Weekend Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Huawei H19-424_V1.0 HCSP-Presales-Campus Network Planning and Design V1.0 Exam Practice Test

Demo: 32 questions
Total 107 questions

HCSP-Presales-Campus Network Planning and Design V1.0 Questions and Answers

Question 1

The description of the CloudEngine S8700 switch is incorrect.

Options:

A.

Provide 3 product forms: 4 slots, 6 slots and 10 slots.

B.

CloudEngine S8700 is a spruce type device.

C.

It has ultra-high-density GE/10GE/25GE/40GE/100GE full-rate access ports, and has a variety of port types.

D.

Adopt distributed forwarding architecture

Question 2

In the southbound protocol of the controller, the () protocol collects the traffic performance data of ports, links, and tunnels (LSPs) from the PCC, including the flow rate and bandwidth utilization to collect quality inspection data;

Options:

A.

BGP-LS

B.

PCEP

C.

SNMP

D.

Netconf

Question 3

The current controller does not support which of the following authentication methods?

Options:

A.

Portal

B.

TACACS

C.

P2P

D.

802.1X

Question 4

In AC3.0, when deploying a Fabric network, which of the following operations is not an operation in Fabric network deployment?

Options:

A.

Configure access management

B.

Configure a policy template

C.

Create an external network

D.

Create a fabric network

Question 5

In the sales strategy of campus network products, when there are more APs in a single project, after-sales network planning service 1 must be carried out

Options:

A.

100

B.

200

C.

300

D.

400

Question 6

Campus virtualization solution, the networking topology that is not supported by underlay routing automation is ()

Options:

A.

Core transparent transmission ring networking

B.

Tree networking

C.

Convergence ring networking

D.

Access to ring networking

Question 7

In the CloudCapmus solution, NETCONF/YANG does not support the management of Huawei devices

Options:

A.

CloudEngine S series switches

B.

CE series switches in data centers

C.

WLAN AP

D.

AR series routers

E.

USG series firewalls

Question 8

When SDN-IWAN is designing BGP routing control, the entire Guqian network structure is adouble-plane structure, which increases the reliability of the network, and the PE of the same plane is preferred when the BGP routing of PE equipment is selected, which is realized through ().

Options:

A.

ORIGIN

B.

MED

C.

LocalPre

D.

AS_PATH

Question 9

SRv6 Policy Group tunnel planning description, incorrect is ()

Options:

A.

Establish an SRv6 Policy Group tunnel group for local and remote devices on the same plane.

B.

The minimum color of the SRv6 Policy Group tunnel group is 1,000,000, and the colors of different VPN services and planes do not need to be distinguished, but can be the same.

C.

Configure an SRv6 Policy Group tunnel group for a VPN service.

D.

Multiple policy tunnels can be planned within the group according to the actual needs of users.

Question 10

In the multi-campus interconnection LAN-WAN convergence scenario, refer to the following topology [Campus topology-8 [The description of the design and deployment of the dual-gateway Interlink solution is incorrect ()

Options:

A.

Synchronize information between dual-gateway devices through the interlink control sub-interface, such as the synchronization and backup of application recognition results, overlay connection information, and connection quality information. Interlink serves as a dual-gateway device interconnection interface that forwards inter-device (VPN) traffic through sub-interfaces.

B.

Interlink serves as a dual-gateway device interconnection interface, providing forwarding of inter-device service (VPN) traffic through sub-interfaces.

C.

Interlink can be interconnected with a direct link, and when the site service traffic is large and the CPE port resources are sufficient, it is recommended that Interlink use an Eth-trunk link. Interlink cannot borrow Layer 2 service interfaces on the CPELAN side.

D.

Interlink cannot borrow the Layer 2 service interface on the CPE LAN side

Question 11

iMaster NCE-Campus is deployed in a virtualized environment based on Taishan's physical server, and the corresponding virtualization software is:

Options:

A.

FusionCompute8.0

B.

FusionCompute6.5.1

C.

VNWare vSphere

D.

Fusionlnsight

Question 12

Regarding end.dt4, decapsulation and specific IPV4 lookup tables, the statement is wrong ()

Options:

A.

For L3VPN scenarios, you need to search in the VPNFIB of the egress PE

B.

SIDs can be used anywhere in the segment list

C.

CHECK THE PRIVATE FIB OF V4 ACCORDING TO THE INNER IPV4DA

D.

You can use the destination address of IPV6 packets without SRH headers

Question 13

The types of cloud devices that the cloud management solution supports management do not include?

Options:

A.

FW

B.

S switches

C.

AR router

D.

CE switches

E.

AP

Question 14

What is the detection technology used for TEHSB and VPNFRR protection solutions in the SDN-WAN solution?

Options:

A.

Ethoam

B.

BFD

C.

Y1731

D.

NQA

Question 15

The statement about campus NCE user access authentication is incorrect

Options:

A.

Portal authentication, MAC address authentication, and 802.1X authentication are supported

B.

Portal page customization is not supported, but it supports docking with third-party Portal servers

C.

The authentication data is transmitted using HTTP2.0 and Radius protocols, and the configuration data is transmitted using the Netconf protocol

D.

Support docking with social media such as Weixin

Question 16

Regarding the description of tunnel planning, it is incorrect ()

Options:

A.

SRv6 Policy Group, SRv6 Policy, and SRv6-BE tunnels are delivered and deployed through the iMaster NCE-IP.

B.

VPN services in the backbone network can be carried by SRv6 Policy Group, SRv6 Policy, and SRv6-BE tunnels.

C.

For L2EVPN services, SRv6Policy tunnels are used first, followed by SRv6-BE for escape.

D.

For L3EVPN services, it is recommended to use SRr6Policy Group tunnels for DSCP traffic diversion and SRv6-BE tunnels for escape if the SRv6 Policy tunnel fails to iterate routes.

Question 17

The virtualization scenario network architecture has multiple node roles, which of the following nodes can be used as both L2 gateway and L3 gateway?

Options:

A.

Router Node

B.

FW Node

C.

Border Node

D.

Edge Node

Question 18

When using the planning and design tool, what is the incorrect description of the function of NCE-Campus planning?

Options:

A.

Support IP address design

B.

Support installation parameter design

C.

The network also supports NCE-Campus planning

D.

Plan the networking mode and cluster scale in the scenario of the scheme

Question 19

Which of the following functions cannot be automatically deployed through underlays in the solution C1R19C10?

Options:

A.

Physical stacking

B.

Interconnection address

C.

Routing interoperability

D.

Divide the routing area

Question 20

IN QOS DESIGN, THE DESCRIPTION OF THE DESIGN PRINCIPLES OF TRAFFIC SCHEDULING IS INCORRECT ()

Options:

A.

Maintain the principle of uniformity in the scheduling strategy of the whole network, and use templated deployment as much as possible to facilitate network management

B.

LPQ/WFQ scheduling strategies can be used to avoid low-priority services not being able to obtain bandwidth resources

C.

The current QoS policy needs to take into account the subsequent expansion of the network

D.

Core services and video-voice services should ensure the absolute priority of forwarding and use PQ scheduling

E.

Unless the business has special requirements, some parameters of the scheduling policy should be defaulted as much as possible

F.

For TCP-based services, the queue must be configured with WRED dropping to avoid TCP global synchronization

Question 21

The following statements about MAC routing are incorrect ()

Options:

A.

If the Flag value of the migration attribute in the MAC address route is 1, it indicates a static MAC address, and the static MAC address is preferred.

B.

When a MAC address route is migrated, the large sequence number in the MAC migration attribute is preferred.

C.

and MAC address routes are filled with two labels (that is, both mplslable1 and mplslable2 are valid in packets).

D.

The Route Distinguisher value (RD value) of the MAC route is generated by the value configured by the evpn source-address

Question 22

The maximum MCS supported by WIFI6 is:

Options:

A.

MCS7

B.

MCS9

C.

MCS11

D.

MCS13

Question 23

In the campus SDN solution, the statement about the distributed gateway solution is wrong ()

Options:

A.

Distributed gateway - VxLAN to access, independent AC scenario, for wireless traffic, local forwarding mode is not recommended.

B.

Distributed gateway - VxLAN to access, independent AC scenario, from the edge to the VN, on the edge to execute the service accompanying policy (the edge needs to subscribe to the IP-Group service), the current solution has supported automatic deployment.

C.

The VTEP device is both an L2 gateway and an L3 gateway. The non-gateway node is not aware of the VXLAN tunnel and acts only as the forwarding node for VXLAN packets.

D.

Distributed gateway - VxLAN to aggregation, AC on the board, the wireless traffic service accompanying policy is executed on the edge, and tunnel forwarding is recommended.

Question 24

Among the following devices, the wireless AP operating at 2.4GHz will not interfere with ()

Options:

A.

Microwave oven

B.

Bluetooth headset

C.

Infrared sensor

D.

Cordless phone working in the 2.4G frequency band

Question 25

Which of the following does not belong to the reliability technology of the controller server ()

Options:

A.

Local hardware redundancy protection

B.

TE HSB

C.

Local software protection

D.

Remote disaster recovery

Question 26

In the V1R22C00 version of CloudCampus solution, the description of the FW synchronization IP-Group feature is incorrect ()

Options:

A.

NCE-Campus supports the configuration of firewall security group policies.

B.

When a user passes the NCE-Campus authentication or the permission changes, NCE-Campus synchronizes the user name, IP-group, and IP address information to FW, and FW identifies all user groups based on the mapping relationship between IP address, user name, and IP-group, and executes the corresponding security group policy.

C.

Reuse the current online behavior management process, and add lP-Group information to the synchronization information of NCE-Campus and firewall.

D.

When the user goes online and ages in FW, FW actively queries the online user to the NCE-Campus server to keep the IP-Group and other information at both ends synchronized

Question 27

Regarding the description of the design principles of Locator SID, it is incorrect ()

Options:

A.

For the Locator CIDR block planning of SRv6, the appropriate mask should be set according to the number of IPv6 SIDs that may be used by the device.

B.

loatos svV6_locator ipu6-prelix21.DB8ABCD: .b4 static 32, Locator is 2001.DB8.ABCD:, length 64 bits, static segment occupies 32 bits, dynamic segment occupies 32 bits args field occupies O bits. The starting value of the state segment is: 2001:DB8:ABCD:0000:0000:0000:C

C.

Locator SID supports static configuration or dynamic allocation, end-op and end-m must be statically configured, and static configuration is also recommended for end and end.x, which is convenient for network O&M. Other SIDs can be assigned dynamically.

D.

Devices at the same site belong to the same large network segment with the same prefix, and different devices are assigned to the small network segment with the same prefix in the large network segment.

Question 28

In the government unified construction mode of SDN-WAN solution, the SRv6 tunnel design description is incorrect ()

Options:

A.

Service slices must use SRv6 Policy tunnels, which can be strictly explicit or loose.

B.

The whole network uses NCE-P to calculate the path of the slice network based on the affinity attribute to ensure the optimal path of the whole network and make full use of the link bandwidth while ensuring the service quality.

C.

SRv6Policy tunnels are vertically deployed between districts, counties, cities, and provincial WANs to optimize traffic to improve bandwidth utilization and ensure service quality.

D.

SRO6fPolicy tunnels can be carried in the default slice network or in a non-default slice network. For default slices, SRv6BE is preferred. Services with special requirements can also be carried through SRv6 policy tunnels.

Question 29

What kind of service nodes are not included in the cloud management platform controller cluster?

Options:

A.

Data processing node FI

B.

Authentication node ACA

C.

Data acquisition node ACC

D.

Register the inquiry center

E.

Device management node ACM

Question 30

The following description of business-oriented VAP is correct

Options:

A.

Provide wireless terminal access function

B.

Establish a MESH connection

C.

Each radio can be configured with multiple radio resources, and the number is unlimited

D.

Each radio can be configured with only one

Question 31

When using the planning and design tool, which of the following statements about the logical networking of the campus network is incorrect?

Options:

A.

The logical networking initialization diagram is determined by the parameters of the scenario of the solution

B.

Support multi-region, multi-aggregation node design

C.

The working mode supports stand-alone and stacked

D.

You can't manually drag and drop to modify

Question 32

In order to quickly recover when the configuration is lost, which of the following operations is recommended?

Options:

A.

Manually save the equipment configuration on the controller on a regular basis

B.

Formulate regular configuration file backup tasks

Demo: 32 questions
Total 107 questions