Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Huawei H12-224 Dumps

Page: 1 / 15
Total 392 questions

HCNP-Routing&Switching (Fast Track) (Huawei Certified Network Professional -Routing&Switching) Questions and Answers

Question 1

Which of the following information be learned on the industry background of the project?

Options:

A.

Common solutions in the industry

B.

Problems to resolve by the project

C.

Organizational structure of customer’s Implementation scope of the project

Question 2

To improve Internet egress reliability.an enterprise uses multiple links to connect to different carrier networks, this mode requires attention to both the quality may be affected

Options:

A.

TRUE

B.

FALSE

Question 3

BGP is an inter domain routing protocol, which of the following statements regarding

BGP are true?

Options:

A.

BGP uses a reliable transport protocol

B.

BGP supports automatic neighbor discovery

C.

BGP supports plaintext authentication

D.

BGP supports rich routing policies

Question 4

In most cases, a risky operation solution can be reviewed and finalized one day before implementation

Options:

A.

TRUE

B.

FALSE

Question 5

which of the following subsystems are involved in building cabling?

Options:

A.

Horizontal subsystem

B.

Access subsystem

C.

Backbone subsystem

D.

Vertical subsystem E. Switching subsystem

Question 6

Which of the following trainings are transfer-to-maintenance trainings after project delivery?

Options:

A.

Networking and configuration training

B.

Routine maintenance training

C.

Emergent troubleshooting training

D.

Management and security production training

Question 7

Which of the following causes for VRRP group flapping is the most impossible.

Options:

A.

The link where VRRP Advertisement packets are transmitted changes form Up to Down frequently

B.

The interval for sending VRRP Advertisement packets is small

C.

Association between VRRP and BFD. is configured to implement a rapid master/backup switchover

D.

VRRP packets are discarded randomly because congestion occurs

Question 8

The agile controller is an automated control system for network resources it provides a unified policy engine to realize unified access control policies within the.

Options:

A.

TRUE

B.

FALSE

Question 9

When two bgp peers establish a TCP connection normal but their AS number and

BGP versions are inconsistent, Which message will be identified as incorrect during negotiation in the error code of the notification message?

Options:

A.

Route-refresh

B.

Open

C.

Keepalive

D.

Update

Question 10

Which of the following statements regarding border security optimization are true?

Options:

A.

Border security optimization aims to prevent or reduce external network attacks and harm

B.

The optimization position is usually located at the network edge

C.

Optimization measures include attack defense technologies packet filtering and hardware firewalls

D.

Border security optimization aims to achieve secure user access control

Question 11

Which of the following causes will lead a failure to establish BGP peer relationships?

Options:

A.

An ACL is configured to prohibit all TCP connections between two BGP neighbor

B.

Two IBGP peers are not physically directly connected

C.

BGP synchronization is enabled on fully-meshed IBGP peers

D.

Two BGP peers are configured with different routing Update intervals

Question 12

Which command is used to configure association between VRRP and a physical interface?

Options:

A.

vrrp vrid 1track interface Gigabit EthernetO/O/O

B.

Track vrrp vrid 1interface Gigabit EthernetO/O/OC. vrrp vrid linterface Gigabit EthernetO/O/O track

C.

vrrp vrid 1interface Gigabit EthernetO/O/O

Question 13

During the sbuctured network troubleshooting process, in which of the following phases is the fault reported or advertised to other departments?

Options:

A.

Fault identification

B.

Information collection

C.

Cause list

D.

Troubleshooting assessment Mi

Question 14

Which of the following statements regarding OSPF external route types is false?

Options:

A.

OSPF includes type 1 and type 2 external routes

B.

The cost of a Type 1 external route is the addition of the AS external cost and the AS internal cost the cost form a router to an A

C.

The cost of a Type 2 external route is the AS external cost

D.

A Type 2 external route is always preferred over a Type 1 external route when other when other conditions are the same

Question 15

the migration kick-off meeting is held to communicate with the customer about the project, communication with other involved parties is not important

Options:

A.

TRUE

B.

FALSE

Question 16

Software upgrade operations are similar for Huawei data com products, therefore, before a software upgrade, you only need to briefly read the upgrade guide.

Options:

A.

TRUE

B.

FALSE

Question 17

Which of following tasks need to be completed during the planning stage of a project?

(Multiple choice)

Options:

A.

Work out the technical design

B.

Know the project background

C.

Determine the model of network devices in the project

D.

Make clear the requirements of network devices in the project E, Plan IP address

Question 18

Which of the following statements regarding MAC address spoofing attacks is false?

Options:

A.

Attackers initiate MAC address spoofing attacks using the MAC address learning mechanism

B.

Attackers send data frames with forged MAC address to the switch to initiate MAC address spoofing attacks

C.

When MAC address spoofing attacks occur the switch may learn incorrect mapping between MAC address and IP addresses

D.

When MAC address spoofing attacks occur the switch may sent packets to the attacker

Question 19

On the border between an enterprise network and its external network, which of the following devices is deployed at the outermost side of the enterprise network?

Options:

A.

IDS

B.

PS

C.

FW

D.

VPN

Question 20

The firewall and router can both implement security defense functions and replace each other.

Options:

A.

TRUE

B.

FALSE

Question 21

Which of the following BGP attributes is Huawei' s unique attribute?

Options:

A.

PrefVal

B.

MED

C.

AS_Path

D.

Origin

Question 22

In the Controller's access control scenario, which of the following statements regarding the roles of the RADIUS server and client is true?

Options:

A.

The Agile Controller integrates all functions of the RADIUS server and client.

B.

The Agile Controller as the RADIUS server, while the user terminal as the RADIUS client.

C.

The authentication device (such as a 802.1X switch as the RADIUS server, while the user terminal as the RADIUS client).

D.

The Agile Controller as the RADIUS server, while the authentication device (such as a 802.1x switch) as the RADIUS clients.

Question 23

Which of the following causes for a VRRP group two-master fault is the most impossible?

Options:

A.

The configurations of the devices in the VRRP group are different

B.

The link where VRRP Advertisement packets are transmitted is faulty.

C.

The VRRP Advertisement packets received by the VRRP backup with a lower priority

D.

The master device sends a VRRP Advertisement packet every 1 second.

Question 24

RSTP defines different ports compared with STP. Which of the following ports cannot work in forwarding state?

Options:

A.

Root port

B.

Designated port

C.

Backup port

D.

Alternate port

Question 25

Which of the following route selection tools can be used by other routing protocols in addition to BGP?

Options:

A.

route-policy

B.

IP- prefix

C.

as-path-filter

D.

community-filter

Question 26

Which of the following statements regarding OSPF authentication commands are true?

Options:

A.

A ciphertext password can be entered , the effect is equivalent

B.

The ospf authentication-mode md5 1huawei command has the same function as the

ospf authentication-mode md5 1 plain huawei command

C.

When an authentication password is configured for area authentication and interface authentication separately , the password configured for area

D.

The ospf authentication-mode simple huawei command has the same function as the

ospf authentication-mode simple plain huawei command.

Question 27

In a route-policy, which of the following BGP attributes can be used in if-match clauses?

Options:

A.

Local-Prerence

B.

AS_Path

C.

TAC

D.

% Community

Question 28

Which of the following BGP attributes can define a set of destination addresses with the public characteristics?

Options:

A.

origin

B.

Community

C.

AS. Path

D.

MED

Question 29

Which of the following statements regarding PIM-SM hello packets is false?

Options:

A.

On a PIM-SM network multicast routers that have just started need to send Hello messages to discover neighbors and maintain neighbor relationships

B.

Multicast routers periodically send Hello Messages to each other to maintain communication

C.

A DR is selected on a network segment based on Hello messages exchanged between routers

D.

Hello messages are sent to multicast group address

Question 30

Which of the flowing statements regarding Huawei eSight network management software is false?

Options:

A.

Multiple users can be created for network management Users may be asked to log in to

B.

eSight from specified IP addresses in specific time ranges.

C.

% The administrator can force unauthorized login users to log out.

D.

% The login time of the administrator role also can be limited.

Question 31

Which of the following are possible causes for an MSTP failure in a LAN?

Options:

A.

MSTP is configured incorrectly

B.

A physical link alternates between up and Down triggering the device to send a large number of TC packets

C.

The MSTP-enabled device receives MSTP TC packets that are transparently sent or from the client

D.

The priority of the port in the specified MSTL is not configured

Question 32

To avoid global TCP synchronization, which congestion avoidance mechanisms can be used?

Options:

A.

Red

B.

Wired

C.

TALL DROP

D.

WFQ

Question 33

Which of the following scenarios is a loop test applicable to?

Options:

A.

to test whether applications are properly connected.

B.

to test whether a routing can prevent loops.

C.

to test whether a switch can prevent loops and broadcast.

D.

to test whether a physical link is disconnected.

Question 34

A source tree is the shortest path form a multicast source to receiver hosts, it is also called a shortest path tree.

Options:

A.

TRUE

B.

FALSE

Question 35

Which of the following tools is used to filter routing information and set route attributes based on routing information?

Options:

A.

as-path-filter

B.

IP-Prefix

C.

Route-policy

D.

Policy-based-route

Question 36

Which of the following BGP routing policy tools can filter routes?

Options:

A.

ip extcommunity-filter

B.

route-policy

C.

filter-policy

D.

peer-list

Question 37

Which of the following statements regarding the OSPF protocol is false?

Options:

A.

After a router receives a Network-Summary-LSA, this router runs a SPF algorithm.

B.

Network-LSA describes link state information of broadcast and NBMA segment.

C.

A virtual connection is a virtual link that belongs to the backbone area (Area 0).

D.

Type 4 LSA describes how to reach an A5BR, including routing and topology information.

Question 38

Which of the following parameters is optional when you configure a RADIUS server template on a Huawei switch?

Options:

A.

Authentication server IP address and port

B.

Automatic RADIUS user detection

C.

Accounting server address and port

D.

Shared-key

Question 39

Which of the following LSPs are established in Downstream Unsolicited (DU) label advertisement mode and ordered label distribution control mode?

Options:

A.

When the edge node finds a new destination address in its routing table that does not belong to any existing FEC the edge bode not crate

B.

An LSP is established by binding an FEC to a label and advertising the binding relationship to the neighboring LSR

C.

lf the egress node has available labels for distribution it allocates labels for the FEC and sends a label mapping message to the upstream node

D.

After receiving a label mapping message the LSR adds the corresponding entry to the label forwarding table

Question 40

Which of the following hello packets are used in IS-IS?

Options:

A.

Level-1LAN IIH

B.

Level-2 LAN IIH

C.

Level-3 LAN IIH

D.

P2P LAN IIH

Question 41

Which of the following statements regarding multicast MAC addresses are false?

Options:

A.

The high 24 bits of the multicast MAC address are 0x01005f the is fixed to 1and the

lower 23 bits of the MAC

B.

One multicast MAC address maps to 32 multicast IP addresses

C.

A multicast MAC address identifies receivers of a multicast group on the data link layer

D.

One multicast MAC address maps to only one multicast IP address

Question 42

AN ABR IN AN OSPF TOTALLY STUB AREA DOES NOT FLOOD. TYPE 3 LSAS.TYPE 4 LSAS.OR TYPE 5 LSAS WITHIN THIS AREA. WITHIN THIS AREA TO INSTRUCT HOW TO TRANSMIT PACKETS TO A DESTINATION OUTSIDE AN AS.

Options:

A.

TRUE

B.

FALSE

Question 43

What are the basic work process steps of SDN?

Options:

A.

Collect network topology information

B.

Collect NE resource information

C.

Collect forwarding information

D.

Generate routes for internal exchange

Question 44

In most cases, optical power is expressed in dbm, which of the following values in dbm is supported by most optical transceiver devices to receive and identify data ?

Options:

A.

-30DBM

B.

-10DBM

C.

10DBM

D.

30DBM

Question 45

Which application environment of following is NFV often deployed?

Options:

A.

Data center

B.

Network node

C.

User access side

D.

Client/Server

Question 46

Which of the following methods is used to control internal employees and guests access networks in the agile controller wireless access control scenario?

Options:

A.

Access control by user name

B.

According to whether the wireless terminal MAC address registration control access

C.

Access control by SSID (different SSIDs for internal employees and guests)

D.

Access control by wireless terminal type

Question 47

n a stateful inspection firewall where three is no session table when the status detection mechanism is enabled and the second packet of 3-way handshakes which of the following statements is true?

Options:

A.

If the firewall security policy permits packets to pass the packets can pass the firewall

B.

lf the firewall security policy permits packets to pass the session table is created

C.

By default when status detection is disabled and the permit policy is created

D.

Packets must pass the firewall and a session table is established

Question 48

If a fault cannot be rectified in a short time on a complex network but the customer needs to restore network availability immediately, which of the following actions is recommended?

Options:

A.

Tell the customer that this is impossible

B.

Set up an alternative network environment

C.

Communicate with the customer on skipping the faulty node and set up an alternative network environment

D.

Attempt rectify the fault if the fault cannot be rectified after a period of time communicate with the customer

Question 49

When bgp route load balancing is configured and there are two load balancing routes whose first eight bgp attributes described in bgp route the two routes prefix be advertised to neighbors?

Options:

A.

The two routes will be both advertised to other BGP peers

B.

One optimal route is selected from the two routes and then advertised to other BGP peers

C.

The two routes will not be advertised to other BGP peers

D.

One optimal route is selected from the two routes and then advertised to IBGP peers

Question 50

An advanced ACL is a series of ordered rules with permit or deny clauses. Which of the attributes can be used in act rules to describe IP packets?

Options:

A.

Source IP address

B.

Destination IP address

C.

Port number

D.

ICMP packet type and message code

Question 51

Which of the following device discovery modes are supported by huawei eSight network management software?

Options:

A.

By specified IP address

B.

By specified IP address segment

C.

By specified product model

D.

Batch import by Excel file (containing specified IP addresses)

Question 52

When a bgp muter receives a route with an unreachable next hop how does it process the route?

Options:

A.

it sends an error message to the router that sends the update message

B.

it does not add this route to its BGP routing table and discards this route

C.

it accepts and adds this route to its BGP routing table However this route will not be preferred by BGP and not added to the IP routing table

D.

it accepts and adds this route to its BGP muting table this route will participate in BGP mute selection and may become the optimal route

Question 53

The master/salve relationship of ospf neighbors is negotiated using DD. packets

Options:

A.

TRUE

B.

FALSE

Question 54

In the VRP, by default, the routes imported by BGP will be automatically summarized.

Options:

A.

TRUE

B.

FALSE

Question 55

Which of the following statements regarding huawei eSight network management software is false?

Options:

A.

eSight is a lightweight system and a wizard is available for eSight installation

B.

eSihht adopts the C/S architecture so users can access eSight using a browser anytime anywhere

C.

eSight provides corresponding solutions for different customers

D.

eSight can uniformly manage devices from multiple vendors

Question 56

In bgp the origin attribute of the routes imported using the import-router command is incomplete

Options:

A.

TRUE

B.

FALSE

Question 57

ACL have two types of matching order configuration order and automatic order

Options:

A.

TRUE

B.

FALSE

Question 58

Which of the following regulations does not belong to the onsite behavior regulations during the service process?

Options:

A.

Rights regulations

B.

Operation regulations

C.

Attitude regulations

D.

Preparation regulations

Page: 1 / 15
Total 392 questions