Special Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

H12-893_V1.0 Questions and Answers

Question # 6

iMaster NCE-Fabric is Huawei's DC controller. Tenants can use it to create VPCs and deploy logical networks as required. After logical NEs are deployed, the corresponding network configurations are delivered to underlying network devices. Which of the following statements is false about the delivered network configurations?

A.

Logical switches are mainly used for Layer 3 communication between hosts on a VXLAN network. These switches correspond to Layer 3 gateway configurations such as VBDIF interface and VPN instance configurations on physical devices.

B.

An end port represents an online host. It corresponds to the traffic encapsulation type (whether a VLAN tag is carried) configured on a Layer 2 sub-interface of a physical device.

C.

A logical port is equivalent to an independent physical port that is used by a host to connect to a VXLAN network. It corresponds to the Layer 2 sub-interface configuration on a physical device.

D.

Logical switches are mainly used for Layer 2 communication between hosts on a VXLAN network. These switches correspond to BD and Layer 2 VNI configurations on physical devices.

Full Access
Question # 7

An enterprise builds a DC and deploys iMaster NCE-Fabric to automatically deliver network configurations. After the engineer manually deploys the underlay network and delivers overlay network configurations through iMaster NCE-Fabric, it is found that tenant hosts cannot access external networks. Which of the following is not a possible cause of this fault?

A.

No return route is configured on the PE.

B.

The engineer did not check whether the service loopback interface needs to be configured on the VXLAN network based on the switch model.

C.

No firewall security policy is configured when host traffic passes through the firewall.

D.

The MAC address of the NVE interface on the VXLAN network is not manually specified.

Full Access
Question # 8

Which of the following statements is false about centralized gateway deployment using BGP EVPN?

A.

When configuring a VTEP, you need to create a Layer 2 BD and bind a VNI to the Layer 2 BD.

B.

A VXLAN tunnel is identified by a pair of VTEP IP addresses and can be established if the local and remote VTEP IP addresses are reachable to each other at Layer 3.

C.

When BGP EVPN is used to dynamically establish a VXLAN tunnel, the local and remote VTEPs first establish a BGP EVPN peer relationship and then exchange BGP EVPN routes to transmit VNI and VTEP IP address information. A VXLAN tunnel is then dynamically established between them.

D.

When configuring a VTEP, you need to create an EVPN Instance in the Layer 2 BD and configure an RD for the local EVPN instance. You do not need to configure an RT.

Full Access
Question # 9

In an M-LAG, two CE series switches send M-LAG synchronization packets through the peer-link to synchronize information with each other in real time. Which of the following entries need to be included in the M-LAG synchronization packets to ensure that traffic forwarding is not affected if either device fails? (Select All that Apply)

A.

MAC address entries

B.

Routing entries

C.

IGMP entries

D.

ARP entries

Full Access
Question # 10

To allow access to a VXLAN network, you need to configure service access points on devices. There are two access modes: Layer ? sub-interface and binding. (Enter the acronym in uppercase letters.)

Full Access
Question # 11

In Huawei CloudFabric Solution, iMaster NCE-Fabric uses SNMP to collect alarms and logs of physical devices and vSwitches.

A.

TRUE

B.

FALSE

Full Access
Question # 12

In network overlay, both endpoints of a VXLAN tunnel are physical switches.

A.

TRUE

B.

FALSE

Full Access
Question # 13

Both M-LAG and stacking technologies can overcome the disadvantages of traditional DCNs. However, M-LAG is a better choice to ensure 24/7 service continuity.

A.

TRUE

B.

FALSE

Full Access
Question # 14

Which of the following statements are true about the tenant service model? (Select All that Apply)

A.

A tenant can apply for independent compute, storage, and network resources.

B.

One logical router is mapped to one VRF.

C.

An EPG can have only one subnet.

D.

A subnet supports the access of only one VM.

Full Access
Question # 15

Linux consists of the user space and kernel space. Which of the following functions are included in the kernel space? (Select All that Apply)

A.

The NIC driver sends data frames.

B.

Data encapsulation

C.

Bit stream transmission

D.

Data encryption

Full Access
Question # 16

Which of the following statements is false about VXLAN tunnel establishment?

A.

A VXLAN tunnel is identified by a pair of VTEPs.

B.

After a tunnel is established, if one end of the tunnel goes Down, the other end may not go Down.

C.

For a static tunnel, you need to manually configure the local and remote VNIs.

D.

Dynamic tunnels depend on EVPN Type 5 routes to transmit information.

Full Access
Question # 17

Which of the following nodes is a backbone node of a DC and provides high-speed IP forwarding?

A.

Spine

B.

DC1 leaf

C.

Service leaf

D.

Border leaf

Full Access
Question # 18

Which of the following can be deployed to enhance DC reliability? (Select All that Apply)

A.

Power supply redundancy

B.

M-LAG

C.

Monitor Link

D.

Controller cluster

Full Access