbit/s, and 80 Mbit/s.

B.

The bandwidths of flows a, b, c, and d are 100 Mbit/s, 100 Mbit/s, 0 Mbit/s, and 0 Mbit/s.

C.

The bandwidths of flows a, b, c, and d are 80 Mbit/s, 60 Mbit/s, 40 Mbit/s, and 20 Mbit/s.

D.

All traffic is discarded due to congestion.

Question 25

When BFD detection intervals at both ends are 30ms and 40ms. Which of the following statement is true?

Options:

A.

A BFD session can be set up. After the negotiation, the detection interval of 40ms is used.

B.

A BFD session can be set up. After the negotiation, the detection interval of 30ms is used.

C.

A BFD session can be set up, and packets are sent at respective intervals at both ends.

D.

A BFD session cannot be established.

Question 26

Which of the following statements regarding ASPF and Servermap are true? (Multiple Choice)

Options:

A.

ASPF checks application layer protocol information and monitors the application layer protocol status of connections.

B.

ASPF determines whether data packets can pass the firewall through the dynamically generated ACL.

C.

During configuration of the NAT server, static Servermap entries are generated.

D.

The Servermap table uses the 5-tuple to represent one session.

Question 27

Which are lower-layer physical devices of NFV framework? (Multiple Choice)

Options:

A.

Storage device

B.

Network device

C.

Server

D.

Air conditioning system

Question 28

Which of the following statements regarding the DSCP priority is false?

Options:

A.

The first 6 bits of the ToS field (leftmost 6 bits) mark different types of services, namely, DSCP priority.

B.

The DSCP priority can be used to classify traffic into 32 types.

C.

Each DSCP priority corresponds to a Behavior Aggregate (BA), and a PHB can be specified for each BA.

D.

You can use some QoS mechanisms to implement PHB.

Question 29

Which queue technology is used to implement the Best-Effort Service model?

Options:

A.

FIFO

B.

WFQ

C.

PQ

D.

LQ

Question 30

Which of the following statements regarding Free Mobility of the Agile Controller are true? (Multiple Choice)

Options:

A.

When administrators configure Free Mobility, they need to select proper authentication points and policy execution points.

B.

In the Free Mobility, Administrators can add static network segments or server resources to security groups, and manually bind their IP addresses to the security groups.

C.

Free Mobility uses a configuration matrix to define access permissions between two security groups such as users and servers.

D.

Free Mobility defines higher forwarding priorities for the VIP user group to ensure their network experience.

Question 31

For the IntServ model, an application needs to apply for reserved resources before sending packets.

Options:

A.

TRUE

B.

FALSE

Question 32

If two devices are connected, one device supports BFD, and the other devices do not support BFD, which BFD function can be used by the BFD-capable device to detect link connectivity?

Options:

A.

Fast handshake

B.

Interface association

C.

BFD Echo

D.

Bidirectional detection

Question 33

Which of the following statements regarding MPLS label encapsulation format are true? (Multiple Choice)

Options:

A.

The total length of an MPLS label is 4 bytes (32 bits).

B.

The TTL field in an MPLS label has the same meaning as that in an IP packet, and can prevent loops.

C.

The S field in an MPLS label has 1 bit and is used to identify whether the label is the bottom-of-stack label. If the value is 1, the label is a penultimate-layer label.

D.

For Ethernet and PPP packets, a label stack is located between the Layer 2 packet header and data. If a VLAN tag is available, the label stack is placed before the VLAN tag.

Question 34

If the DSCP priority (leftmost 6 bits of the ToS field) is used, how many types of packets can be classified?

Options:

A.

8

B.

16

C.

32

D.

64

Question 35

NAT technology can only translate network layer information (IP address) in data packets.

Options:

A.

TRUE

B.

FALSE

Question 36

Which of the following are label distribution control modes in the MPLS system? (Multiple Choice)

Options:

A.

Liberal

B.

Independent

C.

Conservative

D.

Ordered

Question 37

Which of the following items is not the disadvantage of the traditional congestion avoidance mechanism (tail drop)?

Options:

A.

Global TCP synchronization

B.

High jitter and long delay

C.

High cost

D.

Packets are discarded without differentiating the priority

Question 38

What are the common queue scheduling technologies? (Multiple Choice)

Options:

A.

FIFO

B.

LR

C.

WRR

D.

CIR

E.

CQ

F.

WFQ

Question 39

Which of the following statements regarding the delay and jitter is true?

Options:

A.

The jitter is relevant to the delay.

B.

The jitter occurs because the E2E delays of data packets in the different flow are different.

C.

A long delay indicates a short jitter and a short delay indicates a large jitter.

D.

Jitter is independent of delay.

Question 40

Which command is used to configure the VRRP preemption delay?

Options:

A.

vrrp vrid 1 preempt-timer 20

B.

vrrp vrid 1 preempt-mode timer delay 20

C.

vrrp vrid 1 timer delay 20

D.

vrrp vrid 1 preempt-delay 20

Question 41

Which of the following queue scheduling technologies is better in a fair manner?

Options:

A.

WFQ

B.

PQ

C.

FIFO

D.

RR

Question 42

Which of the following statements regarding MPLS label space is false?

Options:

A.

The label space 16-1023 is shared by static LSPs and static CR-LSPs.

B.

The label space 1024 and higher is shared by dynamic signaling protocols, such as LDP, RSVP-TE, and MP-BGP.

C.

When the last hop receives packets with the label control 0, it directly performs IP forwarding or forwards the packets based on the next-layer label.

D.

When the penultimate-hop LSR performs label switching, if it finds that the label value after the switching is 3, then it pops out the label and sends the packet to the last hop.

Question 43

In the DiffServ domain, the core router typically only performs simple traffic classification.

Options:

A.

TRUE

B.

FALSE

Demo: 43 questions
Total 287 questions