Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

H12-891_V1.0 HCIE-Datacom V1.0 Questions and Answers

Questions 4

When designing IGP routes for an enterprise bearer WAN, ensure that the metric of aggregation-layer links is smaller than that of access-layer links, so that data can be preferentially forwarded over aggregation-layer links.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 5

In the admission design for large- and medium-sized campus networks, which of the following authentication modes can be used for PCs connected to IP phones?

Options:

A.

MAC address authentication

B.

802.1X authentication

C.

Multi-mode authentication

D.

Portal authentication

Buy Now
Questions 6

On a broadcast network, if the DR priorities of two interfaces connecting two routers are set to 0, in which of the following states will the OSPF neighbor relationship stay?

Options:

A.

Full

B.

Down

C.

2-way

D.

Exchange

Buy Now
Questions 7

iMaster NCE-Campus provides the terminal identification function to display the terminal type, operating system, and manufacturer information.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 8

Refer to the following command output on the router R1. Which of the following statements isincorrect?

display interface Tunnel

Tunnel0/0/0 current state : UP

Line protocol current state : UP

Last line protocol up time : 15:21:23 UTC-08:00

Description: ! 0.0.3.3

Route Port, The Maximum Transmit Unit is 1500

Internet Address is 20.1.1.1/24

Encapsulation is TUNNEL, loopback not set

Tunnel source 10.0.1.1 (LoopBack0), destination 10.0.3.3

Tunnel protocol/transport GRE/IP, key disabled

keepalive disabled

Checksumming of packets disabled

Current system time: 15:21:37-08:00

300 seconds input rate 0 bits/sec, 0 packets/sec

300 seconds output rate 0 bits/sec, 0 packets/sec

13 seconds input rate 0 bits/sec, 0 packets/sec

13 seconds output rate 448 bits/sec, 0 packets/sec

9 packets output, 824 bytes

0 output error

Input bandwidth utilization : -

Output bandwidth utilization : -

Options:

A.

Key authentication is disabled for the tunnel.

B.

The destination IP address of the tunnel is 10.0.3.3.

C.

The tunnel is a GRE tunnel.

D.

Keepalive detection is enabled on the tunnel.

Buy Now
Questions 9

What is the router ID length supported by OSPFv3?

Options:

A.

128 bits

B.

64 bits

C.

100 bits

D.

32 bits

Buy Now
Questions 10

Which of the following number sequences can be matched by the regular expression100.$?

Options:

A.

1000

B.

1001

C.

10000

D.

100

Buy Now
Questions 11

Which of the following statements about configuring user access authentication is incorrect?

Options:

A.

To implement network access control on users, you need to determine the domains to which they belong and the AAA schemes that they use.

B.

You can configure an 802.1X access profile, a MAC access profile, a Portal access profile, or a multi-mode authentication profile based on the actual authentication requirements on the network.

C.

If the RADIUS or HWTACACS server is used for authentication, you need to configure parameters for interconnection with the authentication server in the AAA scheme.

D.

You need to bind an access profile to an authentication profile to specify the user authentication mode. Then, apply the authentication profile to an interface to enable network access control.

Buy Now
Questions 12

MPLS implements data forwarding based on two different planes. Which of the following statements regarding the forwarding mechanism are correct?

Options:

A.

After an IP packet enters an MPLS domain, the MPLS device forwards the packet based on FIB table queries.

B.

If the tunnel ID is 0x0, the MPLS forwarding process starts.

C.

The system automatically assigns an ID to the upper-layer application that uses a tunnel. This ID is also called the tunnel ID.

D.

If the tunnel ID is not 0x0, the normal IP forwarding process starts.

Buy Now
Questions 13

On the network shown in the figure, OSPF-based SR-MPLS TE is enabled on all routers. Which of the following adjacency labels are allocated by P3?

Options:

A.

9006

B.

9002

C.

9003

D.

9005

Buy Now
Questions 14

Which of the following statements aboutprefix segments and adjacency segmentsare correct?

Options:

A.

A prefix SID is a local SID out of the SRGB range.

B.

An adjacency SID is an offset value within the SRGB range advertised by the source end.

C.

A prefix segment identifies the prefix of a destination address on a network.

D.

An adjacency segment identifies an adjacency on a network.

Buy Now
Questions 15

Refer to the output information of a device below. According to the information, which of the following MPLS labels is carried in a data packet forwarded by the device to 10.0.1.1?

Options:

A.

36100

B.

36200

C.

40100

D.

40200

Buy Now
Questions 16

In the Huawei SD-WAN Solution, the topologies of different VNs must be the same.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 17

The Ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is ______ IRB forwarding. (Capitalize the first letter.)

Options:

Buy Now
Questions 18

A client sends an HTTP request to a server, and the server sends back an HTTP response. Which of the following parameters isnotcarried in the HTTP response?

Options:

A.

Reason phrase

B.

Status code

C.

Protocol version

D.

URI

Buy Now
Questions 19

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following BGP EVPN routes is used to advertise MAC addresses, ARP entries, and IRB routes?

Options:

A.

Type 3

B.

Type 4

C.

Type 2

D.

Type 1

Buy Now
Questions 20

Drag the IPsec functions on the left to the corresponding function description on the right.

Options:

Buy Now
Questions 21

Network administrator A wants to view the BGP peer status of R2. The BGP peer status of R2 is shown in this figure. Obtain the following information: R2 resides in AS _____ (Enter only digits. Do not add punctuations or spaces.)

Options:

Buy Now
Questions 22

An O&M platform mainly provides unified monitoring and performance management for network devices. Which of the following is NOT device monitoring data?

Options:

A.

Management-plane data

B.

Data-plane data

C.

Control-plane data

D.

Monitoring-plane data

Buy Now
Questions 23

Which of the following is not the function of OSPFv3 Link-LSAs?

Options:

A.

Advertises the interface ID of the local router to other routers attached to the link.

B.

Advertises the link-local address of the local interface to other routers attached to the link.

C.

Advertises a list of IPv6 prefixes of the local interface to other routers attached to the link.

D.

Advertises the Options field in the Network-LSA originated on the local link to other routers attached to the link.

Buy Now
Questions 24

The following figure shows the inter-AS MPLS L3VPN Option C (Solution 2). ASBR-PE2 is connected to CE3 and runs eBGP.

To enable all CEs to communicate with each other, which of the following address families must peer relationships be enabled in the BGP process of ASBR-PE2?

Options:

A.

VPNv4 address family

B.

BGP-LS address family

C.

VPN instance unicast address family

D.

Unicast BGP address family

Buy Now
Questions 25

In the following figure, all routers are running OSPF. Given this, which of the following statements is correct?

Options:

A.

R2 forwards the Router-LSAs generated by R1 to R3.

B.

R2 forwards the Router-LSAs generated by R3 to R1.

C.

R2 generates Router-LSAs only in area 0.

D.

R2 generates Router-LSAs in both area 1 and area 0.

Buy Now
Questions 26

NETCONF provides a set of mechanisms for managing network devices. NETCONF operations take place on a configuration datastore of network devices. Which of the following statements is incorrect about the configuration datastore?

Options:

A.

The configuration datastore of network devices can be classified into the candidate, running, and startup configuration datastores.

B.

The operation is oriented at the startup configuration datastore.

C.

The operation is oriented at the candidate configuration datastore.

D.

The operation submits the configuration in a startup configuration datastore to a running configuration datastore.

Buy Now
Questions 27

Which of the following link types may appear in OSPF Router-LSAs?

Options:

A.

TransNet

B.

P-2-P

C.

Vlink

D.

StubNet

Buy Now
Questions 28

Which of the following inter-AS MPLS L3VPN solutions does not require MPLS to run between ASBRs?

Options:

A.

Option C

B.

Option D

C.

Option A

D.

Option B

Buy Now
Questions 29

Whenstatic IPsec VPNis used for WAN interconnection in theHuawei CloudCampus Solution, theAP, Router, and ____can be used as egress devices.

Options:

Buy Now
Questions 30

Before connecting an SSH client to an SSH server in public key authentication mode, a client needs to create a key pair. Which of the following commands is used to create a DSS key pair on the client using Git Bash?

Options:

A.

ssh-keygen -t dss

B.

ssh-keygen -t ecc

C.

ssh-keygen -t dsa

D.

ssh-keygen -t rsa

Buy Now
Questions 31

New IS-IS TLVs are used to carry IPv6 addresses and reachability information to support IPv6 route processing and calculation.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 32

Which of the following statements about static VXLAN tunnel configuration are correct?

Options:

A.

On an NVE interface, the destination address of a VXLAN tunnel is specified based on the address in the ingress replication list. You can create one NVE interface for multiple VXLAN tunnels.

B.

An NVE interface can be associated with multiple VNIs. Therefore, you can create one NVE interface when there are multiple BDs.

C.

One NVE interface must be created for each VXLAN tunnel, and the source and destination IP addresses must be specified for the NVE interface. Therefore, the number of NVE interfaces is the same as the number of VXLAN tunnels on the VTEP.

D.

One NVE interface must be created for each BD. If there are multiple BDs, multiple NVE interfaces must be created.

Buy Now
Questions 33

In thesmall and midsize campus network designbased on theHuawei CloudCampus Solution, when over100 branchesneed to communicate with each other, which of the following interconnection networking models is recommended?

Options:

A.

Direct networking

B.

Full-mesh networking

C.

Hub-spoke networking

D.

Partial-mesh networking

Buy Now
Questions 34

gRPC (Google Remote Procedure Call)is a language-neutral, platform-neutral, and open-source remote RPC system that supportsunary RPCs and streaming RPCs.

Which of the following service methodsare NOT supportedby gRPC?

Options:

A.

rpc Subscribe(SubsArgs) stream returns(SubsReply) {};

B.

rpc dataPublish(stream serviceArgs) returns(stream serviceArgs) {};

C.

rpc stream LotsOfGreetings(HelloRequest) returns (HelloResponse) {};

D.

rpc Cancel(CancelArgs) returns(CancelReply) {};

Buy Now
Questions 35

Theon-premise modeis recommended for controller deployment onsmall and midsize campus networks.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 36

On a CloudCampus virtualized campus network, virtual networks are defined based on services. Each virtual network corresponds to a service, and isolation needs to be manually configured between virtual networks.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 37

Which of the following operations is not involved in the middle phase of a migration?

Options:

A.

Migration preparation

B.

On-site monitoring

C.

Migration implementation

D.

Service test

Buy Now
Questions 38

In the firewall hot standby scenario, which of the following status information can be backed up between the active and standby firewalls?

Options:

A.

Server mapping table

B.

AAA user table (excluding the default user admin)

C.

Session table

D.

Dynamic MAC address table

Buy Now
Questions 39

As shown in the figure, PE1 establishes an EVPN peer relationship with each of PE2 and PE3. When the network is initialized, CE1 sends an ARP request packet.

Which of the following statements are correct about how a PE processes the packet?

Options:

A.

When forwarding the packet to PE3, PE1 needs to add the BUM traffic label allocated by PE3 to the packet.

B.

PE1 sends a MAC/IP advertisement route carrying the MAC address of CE1.

C.

PE2 forwards the packet to CE1.

D.

PE3 forwards the packet to CE1.

Buy Now
Questions 40

When MPLS/BGP IP VPN is deployed, which of the following statements is incorrect about BGP route exchange between PEs and CEs?

Options:

A.

When PEs and CEs use BGP to exchange routing information, you do not need to import private network routes to BGP on PEs.

B.

In a Hub&Spoke scenario, when Hub-CE and Hub-PE run an IGP for communication, EBGP cannot be configured on Spoke-PE or Spoke-CE.

C.

In a scenario where PEs and CEs use BGP to exchange routing information, if two VPN sites have the same private AS number, the AS number replacement function can be used to replace the AS number in a received private network route with any specified AS number. This prevents routes from being discarded because of repeated AS numbers.

D.

In a CE multi-homing scenario, the BGP AS number replacement function may cause routing loops. BGP SoO can be used to prevent routing loops at a VPN site.

Buy Now
Questions 41

On an SR-MPLS network, manually configured prefix SIDs on different devices may conflict with each other. Assume that there are four routes (prefix/mask SID) as follows. Which of the following routes will be selected according to the conflict handling principle?

Options:

A.

1.1.1.1/32 → SID 2

B.

1.1.1.1/32 → SID 1

C.

2.2.2.2/32 → SID 3

D.

3.3.3.3/32 → SID 1

Buy Now
Questions 42

Which of the following headend behaviors can insert SRHs into IPv6 packets? (Select All that Apply)

Options:

A.

H.Encaps.Red

B.

H.Insert

C.

H.Encaps

D.

H.Insert.Red

Buy Now
Questions 43

In the following figure, OSPF is enabled on all router interfaces. The IP addresses marked in the figure belong to Loopback0 of the routers.

The Loopback0 addresses of R1 and R2 are advertised in Area 1, the Loopback0 address of R4 is advertised in Area 0, and the Loopback0 addresses of R3 and R5 are advertised in Area 2. Given this, which of the following IP addresses can ping each other?

Options:

A.

10.0.3.3 and 10.0.5.5

B.

10.0.2.2 and 10.0.5.5

C.

10.0.2.2 and 10.0.3.3

D.

10.0.4.4 and 10.0.2.2

Buy Now
Questions 44

In Huawei SD-WAN Solution, which of the following tunneling technologies is used to establish data channels?

Options:

A.

IPsec

B.

GRE over IPsec

C.

VXLAN

D.

MPLS

Buy Now
Questions 45

After the reset isis all command is run, the specified IS-IS process is reset, and all involved IS-IS neighbor relationships are re-established; however, IS-IS statistics are not cleared.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 46

Drag the OSPFv3 LSAs to map them to their corresponding transmission ranges.

Options:

Buy Now
Questions 47

Drag theIPsec functionson the left to the corresponding function description on the right.

Options:

Buy Now
Questions 48

On the network shown in the following figure, a remote LDP session needs to be established between SWA and SWC. Which of the following statements is correct?

[SWA] mpls lsr-id 1.1.1.1

[SWA] mpls

[SWA-mpls] mpls ldp

[SWC] mpls lsr-id 33.3.3.3

[SWC] mpls

[SWC-mpls] mpls ldp

SWA ---- SWB ---- SWC

<------ Remote LDP Session ------>

Options:

A.

You don't need to specify the LSR ID of the remote peer.

B.

You need to configure the directly-connected interfaces between SWA and SWC to set up TCP connections.

C.

The existing configuration is correct.

D.

You need to create a remote peer and specify an LSR ID for the remote peer.

Buy Now
Questions 49

On a router,SRv6is enabled, and the configurations shown below are performed. Which of the following statements about the configurations are correct?

[Router-segment-routing-ipv6] locator srv6_locator1 ipv6-prefix 2001:DB8:ABCD::/64 static 32

Options:

A.

The locator of this node is2001:DB8:ABCD::.

B.

The static segment of the node occupies32 bits.

C.

The dynamic segment of the node occupies32 bits.

D.

The Args field of this node occupies32 bits.

Buy Now
Questions 50

In the LDP session establishment process, the initiator sends an Initialization message for parameter negotiation. Which message will be sent by the responder if it does not accept negotiation parameters?

Options:

A.

Error Notification Message

B.

Initialization Message

C.

Keepalive Message

D.

Hello Message

Buy Now
Questions 51

The RR (Route Reflector) is critical to the Huawei SD-WAN Solution, and its deployment mode varies based on the scenario. In which of the following modes can an RR be deployed?

Options:

A.

Multi-area deployment of the RR

B.

Independent deployment of the RR

C.

Co-deployment of the RR and hub site

D.

Partially independent deployment of the RR

Buy Now
Questions 52

On a virtualized network deployed using iMaster NCE-Campus, after creating VNs, you need to configure inter-VN communication. Which of the following configurations is used to achieve VN communication?

Options:

A.

Configure traffic filtering.

B.

Create a static route for the VPN instance corresponding to the VN.

C.

Deploy OSPF for the VPN instance corresponding to the VN.

D.

Deploy a routing policy.

Buy Now
Questions 53

To obtain the token ID of iMaster NCE, you need to send an HTTP request message that includes the following Python code to invoke an iMaster NCE RESTful API.

Which of the following statements is incorrect?

import requests

nbi_name = "demo13@north.com"

nbi_pwd = "CgocVcVe1@"

host = "139.9.213.72"

port = "18002"

URI = "/controller/v2/tokens"

post_token_url = "https:// " + host + ":" + port + URI

headers_post = {"Content-Type": "application/json", "Accept": "application/json"}

r = requests.post(post_token_url, headers=headers_post, json={"userName": nbi_name, "password": nbi_pwd}, verify=False)

Options:

A.

You can run the print(r.json()) command to display the response message sent from the server.

B.

Token resources are located at https://139.9.213.72:18002/controller/v2/tokens.

C.

The request body is in JSON format.

D.

The HTTP request uses the GET method to query the token value.

Buy Now
Questions 54

Which of the following methods can be used to establish IPsec SAs? (Select All that Apply)

Options:

A.

Establish IPsec SAs through template negotiation

B.

Establish IPsec SAs in IKE auto-negotiation mode

C.

Establish IPsec SAs through certificate negotiation

D.

Manually establish IPsec SAs

Buy Now
Questions 55

To obtain thetoken IDofiMaster NCE, you need to send anHTTP requestusing the followingPython codeto invoke aniMaster NCE RESTful API:

Which of the following statements isincorrect?

Options:

A.

You can run print(r.json()) to display the response message sent from the server.

B.

Token resources are located at https://139.9.213.72:18002/controller/v2/tokens.

C.

The HTTP request uses the GET method to query the token value.

D.

The request body is inJSON format.

Buy Now
Questions 56

During the implementation of iMaster NCE-Campus Wi-Fi location-based services (LBS), terminal location data is sent to an LBS platform through HTTP requests. Which of the following data formats is used in such HTTP requests?

Options:

A.

XML

B.

HTML

C.

JSON

D.

YAML

Buy Now
Questions 57

Which of the following statements is incorrect about the user authentication points on the network?

Options:

A.

Deploying user authentication points at the access layer achieves granular permission management and high network security.

B.

Moving user authentication points from the access layer to the aggregation or core layer greatly reduces the number of user authentication points, thereby effectively mitigating the pressure on the AAA server.

C.

Deploying user authentication points at the access layer has both advantages and disadvantages when compared to doing so at the aggregation or core layer. Policy association can be applied if user authentication points are deployed at the access layer.

D.

When user authentication points are moved from the access layer to the aggregation layer, MAC address authentication for users may fail.

Buy Now
Questions 58

Which of the following statements about BGP EVPN principles are correct in a scenario where a VXLAN tunnel is dynamically established through BGP EVPN?

Options:

A.

MP_REACH_NLRI is used to carry routing information.

B.

Several BGP EVPN routes are defined through BGP extension.

C.

MP_REACH_NLRI is used to carry the RD.

D.

MP_REACH_NLRI is used to carry the RT.

Buy Now
Questions 59

An LSR supports various label retention modes. Which of the following statements regarding the liberal mode are correct?

Options:

A.

This label retention mode saves the memory and label space.

B.

An LSR retains labels from a neighboring LSR only when the neighbor is its next hop.

C.

An LSR reserves all labels distributed by its neighbor.

D.

Liberal mode allows the device to retain labels from all LSRs, not just the next hop.

Buy Now
Questions 60

Which of the following statements is incorrect about access control on small and midsize campus networks based on the Huawei CloudCampus solution?

Options:

A.

iMaster NCE can function as an authentication server.

B.

Cloud APs support local Portal authentication.

C.

iMaster NCE can function as a Portal relay device.

D.

iMaster NCE can interconnect with a third-party RADIUS server.

Buy Now
Questions 61

An SRLB is a set of user-specified local labels reserved for SR-MPLS. These labels are locally configured and have only local significance. Therefore, they are not advertised through the IGP.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 62

In the CloudCampus public cloud scenario, if deployment through the Huawei registration query center is used, you do not need to configure DHCP Option 148 on the DHCP server of the campus network.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 63

Which of the following fields is added to BGP4+ Update packets to advertise IPv6 routes?

Options:

A.

A new path attribute: MP_UNREACH_NLRI

B.

A new path attribute: MP_REACH_NLRI

C.

A new path attribute: IPv6_REACH_NLRI

D.

A new NLRI type: IPv6_NLRI, which carries the IPv6 NLRI prefix length and IPv6 NLRI prefix.

Buy Now
Questions 64

SR-MPLS uses the MPLS forwarding plane, and therefore requires MPLS to be enabled. Which of the following conditions must be met for MPLS to be automatically enabled on an interface? (Select all that apply)

Options:

A.

The SRGB is configured for the IGP process.

B.

Segment routing is enabled for IGP, and IGP is enabled on the interface.

C.

The static adjacency label of the corresponding interface is configured in the segment routing view.

D.

Segment routing is enabled in the system view.

Buy Now
Questions 65

Which of the following statements regarding OSPF neighbor relationship faults is incorrect?

Options:

A.

For non-DR and non-BDR routers on an Ethernet link, the 2-Way state is acceptable.

B.

The Init state indicates that the router has received Hello packets from its neighbors, but the received Hello packets do not contain the OSPF RID of the receiving router.

C.

The ExStart state indicates that two neighbor routers have inconsistent MTUs or the same OSPF Router ID (RID).

D.

The Attempt state indicates that the router does not send unicast Hello packets to configured neighbors.

Buy Now
Questions 66

Telemetry data must be encoded in GPB binary format. This format reduces the number of bytes in telemetry messages and improves the transmission efficiency compared with messages encoded in JSON format.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 67

In Huawei SD-WAN Solution, which of the following tunneling technologies is used to establish data channels?

Options:

A.

WLAN

B.

IPsec

C.

MPLS

D.

GRE over IPsec

Buy Now
Questions 68

Which of the following statements about DHCP snooping isincorrect?

Options:

A.

After DHCP snooping is enabled in the view of a VLAN, it takes effect for the VLAN's DHCP messages received by all the interfaces of the device.

B.

After DHCP snooping is enabled globally, the device processes only DHCPv4 messages by default if no parameter is specified.

C.

DHCP snooping can prevent attacks by configuring trusted interfaces.

D.

After DHCP snooping is enabled in the view of an interface, it takes effect for all DHCP messages on the interface.

Buy Now
Questions 69

Which of the following intelligent traffic steering policies can be used to fully utilize link bandwidth and implement link bandwidth-based load balancing on an enterprise network with multiple links?

Options:

A.

Application priority-based traffic steering

B.

Link quality-based traffic steering

C.

Link priority-based traffic steering

D.

Traffic bandwidth-based traffic steering

Buy Now
Questions 70

Which of the following statements about SR-MPLS characteristics are correct? (Select all that apply)

Options:

A.

Only the controller can compute paths based on explicit paths.

B.

SR-MPLS supports smooth network evolution by extending existing protocols, such as IGPs.

C.

Efficient TI-LFA FRR protection is provided for fast path fault recovery.

D.

Such networks can quickly interact with upper-layer applications through the source routing technology.

Buy Now
Questions 71

An engineer often remotely logs in to the device to check the device status. The engineer can use the Python Paramiko and telnetlib libraries to implement automatic remote login through Python scripts. The remote login implemented using telnetlib is more secure.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 72

During WLAN planning and design, channels 1, 6, and 11 are recommended on the 2.4 GHz frequency band, and channels 1, 5, 9, and 13 are recommended in high-density scenarios. On the 5 GHz frequency band, it is recommended thathigh-frequency and low-frequency channels of adjacent APs be staggered to prevent overlapping.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 73

An SRv6 Policy can be either statically configured on a device or dynamically generated by the controller and then delivered to the device.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 74

In the Huawei CloudCampus Solution, which of the following deployment modes are supported by Huawei switches?

Options:

A.

DHCP Option 148

B.

CLI

C.

Web interface

D.

Huawei registration center

Buy Now
Questions 75

Which of the following statements aboutOPS (Open Programmability System) application scenariosisincorrect?

Options:

A.

To enable a network device to automatically send a configuration file to the server after the device configuration is saved, users can use the maintenance assistant to create a timer trigger condition and periodically run the Python script.

B.

When the OPS is used to automatically deploy unconfigured devices, a Python script is used to obtain the IP addresses of the software and configuration file server and download the system software and configuration file.

C.

The OPS can reduce the impact of the network environment in some cases. For example, when collected information is transmitted to a server, the Python script can be used to temporarily store the execution result to the device when the network is disconnected. After the network is reconnected, the execution result is transmitted to the server.

D.

The OPS can be used to automatically check the health status of devices.

Buy Now
Questions 76

A network administrator runs thedisplay telemetry subscriptioncommand on a device to check telemetry subscription information. The command output is as follows:

[~CE] display telemetry subscription

Sub-name : Sub1

Sensor group:

Sensor-name Sample-interval(ms) State

Sensor1 1000 RESOLVED

Destination group:

Dest-name Dest-IP Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20000 RESOLVED - GRPC

Sub-state : PASSIVE

Total subscription number is : 1

Which of the following statements is incorrect?

Options:

A.

The device sends sampled data every second.

B.

The subscription name is Sub1.

C.

The subscription mode is static subscription.

D.

The IP address of the device is 192.168.56.1.

Buy Now
Questions 77

Huawei Open Programmability System (OPS) uses HTTP methods to access managed objects to manage network devices. To facilitate script compilation, Huawei OPS provides the Python script template. In the Python script template, what are the contents of the Content-type and Accept fields in the header of an HTTP request packet?

Options:

A.

text/xml, text/json

B.

text/json, text/json

C.

text/xml, text/xml

D.

text/json, text/xml

Buy Now
Questions 78

When you configure avirtualized campus networkoniMaster NCE-Campus, Fit APs can immediately go online after you add them toiMaster NCE-Campus.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 79

In SSP packages, Jinja2 templates are used to implement mapping. In the Jinja2 syntax, {% ... %} contains control structures, for example, a 'for' loop.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 80

On traditional campus networks, network admission control (NAC), VLAN, and ACL technologies are used to control users' network access rights. This results in heavy network O&M workload. Which of the following improvements does the free mobility solution of iMaster NCE-Campus make to traditional campus networks in terms of policy management and control?

Options:

A.

Administrators can use iMaster NCE-Campus to centrally manage service policies on network-wide policy enforcement points.

B.

Administrators can define service policies based on security groups to decouple service policies from IP addresses.

C.

Administrators need to configure service policies multiple times for each policy enforcement point through iMaster NCE-Campus, which then automatically delivers the policies to the corresponding policy enforcement points.

D.

Policy enforcement points on a network can subscribe to IP-security group entries through iMaster NCE-Campus to obtain the mapping between users and IP addresses on the entire network.

Buy Now
Questions 81

The following information is displayed during OSPF troubleshooting. Based on this information, which of the following is the cause of the failure in establishing an OSPF adjacency relationship?

display ospf error interface GigabitEthernet 0/0/0

OSPF Process 1 with Router ID 10.0.12.2

OSPF error statistics

Interface: GigabitEthernet0/0/0 (10.0.12.2)

General packet errors:

0 : Bad version 0 : Bad checksum

0 : Bad area id 0 : Bad authentication type

0 : Bad authentication key 0 : Unknown neighbor

0 : Bad net segment 0 : Extern option mismatch

0 : Router id confusion

HELLO packet errors:

2 : Netmask mismatch 0 : Hello timer mismatch

0 : Dead timer mismatch 0 : Invalid Source Address

Options:

A.

The area types are inconsistent.

B.

The authentication passwords are inconsistent.

C.

The IP address masks of the interfaces are inconsistent.

D.

Hello packets are sent at different intervals.

Buy Now
Questions 82

OSPF is deployed on a campus network to implement network interconnection. An engineer configures R2 as shown in the figure. Which of the following statements is incorrect about LSAs on the OSPF network?

Options:

A.

Type 5 LSAs are flooded in Area 1.

B.

Type 3 LSAs are not flooded in Area 1.

C.

Type 3 LSAs are not flooded in Area 2.

D.

Type 5 LSAs are flooded in Area 2.

Buy Now
Questions 83

In OSPF, an ABR translates all Type 7 LSAs in a Not-So-Stubby Area (NSSA) into Type 5 LSAs.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 84

On the campus network shown, IPv6 is deployed for service tests. Four routers are deployed on the network, and these routers use OSPFv3 for network connectivity. Which of the following statements about LSAs generated by the OSPFv3 network is incorrect?

Options:

A.

R1 generates Router-LSAs describing interface information and receives Router-LSAs generated by R2 and R3.

B.

R1 receives two Link-LSAs generated by R2. The two Link-LSAs describe information about the two links connected to R2.

C.

The LSDB of R1 contains Network-LSAs generated by R3, indicating that R3 may be the DR on the local link.

D.

R2 functions as an area border router (ABR), generates Inter-Area-Prefix-LSAs that describe the IPv6 address prefix of area 1, and advertises these Inter-Area-Prefix-LSAs to R1 and R3.

Buy Now
Questions 85

SR-MPLS uses IGP extensions to advertise labels and reserve bandwidth to support high-bandwidth services.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 86

MPLS supports both static and dynamic LSP establishment. Which of the following protocols cannot dynamically establish LSPs in MPLS TE scenarios? (Select all that apply)

Options:

A.

OSPF

B.

RSVP-TE

C.

BGP

D.

IS-IS

Buy Now
Questions 87

Which of the following is the mapping between VNIs and BDs in VXLAN implementation?

Options:

A.

N:M

B.

1:1

C.

N:1

D.

1:N

Buy Now
Questions 88

Flavors are additional behaviors defined to enhance theEnd series instructionsinSRv6. Which of the followingEnd instructionscan thePSP flavorbe attached to?

Options:

A.

End.X

B.

End.BM

C.

End.T

D.

End

Buy Now
Questions 89

In theHuawei CloudCampus Solution, which of the following devices can go online through theregistration query center?

Options:

A.

Switch

B.

AR

C.

AP

D.

Firewall

Buy Now
Questions 90

Which of the following statements are correct about authentication points and policy enforcement points in Huawei's free mobility solution?

Options:

A.

The policy enforcement point executes inter-group policies based on security groups.

B.

The authentication point and policy enforcement point must be deployed on the same device.

C.

When receiving user traffic, the authentication point enforces a policy to process the traffic based on the source or destination security group corresponding to the source or destination IP address of the traffic.

D.

The authentication point and policy enforcement point can be deployed on different devices.

Buy Now
Questions 91

By default, the domain ID of an OSPF process is the same as the process ID. You can run the domain-id command in the OSPF process view to change a domain ID.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 92

Which of the following statements is incorrect about intranet security design for a large or medium-sized virtualized campus network?

Options:

A.

In addition to terminal access security, interface security must be considered during wireless network security design.

B.

Traffic suppression can be configured on the wired network to block broadcast traffic by shutting down interfaces.

C.

To secure data transmission, the CAPWAP tunnel between the AC and AP supports DTLS encryption.

D.

Intranet security refers to both wired and wireless network security.

Buy Now
Questions 93

OSPF is a mature protocol and is unlikely to have route computation errors in a regular networking environment under correct configurations. Which of the following statements are correct about the possible causes preventing an OSPF neighbor relationship from entering Full state?

Options:

A.

A link works abnormally.

B.

The OSPF network types on both ends of the link are inconsistent.

C.

The router IDs of neighbors are the same.

D.

The OSPF MTU values of interfaces on both ends of the link are different.

Buy Now
Questions 94

Which of the following is the purpose of configuring IS-IS fragmentation on an IS-IS device?

Options:

A.

Disable the device from establishing IS-IS neighbor relationships.

B.

Enable the device to support more IS-IS routes.

C.

There is no practical purpose.

D.

Disable the device from learning IS-IS link-state information.

Buy Now
Questions 95

On an SR-MPLS network, manually configured prefix SIDs on different devices may conflict with each other. Assume that there are four routes (prefix/mask SID) as follows.Which of the following routes will be selected according to the conflict handling principle?

Options:

A.

1.1.1.1/32 2

B.

1.1.1.1/32 1

C.

3.3.3.3/32 1

D.

2.2.2.2/32 3

Buy Now
Questions 96

Which of the following statements aboutBIER (Bit Index Explicit Replication) and PIM (Protocol Independent Multicast)are correct?

Options:

A.

On a BIER-based multicast network, packets sent by the multicast source must be encapsulated with the Bitstring field.

B.

On a PIM-based multicast network, an MDT covering all nodes that multicast traffic traverses needs to be established.

C.

On a BIER-based multicast network, an MDT covering all nodes that multicast traffic traverses does not need to be established.

D.

On a BIER-based multicast network, multicast users must send group join messages hop by hop.

Buy Now
Exam Code: H12-891_V1.0
Exam Name: HCIE-Datacom V1.0
Last Update: Jun 14, 2025
Questions: 275
H12-891_V1.0 pdf

H12-891_V1.0 PDF

$25.5  $84.99
H12-891_V1.0 Engine

H12-891_V1.0 Testing Engine

$30  $99.99
H12-891_V1.0 PDF + Engine

H12-891_V1.0 PDF + Testing Engine

$40.5  $134.99