Month End Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

H12-891_V1.0 Questions and Answers

Question # 6

Which of the following statements is incorrect about access control on small and midsize campus networks based on the Huawei CloudCampus solution?

A.

iMaster NCE can function as an authentication server.

B.

Cloud APs support local Portal authentication.

C.

iMaster NCE can function as a Portal relay device.

D.

iMaster NCE can interconnect with a third-party RADIUS server.

Full Access
Question # 7

New IS-IS TLVs are used to carry IPv6 addresses and reachability information to support IPv6 route processing and calculation.

A.

TRUE

B.

FALSE

Full Access
Question # 8

BFD can implement millisecond-level link status detection.

A.

TRUE

B.

FALSE

Full Access
Question # 9

R1 receives a common IPv6 packet from the CE and generates a packet carrying the SRH (Segment Routing Header), as shown in the figure. The packet is forwarded along the path R1 → R2 → R3 → R4. Identify the node type of each device based on their role in SRv6 processing.

Full Access
Question # 10

Which of the following commands are mandatory for configuring an OSPF-based SR-MPLS TE tunnel? (Select All that Apply)

A.

Configure the LSR ID for routers.

B.

Enable segment routing in the OSPF process view.

C.

Enable the opaque capability of OSPF.

D.

Enable MPLS TE in the OSPF process view.

Full Access
Question # 11

OSPF is deployed on a campus network to implement network interconnection. The LSDB of R2 is shown in the figure.

What can be determined from the LSDB?

A.

Area 1 is an NSSA.

B.

R2 translates Type 7 default route into Type 5 default route.

C.

R2 advertises the default route in the OSPF process.

D.

Area 1 does not have Type 3 LSAs. The possible cause is that R2 filters Type 3 LSAs in the outbound direction of area 1.

Full Access
Question # 12

Drag the OSPFv3 LSAs to map them to their corresponding transmission ranges.

Full Access
Question # 13

OSPFv2 is an IGP running on IPv4 networks, whereas OSPFv3 is an IGP running on IPv6 networks. OSPFv2 and OSPFv3 have similar LSA types, but their LSA functions are slightly different. Which of the following is not an OSPFv3 LSA type?

A.

ASBR-Summary-LSA

B.

AS-External-LSA

C.

Router-LSA

D.

Network-LSA

Full Access
Question # 14

The RR (Route Reflector) is critical to the Huawei SD-WAN Solution, and its deployment mode varies based on the scenario. In which of the following modes can an RR be deployed?

A.

Multi-area deployment of the RR

B.

Independent deployment of the RR

C.

Co-deployment of the RR and hub site

D.

Partially independent deployment of the RR

Full Access
Question # 15

You write the following Python code to invoke a RESTful API to obtain the token ID of iMaster NCE. Which of the following statements are correct?

import requests

response = requests.get("https://139.9.213.72 ")

print(response.json())

Error returned:

requests.exceptions.SSLError: HTTPSConnectionPool(host='139.9.213.72', port=18002): Max retries exceeded with url: /controller/v2/tokens (Caused by SSLError(CertificateError('hostname '139.9.213.72' doesn't match 'devzone.huawei.com')))

Options:

A.

The client does not trust the SSL certificate of the server.

B.

The SSL certificate verification fails.

C.

The code can be modified as follows:import requestsresponse = requests.get("https://139.9.213.72 ", verify=False)print(response.json())

D.

The code can be modified as follows:import requestsresponse = requests.post("http://139.9.213.72 ", verify=False)print(response.json())

Full Access
Question # 16

Which of the following statements does not cause the flapping of a VRRP group?

A.

Too small interval between Advertisement packet transmissions

B.

Inconsistent preemption delay settings

C.

Packet loss on an interface of the backup device

D.

Flapping on the link transmitting VRRP Advertisement packets

Full Access
Question # 17

On an SR-MPLS network, manually configured prefix SIDs on different devices may conflict with each other. Assume that there are four routes (prefix/mask SID) as follows. Which of the following routes will be selected according to the conflict handling principle?

A.

1.1.1.1/32 → SID 2

B.

1.1.1.1/32 → SID 1

C.

2.2.2.2/32 → SID 3

D.

3.3.3.3/32 → SID 1

Full Access
Question # 18

An Ethernet Segment Identifier (ESI) is 10 bytes long and unique on the entire network.

A.

TRUE

B.

FALSE

Full Access
Question # 19

In OSPFv3, which of the following types of LSAs can be flooded in the entire AS?

A.

AS-external-LSA

B.

Intra-Area-Prefix-LSA

C.

Link-LSA

D.

Inter-Area-Prefix-LSA

Full Access
Question # 20

After the reset isis all command is run, the specified IS-IS process is reset, and all involved IS-IS neighbor relationships are re-established; however, IS-IS statistics are not cleared.

A.

TRUE

B.

FALSE

Full Access
Question # 21

As shown in the figure, PE1 establishes an EVPN peer relationship with each of PE2 and PE3. When the network is initialized, CE1 sends an ARP request packet.

Which of the following statements are correct about how a PE processes the packet?

A.

When forwarding the packet to PE3, PE1 needs to add the BUM traffic label allocated by PE3 to the packet.

B.

PE1 sends a MAC/IP advertisement route carrying the MAC address of CE1.

C.

PE2 forwards the packet to CE1.

D.

PE3 forwards the packet to CE1.

Full Access
Question # 22

Huawei Open Programmability System (OPS) uses HTTP methods to access managed objects to manage network devices. HTTP is the most widely used network transmission protocol on the Internet. By default, the TCP port number _____ is used. (Fill in Arabic numerals.)

Full Access
Question # 23

YANG is a data modeling language for the definition of data sent over network management protocols such as NETCONF. Which of the following are basic YANG data models? (Select all that Apply)

A.

Set node

B.

Leaf node

C.

List node

D.

Tree node

Full Access
Question # 24

HTTP/2 is a UDP-based low-delay Internet transport layer protocol.

A.

TRUE

B.

FALSE

Full Access
Question # 25

Congestion avoidance technology can prevent congestion on an interface.

A.

TRUE

B.

FALSE

Full Access
Question # 26

Collecting information before a cutover helps you determine whether services are normal before and after the cutover.

A.

TRUE

B.

FALSE

Full Access
Question # 27

On the campus network shown, IPv6 is deployed for service tests. Four routers are deployed on the network, and OSPFv3 is used for IPv6 network connectivity. An engineer checks the LSDB of R2 and obtains a Link-LSA. Which of the following statements about the LSA are correct?

A.

The link-local address of R2’s GE0/0/0 is FE80::2E0:FCFF:FECD:4F79.

B.

The IPv6 address prefix of R2’s GE0/0/0 is 2001:DB8:2345:23::/64.

C.

This LSA indicates that R2 does not support external routes but can participate in IPv6 route calculation.

D.

This LSA is generated by R2.

Full Access
Question # 28

If ISIS is used to transmit SIDs on an SR network, the node SIDs advertised by a Level-2 router are transmitted only within the same area.

A.

TRUE

B.

FALSE

Full Access
Question # 29

SSH connections are usually established based on TCP/IP connections. In specific cases, SSH connections can be established based on UDP connections.

A.

TRUE

B.

FALSE

Full Access
Question # 30

Exhibit:

A loop occurs because Spanning Tree Protocol (STP) is not enabled on the network. Which of the following symptoms may occur?

A.

A loop alarm is generated on the LAN switch.

B.

CPU usage is too high.

C.

MAC entries flap.

D.

Host receives a large number of broadcast packets.

Full Access
Question # 31

Which of the following is the drop probability of packets exceeding the upper threshold in WRED?

A.

0.2

B.

0.5

C.

1

D.

0.8

Full Access
Question # 32

To allow only authorized users (users who obtain IP addresses through authorized DHCP servers or use specified static IP addresses) to access the network shown in the figure, which of the following solutions can be used?

A.

DAI + Port Security

B.

DHCP Snooping + IPSG

C.

DHCP Snooping + DAI

D.

DAI + IPSG

Full Access
Question # 33

If an engineer wants to remotely log in to a Huawei device, the engineer uses the Paramiko library to compile the following code when compiling the SSH Python script:

cli = ssh.invoke_shell()

cli.send("screen-length 0 temporary\n")

What is the function of screen-length 0 temporary?

A.

Performing automatic word wrap

B.

Performing split-screen display

C.

Canceling split-screen display

D.

Canceling automatic word wrap

Full Access
Question # 34

Which of the following statements about the SP scheduling algorithm isincorrect?

A.

If the SP scheduling algorithm is used and a high-priority queue occupies a large amount of bandwidth, the low-priority queue may be starved.

B.

The SP scheduling algorithm preferentially schedules high-priority queues.

C.

When the SP scheduling algorithm is used to schedule multiple low-priority queues, the data packets that enter the queue first are forwarded first.

D.

To ensure the quality of key services, the SP algorithm can be used to schedule services and set the minimum bandwidth.

Full Access
Question # 35

Before connecting an SSH client to an SSH server in public key authentication mode, a client needs to create a key pair. Which of the following commands is used to create a DSS key pair on the client using Git Bash?

A.

ssh-keygen -t dss

B.

ssh-keygen -t ecc

C.

ssh-keygen -t dsa

D.

ssh-keygen -t rsa

Full Access
Question # 36

Congestion management technology can be used to discard data packets in the buffer queue to prevent the buffer queue from being exhausted.

A.

TRUE

B.

FALSE

Full Access
Question # 37

A network administrator runs thedisplay telemetry subscriptioncommand on a device to check telemetry subscription information. The command output is as follows:

[~CE] display telemetry subscription

Sub-name : Sub1

Sensor group:

Sensor-name Sample-interval(ms) State

Sensor1 1000 RESOLVED

Destination group:

Dest-name Dest-IP Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20000 RESOLVED - GRPC

Sub-state : PASSIVE

Total subscription number is : 1

Which of the following statements is incorrect?

A.

The device sends sampled data every second.

B.

The subscription name is Sub1.

C.

The subscription mode is static subscription.

D.

The IP address of the device is 192.168.56.1.

Full Access
Question # 38

Which of the following inter-AS MPLS L3VPN solutions need VPN user data packets to carry MPLS labels when being forwarded between ASs?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 39

On the network shown in the following figure, a remote LDP session needs to be established between SWA and SWC. Which of the following statements is correct?

[SWA] mpls lsr-id 1.1.1.1

[SWA] mpls

[SWA-mpls] mpls ldp

[SWC] mpls lsr-id 33.3.3.3

[SWC] mpls

[SWC-mpls] mpls ldp

SWA ---- SWB ---- SWC

<------ Remote LDP Session ------>

A.

You don't need to specify the LSR ID of the remote peer.

B.

You need to configure the directly-connected interfaces between SWA and SWC to set up TCP connections.

C.

The existing configuration is correct.

D.

You need to create a remote peer and specify an LSR ID for the remote peer.

Full Access
Question # 40

Huawei Open Programmability System (OPS) uses standard HTTP methods to access managed objects to manage network devices. Which of the following HTTP methods is used to configure the value of a network device's managed object?

A.

PUT

B.

POST

C.

PATCH

D.

GET

Full Access
Question # 41

In an MPLS domain, LSRs can be classified into ingress, transit, and egress LSRs based on how they process data. For the same FEC, an LSR can be both an ingress and a transit LSR of the FEC.

A.

TRUE

B.

FALSE

Full Access
Question # 42

As shown in the figure, R1, R2, R3, and R4 reside in the same MPLS domain, and LDP (Label Distribution Protocol) is used to distribute MPLS labels.

R4 is the egress LSR (Label Switching Router) for the FEC (Forwarding Equivalence Class) 4.4.4.0/24.

To make R4 aware of QoS forwarding priority of a packet sent from R1 and destined for 4.4.4.0/24,

Without looking up R4’s label forwarding information base,

The outgoing label of the FEC on R3 should be _____ (Enter an Arabic numeral without symbols).

Full Access
Question # 43

Refer to the output information of a device below. According to the information, which of the following MPLS labels is carried in a data packet forwarded by the device to 10.0.1.1?

A.

36100

B.

36200

C.

40100

D.

40200

Full Access
Question # 44

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following command needs to be run on the VBDIF interface to enable the VTEP peer to generate BGP EVPN Type 2 routes based on ARP information of the local terminal?

A.

mac-address xxxx-xxxx-xxxx

B.

arp-proxy enable

C.

arp collect host enable

D.

arp distribute-gateway enable

Full Access
Question # 45

To obtain the token ID of iMaster NCE, you need to send an HTTP request message that includes the following Python code to invoke an iMaster NCE RESTful API.

Which of the following statements is incorrect?

import requests

nbi_name = "demo13@north.com"

nbi_pwd = "CgocVcVe1@"

host = "139.9.213.72"

port = "18002"

URI = "/controller/v2/tokens"

post_token_url = "https:// " + host + ":" + port + URI

headers_post = {"Content-Type": "application/json", "Accept": "application/json"}

r = requests.post(post_token_url, headers=headers_post, json={"userName": nbi_name, "password": nbi_pwd}, verify=False)

A.

You can run the print(r.json()) command to display the response message sent from the server.

B.

Token resources are located at https://139.9.213.72:18002/controller/v2/tokens.

C.

The request body is in JSON format.

D.

The HTTP request uses the GET method to query the token value.

Full Access
Question # 46

On a VXLAN-based virtualized network, if the fabric networking mode is centralized gateway networking, the gateway is located on the _____ device. (Capitalize the first letter.)

Full Access
Question # 47

When you configure a virtualized campus network on iMaster NCE-Campus and enable external networks to connect to the Internet, iMaster NCE-Campus will automatically deliver a specific route to direct traffic to the corresponding external network.

A.

TRUE

B.

FALSE

Full Access
Question # 48

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following fields is not carried in BGP EVPN Type 2 routes?

A.

IP Prefix

B.

IP Address

C.

L3VNI

D.

L2VNI

Full Access
Question # 49

The free mobility function is deployed on the iMaster NCE-Campus on a campus network. Which of the following information should an administrator pay attention to?

A.

Define security groups.

B.

Deliver the inter-group policy.

C.

Deploy a policy control matrix.

D.

Select the policy enforcement point.

Full Access
Question # 50

A network administrator runs the display telemetry subscription command on a device to check telemetry subscription information. The command output is as follows. Which of the following statements is incorrect?

[~CE] display telemetry subscription

Sub name : Sub1

Sensor group:

Sensor-name Sample-interval(ms) State

Sensor1 1000 RESOLVED

Destination group:

Dest-name Dest-IP Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20030 RESOLVED - GRPC

Sub state : PASSIVE

Total subscription number is : 1

A.

The device sends sampled data every second.

B.

The subscription mode is static subscription.

C.

The IP address of the device is 192.168.56.1.

D.

The subscription name is Sub1.

Full Access
Question # 51

/ifm/interfaces/interface in Huawei Open Programmability System (OPS) is the URL used to identify a device's managed object.

A.

TRUE

B.

FALSE

Full Access
Question # 52

On the campus network shown, IPv6 is deployed for service tests. Four routers are deployed on the network, and these routers use OSPFv3 for network connectivity. Which of the following statements about LSAs generated by the OSPFv3 network is incorrect?

A.

R1 generates Router-LSAs describing interface information and receives Router-LSAs generated by R2 and R3.

B.

R1 receives two Link-LSAs generated by R2. The two Link-LSAs describe information about the two links connected to R2.

C.

The LSDB of R1 contains Network-LSAs generated by R3, indicating that R3 may be the DR on the local link.

D.

R2 functions as an area border router (ABR), generates Inter-Area-Prefix-LSAs that describe the IPv6 address prefix of area 1, and advertises these Inter-Area-Prefix-LSAs to R1 and R3.

Full Access
Question # 53

Which of the following technologies can be used to measure performance based on actual service traffic in Huawei's CloudWAN solution?

A.

TWAMP

B.

BGP FlowSpec

C.

Telemetry

D.

iFIT

Full Access
Question # 54

Which of the following commands needs to be run in the BGP view to enable a VPN instance to advertise IP routes to the BGP-EVPN address family?

A.

advertise irbvfi

B.

advertise vpnv4

C.

advertise irb

D.

advertise l2vpn evpn

Full Access
Question # 55

In an MPLS VPN network, two-layer MPLS labels are added into data packets before they are transmitted over the public network. Which of the following statements regarding data packet processing are correct?

A.

The egress PE sends the data packet to the correct VPN based on the inner label.

B.

The penultimate hop removes the outer label before forwarding the data packet to a peer egress PE.

C.

The IP data packet received by egress LSR is without labels.

D.

The penultimate-hop device receives a packet with an outer label.

Full Access
Question # 56

Which of the following statements about 802.1X authentication are correct?

A.

802.1X authentication uses EAPoL to exchange authentication information between the client, device, and authentication server.

B.

In EAP termination mode, EAP packets are terminated and re-encapsulated into RADIUS packets on the network access device. The network access device and AAA server use the standard RADIUS protocol to implement authentication, authorization, and accounting.

C.

EAPoL implements EAP encapsulation on an IEEE 802.3 network, whereas EAPoW implements EAP encapsulation on an IEEE 802.11 network.

D.

In EAP relay mode, EAP packets are directly encapsulated by the network access device into RADIUS packets (that is, EAP over RADIUS, or EAPoR). The network access device and AAA server use EAPoR to perform authentication, authorization, and accounting.

Full Access
Question # 57

An enterprise has three types of services. Voice and video services are key services and need to be guaranteed, and FTP services are non-key services. Which of the following scheduling modes is optimal for satisfying the service requirements?

A.

WFQ scheduling is configured for IP voice, video, and FTP download services.

B.

PQ scheduling is configured for IP voice and video services, and WFQ scheduling is configured for FTP download services.

C.

LPQ scheduling is configured for IP voice services, PQ scheduling is configured for video services, and WFQ scheduling is configured for FTP download services.

D.

PQ scheduling is configured for IP voice, video, and FTP download services.

Full Access
Question # 58

Based on the figure, which of the following statements are correct?

tracert 172.17.1.5

1 10.1.12.2 40 ms 10 ms 10 ms

2 10.1.24.2 30 ms 20 ms 20 ms

3 10.1.34.1 20 ms 20 ms 20 ms

4 10.1.13.1 20 ms 20 ms 10 ms

5 10.1.12.2 20 ms 30 ms 20 ms

6 10.1.24.2 30 ms 30 ms 30 ms

7 10.1.34.1 50 ms 40 ms 40 ms

8 10.1.13.1 20 ms 30 ms 30 ms

A.

A. R1 does not have a route to 172.17.1.5.

B.

B. R1 has a route to 172.17.1.5.

C.

C. The path for R1 to access 172.17.1.5 is normal.

D.

D. A loop occurs when R1 accesses 172.17.1.5.

Full Access
Question # 59

If the number of MAC addresses learned on an interface enabled with port security reaches the upper limit, which of the following actions may the switch take?

A.

Discards packets with unknown source MAC addresses without generating any alarm.

B.

Sets the interface state to error-down without generating any alarm.

C.

Discards packets with unknown source MAC addresses and generates an alarm.

D.

Sets the interface state to error-down and generates an alarm.

Full Access
Question # 60

During the implementation of iMaster NCE-Campus Wi-Fi location-based services (LBS), terminal location data is sent to an LBS platform through HTTP requests. Which of the following data formats is used in such HTTP requests?

A.

XML

B.

HTML

C.

JSON

D.

YAML

Full Access
Question # 61

The ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is _____ IRB forwarding. (Capitalize the first letter.)

Full Access
Question # 62

An LSR supports various label retention modes. Which of the following statements regarding the liberal mode are correct?

A.

This label retention mode saves the memory and label space.

B.

An LSR retains labels from a neighboring LSR only when the neighbor is its next hop.

C.

An LSR reserves all labels distributed by its neighbor.

D.

Liberal mode allows the device to retain labels from all LSRs, not just the next hop.

Full Access
Question # 63

BGP Link State (BGP-LS) introduces a new NLRI into BGP. The NLRI carries link, node, topology prefix, and other information, and is also referred to as the link state NLRI.

A.

TRUE

B.

FALSE

Full Access
Question # 64

To obtain thetoken IDofiMaster NCE, you need to send anHTTP requestusing the followingPython codeto invoke aniMaster NCE RESTful API:

Which of the following statements isincorrect?

A.

You can run print(r.json()) to display the response message sent from the server.

B.

Token resources are located at https://139.9.213.72:18002/controller/v2/tokens.

C.

The HTTP request uses the GET method to query the token value.

D.

The request body is inJSON format.

Full Access
Question # 65

As shown in the figure, when PE1 receives an ARP request packet, it forwards the packet to PE4. The packet then carries two labels. The label value 201 is carried by the EVPN Type ____ route. (Enter only digits.)

Full Access
Question # 66

Which of the following statements about GRE is incorrect?

A.

GRE can encapsulate IPv6 unicast packets.

B.

GRE can encapsulate IPv4 unicast packets.

C.

GRE can encapsulate IPv6 broadcast packets.

D.

GRE is easy to implement and puts little burden on devices at both ends of a tunnel.

Full Access
Question # 67

The path of an SR-MPLS TE tunnel can be calculated by the controller or tunnel ingress.

A.

TRUE

B.

FALSE

Full Access
Question # 68

Which of the following is the purpose of configuring IS-IS fragmentation on an IS-IS device?

A.

Disable the device from establishing IS-IS neighbor relationships.

B.

Enable the device to support more IS-IS routes.

C.

There is no practical purpose.

D.

Disable the device from learning IS-IS link-state information.

Full Access
Question # 69

Telemetry is a technology that remotely collects data from physical or virtual devices at high speed, and has a layered protocol stack. Which of the following layers isnotincluded in the telemetry protocol stack?

A.

Communication layer

B.

Transport layer

C.

Data encoding layer

D.

Data analysis layer

Full Access
Question # 70

Which of the following is not the function of OSPFv3 Link-LSAs?

A.

Advertises the interface ID of the local router to other routers attached to the link.

B.

Advertises the link-local address of the local interface to other routers attached to the link.

C.

Advertises a list of IPv6 prefixes of the local interface to other routers attached to the link.

D.

Advertises the Options field in the Network-LSA originated on the local link to other routers attached to the link.

Full Access
Question # 71

On the bearer WAN shown in the figure,SR (Segment Routing)is deployed, and the controller is used to compute paths. Drag network technologies on the left to the corresponding application locations on the right.

Full Access
Question # 72

When configuring a static VXLAN tunnel, you need to manually configure the _____, VTEP IP address, and ingress replication list. (Enter only uppercase letters.)

Full Access
Question # 73

O&M personnel for a large-scale event center receive feedback about Wi-Fi access failures. iMaster NCE-CampusInsight provides the function for personnel to view packet exchange processes and locate the root cause. It is found that IP addresses in the DHCP address pool are exhausted, preventing IP addresses from being assigned to mobile terminals. Which of the following functions is used by O&M personnel in this scenario?

A.

Simulation feedback

B.

Protocol trace

C.

Issue analysis

D.

Client journey

Full Access
Question # 74

TheNETCONF content layercontainsdevice configuration data.

Which of the following statements are correct about the followingNETCONF configuration?

merge

rollback-on-error

10

0

A.

The NETCONF operation is performed to load the configuration data to the startup configuration datastore.

B.

The Huawei-YANG model is used.

C.

VLAN 10 is created on the target device.

D.

The operation contains an operation attribute so that the modified data is merged.

Full Access
Question # 75

What can be determined from the following IS-IS peer output?

Peer information for ISIS(1):

Peer System ID: ee8c.a0c2.baf3

Interface: GE0/0/0

State: Up

HoldTime: 7s

Type: L1

PRI: 64

MT IDs supported: 0(UP), 2(UP)

Local MT IDs: 0, 2

Area Address(es): 49.0022

Peer IP Address(es): 10.1.34.1

Peer IPv6 Address(es): FE80::2E0:FCFF:FE98:2576

A.

Both IPv4 and IPv6 IS-IS neighbor relationships are established between R4 and ee8c.a0c2.baf3.

B.

R4 does not have any IS-IS neighbors.

C.

Only an IPv4 IS-IS neighbor relationship is established between R4 and ee8c.a0c2.baf3.

D.

Only an IPv6 IS-IS neighbor relationship is established between R4 and ee8c.a0c2.baf3.

Full Access
Question # 76

In a scenario where aVXLAN tunnelis dynamically established throughBGP EVPN, which of the following statements about the functions ofBGP EVPN Type 3 routesis incorrect?

A.

If the VTEP IP address of a Type 3 route is reachable at Layer 3 and the peer VNI is the same as the local VNI, an ingress replication list is created for forwarding BUM packets.

B.

Type 3 routes carryL2VNIs and VTEP IP addresses.

C.

Type 3 routes carryL3VNIs.

D.

If the VTEP IP address carried in the received Type 3 route is reachable at Layer 3, a VXLAN tunnel to the peer end is established.

Full Access
Question # 77

Which of the following statements are correct about authentication points and policy enforcement points in Huawei's free mobility solution?

A.

The policy enforcement point executes inter-group policies based on security groups.

B.

The authentication point and policy enforcement point must be deployed on the same device.

C.

When receiving user traffic, the authentication point enforces a policy to process the traffic based on the source or destination security group corresponding to the source or destination IP address of the traffic.

D.

The authentication point and policy enforcement point can be deployed on different devices.

Full Access
Question # 78

Which of the following statements about IPSG is incorrect?

A.

IPSG can be used to check the validity of IP packets. If IP packets are invalid, the device reports an alarm to an NMS.

B.

IPSG is a source IP address filtering technology based on Layer 3 interfaces.

C.

IPSG can be used to prevent hosts from changing IP addresses.

D.

IPSG can defend against IP address spoofing attacks.

Full Access
Question # 79

In addition to indicating priority, the DSCP value can also indicate the drop probability. Which of the following DSCP values is set with the highest drop probability?

A.

AF43

B.

AF10

C.

AF12

D.

AF11

Full Access
Question # 80

In SSP packages, Jinja2 templates are used to implement mapping. In the Jinja2 syntax, {% ... %} contains control structures, for example, a 'for' loop.

A.

TRUE

B.

FALSE

Full Access
Question # 81

Which of the following statements are correct about the authentication protocols used inPortal authentication?

A.

When Portal is used as the authentication protocol, the Portal server needs to exchange authentication information with the access device, which then sends the information to the authentication server for identity authentication.

B.

When Portal is used as the authentication protocol, the Portal server and access device only need to support the Portal protocol, but not the HTTP and HTTPS protocols.

C.

When HTTP or HTTPS is used as the authentication protocol, none of the devices involved in the authentication process need to support the Portal protocol.

D.

When HTTP or HTTPS is used as the authentication protocol, the client needs to send authentication information to the access device, which then sends the information to the authentication server for identity authentication.

Full Access
Question # 82

Which of the following statements about DHCP snooping isincorrect?

A.

After DHCP snooping is enabled in the view of a VLAN, it takes effect for the VLAN's DHCP messages received by all the interfaces of the device.

B.

After DHCP snooping is enabled globally, the device processes only DHCPv4 messages by default if no parameter is specified.

C.

DHCP snooping can prevent attacks by configuring trusted interfaces.

D.

After DHCP snooping is enabled in the view of an interface, it takes effect for all DHCP messages on the interface.

Full Access
Question # 83

In typical "two-city three-center" networking, into which layers is the bearer WAN divided?

A.

Core layer

B.

Aggregation layer

C.

Control layer

D.

Access layer

Full Access
Question # 84

Which of the following headend behaviors can insert SRHs into IPv6 packets? (Select All that Apply)

A.

H.Encaps.Red

B.

H.Insert

C.

H.Encaps

D.

H.Insert.Red

Full Access
Question # 85

During the configuration of L3VPNv4 over SRv6 BE, if an RR is deployed in the SR domain, which command must be run on the RR to ensure that the PEs at both ends can correctly learn VPNv4 routes?

Full Access
Question # 86

Drag the authentication modes on the left into their applicable scenarios on the right.

Full Access
Question # 87

In a VXLAN scenario, which of the following features can be enabled to reduce ARP packet flooding between VTEPs?

A.

Local proxy ARP

B.

ARP broadcast suppression

C.

Host information collection

D.

Port isolation

Full Access
Question # 88

A 32-bit MPLS header consists of a 20-bit label used for packet forwarding, a 3-bit EXP field that identifies the IP packet priority, a 1-bit bottom-of-stack flag that identifies the last label, and an 8-bit TTL field. Which statement regarding the TTL field is correct?

A.

This field is used to control the upstream device in label distribution.

B.

This field is used for label management.

C.

This field limits the LSR.

D.

This field is used to prevent packet forwarding loops, similar to the TTL field in an IP header.

Full Access
Question # 89

Refer to the following command output on the router R3. Which of the following statements are correct?

display interface Tunnel

Tunnel0/0/0 current state : UP

Line protocol current state : UP

Last line protocol up time : 15:21:26 UTC-08:00

Description: HUAWEI, AR Series, Tunnel0/0/0 Interface

Route Port, The Maximum Transmit Unit is 1500

Internet Address is 20.1.1.2/24

Encapsulation is TUNNEL, loopback not set

Tunnel source 10.0.3.3 (LoopBack0), destination 10.0.1.1

Tunnel protocol/transport GRE/IP, key disabled

keepalive disabled

Checksumming of packets disabled

A.

The tunnel destination IP address is 10.0.1.1.

B.

The tunnel interface MTU is 1500 bytes.

C.

The tunnel interface IP address is 20.1.1.2/24.

D.

The tunnel source IP address is 10.0.1.1.

Full Access
Question # 90

Which of the following number sequences can be matched by the regular expression100.$?

A.

1000

B.

1001

C.

10000

D.

100

Full Access
Question # 91

Which of the following statements aboutSR-MPLS Policy path planningare correct?

A.

When planning paths based on bandwidth, you need to set the available bandwidth of each interface in advance.

B.

When planning paths based on delay, you must deploy TWAMP or iFIT in advance to measure real-time network delay.

C.

If you use the controller to plan SR-MPLS Policy paths, only primary and backup paths can be deployed, and load balancing cannot be implemented for the primary path.

D.

When statically planning SR-MPLS Policy paths, you can plan load balancing for the primary path.

Full Access
Question # 92

In the Huawei SD-WAN Solution, which of the following routing protocols is used to advertise VPN routes between CPEs?

A.

RIP

B.

OSPF

C.

IS-IS

D.

BGP

Full Access
Question # 93

In the CloudCampus public cloud scenario, if deployment through the Huawei registration query center is used, you do not need to configure DHCP Option 148 on the DHCP server of the campus network.

A.

TRUE

B.

FALSE

Full Access
Question # 94

An SRLB is a set of user-specified local labels reserved for SR-MPLS. These labels are locally configured and have only local significance. Therefore, they are not advertised through the IGP.

A.

TRUE

B.

FALSE

Full Access
Question # 95

Portal authentication is recommended for scenarios with high mobility and numerous terminal types, such as shopping malls and supermarkets. MAC address authentication is recommended for dumb terminals that do not support Portal authentication, such as printers, fax machines, and IP phones.

A.

TRUE

B.

FALSE

Full Access
Question # 96

OSPF is deployed on a campus network to implement network interconnection. An engineer configures R2 as shown in the figure. Which of the following statements is incorrect about LSAs on the OSPF network?

A.

Type 5 LSAs are flooded in Area 1.

B.

Type 3 LSAs are not flooded in Area 1.

C.

Type 3 LSAs are not flooded in Area 2.

D.

Type 5 LSAs are flooded in Area 2.

Full Access