Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

H12-891_V1.0 HCIE-Datacom V1.0 Questions and Answers

Questions 4

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following fields is not carried in BGP EVPN Type 2 routes?

Options:

A.

IP Prefix

B.

IP Address

C.

L3VNI

D.

L2VNI

Buy Now
Questions 5

O&M personnel for a large-scale event center receive feedback about Wi-Fi access failures. iMaster NCE-CampusInsight provides the function for personnel to view packet exchange processes and locate the root cause. It is found that IP addresses in the DHCP address pool are exhausted, preventing IP addresses from being assigned to mobile terminals. Which of the following functions is used by O&M personnel in this scenario?

Options:

A.

Simulation feedback

B.

Protocol trace

C.

Issue analysis

D.

Client journey

Buy Now
Questions 6

Which of the following statements is correct about the differences between NSR and NSF?

Options:

A.

NSR requires the collaboration of neighboring routers.

B.

NSF requires the collaboration of neighboring routers.

C.

NSF does not require the collaboration of neighboring routers.

D.

Both NSR and NSF require the collaboration of neighboring routers.

Buy Now
Questions 7

Whenstatic IPsec VPNis used for WAN interconnection in theHuawei CloudCampus Solution, theAP, Router, and ____can be used as egress devices.

Options:

Buy Now
Questions 8

You have developed a third-party Portal authentication application and connected it to iMaster NCE-Campus to perform Portal authentication for Wi-Fi users. After connecting to Wi-Fi, a user will be redirected to the login page pushed by the authentication application when visiting any website for the first time.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 9

The figure shows an L3VPN over an SRv6 BE (Best Effort) network. According to the information displayed on PE2, which of the following statements is incorrect?

Options:

A.

An IBGP peer relationship is established between PE2 and PE1, and PE2 leams the route to 192.168.1.0/24 over an IBGP peer relationship.

B.

The instruction type corresponding to FO00:2 :: 1:79 is End.DT4.

C.

PE2 imports the route 192.168.1.0/24 through the import-route command.

D.

The router ID of the BGP process on the P is 1.0.0.6.

Buy Now
Questions 10

SR-MPLS is enabled on all routers. The label information encapsulated byR1into a data packet is shown in the figure.

Which of the following is the forwarding path of the data packet?

Options:

A.

R1-R2-R3-R5-R6

B.

R1-R2-R4-R6

C.

R1-R3-R2-R4-R6

Buy Now
Questions 11

gRPC (Google Remote Procedure Call)is a language-neutral, platform-neutral, and open-source remote RPC system that supportsunary RPCs and streaming RPCs.

Which of the following service methodsare NOT supportedby gRPC?

Options:

A.

rpc Subscribe(SubsArgs) stream returns(SubsReply) {};

B.

rpc dataPublish(stream serviceArgs) returns(stream serviceArgs) {};

C.

rpc stream LotsOfGreetings(HelloRequest) returns (HelloResponse) {};

D.

rpc Cancel(CancelArgs) returns(CancelReply) {};

Buy Now
Questions 12

In thefirewall hot standby scenario, in which of the following conditions will the local deviceproactively send VGMP packets?

Options:

A.

Hot standby being disabled

B.

Priority increase

C.

Link detection packet timeout

D.

Hot standby being enabled

Buy Now
Questions 13

After a wireless user passes Portal authentication, which of the following parameterscannotbe used for authorizing the user?

Options:

A.

free-rule

B.

UCL

C.

IP address

D.

ACL

Buy Now
Questions 14

Which of the following statements about SR-MPLS characteristics are correct? (Select all that apply)

Options:

A.

Only the controller can compute paths based on explicit paths.

B.

SR-MPLS supports smooth network evolution by extending existing protocols, such as IGPs.

C.

Efficient TI-LFA FRR protection is provided for fast path fault recovery.

D.

Such networks can quickly interact with upper-layer applications through the source routing technology.

Buy Now
Questions 15

Refer to the output information of a device below. According to the information, which of the following MPLS labels is carried in a data packet forwarded by the device to 10.0.1.1?

Options:

A.

36100

B.

36200

C.

40100

D.

40200

Buy Now
Questions 16

Among NETCONF operations, the operation may contain an operation attribute, which is used to specify an operation type for configuration data. Which of the following operation attributes isincorrect?

Options:

A.

remove

B.

merge

C.

create

D.

update

Buy Now
Questions 17

Which of the following statements is incorrect about intranet security design for a large or medium-sized virtualized campus network?

Options:

A.

In addition to terminal access security, interface security must be considered during wireless network security design.

B.

Traffic suppression can be configured on the wired network to block broadcast traffic by shutting down interfaces.

C.

To secure data transmission, the CAPWAP tunnel between the AC and AP supports DTLS encryption.

D.

Intranet security refers to both wired and wireless network security.

Buy Now
Questions 18

By default, the domain ID of an OSPF process is the same as the process ID. You can run the domain-id command in the OSPF process view to change a domain ID.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 19

Which of the following statements regarding OSPF neighbor relationship faults is incorrect?

Options:

A.

For non-DR and non-BDR routers on an Ethernet link, the 2-Way state is acceptable.

B.

The Init state indicates that the router has received Hello packets from its neighbors, but the received Hello packets do not contain the OSPF RID of the receiving router.

C.

The ExStart state indicates that two neighbor routers have inconsistent MTUs or the same OSPF Router ID (RID).

D.

The Attempt state indicates that the router does not send unicast Hello packets to configured neighbors.

Buy Now
Questions 20

Which of the following are carried in the HTTP/1.1 response header?

Options:

A.

Status code

B.

Reason phrase

C.

Protocol version

D.

Response method

Buy Now
Questions 21

The telemetry network model is broadly and narrowly defined. Which of the following modules are involved intelemetry in a narrow sense (device-side telemetry)?

Options:

A.

Data generation

B.

Data push

C.

Data source

D.

Data subscription

Buy Now
Questions 22

As shown in the figure, a sham link is established between PE1 and PE2 through the loopback interfaces. CE2 can learn the 192.168.1.0/24 route (directed route on CE1) through the sham link and backdoor link. If other parameters use their default settings, the cost of the 192.168.1.0/24 route on CE2 should be ______. (Enter an Arabic numeral without symbols.)

H12-891_V1.0 Question 22

Options:

Buy Now
Questions 23

Huawei Open Programmability System (OPS) provides openness and programmability capabilities for network devices and enables users to perform secondary development. To facilitate script completion, Huawei OPS provides the Python script template in which the OPSConnection class is created. The member function for creating device resources is def post(self, uri, req_data).

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 24

IPsec uses an asymmetric encryption algorithm to encrypt the symmetric algorithm key, which it uses to encrypt/decrypt data, ensuring security and performance.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 25

MACsec can provide secure services during MAC-layer data transmitting and receiving. Which of the following services isnotprovided by MACsec?

Options:

A.

Controllability check

B.

Integrity check

C.

User data encryption

D.

Data source authenticity verification

Buy Now
Questions 26

On the network shown in the figure, OSPF-based SR-MPLS TE is enabled on all routers. Which of the following adjacency labels are allocated by P3?

Options:

A.

9006

B.

9002

C.

9003

D.

9005

Buy Now
Questions 27

During the migration test, which of the following indicates that the test is completed?

Options:

A.

Tested network services are running properly.

B.

Command outputs are correct.

C.

The network is running properly.

D.

Tested upper-layer application services are running properly on the network.

Buy Now
Questions 28

Huawei Open Programmability System (OPS) uses standard HTTP methods to access managed objects to manage network devices. Which of the following HTTP methods is used to configure the value of a network device's managed object?

Options:

A.

PUT

B.

POST

C.

PATCH

D.

GET

Buy Now
Questions 29

On acampus network,iMaster NCE-Campusis used to deploy twoVNs (Virtual Networks):R&D VNandMarketing VN. Users in these two VNs belong to twoseparate security groups.

The campus network requiresR&D personnel and sales personnel to communicate with each other. To meet this requirement, which of the following tasks does a network administrator need to perform?

Options:

A.

Deploy network service resources.

B.

Deploy a policy control matrix.

C.

Configure inter-VN communication.

D.

Deploy an external network.

Buy Now
Questions 30

Which of the following is the purpose of configuring IS-IS fragmentation on an IS-IS device?

Options:

A.

Disable the device from establishing IS-IS neighbor relationships.

B.

Enable the device to support more IS-IS routes.

C.

There is no practical purpose.

D.

Disable the device from learning IS-IS link-state information.

Buy Now
Questions 31

When a client invokes the iMaster NCE-Campus RESTful API, it sends an HTTP request. The server then returns the status code 401. Which of the following errors has occurred?

Options:

A.

Unauthorized

B.

The requested resource does not exist

C.

Access denied

D.

The service is unavailable

Buy Now
Questions 32

Which of the following technologies can be used to measure performance based on actual service traffic in Huawei's CloudWAN solution?

Options:

A.

TWAMP

B.

BGP FlowSpec

C.

Telemetry

D.

iFIT

Buy Now
Questions 33

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following BGP EVPN routes is used to advertise MAC addresses, ARP entries, and IRB routes?

Options:

A.

Type 3

B.

Type 4

C.

Type 2

D.

Type 1

Buy Now
Questions 34

On the network shown in the following figure, a remote LDP session needs to be established between SWA and SWC. Which of the following statements is correct?

[SWA] mpls lsr-id 1.1.1.1

[SWA] mpls

[SWA-mpls] mpls ldp

[SWC] mpls lsr-id 33.3.3.3

[SWC] mpls

[SWC-mpls] mpls ldp

SWA ---- SWB ---- SWC

<------ Remote LDP Session ------>

Options:

A.

You don't need to specify the LSR ID of the remote peer.

B.

You need to configure the directly-connected interfaces between SWA and SWC to set up TCP connections.

C.

The existing configuration is correct.

D.

You need to create a remote peer and specify an LSR ID for the remote peer.

Buy Now
Questions 35

Which of the following number sequences can be matched by the regular expression 100.s?

Options:

A.

100

B.

10000

C.

1000

D.

1001

Buy Now
Questions 36

Network Quality Analysis (NQA) is a real-time network performance detection and measurement technology. It monitors the performance of multiple protocols running on a network. Which of the following protocols can be monitored by NQA?

Options:

A.

SNMP

B.

OSPF

C.

ICMP

D.

DHCP

Buy Now
Questions 37

VLAN-based MAC address flapping detection is configured. If MAC address flapping occurs, actions to be taken on an interface can be configured as required. Which of the following actions cannot be configured?

Options:

A.

Traffic filtering

B.

Alarm sending

C.

MAC address blocking

D.

Interface blocking

Buy Now
Questions 38

There are multipleSR-MPLS TE tunnel protection mechanisms.FRR (Fast Reroute)constructs avirtual nodeto convert multiple identical route advertisement nodes into a single route advertisement node, and then computes the backup next hop of the virtual node based on theTI-LFA algorithm. In this way, traffic can be quickly switched when a fault occurs.

What is the name of this protection mechanism?

Options:

Buy Now
Questions 39

Which of the following statements does not cause the flapping of a VRRP group?

Options:

A.

Too small interval between Advertisement packet transmissions

B.

Inconsistent preemption delay settings

C.

Packet loss on an interface of the backup device

D.

Flapping on the link transmitting VRRP Advertisement packets

Buy Now
Questions 40

Huawei Open Programmability System (OPS) uses HTTP methods to access managed objects to manage network devices. HTTP is the most widely used network transmission protocol on the Internet. By default, the TCP port number _____ is used. (Fill in Arabic numerals.)

Options:

Buy Now
Questions 41

As shown in the figure, PE1 establishes an EVPN peer relationship with each of PE2 and PE3. When the network is initialized, CE1 sends an ARP request packet.

Which of the following statements are correct about how a PE processes the packet?

Options:

A.

When forwarding the packet to PE3, PE1 needs to add the BUM traffic label allocated by PE3 to the packet.

B.

PE1 sends a MAC/IP advertisement route carrying the MAC address of CE1.

C.

PE2 forwards the packet to CE1.

D.

PE3 forwards the packet to CE1.

Buy Now
Questions 42

In theHuawei CloudCampus Solution, which of the following devices can go online through theregistration query center?

Options:

A.

Switch

B.

AR

C.

AP

D.

Firewall

Buy Now
Questions 43

An LSR (Label Switching Router) supports various label retention modes. Which of the following statements regarding the liberal mode are correct?

Options:

A.

An LSR retains labels from a neighboring LSR only when the neighbor is its next hop.

B.

This label retention mode saves memory and label space.

C.

An LSR reserves all labels distributed by its neighbor.

D.

The liberal mode requires more memory and label space.

Buy Now
Questions 44

Congestion avoidance technology can prevent congestion on an interface.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 45

An engineer needs todownload the configuration file vrpcfg.cfgto a local device throughSFTP, rename the configuration file to backup.cfg, and upload it to thedefault directory of the device.

The configuration file is located at /vrpcfg.cfg (default directory of the remote device), and the local directory is C:\.

Which of the followingPython Paramikocode lines can implement the required operations?

Options:

A.

sftp.get('/vrpcfg.cfg', r'C:\')sftp.put(r'C:\backup.cfg', '/')

B.

sftp.get('/vrpcfg.cfg', r'C:\backup.cfg')sftp.put(r'C:\backup.cfg', '/')

C.

sftp.get('/vrpcfg.cfg', r'C:\vrpcfg.cfg')sftp.put('/backup.cfg', r'C:\vrpcfg.cfg')

D.

sftp.get('/vrpcfg.cfg', r'C:\backup.cfg')sftp.put(r'C:\backup.cfg', '/backup.cfg')

Buy Now
Questions 46

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following statements about symmetric IRB forwarding are correct?

Options:

A.

Both the ingress VTEP and egress VTEP forward packets based on the Layer 3 forwarding table.

B.

The ingress VTEP forwards packets based only on the Layer 2 forwarding table.

C.

The egress VTEP forwards packets based only on the Layer 2 forwarding table.

D.

When VTEPs forward inter-subnet user communication packets, the VNI carried in the VXLAN header is the L3VNI.

Buy Now
Questions 47

iMaster NCE-Campus restricts RESTful APIs. If a client sends aGET requestthat invokes a RESTful API to obtain site information from iMaster NCE-Campus, which of the following fields should be included in the request header?

Options:

A.

ACCESS-TOKEN

B.

ACCEPT-TOKEN

C.

X-ACCEPT-TOKEN

D.

X ACCESS TOKEN

Buy Now
Questions 48

What can be determined from the following figure?

display bgp ipv6 routing-table

Total Number of Routes: 2

*>i Network : 3002::3

NextHop : 3000:FDEA::3

MED : 0

Path/Orgn : i

*>i Network : 3002::4

NextHop : 3000:FDEA::3

MED : 0

PrefixLen : 128

LocPrf : 100

PrefVal : 0

Path/Orgn : 65001 i

Options:

A.

If no routing policy is configured for the AS Path attribute, 3002::4/128 does not originate from AS 65001.

B.

R1 does not have routes 3002::3/128 and 3002::4/128.

C.

If no routing policy is configured for the AS_Path attribute, 3002::4/128 originates from AS 65001.

D.

R1 has routes 3002::3/128 and 3002::4/128.

Buy Now
Questions 49

New IS-IS TLVs are used to carry IPv6 addresses and reachability information to support IPv6 route processing and calculation.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 50

In Huawei SD-WAN Solution, which of the following tunneling technologies is used to establish data channels?

Options:

A.

IPsec

B.

GRE over IPsec

C.

VXLAN

D.

MPLS

Buy Now
Questions 51

On an SR-MPLS network, manually configured prefix SIDs on different devices may conflict with each other. Assume that there are four routes (prefix/mask SID) as follows.Which of the following routes will be selected according to the conflict handling principle?

Options:

A.

1.1.1.1/32 2

B.

1.1.1.1/32 1

C.

3.3.3.3/32 1

D.

2.2.2.2/32 3

Buy Now
Questions 52

A VGMP packet is encapsulated with a UDP header and a VGMP header. By default, a VGMP packet uses UDP port _____.

Options:

Buy Now
Questions 53

What can be determined from the following figure?

display ipv6 routing-table protocol isis

Public Routing Table : ISIS

Summary Count: 6

ISIS Routing Table's Status : < Active >

Summary Count: 6

Destination : 3000:FDEA::4

NextHop : FE80::2E0:FCFF:FE98:2577

Cost : 20

Interface : GigabitEthernet0/0/1

PrefixLength : 128

Preference : 15

Protocol : ISIS-L2

Flags : D

Options:

A.

R1 has six IS-IS IPv6 routes.

B.

R1 does not have IS-IS IPv6 routes.

C.

IS-IS IPv6 must have been enabled on GigabitEthernet0/0/1 of R1.

D.

R1 is not a Level-1 device.

Buy Now
Questions 54

Which of the following link types may appear in OSPF Router-LSAs?

Options:

A.

TransNet

B.

P-2-P

C.

Vlink

D.

StubNet

Buy Now
Questions 55

TheNETCONF content layercontainsdevice configuration data.

Which of the following statements are correct about the followingNETCONF configuration?

merge

rollback-on-error

10

0

Options:

A.

The NETCONF operation is performed to load the configuration data to the startup configuration datastore.

B.

The Huawei-YANG model is used.

C.

VLAN 10 is created on the target device.

D.

The operation contains an operation attribute so that the modified data is merged.

Buy Now
Questions 56

The following figure shows the inter-AS MPLS VPN Option B solution. IfASBR-PE1andASBR-PE2only transmit VPNv4 routes, you can run the following command onASBR-PE1:

[ASBR-PE1-bgp-af-vpnv4] undo peer 10.0.34.4 enable

H12-891_V1.0 Question 56

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 57

AH is an IP-based transport-layer protocol. The protocol number is _____. (Enter only digits.)

Options:

Buy Now
Questions 58

iMaster NCE-CampusInsightuses SNMP technology to collect metrics and logs of network devices and detects network exceptions based on real service traffic.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 59

Refer to the figure.

H12-891_V1.0 Question 59

Which of the following steps are mandatory to enable 802.1X authentication on GE0/0/2 and GE0/0/3 of SW3 and configure a RADIUS server to authenticate and deliver network access rights to users?

Options:

A.

Configure an AAA scheme.

B.

Configure an authentication profile.

C.

Configure an authentication domain.

D.

Configure an 802.1X access profile.

Buy Now
Questions 60

The ________ command can be run to completely isolate Layer 2 and Layer 3 of different interfaces in a VLAN. (Use lowercase letters to supplement the command, which cannot be abbreviated.)

Options:

Buy Now
Questions 61

Drag the IPsec functions on the left to the corresponding function description on the right.

Options:

Buy Now
Questions 62

Network administrator A wants to use an IP prefix list to match specific routes. Which of the following routes can be matched by the IP prefix list shown in this figure?

ip ip-prefix TEST permit 10.0.0.0 24 less-equal 30

Options:

A.

10.0.2.0/24

B.

10.0.1.0/24

C.

10.0.0.1/30

D.

10.0.0.0/24

Buy Now
Questions 63

Which of the following statements is incorrect about MP-BGP?

Options:

A.

MP-BGP uses the MP_REACH_NLRI and MP_UNREACH_NLRI attributes to advertise VPNv4 routes.

B.

When PEs and CEs exchange routes through BGP, you need to create a BGP process for each VPN instance in the CE.

C.

The packet types and VPNv4 route advertisement policies of MP-BGP are the same as those of BGP-4.

D.

MP-BGP needs to allocate private network labels for VPNv4 routes.

Buy Now
Questions 64

Port isolation can be deployed on an Ethernet network to implement both Layer 2 communication and Layer 3 isolation, making the networking more flexible.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 65

Which of the following statements is incorrect about Authentication Header (AH)?

Options:

A.

AH provides packet encryption.

B.

AH provides data origin authentication.

C.

AH provides anti-replay protection.

D.

AH provides data integrity authentication.

Buy Now
Questions 66

A client sends an HTTP request to a server, and the server sends back an HTTP response. Which of the following parameters isnotcarried in the HTTP response?

Options:

A.

Reason phrase

B.

Status code

C.

Protocol version

D.

URI

Buy Now
Questions 67

YANG is a data modeling language for the definition of data sent over network management protocols such as NETCONF. Which of the following are basic YANG data models? (Select all that Apply)

Options:

A.

Set node

B.

Leaf node

C.

List node

D.

Tree node

Buy Now
Questions 68

Which of the following is the default port used by iMaster NCE-Campus northbound open APIs?

Options:

A.

18008

B.

18006

C.

18002

D.

18000

Buy Now
Questions 69

Which of the following functions can be provided by iMaster NCE-Campus when it functions as a relay agent for authentication?

Options:

A.

User accounting

B.

User authentication

C.

User analysis

D.

Marketing

Buy Now
Questions 70

An LSR supports various label retention modes. Which of the following statements regarding the liberal mode are correct?

Options:

A.

This label retention mode saves the memory and label space.

B.

An LSR retains labels from a neighboring LSR only when the neighbor is its next hop.

C.

An LSR reserves all labels distributed by its neighbor.

D.

Liberal mode allows the device to retain labels from all LSRs, not just the next hop.

Buy Now
Questions 71

Which of the following statements aboutSR-MPLS Policy path planningare correct?

Options:

A.

When planning paths based on bandwidth, you need to set the available bandwidth of each interface in advance.

B.

When planning paths based on delay, you must deploy TWAMP or iFIT in advance to measure real-time network delay.

C.

If you use the controller to plan SR-MPLS Policy paths, only primary and backup paths can be deployed, and load balancing cannot be implemented for the primary path.

D.

When statically planning SR-MPLS Policy paths, you can plan load balancing for the primary path.

Buy Now
Questions 72

In the following figure, R1, R2, R3, and R4 all belong to OSPF area 0. The link costs are marked in the figure. The Loopback0 addresses of R1, R2, R3, and R4 are advertised to OSPF. R1, R2, and R3, which are R4 clients, use Loopback0 to establish an iBGP peer relationship with R4. The directly connected network segment 172.20.1.4/32 of R4 is advertised to BGP. Which of the following statements are correct about the direction of traffic from R1 to 172.20.1.4/32?

H12-891_V1.0 Question 72

Options:

A.

The preferred path is R1–R3–R4.

B.

If the stub router on-startup command is run on R3, packet loss occurs during the power-off process of R3 but no packet loss occurs during the startup process of R3.

C.

The preferred path is R1–R2–R4.

D.

Packet loss occurs during both the power-off and startup processes of R3.

Buy Now
Questions 73

In typical "two-city three-center" networking, into which layers is the bearer WAN divided?

Options:

A.

Core layer

B.

Aggregation layer

C.

Control layer

D.

Access layer

Buy Now
Questions 74

To allow only authorized users (users who obtain IP addresses through authorized DHCP servers or use specified static IP addresses) to access the network shown in the figure, which of the following solutions can be used?

H12-891_V1.0 Question 74

Options:

A.

DAI + Port Security

B.

DHCP Snooping + IPSG

C.

DHCP Snooping + DAI

D.

DAI + IPSG

Buy Now
Questions 75

NETCONF uses an XML-based encoding format. NETCONF uses text files to represent complex hierarchical data. Which of the following statements are correct about the following XML file?

Learners

Huawei

<heading>Reminder

Don't forget Reading!

Options:

A.

encoding: indicates the character set encoding format. Currently, only UTF-8 encoding is supported.

B.

/: indicates the end of the current tag.

C.

D.

?>: indicates the end of an instruction.

Buy Now
Questions 76

Python Paramikoimplements theSSH protocol. In thePython Paramiko module, which of the following classes is used tocreate SFTP sessions and perform remote file operations?

Options:

A.

Packetizer class

B.

SFTPClient class

C.

Channel class

D.

Transport class

Buy Now
Questions 77

In the following figure, OSPF is enabled on all router interfaces. The IP addresses marked in the figure belong to Loopback0 of the routers.

H12-891_V1.0 Question 77

The Loopback0 addresses of R1 and R2 are advertised in Area 1, the Loopback0 address of R4 is advertised in Area 0, and the Loopback0 addresses of R3 and R5 are advertised in Area 2. Given this, which of the following IP addresses can ping each other?

Options:

A.

10.0.3.3 and 10.0.5.5

B.

10.0.2.2 and 10.0.5.5

C.

10.0.2.2 and 10.0.3.3

D.

10.0.4.4 and 10.0.2.2

Buy Now
Questions 78

Drag the OSPFv3 LSAs to map them to their corresponding transmission ranges.

H12-891_V1.0 Question 78

Options:

Buy Now
Questions 79

Which of the following methods can be used to establish IPsec SAs? (Select All that Apply)

Options:

A.

Establish IPsec SAs through template negotiation

B.

Establish IPsec SAs in IKE auto-negotiation mode

C.

Establish IPsec SAs through certificate negotiation

D.

Manually establish IPsec SAs

Buy Now
Questions 80

In a BGP/MPLS IP VPN scenario, if a PE and CE use OSPF to exchange routing information, domain IDs are used to identify whether the routes imported to VPN instances are from the same OSPF domain.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 81

MPLS supports forwarding equivalence class (FEC). Which of the following cannot be used as an FEC allocation standard?

Options:

A.

Fragment offset

B.

Application protocol

C.

Destination address

D.

Class of Service (CoS)

Buy Now
Questions 82

Which of the following community attributes ensure that BGP routes are transmitted only within an AS?

Options:

A.

No Export Subconfed

B.

No_Export

C.

Internet

D.

No_Advertise

Buy Now
Questions 83

An HTTP request line consists of three fields. Select the fields to form a complete HTTP request message.

H12-891_V1.0 Question 83

Options:

Buy Now
Questions 84

As shown in the figure, when PE1 receives an ARP request packet, it forwards the packet to PE4. The packet then carries two labels. The label value 201 is carried by the EVPN Type ____ route. (Enter only digits.)

Options:

Buy Now
Questions 85

If an engineer wants to remotely log in to a Huawei device, the engineer uses the Paramiko library to compile the following code when compiling the SSH Python script:

cli = ssh.invoke_shell()

cli.send("screen-length 0 temporary\n")

What is the function of screen-length 0 temporary?

Options:

A.

Performing automatic word wrap

B.

Performing split-screen display

C.

Canceling split-screen display

D.

Canceling automatic word wrap

Buy Now
Questions 86

NAFTIR policing can only be applied to the inbound direction. Its purpose is to monitor the traffic entering the device and ensure that the upstream device does not unnecessarily consume network resources.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 87

The path of an SR-MPLS TE tunnel can be calculated by the controller or tunnel ingress.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 88

SSH connections are usually established based on TCP/IP connections. In specific cases, SSH connections can be established based on UDP connections.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 89

Which of the following are potential risks in HTTP communication?

Options:

A.

Eavesdropping: Third parties can obtain communication data.

B.

Pretending: Third parties can impersonate another user.

C.

Tampering: Third parties can tamper with communication data.

D.

Lost: There is a low probability that data is lost during transmission.

Buy Now
Questions 90

Man-in-the-middle attacks (MITM) or IP/MAC Spoofing attacksare common onintranetsand can causeinformation leakage.

Which configuration method can prevent these attacks?

Options:

A.

Configure the trusted or untrusted interface.

B.

Limit the maximum number of MAC addresses that can be learned on a switch interface.

C.

Configure DHCP snooping to check the CHADDR field carried in a DHCP Request packet.

D.

Configure association between DHCP snooping and IPSG or DAI on the switch.

Buy Now
Questions 91

Which of the following statements isincorrectaboutintranet security designfor a large or medium-sizedvirtualized campus network?

Options:

A.

Traffic suppression can be configured on the wired network to block broadcast traffic by shutting down interfaces.

B.

Intranet security refers to both wired and wireless network security.

C.

To secure data transmission, the CAPWAP tunnel between the AC and AP supports DTLS encryption.

D.

In addition to terminal access security, air interface security must be considered during wireless network security design.

Buy Now
Questions 92

In the following figure, a GRE tunnel is established between R1 and R2. If the command ping -a 10.1.1.1 10.3.1.1 is run on R1, which of the following statements is correct about the ICMP packet sent by GE0/0/1 of R1?

Options:

A.

The packet will be encapsulated using GRE, and the source and destination IP addresses in the outer IP header are10.0.12.1and10.0.12.2, respectively.

B.

The packet will be encapsulated using GRE, and the source and destination IP addresses in the outer IP header are10.0.12.1and10.3.1.1, respectively.

C.

The packet will be encapsulated using GRE, and the source and destination IP addresses in the inner IP header are10.1.1.1and10.3.1.1, respectively.

D.

The packet will be encapsulated using GRE, and the source and destination IP addresses in the inner IP header are10.1.1.1and10.0.12.2, respectively.

Buy Now
Questions 93

If SRv6 needs to be deployed on a bearer WAN, which of the following technologies are required? (Select all that apply)

Options:

A.

MPLS

B.

BGP

C.

IGP

D.

BGP-LU

Buy Now
Questions 94

Which of the following number sequences can be matched by the regular expression100.$?

Options:

A.

1000

B.

1001

C.

10000

D.

100

Buy Now
Questions 95

Which of the following statements is incorrect about access control on small and midsize campus networks based on the Huawei CloudCampus solution?

Options:

A.

iMaster NCE can function as an authentication server.

B.

Cloud APs support local Portal authentication.

C.

iMaster NCE can function as a Portal relay device.

D.

iMaster NCE can interconnect with a third-party RADIUS server.

Buy Now
Questions 96

What is the router ID length supported by OSPFv3?

Options:

A.

128 bits

B.

64 bits

C.

100 bits

D.

32 bits

Buy Now
Exam Code: H12-891_V1.0
Exam Name: HCIE-Datacom V1.0
Last Update: May 1, 2025
Questions: 275

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now H12-891_V1.0 testing engine

PDF (Q&A)

$31.5  $104.99
buy now H12-891_V1.0 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 02 May 2025