Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

H12-831_V1.0 Questions and Answers

Question # 6

Which of the following statements is true about the role of ping and tracert?

A.

Pingthrough one-wayicmp echo requestPacket inspection and bidirectional reachability of the correct end

B.

TracertMust be able to trace every hop from source to destinationIPaddress

C.

pingThe reachability from the local end to the peer end is verifieD. but it does not mean that the peer end to the local end must be reachable

D.

tracertandpingThe function is the same, just the name is different

Full Access
Question # 7

As shown, all routers run OSPF. Which of the following statements is correct?

A.

R2in the area1and area0will generateRouter LSA

B.

R2WillR3GeneratedRouter LSAforward toR1

C.

R2WillR1GeneratedRouter LSAforward toR3

D.

R2only in area0generated inRouter LSA

Full Access
Question # 8

A campus deploys OSPF to implement network interworking. The LSDB of R2 is shown in the figure. From this LSDB. it is possible to

What information was obtained?

A.

ArealNone inType3 LSA. maybeR2in the area1In the correct directiontype3 LSAfiltered

B.

Area 1forNSSAarea

C.

R2WillType7 LSAThe default route is converted toType5 LSAdefault route for

D.

R2existOSPFThe default route is delivered in the process

Full Access
Question # 9

Engineer Guan used two routers to test IPv6 services. By running the BGP4+ module to communicate with the branch, as shown in Juxin, an engineer captured packets to view the Updte packets sent by R1. Which of the following statements is true about the description of the message information?

A.

This message describes only oneBGPAttribute: Multi-protocol unreachableNLRIAttributes

B.

This message describes the current cancellationIPv6routing

C.

The maximum and the preceding length of the routing address described in this packet is:2001:db8:2345:l::l/128

D.

The next hop address of the route described in this packet is:2001:db8:2345:l::l\

Full Access
Question # 10

In OSPF, the A, BR will convert all type 7 L SAs in the NSSA area to type 5 L SAs.

A.

True

B.

False

Full Access
Question # 11

What is the LSA whose flooding range is the entire autonomous system in SPFV3?

A.

Link-LSA

B.

As-external-LSA

C.

Inter-Area-Prefix-LSA

D.

Intra-Area-Prefix-LSA

Full Access
Question # 12

Match the alarm severity to the severity of the fault and countermeasures

C. Critical", Major-2, Minor-3, Warning-4 A

D. Critical-3, Major-2, Minor-1, Warning-4

Full Access
Question # 13

Which of the following commands can be used to view information about BGP VPNv4 routes and BGP private network routes on PEs

interest

A.

display bgp routing-table address-family vpnv4

B.

display bgp vpnv4 routing-table

C.

display bgp routing-table ipv4-family vpnv4

D.

display vpnv4 bgp routing-table

Full Access
Question # 14

In an MPLS network, functions such as neighbor discovery, session establishment and maintenance, and label management are implemented by exchanging LDP messages between SRs running the DP protocol. To ensure the reliability of message delivery, all LDP messages are sent and received based on TCP connections.

A.

True

B.

False

Full Access
Question # 15

From this figure, we can conclude that

A.

R4not anyIS-ISNeighbor

B.

R4andee8c.aOc2.baf3establishedIPv4,IPv6ofIS-ISNeighbor

C.

R4andee8C. aOe2.baf3only establishedIPv6ofIS-ISNeighbor

D.

R4andee8c.aOc2.bat3only establishedIPv4ofIS-ISNeighbor

Full Access
Question # 16

A campus has deployed IPv6 for service testing. There are 4 routers in the network, running 0SPFV3.

Interconnection of IPv6 networks. As shown in the figure, an engineer checked the LSDB of R2 and intercepted one of them

Link-LSAs. Which of the following statements is true about the description of this LSA?

A.

R2interfaceGEO/O/OThe link-local address force:FE80::2E0;FCFF:FEC, D:4F79

B.

produce theLSAThe router isR2

C.

ShouldLSAshowR2External routing is not supported, but participatingIPv6route calculation

D.

R2interfaceGE0/0/0IPV6address prefix:2001:2343:23: :/64

Full Access
Question # 17

Can Huawei equipment perform traffic suppression for Mingbi packets?

A.

Unknown unicast

B.

known unicast

C.

multicast

D.

broadcast

Full Access
Question # 18

The IS-IS Level-1 neighbor relationship between R3 and R4 is not established. According to the information in this figure_What is the possible reason?

A.

R3andR4the interconnect interfacecircuit-typeMismatch

B.

R3andR4different area codes

C.

R3andR4ofIS-LevelMismatch

D.

R3andR1ofIIHAuthentication failed

Full Access
Question # 19

Which of the following features affects BGP neighbor establishment?

A.

BGPCertification

B.

BGP GSTM

C.

BGProute filtering

D.

ebgp max hop

Full Access
Question # 20

About the difference between NSR and NSF, which is correct?

A.

NSF must rely on neighbor routers to complete

B.

Both NSR and NSP require neighbor routers to complete

C.

NSR must rely on neighbor routers to complete

Full Access
Question # 21

According to this picture, you can judge

A.

The optimal outgoing interface for R1 to access room 3000: FDEA::3 is GigabitEtherneto/0/1

B.

R1 with 3000:FDEA::3 is IB6P neighbor

C.

R1 has a TCP connection with 3000:FDEA::3

D.

R1 learned route 3002 through IBGP::3/128

Full Access
Question # 22

According to this picture, we can judge?

display ospf Isdb router self-originate OSPF Process 1 with Router ID 10.0.12J Area: 0.0.0.0

Type:Router

Lsid: 10.0.12 J

Adv rtr: 10.0.12.1

Ls age: 312

Len: 36

Options : A, BR E

\seq#:80000013

1chksum : 0xc61c

ILink count: 1

1* Link ID: 10.0.12.2

IData : 10.0.12.1

,Link Type: TransNet

.Metric : 1

A.

R1ofsystem IDYesee8c.a0c2.bafl

B.

R1existinglevel", andlevel-1-2Dimensional state information of

C.

R1onlylevel-2link state information

Ds level-2In the network, there are a total of8Tailu Electric

Full Access
Question # 23

As shown in the figure, OSPF is deployed in a campus, and Area 1 is deployed as an NSSA area. In the case of missing header, R2 will automatically generate a missing header route of Type 7 LSA and flood it in the NSSA area

A.

True

B.

False

Full Access
Question # 24

All routers in a network run IS-IS, and all are in Area 49.0001, where the L SDB of R1 is shown in the figure

According to this, it is judged that the DIS of Level-2 is. (Please fill in the device name, such as R1)

| displayisisisdb

DatabaseinformationforISIS (1)

Level-1Link State Database

LSPIDO Seq Num ChecksumbHoldtime Length ATT/P/OL

0001.0000.4004.00-00 0x00000008 0xb701 1186 68 0/0/0

0001.0000.2002.00-00Ox 0000008 0xb701 1186680/0/0

0001.0100.1001.00-00*0x00000050x2f9d1187 680/0/0

0001.0100.1001.01-00*0x00000001 0xa79e1110550/0/0

Level-2 Link State Database

LSPIDAN> Seq Num Checksum., Holdtime Length ATT/P/OL

0001.00002002.00-00 0000000080xb7011188 6S0/0/0

0001.0100.1001.00-00* 0x00000060x2d9e 1187 680/0/0

0001.0100.1001.01-00* 0x00000005OxdObO 1191 660/0/0

0100.0000.3003.00-00 000000005 0xfe53 1185 560/0/0

0

Full Access
Question # 25

Please pair the following DHCP attack types with corresponding explanations.

A.

DHCPstarvation attack-3 DHCPPhishing attack man-in-the-middle attack-2 DHCPPacket flood attack-4

B.

DHCPstarvation attack-2 DHCPPhishing attack-3man-in-the-middle attack-1 DHCPPacket flood attack-4

C.

DHCPstarvation attack-1 DHCPPhishing attack-3man-in-the-middle attack-2 DHCPPacket flood attack-4

D.

DHCPstarvation attack-4 DHCPPhishing attack-3man-in-the-middle attack-2 DHCPPacket flood attack-1

Full Access
Question # 26

R1 executes the operation ping -a lO.l.Ll 10.5.16.2, what is the meaning of this command?

A.

pingpackage sourceIPaddress isR1any direct interface address of

B.

pingpackage sourceIFPaddress isR1direction10.5.16.2the optimalIPThe outgoing interface address of the route, and is not

10.1.1.1

C.

pingpackage sourceIPaddress is10.1.1.1

D.

pingPurpose of the packageIPaddress is10.1.1.1and10.5.16.2

Full Access
Question # 27

Network administrator A wants to use the IP Prefix List to match a specific route entry. Which of the following routes will

Matched by the IIP Prefix List in the figure?

A.

10.0.0.1/30

B.

10.0.0.0/24

C.

10.0.2.0/24

D.

10.0.1.0/24

Full Access
Question # 28

Which of the following statements about VLAN aggregation is true?

A.

Super-VLANOnly physical interfaces cannot establish Layer 3VLANIFinterface

B.

OneSuper-VLANcan contain one or moreSub-VLAN

C.

Sub-VLANContains physical interfaces. Three layers can be builtVLANIFinterface

D.

Sub-VLANfor isolating broadcast domains

Full Access
Question # 29

As shown in the figure, all routers run OSPF, because R3 is in the backbone area, so in the LSDB of R3 There are no three types of LSAO

A.

True

B.

False

Full Access
Question # 30

From this figure, it can be known that

A.

R1access172.17.1.5There is a loop

B.

R1have access172.17.1 5routing

C.

R1no access172.17.1.5routing

D.

R1access172.17.1.5There is no problem with the path

Full Access
Question # 31

An engineer uses two routers to test IPv6 services, and simulates the interconnection between the headquarters and branches by running BGP4+. The logical topology of the network is shown in the figure. Regarding the transmission of IPv6 routes between the two devices, which of the following Is a statement wrong?

A.

The Next_Hop attribute must be an IPv6 global unicast address when routing

B.

BGP4+ transmits routing information between peers through Update packets

C.

If the MP_REA, CH_NLRI attribute is carried in the Update packet, it indicates that the advertisement is a reachable route

D.

When the route is transmitted, it will carry recognized mandatory attributes such as AS_Path

Full Access
Question # 32

In BGP/MPLS IP VPN, the 0SPF multi-instance process uses the DN bit to prevent Type5 LSA loops.

A.

True

B.

False

Full Access
Question # 33

The rollback operation of project cutover can be temporarily determined according to the situation during cutover, and no advance plan is required.

A.

True

B.

False

Full Access
Question # 34

As shown in the figure, in a medium-sized network, BGP generally deploys dual RRs to improve R reliability. When deploying dual RRs, the ClusterIDs of the two RRs are generally set to be the same. What is the reason for this?

A.

Prevent RR from receiving too many routes and causing insufficient memory

B.

prevent suboptimal

C.

prevent loops

D.

Prevent the client from receiving too many routes and causing it to run out of memory

Full Access
Question # 35

There is the concept of forwarding equivalence class FEC in MPLS. The following description is wrong:

A.

MPLSGrouping packets with the same forwarding processing method is calledFEC

B.

a forwarding equivalence classFECA unique label value is assigned on all routers

C.

sameFECgrouped inMPLSThere will be different processing in the network

D.

FECThe division is very flexible. Can be the source address, and the address, source port, destination port, protocol type or

VPNEqual to any combination of division basis

Full Access
Question # 36

Which of the following descriptions is correct about configuring static LSPs in MPLS networks?

A.

when a certainLSRforEgress LSR, you only need to configureIn Label,The range is16-1023

B.

when a certainLSRforTransit LSR, you need to configureIn LabelandOut labeljn LabelThe range is16~1023,Out LabelThe range is16~1048575

C.

when a certainLSRforTransit LSRneed to be configured at the same timeIn LabelandOut Label,The range is16-1023

D.

when a certainLSRforIngress LSR, just configureOut Label,The range is16~1048575

Full Access
Question # 37

In PLSVPN, in order to distinguish IPv4 prefixes that use the same address space, the value of R0 is added to the IPv4 address. The correct description of the following options is:

A.

On a PE device, each VP instance corresponds to a value of 0. On the same PE device, the RD value must be unique.____, ____, ____.

B.

RD can be used to control the publication of 1 routing information

C.

RD is encapsulated in Update message as BGP extended community attribute during delivery

D.

After the PE receives the IPv4 route from the CE, it adds RD to the IPv4 route to convert it into a globally unique VPN-IPv4 route, and publishes it on the public network

Full Access
Question # 38

ping -a Xc Ys z -vpn-instance M 10.5.16.2, the meaning of this command is:

A.

ShouldpingsendYindivualICMPask

B.

ShouldpingofICMPThe request packet size isZ(excludingIPandICMPhead)

C.

Shouldpingpackage sourceIFPaddress isX

D.

Shouldpingpackage belongs toVPNexampleM

Full Access
Question # 39

As shown in the figure, configure a backhaul summary route 10.0.0.0/24 on the border route RT1. next hop

to RT2. At the same time, the default route to the external network is configured. At this point, a routing black hole will appear. The following is about routing

Is the black hole statement correct? (multiple choice)

A.

Configuring black hole routing can solve the routing black hole problem

B.

Routing black hole has no impact on the network and can be ignored

C.

Precise routing $□ can always avoid routing black holes

D.

If the terminal in the network sends data packets to the network segment that does not appear on the internal network, a loop will occur

Full Access