Special Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

H12-891_V1.0 Questions and Answers

Question # 6

Exhibit:

The following figure shows the inter-AS MPLS VPN Option C (solution 2). RRs are deployed, and no traffic passes through the RRs during forwarding. If a data packet sent from PE2 to 192.168.1.1 carries two labels, which of the following statements about the two labels are correct?

A.

T1 is allocated by RR2.

B.

T1 is allocated by P2.

C.

V1 is allocated by PE1.

D.

V1 is allocated by P2.

Full Access
Question # 7

The IS-IS Level-1 neighbor relationship is not established between R3 and R4. Referring to the following information, what is the possible cause?

A.

The IIH authentication between R3 and R1 fails.

B.

The IS-IS levels of R3 and R4 do not match.

C.

The circuit types of the interfaces connecting R3 and R4 do not match.

D.

The area IDs of R3 and R4 are different.

Full Access
Question # 8

An SRLB is a set of user-specified local labels reserved for SR-MPLS. These labels are locally configured and have only local significance. Therefore, they are not advertised through the IGP.

A.

TRUE

B.

FALSE

Full Access
Question # 9

Which of the following statements is incorrect about Authentication Header (AH)?

A.

AH provides packet encryption.

B.

AH provides data origin authentication.

C.

AH provides anti-replay protection.

D.

AH provides data integrity authentication.

Full Access
Question # 10

What can be determined from the following figure?

A.

R3 must be a Level-2 device.

B.

The device role of R3 cannot be determined.

C.

R3 must be a Level-1-2 device.

D.

R3 must be a Level-1 device.

Full Access
Question # 11

Collecting information before a cutover helps you determine whether services are normal before and after the cutover.

A.

TRUE

B.

FALSE

Full Access
Question # 12

Complete the basic processing procedure for DiffServ model-based QoS shown in the figure

Full Access
Question # 13

Which of the following are potential risks in HTTP communication?

A.

Eavesdropping: Third parties can obtain communication data.

B.

Pretending: Third parties can impersonate another user.

C.

Tampering: Third parties can tamper with communication data.

D.

Lost: There is a low probability that data is lost during transmission.

Full Access
Question # 14

BGP Link State (BGP-LS) introduces a new NLRI into BGP. The NLRI carries link, node, topology prefix, and other information, and is also referred to as the link state NLRI.

A.

TRUE

B.

FALSE

Full Access
Question # 15

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following statements about symmetric IRB forwarding are correct?

A.

Both the ingress VTEP and egress VTEP forward packets based on the Layer 3 forwarding table.

B.

The ingress VTEP forwards packets based only on the Layer 2 forwarding table.

C.

The egress VTEP forwards packets based only on the Layer 2 forwarding table.

D.

When VTEPs forward inter-subnet user communication packets, the VNI carried in the VXLAN header is the L3VNI.

Full Access
Question # 16

During the evolution from OSPFv2 to OSPFv3, LSA formats and functions remain unchanged, except that the network layer addresses in LSAs are changed from IPv4 to IPv6.

A.

TRUE

B.

FALSE

Full Access
Question # 17

The on-premise mode is recommended for controller deployment on small and midsize campus networks.

A.

TRUE

B.

FALSE

Full Access
Question # 18

Drag the IPsec functions on the left to the corresponding function description on the right.

Full Access
Question # 19

Which of the following user logout modes are supported by 802.1X authentication?

A.

An authentication server forces a user to log out.

B.

A user logs out manually.

C.

An access device forces a user to log out.

D.

An accounting server forces a user to log out.

Full Access
Question # 20

The figure shows a packet that contains three label headers. Select the values (in decimal notation) of the X, Y, and Z fields, respectively.

Full Access
Question # 21

IPsec SAs can be established in either manual mode or IKE auto-negotiation mode. Which of the following statements about the two modes is incorrect?

A.

The lifetime of an SA established in IKE auto-negotiation mode is controlled by the lifetime parameters configured on both ends of the tunnel.

B.

In manual mode, all parameters (including encryption and authentication keys) required for establishing an IPsec SA need to be manually configured.

C.

In IKE auto-negotiation mode, the encryption and authentication keys required for establishing an SA are generated using the DH algorithm.

D.

SAs established in both manual and IKE auto-negotiation modes can be dynamically updated.

Full Access
Question # 22

In the SD-WAN Solution, which routing protocols can be used by LAN-side devices to connect to a Layer 3 network?

A.

IS-IS

B.

OSPF

C.

BGP

D.

RIP

Full Access
Question # 23

Which of the following intelligent traffic steering policies can be used to fully utilize link bandwidth and implement link bandwidth-based load balancing on an enterprise network with multiple links?

A.

Application priority-based traffic steering

B.

Link quality-based traffic steering

C.

Link priority-based traffic steering

D.

Traffic bandwidth-based traffic steering

Full Access
Question # 24

Which of the following statements are correct about the command:

ping -aX -cY -sZ -vpn-instance M 10.5.16.2

A.

The source IP address of the ping packets is X.

B.

The ping packets belong to VPN instance M.

C.

During the ping operation, the quantity of ICMP Request packets is Y.

D.

The size of each ICMP Request packet for the ping operation is Z bytes.

Full Access
Question # 25

Exhibit:

A loop occurs because Spanning Tree Protocol (STP) is not enabled on the network. Which of the following symptoms may occur?

A.

A loop alarm is generated on the LAN switch.

B.

CPU usage is too high.

C.

MAC entries flap.

D.

Host receives a large number of broadcast packets.

Full Access
Question # 26

On a campus network, iMaster NCE-Campus is used to deploy two VNs (Virtual Networks): R&D VN and Marketing VN. Users in these two VNs belong to two separate security groups.

The campus network requires R&D personnel and sales personnel to communicate with each other. To meet this requirement, which of the following tasks does a network administrator need to perform?

A.

Deploy network service resources.

B.

Deploy a policy control matrix.

C.

Configure inter-VN communication.

D.

Deploy an external network.

Full Access
Question # 27

Flavors are additional behaviors defined to enhance the End series instructions in SRv6. Which of the following End instructions can the PSP flavor be attached to?

A.

End.X

B.

End.BM

C.

End.T

D.

End

Full Access
Question # 28

Huawei Open Programmability System (OPS) uses HTTP methods to access managed objects to manage network devices. HTTP is the most widely used network transmission protocol on the Internet. By default, which TCP port number is used?

Full Access
Question # 29

In the Huawei SD-WAN Solution, the topologies of different VNs must be the same.

A.

TRUE

B.

FALSE

Full Access
Question # 30

Which of the following statements about VXLAN principles is incorrect?

A.

VXLAN uses MAC-in-UDP encapsulation to encapsulate Ethernet packets into UDP packets and thereby extend Layer 2 networks.

B.

When VXLAN is deployed, in addition to devices at both ends of a VXLAN tunnel, intermediate forwarding devices are also required to support VXLAN. Otherwise, VXLAN packets cannot be forwarded.

C.

VXLAN packets are forwarded through routes on the underlay network, and the MAC address of the terminal in the inner data frame is not considered during underlay forwarding.

D.

VXLAN can be deployed on campus networks to implement Layer 2 and Layer 3 communication.

Full Access
Question # 31

iMaster NCE-CampusInsight uses SNMP technology to collect metrics and logs of network devices and detects network exceptions based on real service traffic.

A.

TRUE

B.

FALSE

Full Access
Question # 32

A VGMP packet is encapsulated with a UDP header and a VGMP header. By default, a VGMP packet uses UDP port _____.

Full Access
Question # 33

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following fields is not carried in BGP EVPN Type 2 routes?

A.

IP Prefix

B.

IP Address

C.

L3VNI

D.

L2VNI

Full Access
Question # 34

As shown in the following figure, an engineer tests network interconnection between two branches. To implement network interconnection, OSPF is deployed on R1, R2, and R3 of branch 1, and IS-IS is deployed on R2, R3, and R4 of branch 2. Which of the following operations needs to be performed to allow R1 to access R4's loopback interface address?

A.

Run the default-route-advertise command in both the OSPF and IS-IS views on R2.

B.

No configuration is required.

C.

Run the default-route-advertise command only in the OSPF view on R2.

D.

Run the default-route-advertise command only in the IS-IS view on R2.

Full Access
Question # 35

As shown in the figure, ARP broadcast suppression is enabled on VTEP1 in BD 20 (VNI 200).

    VTEP1 learns ARP information about PC2 through BGP EVPN routes.

    When VTEP1 forwards the ARP request for PC1’s MAC address to VTEP2,

    What is the destination MAC address of the inner data frame?

A.

MAC B

B.

MAC C

C.

MAC A

D.

MAC D

Full Access
Question # 36

BGP EVPN can be used as the VXLAN control plane protocol to completely prevent traffic flooding, such as broadcast ARP packets, on the VXLAN network.

A.

TRUE

B.

FALSE

Full Access
Question # 37

When a client invokes the iMaster NCE-Campus RESTful API, it sends an HTTP request. The server then returns the status code 401.

Which of the following errors has occurred?

A.

The service is unavailable.

B.

Access denied.

C.

The requested resource does not exist.

D.

Unauthorized.

Full Access
Question # 38

Which of the following statements is correct about 6PE and 6VPE?

A.

In 6VPE networking, IPv6 addresses of a CE can be reused.

B.

In 6PE networking, VPN instances need to be created on PEs.

C.

In 6PE networking, IPv6 addresses of a CE can be reused.

D.

In 6VPE networking, no VPN instance needs to be created on PEs.

Full Access
Question # 39

Which of the following statements regarding OSPF neighbor relationship faults is incorrect?

A.

For non-DR and non-BDR routers on an Ethernet link, the 2-Way state is acceptable.

B.

The Init state indicates that the router has received Hello packets from its neighbors, but the received Hello packets do not contain the OSPF RID of the receiving router.

C.

The ExStart state indicates that two neighbor routers have inconsistent MTUs or the same OSPF Router ID (RID).

D.

The Attempt state indicates that the router does not send unicast Hello packets to configured neighbors.

Full Access
Question # 40

When you configure a virtualized campus network on iMaster NCE-Campus, Fit APs can immediately go online after you add them to iMaster NCE-Campus.

A.

TRUE

B.

FALSE

Full Access
Question # 41

If an engineer wants to remotely log in to a Huawei device, the engineer uses the Paramiko library to compile the following code when compiling the SSH Python script:

cli = ssh.invoke_shell()

cli.send("screen-length 0 temporary\n")

What is the function of screen-length 0 temporary?

A.

Performing automatic word wrap

B.

Performing split-screen display

C.

Canceling split-screen display

D.

Canceling automatic word wrap

Full Access
Question # 42

In SRv6, each time a packet passes through an SRv6 endpoint node, the Segments Left field value decrements by 1, and the IPv6 DA changes.

A.

TRUE

B.

FALSE

Full Access
Question # 43

Which of the following is the purpose of configuring IS-IS fragmentation on an IS-IS device?

A.

Disable the device from establishing IS-IS neighbor relationships.

B.

Enable the device to support more IS-IS routes.

C.

There is no practical purpose.

D.

Disable the device from learning IS-IS link-state information.

Full Access
Question # 44

Which of the following technologies can be used to measure performance based on actual service traffic in Huawei's CloudWAN solution?

A.

TWAMP

B.

BGP FlowSpec

C.

Telemetry

D.

iFIT

Full Access
Question # 45

As shown in the figure, when PE1 receives an ARP request packet, it forwards the packet to PE4. The packet then carries two labels. The label value 201 is carried by the EVPN Type ____ route. (Enter only digits.)

Full Access
Question # 46

Which of the following inter-AS MPLS L3VPN solutions does not require MPLS to run between ASBRs?

A.

Option C

B.

Option D

C.

Option A

D.

Option B

Full Access
Question # 47

Which of the following types of EVPN routes does not carry MPLS labels?

A.

Ethernet A-D route

B.

MAC/IP advertisement route

C.

Ethernet segment route

D.

Inclusive multicast route

Full Access
Question # 48

The following figure shows the inter-AS MPLS L3VPN Option C (Solution 2). ASBR-PE2 is connected to CE3 and runs eBGP.

To enable all CEs to communicate with each other, which of the following address families must peer relationships be enabled in the BGP process of ASBR-PE2?

A.

VPNv4 address family

B.

BGP-LS address family

C.

VPN instance unicast address family

D.

Unicast BGP address family

Full Access
Question # 49

What can be determined from the following IS-IS peer output?

Peer information for ISIS(1):

    Peer System ID: ee8c.a0c2.baf3

    Interface: GE0/0/0

    State: Up

    HoldTime: 7s

    Type: L1

    PRI: 64

    MT IDs supported: 0(UP), 2(UP)

    Local MT IDs: 0, 2

    Area Address(es): 49.0022

    Peer IP Address(es): 10.1.34.1

    Peer IPv6 Address(es): FE80::2E0:FCFF:FE98:2576

A.

Both IPv4 and IPv6 IS-IS neighbor relationships are established between R4 and ee8c.a0c2.baf3.

B.

R4 does not have any IS-IS neighbors.

C.

Only an IPv4 IS-IS neighbor relationship is established between R4 and ee8c.a0c2.baf3.

D.

Only an IPv6 IS-IS neighbor relationship is established between R4 and ee8c.a0c2.baf3.

Full Access
Question # 50

Which of the following statements about IPSG is incorrect?

A.

IPSG can be used to check the validity of IP packets. If IP packets are invalid, the device reports an alarm to an NMS.

B.

IPSG is a source IP address filtering technology based on Layer 3 interfaces.

C.

IPSG can be used to prevent hosts from changing IP addresses.

D.

IPSG can defend against IP address spoofing attacks.

Full Access
Question # 51

Which of the following statements is correct about 6PE and 6VPE?

A.

In 6PE networking, VPN instances need to be created on PEs.

B.

In 6PE networking, IPv6 addresses of a CE can be reused.

C.

In 6VPE networking, IPv6 addresses of a CE can be reused.

D.

In 6VPE networking, no VPN instance needs to be created on PEs.

Full Access
Question # 52

As shown in the figure, what is known about the default routes on R4?

Routing Table on R4:

display ip routing-table protocol isis

Destination/Mask Proto Pre Cost Flags NextHop Interface

0.0.0.0/0 ISIS-L1 15 10 D 10.1.24.1 GigabitEthernet0/0/1

ISIS-L1 15 10 D 10.1.34.1 GigabitEthernet0/0/0

172.16.1.2/32 ISIS-L1 15 10 D 10.1.24.1 GigabitEthernet0/0/1

172.16.1.3/32 ISIS-L1 15 10 D 10.1.34.1 GigabitEthernet0/0/0

A.

Four equal-cost default routes

B.

One default route

C.

Two default routes with different costs

D.

Two equal-cost default routes

Full Access
Question # 53

In 6PE and 6VPE networking, no VPN instance needs to be created on PEs.

A.

TRUE

B.

FALSE

Full Access