Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

H12-821_V1.0 HCIP-Datacom-Core Technology V1.0 Questions and Answers

Questions 4

A wide area network (WAN) is a remote network that connects local area networks (LANs) or metropolitan area networks (MANs) in different areas for communication purposes. It is typically used to interconnect campus networks or data center networks.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 5

An ACL can be used to match routes or data, but cannot be used to match both the IP address prefix length and mask length.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 6

On an OSPF or IS-IS network, the filter-policy import command can be run on a router to filter out the LSAs forwarded by its neighbors.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 7

Which of the following statements is false, based on the following IGMP information on an interface of RTA?XC

H12-821_V1.0 Question 7

Options:

A.

The interval for sending group-specific Query messages is 60s.

B.

The maximum time for response to Query messages is 10s.

C.

The IP address of the interface is 192.168.1.1.

D.

The IGMP version is IGMPV2.

Buy Now
Questions 8

If the interval for two consecutive packets of a TCP session reaching the firewall is longer than the aging time of the session, the firewall deletes the session information from the session table to ensure network security.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 9

ASBRs cannot exist in an OSPF stub area.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 10

Which of the following methods is usually used by a network administrator to configure a newly purchased device for the first time?

Options:

A.

Telnet

B.

SNMP

C.

Login through the Console port

D.

FTP

Buy Now
Questions 11

Which Of the following IEEE 802.11 standards is also known as Wi-Fi 6?

Options:

A.

802.11ac

B.

802.11n

C.

802.11ax

D.

802.11b

Buy Now
Questions 12

On a network, each router has a local core routing table and protocol routing tables. A routing entry in the local core routing table has multiple key fields. Which of the following are included?

Options:

A.

Destination address of a route

B.

Routing protocol preference of a route

C.

Inbound interface that learns a route

D.

Routing protocol that learns a route

Buy Now
Questions 13

A network entity title consists of an area address and a system ID. It is a special NSAP (the SEL has a fixed value of 00) and is mainly used for route calculation.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 14

Which of the following statements regarding the BGP error display of a router false?

Options:

A.

The error may be caused by the incorrect neighbor address.

B.

The neighbor address of this router is 10.1.1.5.

C.

Error Type indicates that the BGP error is caused by the neighbor relationship error.

D.

The error occurred at 12:40:39 on March 22, 2010.

Buy Now
Questions 15

When a packet passes through a firewall, the firewall creates a session connection for the packet to guide subsequent forwarding of the packet. However, the firewall does not create session entries for all packets. For which of the following packets does the firewall not create session entries when the packet reaches the firewall?

Options:

A.

ICMP ping packet

B.

GRE packet

C.

Subsequent fragment

D.

UDP packet

Buy Now
Questions 16

On Huawei switches, which of the following planes provides network information and forwarding entries that are mandatory for data plane forwarding?

Options:

A.

Forwarding plane

B.

Control plane

C.

Data plane

D.

Monitoring plane

Buy Now
Questions 17

On an enterprise network, the directly connected interfaces of two OSPF routers are on different network segments and have different masks. To establish an OSPF neighbor relationship between the two interfaces, you can change their network types to which of the following?

Options:

A.

Point-to-point

B.

NBMA

C.

P2MP

D.

Broadcast

Buy Now
Questions 18

Which of the following statements regarding different LSA types is false?

Options:

A.

LS Request packets contain only LS Type, LS ID, and Advertising Router.

B.

LS Ack packets contain complete LSA information.

C.

DD packets contain only LSA summary information, including LS Type, LS ID, Advertising Router, and LS Sequence Number.

D.

LS Update packets contain complete LSA information.

Buy Now
Questions 19

The Internet Assigned Numbers Authority (IANA) allocates Class D addresses to IPv4 multicast. An IPv4 address is 32 bits long, and the four most significant bits of a Class D address are 1110.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 20

On an OSPF network, if a router functions as an ABR, the router must also be a BR.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 21

Which of the following protocols are multi-channel protocols?

Options:

A.

H.323

B.

FTP

C.

Telnet

D.

SMTP

Buy Now
Questions 22

After a BGP peer relationship is established between two ends, changing the router ID of one end resets the BGP peer relationship.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 23

As shown in the figure, R1 imports the direct route 10.1.1.0/24 to OSPF. An engineer enables bidirectional route re-advertisement on R2 and R3, and configures the following commands on R3. After the network becomes stable, which of the following is thePrevalue of the route 10.1.1.0/24 in the routing table of R4?

H12-821_V1.0 Question 23

[R3]acl 2000

[R3-acl-basic-2000] rule permit source 10.1.1.0 0

[R3-acl-basic-2000] quit

[R3]route-policy hcip permit node 10

[R3-route-policy-10] if-match acl 2000

[R3-route-policy-10] apply preference 14

[R3-route-policy-10] quit

[R3]ospf 1

[R3-ospf-1] preference ase route-policy hcip

Options:

A.

150

B.

14

C.

10

D.

15

Buy Now
Questions 24

Security policy is the core feature of firewalls. Only valid traffic that complies with security policies can be forwarded by firewalls. Which of the following statements are true about security policy matching rules?

Options:

A.

Multiple values can be configured for a single matching condition, and the values are logically ANDed.

B.

If a security policy contains multiple matching conditions, the relationship between them is AND.

C.

The system has a default security policy nameddefault, where all matching conditions areanyand the default action ispermit.

D.

When multiple security policy rules are configured, they are sorted in a list by configuration sequence by default. A security policy rule configured earlier is placed higher in the list and has a higher priority.

Buy Now
Questions 25

STAs stay on different subnets before and after Layer 3 roaming. To enable the STAs to access the original network after roaming, network engineers need to configure user traffic to be forwarded to the original subnet over a CAPWAP tunnel.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 26

A router performs a lookup in its FIB table for a packet. If the tunnel ID in the matching entry is 0, the packet needs to be forwarded through a tunnel, such as an MPLS tunnel.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 27

Which of the following statements regarding OSPF is true?

Options:

A.

OSPF does not have an acknowledgement mechanism. Therefore, OSPF relies on the upper-layer protocol, TCP, for acknowledgement.

B.

OSPF performs LSDB update every 30 minutes.

C.

OSPF uses the Bellman-Ford algorithm, and each router independently runs this algorithm.

D.

OSPF floods a LSU packet at an interval of 5s.

Buy Now
Questions 28

On anRSTP network, port roles are optimized to overcome thedisadvantages of STP. Which of the followingport rolesare supported inRSTP?

Options:

A.

Root port

B.

Designated port

C.

Backup port

D.

Alternate port

Buy Now
Questions 29

The Origin attribute is used to define the origin of BGP path information. There are three types of Origin attributes. Which of the following lists the Origin attributes in descending order of priority?

Options:

A.

IGP > EGP > Incomplete

B.

Incomplete > IGP > EGP

C.

EGP > IGP > Incomplete

D.

Incomplete > EGP > IGP

Buy Now
Questions 30

Which of the following statements regarding IGMPv1 and IGMPv2 are true?

Options:

A.

1GMPv2 supports only general query.

B.

1GMPv2 defines the Leave message type.

C.

IGMPv1 does not define the IGMP Leave message type.

D.

IGMPv1 supports general query.

Buy Now
Questions 31

When an SSH client accesses an SSH server for the first time and the SSH server's public key is not configured on the SSH client, you can enable first-time authentication on the SSH client. This allows the SSH client to access the SSH server and saves the SSH server's public key on the SSH client. In this way, the next time the SSH client accesses the SSH server, the SSH client can use the saved public key to authenticate the SSH server.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 32

In BGP, Notification messages are used to request peers to resend routing information after routing policies are changed.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 33

On an OSPF network, Type 7 LSAs can be generated only by ASBRs in NSSAs or stub areas and describe AS-external routes.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 34

Which of the following statements regarding the LSA age field are true?

Options:

A.

The unit of this field is seconds. In a LSDB, the LS age of a LSA increases with time.

B.

If the LS age of a LSA has reached the LSRefreshTime (30 minutes), any router can regenerate an instance of this LSA again.

C.

The unit of this field is seconds. In a LSDB, the LS age of a LSA decreases with time.

D.

If the LS age of a LSA has reached the LSRefreshTime (30 minutes), the originator of this LSA needs to regenerate an instance of this LSA again.

Buy Now
Questions 35

In inter-AC roaming scenarios, an AC can function as the mobility server of multiple mobility groups, but can be added only to one mobility group.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 36

An enterprise network runs OSPF to implement network communication. Which of the following types of LSAs may be generated by an ABR?

Options:

A.

NSSA LSA

B.

AS External LSA

C.

Network Summary LSA

D.

ASBR Summary LSA

Buy Now
Questions 37

IPv6 defines multiple types of addresses. Which of the following statements is false about these addresses?

Options:

A.

Link-local addresses can be quickly generated using the EUI-64 method.

B.

Anycast addresses can be used only as destination addresses.

C.

Each interface can have multiple global unicast addresses with different network prefixes.

D.

Manually configured link-local addresses have a higher priority than automatically generated ones.

Buy Now
Questions 38

BFD provides fast fault detection independent of media and routing protocols. To use this mechanism to detect link connectivity, devices at both ends must support this feature.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 39

An IP prefix list is a common matching tool used in routing policies. Which of the following cannot be configured as matching conditions in an IP prefix list on a Huawei router?

Options:

A.

Port number

B.

Mask

C.

Action

D.

Index

Buy Now
Questions 40

In BGP, Keepalive messages are used to maintain BGP peer relationships. When a BGP router receives a Keepalive message from a peer, the BGP router sets the state of the peer to Established and periodically sends Keepalive messages to maintain the connection. By default, the device sends Keepalive messages every seconds.

Options:

Buy Now
Questions 41

L2TP does not provide security encryption. Therefore, other security measures, such as IPsec, are required to ensure the security of the entire tunnel for data transmission.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 42

An enterprise uses Huawei routers to deploy an IS-IS network for network-wide communication. An engineer wants to change the interface cost to control route selection. By default, which of the following values is the maximum cost that can be configured?

Options:

A.

67

B.

63

C.

64

D.

68

Buy Now
Questions 43

In IP multicast, RPF routes can be elected only from among unicast routes and multicast static routes.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 44

On an STP network, the root bridge, root port, and designated port are elected in sequence. The election rules of these ports are different. List the steps for electing the root port in sequence.

H12-821_V1.0 Question 44

Options:

Buy Now
Questions 45

SSHis a secure protocol that establishes tunnels for users on insecure networks.Which of the following statements is false about SSH login?

Options:

A.

The SSH server supports authentication. Only users who have passed authentication can log in to the device.

B.

When the SSH server function is enabled on a device, the socket obtaining service is also enabled on the device. This makes the device prone to scanning by attackers. As such, the SSH server function and the corresponding port can be disabled when the SSH server function is not required.

C.

An ACL rule can be configured for each VTY channel to control the IP addresses of clients that are allowed to log in to the device.

D.

By default, the port number of the SSH server is 23. You can change the port number of the SSH server to a non-well-known port number to reduce the probability of being scanned and attacked.

Buy Now
Questions 46

Route attributes are specific descriptions of routes. BGP route attributes can be classified into four types. Which of the following are well-known discretionary attributes?

Options:

A.

Atomic_Aggregate

B.

Local-Preference

C.

Community

D.

MED

Buy Now
Questions 47

An enterprise office network runs OSPF and is divided into multiple OSPF areas. Enterprise network engineers can configure route summarization on ASBRs to reduce the number of inter-area Type 3 LSAs, which in turn reduces the routing table size and improves device resource utilization.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 48

Which of the following routing protocols support the default route through command configuration?

Options:

A.

BGP

B.

IS-IS

C.

OSPF

D.

ICMP

Buy Now
Questions 49

When receiving a packet, a Huawei router matches the packet against ACL rules. The default ACL matching order used by the Huawei router is.

Options:

Buy Now
Questions 50

ACLs are a common matching tool in routing policies. An ACL can be configured on a router to match routes.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 51

On the campus OSPF network shown in the following figure, the interfaces connecting the five routers are GE interfaces, and their costs are not changed. The import-route command is run on R1. After the network converges, the route to the server at 192.168.1.0/24 is queried on R2. Which of the following is the cost of this route?

Options:

A.

2

B.

4

C.

3

D.

1

Buy Now
Questions 52

On an OSPF network, if two routers with the same router ID run in different areas and one of the routers is an ASBR, LSA flapping occurs.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 53

During the DHCP interaction process, the DHCP server and client exchange various types of packets. Which of the following packets is not sent from the client to the server?

Options:

A.

DHCP Release

B.

DHCPNAK

C.

DHCP Request

D.

DHCP Discover

Buy Now
Questions 54

In the OSPF protocol, intra-area route calculation involves only Router LSA, Network LSA, and Summary LSA.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 55

On an IS-IS network, each router can generate LSPs. Which of the following events trigger the generation of a new LSP?

Options:

A.

Related IS-IS interfaces go up or down.

B.

Periodic updates occur.

C.

Inter-area IP routes change.

D.

The IS-IS interface cost is increased.

Buy Now
Questions 56

Four routers run IS-IS and have established adjacencies. The area IDs and router levels are marked in the following figure. Which of the following statements is true?

Options:

A.

The LSDB of R2 does not contain the LSP of R4.

B.

The LSDB of R1 does not contain the LSP of R4.

C.

The LSDB of R2 does not contain the LSP of R3.

D.

The LSDB of R3 does not contain the LSP of R4.

Buy Now
Questions 57

To overcome the disadvantages ofSTP,RSTPchanges the format ofconfiguration BPDUs. Which of the following fields inSTP BPDUsis used to specify theport role?

Options:

A.

Flags

B.

BPDU Type

C.

PID

D.

PVI

Buy Now
Questions 58

On an IPv6 network, intermediate forwarding devices do not fragment IPv6 packets for the purpose of reducing their packet processing pressure. Packets are fragmented only on the source node.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 59

Typically, a protocol that occupies two ports during communication is called a multi-channel protocol. For such protocols, the ASPF function must be enabled on the firewall to ensure smooth setup of the data channel and reduce the risk of attacks. Which of the following protocols is not a multi-channel protocol?

Options:

A.

FTP

B.

SIP

C.

SMTP

D.

H.323

Buy Now
Questions 60

The filter-policy 2000 export command is run in an ISIS process. Which of the following statements about the functions of a filter policy is false?

Options:

A.

Is used together with the route import function to advertise some imported external routes to neighbors.

B.

If this command is not run, the device by default advertises all routes that ISIS Imports form external routing protocols.

C.

Controls the advertisement of routes generated by the device.

D.

Filters LSPs to be advertised.

Buy Now
Questions 61

The BFD Echo function checks the connectivity of the forwarding link by looping back packets. Which of the following statements are true about this function?

Options:

A.

If URPF is enabled on the peer end, BFD packets may be incorrectly discarded on the peer end.

B.

In the BFD Echo function, the device uses the IP address of the outbound interface as the source IP address by default.

C.

The BFD Echo function applies only to single-hop BFD sessions.

D.

When configuring a BFD session supporting the BFD echo function, you need to configure both the local and remote discriminators.

Buy Now
Questions 62

A forwarding information database (FIB) can directly guide packet forwarding on a router.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 63

On an IS-IS network, all routers generate LSPs. Which of the following types of information isnotcontained in the LSPs generated by pseudonodes?

Options:

A.

Interface information

B.

Information about supported network protocols

C.

Route information

D.

Neighbor information

Buy Now
Questions 64

What is the correct procedure for a VLAN pool to assign terminals to VLANs.

H12-821_V1.0 Question 64

Options:

Buy Now
Questions 65

Access control lists can be classified into which types as follows?

Options:

A.

Basic ACL

B.

User-defined ACL

C.

Advanced ACL

D.

Layer 2 ACL

Buy Now
Questions 66

On an IS-IS network, each device needs to be configured with anetwork entity title (NET), which consists of three parts, each containing different fields. Which of the following fields are contained in theArea Address part?

Options:

A.

High Order DSP

B.

AFI

C.

IDI

D.

System ID

Buy Now
Questions 67

Which of the following statements regarding OSPF route summarization is false?

Options:

A.

OSPF supports two route summarization modes: ABR summarization and ASBR summarization.

B.

Any router in OSPF can summarize routes.

C.

Route summarization is the process of summarizing routes with the same prefix into one route and then advertising only the summarized route to other areas.

D.

Route summarization can reduce routing information, decrease the routing table size, and improve router performance.

Buy Now
Questions 68

In PIM-DM, which of the following processes are involved in SPT establishment?

Options:

A.

Prune

B.

Graft

C.

Flooding

D.

State-refresh

Buy Now
Questions 69

iMaster NCE-Campus can be used as an authentication server on a WLAN to authenticate STAs.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 70

Which of the following statements regarding the firewall zone security level is false?

Options:

A.

The configured security level cannot be changed.

B.

Two zones cannot be configured with the same security level.

C.

The default security level of the new zone is 1.

D.

Only the security level of the user-defined zone can be configured.

Buy Now
Questions 71

By default, if no router ID is configured but multiple loopback interface addresses are configured, BGP selects the largest loopback interface address as the router ID.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 72

Preferences of routing protocols determine the sequence In which a router selects a route among routes to the same destination /earned through different routing protocols.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 73

On an STP network, parameters used for role election, such as the root bridge ID, root path cost, and bridge ID, are all fields in BPDUs.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 74

After IPsec is deployed on an enterprise network, services are interrupted. The administrator finds that no data flow triggers IKE negotiation.

Which of the following are possible causes?(Select all that apply)

Options:

A.

Configuration error of an interzone security policy

B.

An unreachable route

C.

The IPsec policy is not correctly applied to the related interface.

D.

A mismatch between the ACL and protected data flow

Buy Now
Questions 75

During routine maintenance, an enterprise administrator runs a command to check VRRP group information. Which of the following statements is false about the command output?

yaml

CopyEdit

display vrrp verbose

Vlanif100 | Virtual Router 1 State: Master

Virtual IP: 10.1.1.100

Master IP: 10.1.1.2

PriorityRun: 120 PriorityConfig: 120

DR: None BDR: None MTU: 0

Preempt: YES Delay Time: 20s

Remain: --

Track: YES Priority Reduced: 20

Auth Type: MD5

BFD-session State: UP

Options:

A.

Preemption is enabled for the VRRP group.

B.

This VRRP group is an mVRRP group.

C.

Authentication is enabled for the VRRP group.

D.

The ID of the VRRP group is 1.

Buy Now
Questions 76

On an RSTP network, port priorities may be compared during root port or designated port election. Which of the following values is the default priority of a port on a Huawei switch?

Options:

A.

1

B.

128

C.

4096

D.

32768

Buy Now
Questions 77

A non-client is an IBGP peer that functions as neither an RR nor a client. A non-client must establish fully meshed connections with the RR and all the other non-clients.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 78

If a router ID is configured in both the system via and the BGP view, BGP uses the router ID configured in the BGP view because the BGP view takes precedence over the system view.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 79

InIPv6,NDP (Neighbor Discovery Protocol)uses multiple types ofICMPv6 packets. Which of the following functions areRS (Router Solicitation) packetsused for?

Options:

A.

Duplicate address detection

B.

Prefix readdressing

C.

Redirection

D.

Address resolution

Buy Now
Questions 80

On an OSPF network, interfaces are classified into four types based on link layer protocols. Which of the following types can interfaces on an IS-IS network be classified into based on physical links?

Options:

A.

P2P

B.

Broadcast

C.

P2MP

D.

NBMA

Buy Now
Questions 81

Compared with RSTP, which of the following port roles are added to MSTP?

Options:

A.

Backup port

B.

Master port

C.

Edge port

D.

Regional edge port

Buy Now
Questions 82

OSPF networks are classified into four types of networks by link layer protocol. Drag the following link layer protocols to the corresponding network types.(Token is reusable)

Options:

Buy Now
Questions 83

As shown in the figure, the stateful inspection firewall forwards the packet because the packet matches the session status of the firewall.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 84

The Interface \P address and VRRP virtual IP address can be the same.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 85

Which of the following statements regarding routing policy and policy-based routing are true?

Options:

A.

A routing policy is used to control import, advertisement, and receiving of routing information.

B.

Policy-based routing is used to control import, advertisement, and receiving of routing information.

C.

Policy-based routing is used to control packet forwarding without following routes in the routing table.

D.

A routing policy is used to control packet forwarding without following routes in the routing table.

Buy Now
Questions 86

On the network shown in the following figure, the management VLAN is VLAN 10, and the AP isconfigured to obtain an IP address on the network segment 10.1.1.0/24 through DHCP. The AP, AC, and AR function as the DHCP client, DHCP relay agent, and DHCP server, respectively. Which of the following configurations for the DHCP relay agent and DHCP server are correct?

Options:

A.

[AC] dhcp server group AP[AC-dhcp-server-group-AP] dhcp-server 172.21.1.2[AC-dhcp-server-group-AP] quit[AC] interface Vlanif 10[AC-Vlanif 10] dhcp select relay[AC-Vlanif 10] dhcp relay server-select AP[AC-Vlanif 10] quit

B.

[AR] ip pool AP[AR-ip-pool-AP] network 10.1.1.0 mask 24[AR-ip-pool-AP] gateway-list 10.1.1.2[AR-ip-pool-AP] excluded-ip-address 10.1.1.1[AR-ip-pool-AP] quit[AR] interface GigabitEthernet 0/0/1[AR-GigabitEthernetO/O/1] dhcp select global[AR-GigabitEthernet0/0/l] quit[AR] ip route-static 10.1.1.0 255.255.255.0 172.21.1.1

C.

[AR] ip pool AP[AR-ip-pool-AP] network 172.21.1.0 mask 24[AR-ip-pool-AP] gateway-list 172.21.1.2[AR-ip-pool-AP] excluded-ip-address 172.21.1.1[AR-ip-pool-AP] quit[AR] interfaceGigabitEthernet 0/0/1[AR-GigabitEthernetO/0/1] dhcp select global[AR-GigabitEthernetO/0/1] quit[AR] ip route-static 10.1.1.0 255.255.255.0 172.21.1.1

D.

[AC] dhcp server group AP[AC-dhcp-server-group-AP] dhcp-server 10.1.1.2[AC-dhcp-server-group-AP] quit[AC] interface Vlanif 10[AC-Vlanif 10] dhcp select relay[AC-Vlanif 10] dhcp relay server-select AP[AC-VlaniflO] quit

Buy Now
Questions 87

IGMPv2 uses the timeout mechanism for group members leaving a group. Group members can only leave a group silently. Before the timeout period expires, multicast traffic is still forwarded by the multicast router, and this is a defect.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 88

In the OSPF protocol, inter-area route calculation involves only Router LSA, Network LSA, and Summary LSA.

Options:

A.

TRUE

B.

FLASE

Buy Now
Questions 89

On an OSPF network, if two indirectly connected routers with the same router ID run in the same area, Type 1 LSA calculation fails.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 90

Which of the following statements about multicast packet forwarding is true?

Options:

A.

If a multicast data packet fails the RPF check, the packet must have been received through a sub-optimal interface. However, this interface still receives and forwards the multicast traffic downstream.

B.

IGMP snooping cannot control the scope of multicast traffic flooding on a Layer 2 network.

C.

The source address of a multicast packet is a unicast address.

D.

In multicast transmission, the destination address of a packet can be the unicast address of a host.

Buy Now
Questions 91

Which command is used to configure the VRRP preemption delay?

Options:

A.

vrrp vrid 1 timer delay 20

B.

vrrp vrid 1 preempt-delay 20

C.

vrrp vrid 1 preempt-mode timer delay 20

D.

vrrp vrid 1 preempt-timer 20

Buy Now
Questions 92

Which of the following statements is false about the default processing of the next hop address when a BGP device advertises a route?

Options:

A.

When advertising a locally originated route to an IBGP peer, a BGP device sets the next hop address to the IP address of its interface connected to the peer.

B.

When advertising a non-labeled route received from an EBGP peer to an IBGP peer, a BGP device changes the next hop address to the IP address of its interface connected to the IBGP peer.

C.

When advertising a route to an EBGP peer, a BGP device sets the next hop address to the IP address of its interface connected to the peer.

D.

A BGP device does not change the next hop address of a route if the route is received from an IBGP peer and is to be sent to another IBGP peer.

Buy Now
Questions 93

A Layer 2 switch supports multiple types of Ethernet interfaces. Similar to a trunk interface, a hybrid interface allows data frames from multiple VLANs to pass through. In addition, you can determine whether data frames from a VLAN sent out from a hybrid interface are tagged or untagged.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 94

A switch running a later IGMP version can identify Report messages of an earlier IGMP version, but the switch running an earlier IGMP version cannot identify Report messages of a later IGMP version. To ensure that IGMP runs properly, you are advised to set the IGMP version on the switch to be the same as or later than the IGMP version of member hosts.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 95

Roaming technologyis typically used on alarge WLANto ensure thatSTA (station) servicesare not interrupted when STAs move between coverage areas of different APs.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 96

This configuration is part of RTA configuration. Which of the following statements regarding the configuration are true?

[RTA] ospf 100

[RTA-ospf-100]silent-interface GigabitEthernet 1/0/0

Options:

A.

RTA cannot establish a neighbor relationship with the neighbor that this interface is directly connected to.

B.

GigabitEthernet 1/0/0 is prohibited from sending OSPF packets.

C.

Direct routes of GigabitEthernet 1/0/0 can still be advertised.

D.

This interface cannot send Hello packets.

Buy Now
Questions 97

OSPF has five types of packets, which have the same header format. If the Auth Type field in the packet header is 1, which of the following authentication modes is used?

Options:

A.

Non-authentication

B.

MD5 authentication

C.

Plaintext authentication

D.

Hash authentication

Buy Now
Questions 98

An enterprise administrator wants to configure single-hop BFD to implement fast detection of direct links. Which of the following configurations are mandatory?

Options:

A.

Configure the remote discriminator of a BFD session.

B.

Configure the local discriminator of a BFD session.

C.

Configure a multicast IP address for BFD.

D.

Enable BFD globally.

Buy Now
Exam Code: H12-821_V1.0
Exam Name: HCIP-Datacom-Core Technology V1.0
Last Update: Jun 23, 2025
Questions: 329

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now H12-821_V1.0 testing engine

PDF (Q&A)

$36.75  $104.99
buy now H12-821_V1.0 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 01 Jul 2025