Spring Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

H12-891_V1.0 HCIE-Datacom V1.0 Questions and Answers

Questions 4

Which of the following is the mapping between VNIs and BDs in VXLAN implementation?

Options:

A.

N:M

B.

1:1

C.

N:1

D.

1:N

Buy Now
Questions 5

An SRv6 Policy can be either statically configured on a device or dynamically generated by the controller and then delivered to the device.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 6

Which of the following statements about DHCP snooping is incorrect?

Options:

A.

After DHCP snooping is enabled in the view of a VLAN, it takes effect for the VLAN ' s DHCP messages received by all the interfaces of the device.

B.

After DHCP snooping is enabled globally, the device processes only DHCPv4 messages by default if no parameter is specified.

C.

DHCP snooping can prevent attacks by configuring trusted interfaces.

D.

After DHCP snooping is enabled in the view of an interface, it takes effect for all DHCP messages on the interface.

Buy Now
Questions 7

After a wireless user passes Portal authentication, which of the following parameters cannot be used for authorizing the user?

Options:

A.

free-rule

B.

UCL

C.

IP address

D.

ACL

Buy Now
Questions 8

Drag the authentication modes on the left into their applicable scenarios on the right.

H12-891_V1.0 Question 8

Options:

Buy Now
Questions 9

An LSR supports various label retention modes. Which of the following statements regarding the liberal mode are correct?

Options:

A.

This label retention mode saves the memory and label space.

B.

An LSR retains labels from a neighboring LSR only when the neighbor is its next hop.

C.

An LSR reserves all labels distributed by its neighbor.

D.

Liberal mode allows the device to retain labels from all LSRs, not just the next hop.

Buy Now
Questions 10

In typical " two-city three-center " networking, into which layers is the bearer WAN divided?

Options:

A.

Core layer

B.

Aggregation layer

C.

Control layer

D.

Access layer

Buy Now
Questions 11

AH is an IP-based transport-layer protocol. The protocol number is _____. (Enter only digits.)

Options:

Buy Now
Questions 12

On the bearer WAN shown in the figure, SR (Segment Routing) is deployed, and the controller is used to compute paths. Drag network technologies on the left to the corresponding application locations on the right.

H12-891_V1.0 Question 12

H12-891_V1.0 Question 12

Options:

Buy Now
Questions 13

A network administrator runs the display telemetry subscription command on a device to check telemetry subscription information. The command output is as follows:

[~CE] display telemetry subscription

Sub-name : Sub1

Sensor group:

Sensor-name Sample-interval(ms) State

Sensor1 1000 RESOLVED

Destination group:

Dest-name Dest-IP Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20000 RESOLVED - GRPC

Sub-state : PASSIVE

Total subscription number is : 1

Which of the following statements is incorrect?

Options:

A.

The device sends sampled data every second.

B.

The subscription name is Sub1.

C.

The subscription mode is static subscription.

D.

The IP address of the device is 192.168.56.1.

Buy Now
Questions 14

In the small and midsize campus network design based on the Huawei CloudCampus Solution, when over 100 branches need to communicate with each other, which of the following interconnection networking models is recommended?

Options:

A.

Direct networking

B.

Full-mesh networking

C.

Hub-spoke networking

D.

Partial-mesh networking

Buy Now
Questions 15

iMaster NCE-CampusInsight uses SNMP technology to collect metrics and logs of network devices and detects network exceptions based on real service traffic.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 16

Which of the following types of LSAs does OSPF use to support SR-MPLS?

Options:

A.

Type 7 NSSA External LSA

B.

Type 10 Opaque LSA

C.

Type 1 Router LSA

D.

Type 2 Network LSA

Buy Now
Questions 17

Which of the following statements is correct about the differences between NSR and NSF?

Options:

A.

NSR requires the collaboration of neighboring routers.

B.

NSF requires the collaboration of neighboring routers.

C.

NSF does not require the collaboration of neighboring routers.

D.

Both NSR and NSF require the collaboration of neighboring routers.

Buy Now
Questions 18

Which of the following statements is correct about 6PE and 6VPE?

Options:

A.

In 6PE networking, VPN instances need to be created on PEs.

B.

In 6PE networking, IPv6 addresses of a CE can be reused.

C.

In 6VPE networking, IPv6 addresses of a CE can be reused.

D.

In 6VPE networking, no VPN instance needs to be created on PEs.

Buy Now
Questions 19

If ISIS is used to transmit SIDs on an SR network, the node SIDs advertised by a Level-2 router are transmitted only within the same area.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 20

Which of the following statements about SR-MPLS Policy candidate paths are correct?

Options:

A.

A candidate path can contain multiple segment lists, with each segment list carrying the weight attribute.

B.

Load balancing can be implemented among candidate paths and among segment lists.

C.

An SR-MPLS policy can contain multiple candidate paths with the preference attribute.

D.

The valid candidate path with the highest preference functions as the primary path of the SR-MPLS Policy.

Buy Now
Questions 21

A network administrator needs to retrieve a token ID from iMaster NCE using the following Python code:

import requests

nbi_name = " demol3@north.com "

nbi_pwd = " qqcOVcVel@ "

host = " 139.9.213.72 "

port = " 18002 "

URI = " /controller/v2/tokens "

post_token_url = " https:// " + host + " : " + port + URI

headers_post = { ' Content-Type ' : ' application/json ' , ' Accept ' : ' application/json ' }

r = requests.post(post_token_url, headers=headers_post, json={ " userName " : nbi_name, " password " : nbi_pwd}, verify=incorrect)

Which of the following statements is incorrect?

Options:

A.

You can run print(r.json()) to display the response message sent from the server.

B.

Token resources are located at https://139.9.213.72:18002/controller/v2/tokens.

C.

The HTTP request uses the GET method to query the token value.

D.

The request body is in JSON format.

Buy Now
Questions 22

Which of the following statements about static VXLAN tunnel configuration are correct?

Options:

A.

On an NVE interface, the destination address of a VXLAN tunnel is specified based on the address in the ingress replication list. You can create one NVE interface for multiple VXLAN tunnels.

B.

An NVE interface can be associated with multiple VNIs. Therefore, you can create one NVE interface when there are multiple BDs.

C.

One NVE interface must be created for each VXLAN tunnel, and the source and destination IP addresses must be specified for the NVE interface. Therefore, the number of NVE interfaces is the same as the number of VXLAN tunnels on the VTEP.

D.

One NVE interface must be created for each BD. If there are multiple BDs, multiple NVE interfaces must be created.

Buy Now
Questions 23

Which of the following technologies can be used to isolate users in the same VLAN?

Options:

A.

Super VLAN

B.

Port isolation

C.

IPSG

D.

Ethernet port security

Buy Now
Questions 24

R1 receives a common IPv6 packet from the CE and generates a packet carrying the SRH (Segment Routing Header), as shown in the figure. The packet is forwarded along the path R1 → R2 → R3 → R4. Identify the node type of each device based on their role in SRv6 processing.

H12-891_V1.0 Question 24

H12-891_V1.0 Question 24

Options:

Buy Now
Questions 25

In the admission design for large- and medium-sized campus networks, which of the following authentication modes can be used for PCs connected to IP phones?

Options:

A.

MAC address authentication

B.

802.1X authentication

C.

Multi-mode authentication

D.

Portal authentication

Buy Now
Questions 26

The NETCONF content layer contains device configuration data.

Which of the following statements are correct about the following NETCONF configuration?

< ?xml version= " 1.0 " encoding= " UTF-8 " ? >

< rpc xmlns= " urn:ietf:params:xrnl:ns:netconf:base:1.0 " message-id= " 801 " >

< edit-config >

< target >

< running/ >

< /target >

< default-operation > merge < /default-operation >

< error-option > rollback-on-error < /error-option >

< config xmlns:xc= " urn:ietf:params:xml:ns:netconf:base:1.0 " >

< vlan xmlns= " http://www.huawei.com/netconf/vrp/huawei-vlan " >

< vlans >

< vlan >

< vlanId > 10 < /vlanId >

< protocolVlans >

< protocolVlan xc:operation= " merge " >

< protocolIndex > 0 < /protocolIndex >

< /protocolVlan >

< /protocolVlans >

< /vlan >

< /vlans >

< /vlan >

< /config >

< /edit-config >

< /rpc >

Options:

A.

The NETCONF < edit-config > operation is performed to load the configuration data to the startup configuration datastore.

B.

The Huawei-YANG model is used.

C.

VLAN 10 is created on the target device.

D.

The < config > operation contains an operation attribute so that the modified data is merged.

Buy Now
Questions 27

You have developed a third-party Portal authentication application and connected it to iMaster NCE-Campus to perform Portal authentication for Wi-Fi users. After connecting to Wi-Fi, a user will be redirected to the login page pushed by the authentication application when visiting any website for the first time.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 28

In the Huawei SD-WAN Solution, which of the following routing protocols is used to advertise VPN routes between CPEs?

Options:

A.

RIP

B.

OSPF

C.

IS-IS

D.

BGP

Buy Now
Questions 29

An O & M platform mainly provides unified monitoring and performance management for network devices. Which of the following is NOT device monitoring data?

Options:

A.

Management-plane data

B.

Data-plane data

C.

Control-plane data

D.

Monitoring-plane data

Buy Now
Questions 30

The ________ command can be run to completely isolate Layer 2 and Layer 3 of different interfaces in a VLAN. (Use lowercase letters to supplement the command, which cannot be abbreviated.)

Options:

Buy Now
Questions 31

In a scenario where SR Policies are dynamically established through the controller, which of the following statements about the SR Policy solution architecture is incorrect?

Options:

A.

The controller uses NETCONF to deliver configurations such as service interfaces and routing policies.

B.

The controller uses BGP-LS to collect tunnel topology information and computes SR Policy paths.

C.

The controller uses telemetry to deliver information such as SRv6 SIDs to construct SID entries.

D.

The controller uses BGP IPv6 SR Policy to deliver SR Policy information, such as the color, headend, and endpoint information.

Buy Now
Questions 32

MPLS is located between the data link layer and network layer in the TCP/IP protocol stack and can provide services for all network layer protocols.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 33

Which of the following inter-AS MPLS L3VPN solutions does not require MPLS to run between ASBRs?

Options:

A.

Option C

B.

Option D

C.

Option A

D.

Option B

Buy Now
Questions 34

OSPF is a mature protocol and is unlikely to have route computation errors in a regular networking environment under correct configurations. Which of the following statements are correct about the possible causes preventing an OSPF neighbor relationship from entering Full state?

Options:

A.

A link works abnormally.

B.

The OSPF network types on both ends of the link are inconsistent.

C.

The router IDs of neighbors are the same.

D.

The OSPF MTU values of interfaces on both ends of the link are different.

Buy Now
Questions 35

Which of the following are carried in an HTTP/1.1 response?

Options:

A.

Status line

B.

Response body

C.

Response header

D.

Empty line

Buy Now
Questions 36

Huawei Open Programmability System (OPS) uses HTTP methods to access managed objects to manage network devices. Drag the HTTP methods to their corresponding functions.

H12-891_V1.0 Question 36

Options:

Buy Now
Questions 37

gRPC (Google Remote Procedure Call) is a language-neutral, platform-neutral, and open-source remote RPC system that supports unary RPCs and streaming RPCs.

Which of the following service methods are NOT supported by gRPC?

Options:

A.

rpc Subscribe(SubsArgs) stream returns(SubsReply) {};

B.

rpc dataPublish(stream serviceArgs) returns(stream serviceArgs) {};

C.

rpc stream LotsOfGreetings(HelloRequest) returns (HelloResponse) {};

D.

rpc Cancel(CancelArgs) returns(CancelReply) {};

Buy Now
Questions 38

Huawei Open Programmability System (OPS) uses HTTP methods to access managed objects to manage network devices. HTTP is the most widely used network transmission protocol on the Internet. By default, which TCP port number is used?

Options:

Buy Now
Questions 39

Which MPLS label will be used by PE2 for forwarding traffic to 10.0.1.1 based on the following SR-MPLS database?

Given Data (LSDB Information):

    Prefix-SID: 100

    SRGB Base: 40000

Options:

A.

39002

B.

40002

C.

38002

D.

36002

Buy Now
Questions 40

Which of the following channels are involved in the Huawei SD-WAN Solution?

Options:

A.

Management channel

B.

Control channel

C.

Data channel

D.

Orchestration channel

Buy Now
Questions 41

In SSP packages, Jinja2 templates are used to implement mapping. In the Jinja2 syntax, {% ... %} contains control structures, for example, a ' for ' loop.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 42

To deploy a virtual campus network using iMaster NCE-Campus, the following steps are performed. From top to bottom, sort the steps in the order in which they occur during network deployment and management.

H12-891_V1.0 Question 42

Options:

Buy Now
Questions 43

Which of the following roles is NOT a core role in Huawei ' s Free Mobility solution?

Options:

A.

iMaster NCE-Campus

B.

Policy enforcement device

C.

Authentication device

D.

Policy control device

Buy Now
Questions 44

SR-MPLS uses the MPLS forwarding plane, and therefore requires MPLS to be enabled. Which of the following conditions must be met for MPLS to be automatically enabled on an interface? (Select all that apply)

Options:

A.

The SRGB is configured for the IGP process.

B.

Segment routing is enabled for IGP, and IGP is enabled on the interface.

C.

The static adjacency label of the corresponding interface is configured in the segment routing view.

D.

Segment routing is enabled in the system view.

Buy Now
Questions 45

Refer to the figure.

H12-891_V1.0 Question 45

Which of the following steps are mandatory to enable 802.1X authentication on GE0/0/2 and GE0/0/3 of SW3 and configure a RADIUS server to authenticate and deliver network access rights to users?

Options:

A.

Configure an AAA scheme.

B.

Configure an authentication profile.

C.

Configure an authentication domain.

D.

Configure an 802.1X access profile.

Buy Now
Questions 46

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following command needs to be run on the VBDIF interface to enable the VTEP peer to generate BGP EVPN Type 2 routes based on ARP information of the local terminal?

Options:

A.

mac-address xxxx-xxxx-xxxx

B.

arp-proxy enable

C.

arp collect host enable

D.

arp distribute-gateway enable

Buy Now
Questions 47

On a VXLAN-based virtualized campus network, BGP EVPN can be used as the control plane protocol. Which of the following EVPN route types are not used in the virtualized campus network scenario?

Options:

A.

Type 3

B.

Type 2

C.

Type 4

D.

Type 1

Buy Now
Questions 48

Portal authentication is recommended for scenarios with high mobility and numerous terminal types, such as shopping malls and supermarkets. MAC address authentication is recommended for dumb terminals that do not support Portal authentication, such as printers, fax machines, and IP phones.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 49

Which of the following is the type of northbound API used by iMaster NCE-WAN?

Options:

A.

NETCONF

B.

SNMP

C.

CLI

D.

RESTful

Buy Now
Questions 50

The RR (Route Reflector) is critical to the Huawei SD-WAN Solution, and its deployment mode varies based on the scenario. In which of the following modes can an RR be deployed?

Options:

A.

Multi-area deployment of the RR

B.

Independent deployment of the RR

C.

Co-deployment of the RR and hub site

D.

Partially independent deployment of the RR

Buy Now
Questions 51

In a BGP/MPLS IP VPN scenario, if a PE and CE use OSPF to exchange routing information, domain IDs are used to identify whether the routes imported to VPN instances are from the same OSPF domain.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 52

When an SSH client logs in to an SSH server that is configured only with username and password authentication in SSH mode, the key exchange phase is not involved (no key is generated).

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 53

SSH connections are usually established based on TCP/IP connections. In specific cases, SSH connections can be established based on UDP connections.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 54

The ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is _____ IRB forwarding. (Capitalize the first letter.)

Options:

Buy Now
Questions 55

Which of the following statements about 802.1X authentication are correct?

Options:

A.

802.1X authentication uses EAPoL to exchange authentication information between the client, device, and authentication server.

B.

In EAP termination mode, EAP packets are terminated and re-encapsulated into RADIUS packets on the network access device. The network access device and AAA server use the standard RADIUS protocol to implement authentication, authorization, and accounting.

C.

EAPoL implements EAP encapsulation on an IEEE 802.3 network, whereas EAPoW implements EAP encapsulation on an IEEE 802.11 network.

D.

In EAP relay mode, EAP packets are directly encapsulated by the network access device into RADIUS packets (that is, EAP over RADIUS, or EAPoR). The network access device and AAA server use EAPoR to perform authentication, authorization, and accounting.

Buy Now
Questions 56

As shown in the following figure, OSPF is deployed on a campus network to implement network interconnection, and Area 1 is deployed as an NSSA. To enable R1 to access R4’s loopback interface address, an engineer imports a direct route to R4’s OSPF process. Which of the following statements about this scenario are correct?

[R4-ospf-1] import-route direct

Loopback0: 10.1.4.4/32

Options:

A.

R2 is an ABR and translates Type 7 LSAs carrying the default route information into Type 5 LSAs.

B.

R2 is an ABR and translates Type 7 LSAs that describe external routes into Type 5 LSAs.

C.

R4 is an ASBR in the NSSA and generates Type 7 LSAs carrying the default route information.

D.

R4 is an ASBR in the NSSA and generates Type 7 LSAs to describe external routes.

Buy Now
Questions 57

BGP Link State (BGP-LS) introduces a new NLRI into BGP. The NLRI carries link, node, topology prefix, and other information, and is also referred to as the link state NLRI.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 58

Port isolation can be deployed on an Ethernet network to implement both Layer 2 communication and Layer 3 isolation, making the networking more flexible.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 59

Which of the following statements about the multicast address used by OSPFv3 are correct?

Options:

A.

All OSPF routers use FF08::5.

B.

The DR uses FF08::6.

C.

All OSPF routers use FF02::5.

D.

The DR uses FF02::6.

Buy Now
Questions 60

Which of the following is the default port used by iMaster NCE-Campus northbound open APIs?

Options:

A.

18008

B.

18006

C.

18002

D.

18000

Buy Now
Questions 61

Which of the following technologies can be used to measure performance based on actual service traffic in Huawei ' s CloudWAN solution?

Options:

A.

TWAMP

B.

BGP FlowSpec

C.

Telemetry

D.

iFIT

Buy Now
Questions 62

The telemetry network model is broadly and narrowly defined. Which of the following modules are involved in telemetry in a narrow sense (device-side telemetry)?

Options:

A.

Data generation

B.

Data push

C.

Data source

D.

Data subscription

Buy Now
Questions 63

In the Huawei CloudCampus Solution, which of the following devices can go online through the registration query center?

Options:

A.

Switch

B.

AR

C.

AP

D.

Firewall

Buy Now
Questions 64

Network administrator A wants to use an IP prefix list to match specific routes. Which of the following routes can be matched by the IP prefix list shown in this figure?

ip ip-prefix TEST permit 10.0.0.0 24 less-equal 30

Options:

A.

10.0.2.0/24

B.

10.0.1.0/24

C.

10.0.0.1/30

D.

10.0.0.0/24

Buy Now
Questions 65

What can be determined from the following IS-IS peer output?

Peer information for ISIS(1):

    Peer System ID: ee8c.a0c2.baf3

    Interface: GE0/0/0

    State: Up

    HoldTime: 7s

    Type: L1

    PRI: 64

    MT IDs supported: 0(UP), 2(UP)

    Local MT IDs: 0, 2

    Area Address(es): 49.0022

    Peer IP Address(es): 10.1.34.1

    Peer IPv6 Address(es): FE80::2E0:FCFF:FE98:2576

Options:

A.

Both IPv4 and IPv6 IS-IS neighbor relationships are established between R4 and ee8c.a0c2.baf3.

B.

R4 does not have any IS-IS neighbors.

C.

Only an IPv4 IS-IS neighbor relationship is established between R4 and ee8c.a0c2.baf3.

D.

Only an IPv6 IS-IS neighbor relationship is established between R4 and ee8c.a0c2.baf3.

Buy Now
Questions 66

Which of the following statements is incorrect about a BGP/MPLS IP VPN?

Options:

A.

In most cases, CEs are unaware of VPNs and do not need to support MPLS or MP-BGP.

B.

A BGP/MPLS IP VPN consists of customer edges (CEs), provider edges (PEs), and providers (Ps). PEs and Ps are carrier devices, whereas CEs are BGP/MPLS IP VPN customer devices.

C.

Inter-site communication can be implemented through VPN. A site can only belong to only one VPN.

D.

Ps only need to provide basic MPLS forwarding capabilities and do not need to maintain VPN-related information.

Buy Now
Questions 67

The display current-configuration command displays the running configurations in memory.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 68

In Huawei SD-WAN Solution, which of the following tunneling technologies is used to establish data channels?

Options:

A.

IPsec

B.

GRE over IPsec

C.

VXLAN

D.

MPLS

Buy Now
Questions 69

BGP EVPN can be used as the VXLAN control plane protocol to completely prevent traffic flooding, such as broadcast ARP packets, on the VXLAN network.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 70

The following information is displayed during OSPF troubleshooting. Based on this information, which of the following is the cause of the failure in establishing an OSPF adjacency relationship?

< Huawei > display ospf error interface GigabitEthernet 0/0/0

OSPF Process 1 with Router ID 10.0.12.2

OSPF error statistics

Interface: GigabitEthernet0/0/0 (10.0.12.2)

General packet errors:

0 : Bad version 0 : Bad checksum

0 : Bad area id 0 : Bad authentication type

0 : Bad authentication key 0 : Unknown neighbor

0 : Bad net segment 0 : Extern option mismatch

0 : Router id confusion

HELLO packet errors:

2 : Netmask mismatch 0 : Hello timer mismatch

0 : Dead timer mismatch 0 : Invalid Source Address

Options:

A.

The area types are inconsistent.

B.

The authentication passwords are inconsistent.

C.

The IP address masks of the interfaces are inconsistent.

D.

Hello packets are sent at different intervals.

Buy Now
Questions 71

If SRv6 needs to be deployed on a bearer WAN, which of the following technologies are required? (Select all that apply)

Options:

A.

MPLS

B.

BGP

C.

IGP

D.

BGP-LU

Buy Now
Questions 72

Which of the following are advantages of GRE tunnels? (Select All that Apply)

Options:

A.

GRE tunnels enlarge the scope of a hop-limited network

B.

GRE tunnels can be used to construct VPN networks

C.

ARP packets can be encapsulated through GRE tunnels

D.

Multicast data can be encapsulated through GRE tunnels

Buy Now
Questions 73

As shown in the figure, ARP broadcast suppression is enabled on VTEP1 in BD 20 (VNI 200).

    VTEP1 learns ARP information about PC2 through BGP EVPN routes.

    When VTEP1 forwards the ARP request for PC1’s MAC address to VTEP2,

    What is the destination MAC address of the inner data frame?

H12-891_V1.0 Question 73

Options:

A.

MAC B

B.

MAC C

C.

MAC A

D.

MAC D

Buy Now
Questions 74

NETCONF provides a set of mechanisms for managing network devices. NETCONF operations take place on a configuration datastore of network devices. Which of the following statements is incorrect about the configuration datastore?

Options:

A.

The configuration datastore of network devices can be classified into the candidate, running, and startup configuration datastores.

B.

The < delete-config > operation is oriented at the startup configuration datastore.

C.

The < validate > operation is oriented at the candidate configuration datastore.

D.

The < commit > operation submits the configuration in a startup configuration datastore to a running configuration datastore.

Buy Now
Questions 75

SR-MPLS is enabled on all routers. The label information encapsulated by R1 into a data packet is shown in the figure.

H12-891_V1.0 Question 75

Which of the following is the forwarding path of the data packet?

Options:

A.

R1-R2-R3-R5-R6

B.

R1-R2-R4-R6

C.

R1-R3-R2-R4-R6

Buy Now
Questions 76

On a CloudCampus virtualized campus network, service data enters different VNs from physical networks through edge nodes, and the VN that the data will enter is determined by the VLANs to which users belong. Which of the following statements about dynamic VLAN authorization is incorrect?

Options:

A.

When wired users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

B.

When wireless users pass Portal authentication, they join the authorization VLANs delivered to edge nodes.

C.

When wireless users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

D.

When wired users pass MAC address authentication, they join the authorization VLANs delivered to edge nodes.

Buy Now
Questions 77

On the network shown in the following figure, a remote LDP session needs to be established between SWA and SWC. Which of the following statements is correct?

[SWA] mpls lsr-id 1.1.1.1

[SWA] mpls

[SWA-mpls] mpls ldp

[SWC] mpls lsr-id 33.3.3.3

[SWC] mpls

[SWC-mpls] mpls ldp

SWA ---- SWB ---- SWC

< ------ Remote LDP Session ------ >

Options:

A.

You don ' t need to specify the LSR ID of the remote peer.

B.

You need to configure the directly-connected interfaces between SWA and SWC to set up TCP connections.

C.

The existing configuration is correct.

D.

You need to create a remote peer and specify an LSR ID for the remote peer.

Buy Now
Questions 78

NETCONF provides a set of mechanisms for managing network devices. What layers can NETCONF be conceptually partitioned into?

Options:

A.

Encrypted transport layer, messages layer, operations layer, and content layer

B.

Encrypted transport layer, messages layer, configuration layer, and content layer

C.

Secure transport layer, messages layer, configuration layer, and content layer

D.

Secure transport layer, messages layer, operations layer, and content layer

Buy Now
Questions 79

Which of the following fields is added to BGP4+ Update packets to advertise IPv6 routes?

Options:

A.

A new path attribute: MP_UNREACH_NLRI

B.

A new path attribute: MP_REACH_NLRI

C.

A new path attribute: IPv6_REACH_NLRI

D.

A new NLRI type: IPv6_NLRI, which carries the IPv6 NLRI prefix length and IPv6 NLRI prefix.

Buy Now
Questions 80

Which of the following statements is incorrect about intranet security design for a large or medium-sized virtualized campus network?

Options:

A.

Traffic suppression can be configured on the wired network to block broadcast traffic by shutting down interfaces.

B.

Intranet security refers to both wired and wireless network security.

C.

To secure data transmission, the CAPWAP tunnel between the AC and AP supports DTLS encryption.

D.

In addition to terminal access security, air interface security must be considered during wireless network security design.

Buy Now
Questions 81

H12-891_V1.0 Question 81

As shown in the following figure, an engineer tests network interconnection between two branches. To implement network interconnection, OSPF is deployed on R1, R2, and R3 of branch 1, and IS-IS is deployed on R2, R3, and R4 of branch 2. Which of the following operations needs to be performed to allow R1 to access R4 ' s loopback interface address?

Options:

A.

Run the default-route-advertise command in both the OSPF and IS-IS views on R2.

B.

No configuration is required.

C.

Run the default-route-advertise command only in the OSPF view on R2.

D.

Run the default-route-advertise command only in the IS-IS view on R2.

Buy Now
Questions 82

At the NETCONF content layer, the < config > operation may contain an operation attribute, which is used to specify an operation type for configuration data. Which of the following operation attributes are supported?

Options:

A.

create: The configuration data identified by the element that contains this attribute is added to the configuration datastore only if the configuration data does not already exist in the configuration datastore. If it already exists in the configuration datastore, < rpc-error > with the < error-tag > value being data-exists is returned.

B.

delete: The configuration data identified by the element that contains this attribute is deleted from the configuration datastore. If the configuration data does not exist in the configuration datastore, a deletion success message is returned.

C.

merge: The configuration data identified by the element that contains this attribute is modified if the configuration data already exists in the configuration datastore. If not, the configuration data is created in the datastore.

D.

remove: The configuration data identified by the element that contains this attribute is deleted from the configuration datastore. If the configuration data does not exist in the configuration datastore, a deletion success message is returned.

Buy Now
Questions 83

H12-891_V1.0 Question 83

As shown in the following figure, an engineer tests network interconnection between two branches. To implement network interconnection, OSPF is deployed on R1, R2, and R3 of branch 1, and IS-IS is deployed on R2, R3, and R4 of branch 2. Which of the following operations needs to be performed to allow R1 to access R4 ' s loopback interface address?

Options:

A.

Run the default-route-advertise command in both the OSPF and IS-IS views on R2.

B.

No configuration is required.

C.

Run the default-route-advertise command only in the OSPF view on R2.

D.

Run the default-route-advertise command only in the IS-IS view on R2.

Buy Now
Questions 84

A network administrator runs the display telemetry destination command on a device to check information about a destination group that sampled data is sent to. The command output is as follows. Which of the following statements is incorrect?

[~CE-telemetry-sensor-group-Sensor1]display telemetry destination

Dest-name Dest-addr Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20000 RESOLVED - GRPC

Options:

A.

The IP address of the destination group is 192.168.56.1

B.

The destination group name is Dest1.

C.

VPN encapsulation is used for data push.

D.

The gRPC protocol is used for data push.

Buy Now
Questions 85

Which of the following number sequences can be matched by the regular expression 100.s?

Options:

A.

100

B.

10000

C.

1000

D.

1001

Buy Now
Questions 86

Huawei CloudCampus Solution has multiple application scenarios, and iMaster NCE-Campus provides different APIs for each application scenario. Match the following application scenarios with the open APIs provided by iMaster NCE-Campus.

H12-891_V1.0 Question 86

Options:

Buy Now
Questions 87

When Huawei iMaster NCE-IP is used to configure SR-MPLS TE tunnels, which of the following protocols is used by the controller to collect device running status information?

Options:

A.

Telemetry

B.

Telnet

C.

BGP-LS

D.

IS-IS

Buy Now
Questions 88

The IS-IS Level-1 neighbor relationship is not established between R3 and R4. Referring to the following information, what is the possible cause?

H12-891_V1.0 Question 88

Options:

A.

The IIH authentication between R3 and R1 fails.

B.

The IS-IS levels of R3 and R4 do not match.

C.

The circuit types of the interfaces connecting R3 and R4 do not match.

D.

The area IDs of R3 and R4 are different.

Buy Now
Questions 89

In the SD-WAN Solution, which routing protocols can be used by LAN-side devices to connect to a Layer 3 network?

Options:

A.

IS-IS

B.

OSPF

C.

BGP

D.

RIP

Buy Now
Questions 90

This figure shows an SRv6 (Segment Routing over IPv6) packet. If the Destination Address field in the IPv6 basic header is FC04::4, the value of the SL (Segment Left) field in the SRv6 header should be ____. (Enter only digits.)

Options:

Buy Now
Questions 91

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following BGP EVPN routes is used to advertise MAC addresses, ARP entries, and IRB routes?

Options:

A.

Type 3

B.

Type 4

C.

Type 2

D.

Type 1

Buy Now
Questions 92

On a broadcast network, if the DR priorities of two interfaces connecting two routers are set to 0, in which of the following states will the OSPF neighbor relationship stay?

Options:

A.

Full

B.

Down

C.

2-way

D.

Exchange

Buy Now
Questions 93

The Huawei SD-WAN solution has three types of channels. Drag the channel names to their corresponding callouts.

H12-891_V1.0 Question 93

H12-891_V1.0 Question 93

Options:

Buy Now
Questions 94

The path of an SR-MPLS TE tunnel can be calculated by the controller or tunnel ingress.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 95

Which of the following statements about BIER (Bit Index Explicit Replication) and PIM (Protocol Independent Multicast) are correct?

Options:

A.

On a BIER-based multicast network, packets sent by the multicast source must be encapsulated with the Bitstring field.

B.

On a PIM-based multicast network, an MDT covering all nodes that multicast traffic traverses needs to be established.

C.

On a BIER-based multicast network, an MDT covering all nodes that multicast traffic traverses does not need to be established.

D.

On a BIER-based multicast network, multicast users must send group join messages hop by hop.

Buy Now
Questions 96

As shown in the figure, PE1 establishes an EVPN peer relationship with each of PE2 and PE3. When the network is initialized, CE1 sends an ARP request packet.

Which of the following statements are correct about how a PE processes the packet?

Options:

A.

When forwarding the packet to PE3, PE1 needs to add the BUM traffic label allocated by PE3 to the packet.

B.

PE1 sends a MAC/IP advertisement route carrying the MAC address of CE1.

C.

PE2 forwards the packet to CE1.

D.

PE3 forwards the packet to CE1.

Buy Now
Exam Code: H12-891_V1.0
Exam Name: HCIE-Datacom V1.0
Last Update: Mar 21, 2026
Questions: 322

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now H12-891_V1.0 testing engine

PDF (Q&A)

$31.5  $104.99
buy now H12-891_V1.0 pdf
dumpsmate guaranteed to pass

24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 21 Mar 2026