Labour Day - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

Note! The H12-224 Exam is no longer available.

H12-224 HCNP-Routing&Switching (Fast Track) (Huawei Certified Network Professional -Routing&Switching) Questions and Answers

Questions 4

Which of the following attacks is not the network layer attack?

Options:

A.

P spoofing attack

B.

Smurf attack

C.

ARP spoofing attack

D.

ICMP attack

Buy Now
Questions 5

which drop policy is not induced by congestion avoidance?

Options:

A.

FIFO

B.

RED

C.

WRED

D.

WFQ

Buy Now
Questions 6

Which of the following statements regarding OSPF neighbor relationship and adjacency is true?

Options:

A.

OSPF routers must establish an adjacency before exchanging information.

B.

Not all neighbors can establish adjacencies.

C.

Adjacencies are maintained using OSPF Hello Protocol

D.

Neighbor relationships are selected from adjacencies to exchange routing information

Buy Now
Questions 7

The firewall and router can both implement security defense functions and replace each other.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 8

To improve stp running stability a network administrator wants to configure some stp features or protection mechanism on switches. Which of the following configuration roadmaps is correct?

Options:

A.

Configure the user access port as an edge to prevent the user from connecting to the switch on this port.

B.

Configure root protection on the user access port to ensure that the user does not connect to a switch with a higher priority

C.

Configure loop protection on positions where loops have occurred so that loops are always blocked

D.

Configure BPDU protection so that the switch checks the validity of each received

BPDU to prevent attacks of forged

Buy Now
Questions 9

Which command is used to enable association between BFD and VRRP?

Options:

A.

vrrp vrid 1track bfd-session session-name 1reduced 100

B.

bfd-session vrrp vrid 1 track session-name 1 reduced 100

C.

track vrrp vrid 1bfd-session session-name 1 reduced 100

D.

vrrp vrid 1 track bfd- session-name 1 reduced 100

Buy Now
Questions 10

In the multicast network environment how do an IGMPv1 host and an IGMPv2 muter on the same LAN interact with each other?

Options:

A.

If any host on a LAN is running IGMPv1 all hosts on the LAN must also use IGMPv1.

B.

Membership Report message sent from the IGMPv1 host will be received by the IGMPv2 muter.

C.

If the IGMPv1 is in a specific group theIGMPv2 muter must ignore all Leave messages received from this group.

D.

The version 2 muter must set a countdown timer associated with the group that takes into account the presence of the version 1host.

Buy Now
Questions 11

Which of the following statements regarding MUX VLAN is true?

Options:

A.

The MUX VLAN contains a principal VLAN and subordinate VLANs. The principal

VLAN and subordinate VLANS cannot communication

B.

The MUX VLAN contains a principal VLAN and subordinate VLANs. The subordinate

VLANs are classified into subordinate group VLAN can communicate with each other.

C.

The interfaces between subordinate separate VLANs can communicate with each other,

but cannot communicate with the interface

D.

The principal VLAN and subordinate VLANs cannot communicate

Buy Now
Questions 12

To inject IGP routes into BGP routes, you can only use the network command.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 13

Which of the following statements regarding MAC address spoofing attacks is false?

Options:

A.

Attackers initiate MAC address spoofing attacks using the MAC address learning mechanism

B.

Attackers send data frames with forged MAC address to the switch to initiate MAC address spoofing attacks

C.

When MAC address spoofing attacks occur the switch may learn incorrect mapping between MAC address and IP addresses

D.

When MAC address spoofing attacks occur the switch may sent packets to the attacker

Buy Now
Questions 14

Switches run the MSTP protocol by default, which of the following statements regarding the defaults is true?

Options:

A.

All switches run in the same region by default

B.

The STP calculation speed is faster than that when multiple instances are configured

C.

Due to lack of configuration all switches switch the running mode to RSTP.

D.

Each switch runs in an independent region

Buy Now
Questions 15

Which of the following procedures are included in IS-IS route calculation?

Options:

A.

Neighbor relationship establishment

B.

Route calculation

C.

Link information exchange

D.

Router advertisement

Buy Now
Questions 16

Which of the following statements regarding PIM-SM hello packets is false?

Options:

A.

On a PIM-SM network multicast routers that have just started need to send Hello messages to discover neighbors and maintain neighbor relationships

B.

Multicast routers periodically send Hello Messages to each other to maintain communication

C.

A DR is selected on a network segment based on Hello messages exchanged between routers

D.

Hello messages are sent to multicast group address

Buy Now
Questions 17

How many bits does an MPLS label field have?

Options:

A.

8

B.

3

C.

1

Buy Now
Questions 18

Which of the following items are used to remind customers of information security?

Options:

A.

Account soft-out reminder

B.

Password updated reminder

C.

Log protection reminder

D.

Data backup reminder

Buy Now
Questions 19

Which of the following statements regarding network maintenance work are true?

Options:

A.

For device software maintenance onsite operations are allowed but only remote operations are recommended

B.

The device software running is closely related to services running on the device

C.

The external environment where hardware runs does not need special attention

D.

For device environment maintenance personnel need to go the site or even use some professional tools for

Buy Now
Questions 20

TWOLEVEL-1routersindifferentareascanestablisha neighbor relationship.

Options:

A.

TRURE

B.

FALSE

Buy Now
Questions 21

Which of the following statements regarding the VRRP master is false?

Options:

A.

The VRRP master periodically sends VRRP packets.

B.

The VRRP master uses the virtual MAC address to respond to ARP Request packets destined for the virtual IP address.

C.

The VRRP master forwards IP packets destined for the virtual MAC address.

D.

Even if the router becomes the master, the backup router with a higher priority preempts to be the master.

Buy Now
Questions 22

When two routers establish a logical BGP peer relationship over multiple physical links the peer connect-interface command must be used.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 23

In the act configuration command ad (number) ad-number (match-order{auto|config}], the ad-number parameter specifies an

Options:

A.

1000-3999

B.

2000-2999

C.

3000-3999 0-1000

Buy Now
Questions 24

A DHCP server may use different address ranges to allocate IP address to clients which of the following statements regarding address allocation are true?

Options:

A.

IP address that is statically bound with the MAC address of a client in database of the

DHCP sever

B.

IP address that has been allocated to the client that is the IP address in the Requested

IP Adder Option of the DHCP Discover packet sent by the client

C.

First available IP address found by the server in the DHCP address pool

D.

On the DHCP server query Expired and conflicting IP addresses if you find an available

IP address you can assign EiP address that once conflicts with the IP address of another client.

Buy Now
Questions 25

Which of the following causes may result in an is-is neighbor relationship fault

Options:

A.

The devices on two ends of a link have the same system ID

B.

The devices on two ends of a link have inconsistent IS-IS levels

C.

When an IS-IS level-1neighbor relationship is established the devices on two ends of a link have inconsistent area addresses

D.

The IP addresses of interfaces on two ends of a link are on different network segments

Buy Now
Questions 26

Which of the following statements regarding

ASBR-Summary-LSA is false?

Options:

A.

Link State ID. indicates the router ID. of an ASBR

B.

Advertising Router indicates the router ID. of an ABR

C.

The Advertising Router fields in ASBR-Summary-LSAs of all areas are the same

D.

Metric indicates the cost of routes form an ABR to an ASBR

Buy Now
Questions 27

Ethernet supports broadcast once a network loop occurs this simple broadcast mechanism will cause catastrophic consequences which of the following symptoms may

be caused by a loop?

Options:

A.

Users cannot log in to the device remotely

B.

The display interface coming output shows a large number of broadcast packets received on an interface

C.

The CPU usage exceeds 70%

D.

A lot of ICMP packets are lost in ping tests

Buy Now
Questions 28

bgp routers establish peer relationships using udp

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 29

Which of the following packets are transmitted in unicast mode during IP address application by the DHCP client and IP address allocation by DHCP server?

Options:

A.

DHCP Offer

B.

DHCP Request

C.

DHCP Discover

D.

DHCPACK

Buy Now
Questions 30

If the number of checked goods is different from the number of goods on the packing

list, you can unpack and inspect goods and then contact the vendor to handle the inconsistency

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 31

Which packet information can be used for complex traffic classification?

Options:

A.

Packet length

B.

Source and destination addresses

C.

Protocol type

D.

Source and destination MAC addresses

Buy Now
Questions 32

What is the default sending interval of BED packets?

Options:

A.

5s

B.

100ms

C.

1000ms

D.

10S

Buy Now
Questions 33

During EBGP peer relationship troubleshooting, it is found that two directly connected devices set up connections using loopback interfaces command is executed to check the configuration of peer ebgp-max hop hop-count. Which of the following statements is correct?

Options:

A.

The hop count must be greater than

B.

The hop count must be greater than2

C.

The hop count must be greater than 15

D.

The hop count must be greater than 255

Buy Now
Questions 34

Which of the following statements regarding BGP route selection rules are true?

Options:

A.

The route with the higher local preference is preferred

B.

A summarized route is preferred over a non-summarized route

C.

The priorities of three origin attributes types are in the following order EGP IGP

Incomplete

D.

Among the equal-cost routes the route with the shorter duster-list is preferred

Buy Now
Questions 35

Which of the following statements regarding the model is false?

Options:

A.

RSVP is used to transmit signaling of Qos requests notifying the router of Qos requirements of the application

B.

Lt provides guaranteed bandwidth and delay to meet requirements of the application

C.

Lt can provide a load control service to ensure that even in the case of network overload can provide services similar to the net model ensures that packets of some applications can be processed with the low delay

D.

ln this model the network maintains the status of each flow(IP addresses and port numbers of source and destination and destination ends )meeting application requirements

Buy Now
Questions 36

Which of the following firewalls has the highest forwarding efficiency when processing non- first-packet data flows?

Options:

A.

Packet filtering firewall

B.

Proxy firewall

C.

Stateful inspection firewall

D.

Software firewall

Buy Now
Questions 37

Flow mirroring is divided into local Flow mirroring and remote Flow mirroring.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 38

MPLS uses LDP to provide different label distribution modes. Which of the following statements regarding LDP label distribution control modes are false?

Options:

A.

LDP label distribution can be controlled in ordered mode

B.

ln ordered mode when an LSR is the origin of a route it can send label mapping messages to the upstream router in

C.

LDP label distribution cannot be controlled in independent mode

D.

ln independent mode an LSR cannot send label mapping messages to the upstream router before it receives label m

Buy Now
Questions 39

How does an IGMPv2 router maintain group membership on the local network segment?

Options:

A.

A router maintains a timer for each group membership and periodically resets the timer

if it receives Report message

B.

A router periodically sends Query messages and receiver hosts send Report messages after receiving the Query me

CA router periodically sends Group-Specific Query messages periodically

C.

A router will not delete any group memberships unless it receives Leave messages

Buy Now
Questions 40

Which of the following statements regarding OSPF stub area is true?

Options:

A.

AS-external-LSAs can be advertised within a stub area

B.

AS external route can only be based on a default route that is manually configured on an

ABR.

C.

A virtual link cannot pass through a stub area

D.

Any area can be a stub area

Buy Now
Questions 41

MUX VLAN provides a mechanism for network resource control based on VLANs. Which of the following concepts do not belong to the MUX VLAN?

Options:

A.

Principal VLAN

B.

Subordinate VLAN

C.

Guest VLAN Subordinate group VLAN

Buy Now
Questions 42

To avoid global TCP synchronization, which congestion avoidance mechanisms can be used?

Options:

A.

Red

B.

Wired

C.

TALL DROP

D.

WFQ

Buy Now
Questions 43

Which of the following statements regarding buffer overflow attacks is false?

Options:

A.

the buffer overflow attack indicates that an attacker uses defects of memory operations of the software system and runs attack codes with high operation rights.

B.

the buffer overflow attack is irrelevant to the OS vulnerabilities and architecture.

C.

the buffer overflow attack is the most common attack of the software system.

D.

the buffer overflow attack is an application-layer attack.

Buy Now
Questions 44

Which of the following statements regarding P2MP network is true?

Options:

A.

in a P2MP network devices with different mask lengths cannot establish neighbor relationships but this limitation can be

B.

In a P2MP network DR and BDR need to be elected

C.

OSPF does not regard a network as a P2MP network type by default regardless of any

link layer protocol A P2MP network

D.

ln a P2MP network sent LSAs can be filtered using the filter-ls a-out peer command

Buy Now
Questions 45

OSPF runs on TCP protocol and uses TCP port number 179.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 46

Which of the following scenarios is a loop test applicable to?

Options:

A.

to test whether applications are properly connected.

B.

to test whether a routing can prevent loops.

C.

to test whether a switch can prevent loops and broadcast.

D.

to test whether a physical link is disconnected.

Buy Now
Questions 47

Which of the following statements regarding BGp route reliability is true?

Options:

A.

BGP routes do not need to be periodically updated.

B.

BGP sends complete routing table information during each router update.

C.

BGP periodically sends Open messages to detect TCP connectivity.

D.

BGP updates routes in multicast mode.

Buy Now
Questions 48

An access control list (acl) can be used to match routing information or addresses of data packets.it can only identify a specific of packets and cannot filter packets.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 49

Which of the following statements regarding the LSA age field are true? (Multiple Choice)

Options:

A.

The unit of this field Is seconds. In a LSDB, the LS age of a LSA decreases with time.

B.

The unit of this field is seconds. In a L5DB, the LS age of LSA increase with time.

C.

If the LS age of a LSA has reached the LSRefreshTime (30 minutes), the originator of this LSA needs to regenerate an instance of this LSA again.

D.

If the LS age of a LSA has reached the LSRefershTime (30 minutes), any routers can regenerate an instance of this LSA again.

Buy Now
Questions 50

What is the default priority of the device in a VRRP group?

Options:

A.

200

B.

150

C.

100

D.

0

Buy Now
Questions 51

A DHCP server allocates IP addresses to clients which of the following steps are required when configuring a DHCP server.

Options:

A.

Enable DHCP globally

B.

Configure the DHCP option 82 field

C.

Configure the globally address pool if the DHCP server based on the global address pool is used.

D.

Configure the interface address pool if the DHCP server based on the interface address pool is used.

Buy Now
Questions 52

Which of the following statements regarding MUX VLAN is true?

Options:

A.

You do not need to configure the principal VLAN and subordinate VLAN in sequence

B.

The MUX VLAN function must be enabled on an interface so that it can take effect

C.

The principal VLAN and the subordinate VLAN of the MUX VLAN can be the same

VLAN

D.

The MUX VLAN can contain only one subordinate group VLAN

Buy Now
Questions 53

Which command is used to enable association between BFB and OSPF on all interfaces?

Options:

A.

bfd enable

B.

bfd all-interface enable

C.

All-interface bfd enable

Am

D.

Undo bfd all-interface disable

Buy Now
Questions 54

Which of the following even represent the end of the network planning stage?

Options:

A.

Project initiation

B.

Bid release

C.

Contract signing. Preliminary project acceptance

Buy Now
Questions 55

Which of the following statements regarding the characteristic of HA network are true?

Options:

A.

Faults cannot occur frequently

B.

Faults can be recovered rapidly

C.

No fault occurs

D.

When faults occur, services can be only restored manually

Buy Now
Questions 56

which command is used to enable association between bfd and ospf on all interfaces

Options:

A.

bfd enable

B.

Bfd all-interface enable

C.

all-interface bfd enable

D.

Undo bfd all-interface disable

Buy Now
Questions 57

Which of the following statements regarding the physical topology monitoring function of esight are true

Options:

A.

eSight displays the layout and status of NEs subnets and links on the GUI

B.

eSinght supports visualized monitoring of the network-wide running status

C.

eSight display the architecture of the entire network and relationship between network entities

D.

The physical topology monitoring provides an entry for unified network monitoring improving O&M efficiency

Buy Now
Questions 58

Which of the following is the purpose of access security optimization?

Options:

A.

To ensure that sensitive management information will not be intercepted

B.

To prevent or reduce external network attacks and harm

C.

To ensure secure access to key services

D.

To achieve secure user access control

Buy Now
Exam Code: H12-224
Exam Name: HCNP-Routing&Switching (Fast Track) (Huawei Certified Network Professional -Routing&Switching)
Last Update: Nov 27, 2023
Questions: 392
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 07 May 2024