Pre-Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Huawei H12-891_V1.0 HCIE-Datacom V1.0 Exam Practice Test

Demo: 65 questions
Total 322 questions

HCIE-Datacom V1.0 Questions and Answers

Question 1

When a client invokes the iMaster NCE-Campus RESTful API, it sends an HTTP request. The server then returns the status code 401. Which of the following errors has occurred?

Options:

A.

Unauthorized

B.

The requested resource does not exist

C.

Access denied

D.

The service is unavailable

Question 2

Collecting information before a cutover helps you determine whether services are normal before and after the cutover.

Options:

A.

TRUE

B.

FALSE

Question 3

Drag the authentication modes on the left into their applicable scenarios on the right.

Options:

Question 4

SR-MPLS uses IGP extensions to advertise labels and reserve bandwidth to support high-bandwidth services.

Options:

A.

TRUE

B.

FALSE

Question 5

The command can be run to completely isolate Layer 2 and Layer 3 of different interfaces in a VLAN. (Use lowercase letters to supplement the command, which cannot be abbreviated.)

Options:

Question 6

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following statements about symmetric IRB forwarding are correct?

Options:

A.

Both the ingress VTEP and egress VTEP forward packets based on the Layer 3 forwarding table.

B.

The ingress VTEP forwards packets based only on the Layer 2 forwarding table.

C.

The egress VTEP forwards packets based only on the Layer 2 forwarding table.

D.

When VTEPs forward inter-subnet user communication packets, the VNI carried in the VXLAN header is the L3VNI.

Question 7

HTTP is an application layer protocol for distributed, collaborative, and hypermedia information systems.

Options:

A.

TRUE

B.

FALSE

Question 8

On the network shown in the figure, OSPF-based SR-MPLS TE is enabled on all routers. Which of the following adjacency labels are allocated by P3?

Options:

A.

9006

B.

9002

C.

9003

D.

9005

Question 9

An enterprise has three types of services. Voice and video services are key services and need to be guaranteed, and FTP services are non-key services. Which of the following scheduling modes is optimal for satisfying the service requirements?

Options:

A.

WFQ scheduling is configured for IP voice, video, and FTP download services.

B.

PQ scheduling is configured for IP voice and video services, and WFQ scheduling is configured for FTP download services.

C.

LPQ scheduling is configured for IP voice services, PQ scheduling is configured for video services, and WFQ scheduling is configured for FTP download services.

D.

PQ scheduling is configured for IP voice, video, and FTP download services.

Question 10

Which of the following statements is incorrect about a BGP/MPLS IP VPN?

Options:

A.

In most cases, CEs are unaware of VPNs and do not need to support MPLS or MP-BGP.

B.

A BGP/MPLS IP VPN consists of customer edges (CEs), provider edges (PEs), and providers (Ps). PEs and Ps are carrier devices, whereas CEs are BGP/MPLS IP VPN customer devices.

C.

Inter-site communication can be implemented through VPN. A site can only belong to only one VPN.

D.

Ps only need to provide basic MPLS forwarding capabilities and do not need to maintain VPN-related information.

Question 11

How long is an IPv6 prefix assigned to a host when an IPv6 address is configured for the host in SLAAC mode?

Options:

A.

64 bits

B.

32 bits

C.

96 bits

D.

128 bits

Question 12

An LSR supports various label retention modes. Which of the following statements regarding the liberal mode are correct?

Options:

A.

This label retention mode saves the memory and label space.

B.

An LSR retains labels from a neighboring LSR only when the neighbor is its next hop.

C.

An LSR reserves all labels distributed by its neighbor.

D.

Liberal mode allows the device to retain labels from all LSRs, not just the next hop.

Question 13

If the number of MAC addresses learned on an interface enabled with port security reaches the upper limit, which of the following actions may the switch take?

Options:

A.

Discards packets with unknown source MAC addresses without generating any alarm.

B.

Sets the interface state to error-down without generating any alarm.

C.

Discards packets with unknown source MAC addresses and generates an alarm.

D.

Sets the interface state to error-down and generates an alarm.

Question 14

IS-IS supports multi-instance and multi-process. Which of the following statements are correct about IS-IS multi-instance and multi-process?

Options:

A.

One IS-IS process can be associated with only one VPN instance.

B.

One VPN instance can be associated with multiple different IS-IS processes.

C.

One IS-IS process can be associated with multiple different VPN instances.

D.

If multiple IS-IS processes are created on an IS-IS router, these processes are independent of each other.

Question 15

With telemetry, certain data can be sampled based on specific sampling paths. Which of the following sampling paths are supported by telemetry?

Options:

A.

Interface statistics

B.

Information about the optical module on an interface

C.

CPU information

D.

Memory information

Question 16

The naming of SRv6 instructions complies with certain rules. You can quickly determine the function of an instruction based on the instruction name. Which of the following statements about the keywords in SRv6 instruction names are correct?

Options:

A.

T: searches a specified routing table to forward packets.

B.

M: searches a Layer 2 forwarding table for unicast forwarding.

C.

V: searches a VPN instance routing table to forward packets.

D.

X: forwards packets through one or a group of specified Layer 3 interfaces.

Question 17

Based on the configuration in the following figure, how many interfaces on R4 are advertised into IS-IS?

plaintext

CopyEdit

< R4 > display isis interface

Interface information for ISIS(1)

Interface Id IPV4.State IPV6.State MTU Type DIS

GE0/0/0 001 Up Down 1497 L1/L2 No/No

GE0/0/1 002 Up Down 1497 L1/L2 No/No

Loop0 001 Up Down 1500 L1/L2 -

Options:

A.

2

B.

1

C.

3

D.

0

Question 18

Huawei Open Programmability System (OPS) uses standard HTTP methods to access managed objects to manage network devices. Which of the following HTTP methods is used to configure the value of a network device ' s managed object?

Options:

A.

PUT

B.

POST

C.

PATCH

D.

GET

Question 19

In the gRPC-based telemetry protocol, the data model layer consists of the RPC layer, telemetry layer, and service data layer. Drag the .proto file to the layer where the file should be located.

Options:

Question 20

NETCONF uses an XML-based encoding format. NETCONF uses text files to represent complex hierarchical data. Which of the following statements are correct about the following XML file?

< ?xml version= " 1.0 " encoding= " UTF-8 " ? >

< note >

< to > Learners < /to >

< from > Huawei < /from >

< heading > Reminder < /heading >

< body > Don ' t forget Reading! < /body >

< /note >

Options:

A.

encoding: indicates the character set encoding format. Currently, only UTF-8 encoding is supported.

B.

/: indicates the end of the current tag.

C.

< ?: indicates the start of an instruction.

D.

? > : indicates the end of an instruction.

Question 21

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following BGP EVPN routes is used to advertise MAC addresses, ARP entries, and IRB routes?

Options:

A.

Type 3

B.

Type 4

C.

Type 2

D.

Type 1

Question 22

During the migration test, which of the following indicates that the test is completed?

Options:

A.

Tested network services are running properly.

B.

Command outputs are correct.

C.

The network is running properly.

D.

Tested upper-layer application services are running properly on the network.

Question 23

Which of the following commands needs to be run in the BGP view to enable a VPN instance to advertise IP routes to the BGP-EVPN address family?

Options:

A.

advertise irbvfi

B.

advertise vpnv4

C.

advertise irb

D.

advertise l2vpn evpn

Question 24

IPsec uses an asymmetric encryption algorithm to encrypt the symmetric algorithm key, which it uses to encrypt/decrypt data, ensuring security and performance.

Options:

A.

TRUE

B.

FALSE

Question 25

NETCONF provides a set of mechanisms for managing network devices. NETCONF operations take place on a configuration datastore of network devices. Which of the following statements is incorrect about the configuration datastore?

Options:

A.

The configuration datastore of network devices can be classified into the candidate, running, and startup configuration datastores.

B.

The < delete-config > operation is oriented at the startup configuration datastore.

C.

The < validate > operation is oriented at the candidate configuration datastore.

D.

The < commit > operation submits the configuration in a startup configuration datastore to a running configuration datastore.

Question 26

O & M personnel for a large-scale event center receive feedback about Wi-Fi access failures. iMaster NCE-CampusInsight provides the function for personnel to view packet exchange processes and locate the root cause. It is found that IP addresses in the DHCP address pool are exhausted, preventing IP addresses from being assigned to mobile terminals. Which of the following functions is used by O & M personnel in this scenario?

Options:

A.

Simulation feedback

B.

Protocol trace

C.

Issue analysis

D.

Client journey

Question 27

MPLS supports Forwarding Equivalence Class (FEC). Which of the following cannot be used as a FEC allocation standard?

Options:

A.

Application protocol

B.

Fragment offset

C.

Class of Service (CoS)

D.

Destination address

Question 28

Huawei CloudCampus Solution has multiple application scenarios, and iMaster NCE-Campus provides different APIs for each application scenario. Match the following application scenarios with the open APIs provided by iMaster NCE-Campus.

Options:

Question 29

An engineer often remotely logs in to the device to check the device status. The engineer can use the Python Paramiko and telnetlib libraries to implement automatic remote login through Python scripts. The remote login implemented using telnetlib is more secure.

Options:

A.

TRUE

B.

FALSE

Question 30

When you configure a virtualized campus network on iMaster NCE-Campus and enable external networks to connect to the Internet, iMaster NCE-Campus will automatically deliver a specific route to direct traffic to the corresponding external network.

Options:

A.

TRUE

B.

FALSE

Question 31

Which of the following is the purpose of configuring IS-IS fragmentation on an IS-IS device?

Options:

A.

Disable the device from establishing IS-IS neighbor relationships.

B.

Enable the device to support more IS-IS routes.

C.

There is no practical purpose.

D.

Disable the device from learning IS-IS link-state information.

Question 32

Which of the following statements regarding RT are correct?

Options:

A.

Each VPN instance is associated with one or more pairs of VPN Target attributes, used to control VPN routing information advertisement and reception between sites.

B.

Export Target and Import Target are independent of each other and support multiple values to implement flexible VPN routing information advertisement and reception control.

C.

RTs are classified into two types: Export Target and Import Target.

D.

The RT value is advertised to neighbors through the BGP extended community attribute in Update messages.

Question 33

An SRv6 Policy can be either statically configured on a device, or be delivered to a device after being dynamically generated by the controller.

Options:

A.

TRUE

B.

FALSE

Question 34

As shown in the figure, what is known about the default routes on R4?

Routing Table on R4:

< R4 > display ip routing-table protocol isis

Destination/Mask Proto Pre Cost Flags NextHop Interface

0.0.0.0/0 ISIS-L1 15 10 D 10.1.24.1 GigabitEthernet0/0/1

ISIS-L1 15 10 D 10.1.34.1 GigabitEthernet0/0/0

172.16.1.2/32 ISIS-L1 15 10 D 10.1.24.1 GigabitEthernet0/0/1

172.16.1.3/32 ISIS-L1 15 10 D 10.1.34.1 GigabitEthernet0/0/0

Options:

A.

Four equal-cost default routes

B.

One default route

C.

Two default routes with different costs

D.

Two equal-cost default routes

Question 35

MPLS implements data forwarding based on two different planes. Which of the following statements regarding the forwarding mechanism are correct?

Options:

A.

After an IP packet enters an MPLS domain, the MPLS device forwards the packet based on FIB table queries.

B.

If the tunnel ID is 0x0, the MPLS forwarding process starts.

C.

The system automatically assigns an ID to the upper-layer application that uses a tunnel. This ID is also called the tunnel ID.

D.

If the tunnel ID is not 0x0, the normal IP forwarding process starts.

Question 36

Which of the following statements is incorrect about Authentication Header (AH)?

Options:

A.

AH provides packet encryption.

B.

AH provides data origin authentication.

C.

AH provides anti-replay protection.

D.

AH provides data integrity authentication.

Question 37

Which of the following operations is not involved in the middle phase of a migration?

Options:

A.

Migration preparation

B.

On-site monitoring

C.

Migration implementation

D.

Service test

Question 38

When designing IGP routes for an enterprise bearer WAN, ensure that the metric of aggregation-layer links is smaller than that of access-layer links, so that data can be preferentially forwarded over aggregation-layer links.

Options:

A.

TRUE

B.

FALSE

Question 39

On a campus network, which of the following problems may occur when you manually create a static VXLAN tunnel?

Options:

A.

Although the static VXLAN tunnel mode supports the distributed gateway scenario, the configuration involves a heavy workload and is complex to adjust.

B.

Remote MAC addresses can be learned by the VTEP only through data flooding.

C.

A static VXLAN tunnel also uses corresponding protocols on the control plane, which consumes device resources.

D.

If N devices need to establish static VXLAN tunnels, a maximum of N(N -1)/2 tunnels need to be manually configured, which involves a heavy workload.

Question 40

Huawei Open Programmability System (OPS) uses HTTP methods to access managed objects to manage network devices. To facilitate script compilation, Huawei OPS provides the Python script template. In the Python script template, what are the contents of the Content-type and Accept fields in the header of an HTTP request packet?

Options:

A.

text/xml, text/json

B.

text/json, text/json

C.

text/xml, text/xml

D.

text/json, text/xml

Question 41

Telemetry is a technology that remotely collects data from physical or virtual devices at high speed, and has a layered protocol stack. Which of the following layers is not included in the telemetry protocol stack?

Options:

A.

Communication layer

B.

Transport layer

C.

Data encoding layer

D.

Data analysis layer

Question 42

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following command needs to be run on the VBDIF interface to enable the VTEP peer to generate BGP EVPN Type 2 routes based on ARP information of the local terminal?

Options:

A.

mac-address xxxx-xxxx-xxxx

B.

arp-proxy enable

C.

arp collect host enable

D.

arp distribute-gateway enable

Question 43

In the Huawei SD-WAN Solution, which of the following routing protocols is used to advertise VPN routes between CPEs?

Options:

A.

RIP

B.

OSPF

C.

IS-IS

D.

BGP

Question 44

When MPLS/BGP IP VPN is deployed, which of the following statements is incorrect about BGP route exchange between PEs and CEs?

Options:

A.

When PEs and CEs use BGP to exchange routing information, you do not need to import private network routes to BGP on PEs.

B.

In a Hub & Spoke scenario, when Hub-CE and Hub-PE run an IGP for communication, EBGP cannot be configured on Spoke-PE or Spoke-CE.

C.

In a scenario where PEs and CEs use BGP to exchange routing information, if two VPN sites have the same private AS number, the AS number replacement function can be used to replace the AS number in a received private network route with any specified AS number. This prevents routes from being discarded because of repeated AS numbers.

D.

In a CE multi-homing scenario, the BGP AS number replacement function may cause routing loops. BGP SoO can be used to prevent routing loops at a VPN site.

Question 45

MPLS is located between the data link layer and network layer in the TCP/IP protocol stack and can provide services for all network layer protocols.

Options:

A.

TRUE

B.

FALSE

Question 46

Which of the following issues do DiffServ model-based QoS have?

Options:

A.

It involves only single-hop behaviors and does not change the network topology.

B.

Independent resources cannot be provided for users.

C.

It does not change service behaviors. If bursty traffic in a single flow is too heavy, congestion still occurs.

D.

The number of queues is small, and SLA assurance cannot be provided for specific users. As a result, deterministic delay assurance cannot be provided.

Question 47

In the LDP session establishment process, the initiator sends an Initialization message for parameter negotiation. Which message will be sent by the responder if it does not accept negotiation parameters?

Options:

A.

Error Notification Message

B.

Initialization Message

C.

Keepalive Message

D.

Hello Message

Question 48

NETCONF provides a set of mechanisms for managing network devices. What layers can NETCONF be conceptually partitioned into?

Options:

A.

Encrypted transport layer, messages layer, operations layer, and content layer

B.

Encrypted transport layer, messages layer, configuration layer, and content layer

C.

Secure transport layer, messages layer, configuration layer, and content layer

D.

Secure transport layer, messages layer, operations layer, and content layer

Question 49

Which of the following link types may appear in OSPF Router-LSAs?

Options:

A.

TransNet

B.

P-2-P

C.

Vlink

D.

StubNet

Question 50

VLAN-based MAC address flapping detection is configured. If MAC address flapping occurs, actions to be taken on an interface can be configured as required. Which of the following actions cannot be configured?

Options:

A.

Traffic filtering

B.

Alarm sending

C.

MAC address blocking

D.

Interface blocking

Question 51

Which of the following is the mapping between VNIs and BDs in VXLAN implementation?

Options:

A.

N:M

B.

1:1

C.

N:1

D.

1:N

Question 52

Which of the following items are included in static information collection and analysis?

Options:

A.

Device types

B.

Interface types

C.

License

D.

Packet loss rate

Question 53

Complete the basic processing procedure for DiffServ model-based QoS shown in the figure

Options:

Question 54

During WLAN planning and design, channels 1, 6, and 11 are recommended on the 2.4 GHz frequency band, and channels 1, 5, 9, and 13 are recommended in high-density scenarios. On the 5 GHz frequency band, it is recommended that high-frequency and low-frequency channels of adjacent APs be staggered to prevent overlapping.

Options:

A.

TRUE

B.

FALSE

Question 55

On a CloudCampus virtualized campus network, virtual networks are defined based on services. Each virtual network corresponds to a service, and isolation needs to be manually configured between virtual networks.

Options:

A.

TRUE

B.

FALSE

Question 56

In a VXLAN scenario, which of the following features can be enabled to reduce ARP packet flooding between VTEPs?

Options:

A.

Local proxy ARP

B.

ARP broadcast suppression

C.

Host information collection

D.

Port isolation

Question 57

The BGP ORF function can be used to control the maximum number of routes that can be sent by a BGP peer. To achieve this, which of the following tools is used to send such a route list to BGP peers?

Options:

A.

Filter-policy

B.

Route-policy

C.

ACL

D.

IP prefix-list

Question 58

Which of the following is the drop probability of packets exceeding the upper threshold in WRED?

Options:

A.

0.2

B.

0.5

C.

1

D.

0.8

Question 59

In an MPLS VPN network, two-layer MPLS labels are added into data packets before they are transmitted over the public network. Which of the following statements regarding data packet processing are correct?

Options:

A.

The egress PE sends the data packet to the correct VPN based on the inner label.

B.

The penultimate hop removes the outer label before forwarding the data packet to a peer egress PE.

C.

The IP data packet received by egress LSR is without labels.

D.

The penultimate-hop device receives a packet with an outer label.

Question 60

Which of the following statements about BGP EVPN principles are correct in a scenario where a VXLAN tunnel is dynamically established through BGP EVPN?

Options:

A.

MP_REACH_NLRI is used to carry routing information.

B.

Several BGP EVPN routes are defined through BGP extension.

C.

MP_REACH_NLRI is used to carry the RD.

D.

MP_REACH_NLRI is used to carry the RT.

Question 61

In OSPFv3, which of the following types of LSAs can be flooded in the entire AS?

Options:

A.

AS-external-LSA

B.

Intra-Area-Prefix-LSA

C.

Link-LSA

D.

Inter-Area-Prefix-LSA

Question 62

NAFTIR policing can only be applied to the inbound direction. Its purpose is to monitor the traffic entering the device and ensure that the upstream device does not unnecessarily consume network resources.

Options:

A.

TRUE

B.

FALSE

Question 63

Which of the following statements is incorrect about adding devices on a virtualized network deployed using iMaster NCE-Campus?

Options:

A.

iMaster NCE-Campus allows users to add devices in batches.

B.

iMaster NCE-Campus allows users to add devices by device role.

C.

iMaster NCE-Campus allows users to add devices by device ESN.

D.

iMaster NCE-Campus allows users to add devices by device model.

Question 64

Which of the following statements about OPS (Open Programmability System) application scenarios is incorrect?

Options:

A.

To enable a network device to automatically send a configuration file to the server after the device configuration is saved, users can use the maintenance assistant to create a timer trigger condition and periodically run the Python script.

B.

When the OPS is used to automatically deploy unconfigured devices, a Python script is used to obtain the IP addresses of the software and configuration file server and download the system software and configuration file.

C.

The OPS can reduce the impact of the network environment in some cases. For example, when collected information is transmitted to a server, the Python script can be used to temporarily store the execution result to the device when the network is disconnected. After the network is reconnected, the execution result is transmitted to the server.

D.

The OPS can be used to automatically check the health status of devices.

Question 65

Which of the following factors does not need to be considered during the selection of core devices for the enterprise bearer WAN?

Options:

A.

Device naming conventions

B.

Service volume

C.

Physical location

D.

Node quantity

Demo: 65 questions
Total 322 questions