Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Huawei H12-841_V1.5 Dumps Questions Answers

HCIP-Datacom-Campus Network Planning and Deployment V1.5 Questions and Answers

Question 1

Complete the following static VXLAN tunnel configurations by dragging the configurations to the corresponding areas.

Options:

Buy Now
Question 2

(On a virtualized network deployed using iMaster NCE-Campus, after an administrator performs an operation, iMaster NCE-Campus delivers the following configuration to devices. Which of the following operations did the administrator perform?)

acl number9997

rule1permit ip source ucl-groupnameResearch_Group destination ucl-groupnameSales_Group

rule2permit ip source ucl-groupnameResearch_Group destination ucl-groupnameGuest_Group

Options:

A.

Deploy a policy control matrix.

B.

Deploy inter-VN communication.

C.

Create a security group.

D.

Create an authorization result.

Question 3

(In the admission design for large- and medium-sized campus networks, which of the following authentication modes can be used for PCs connected to IP phones?)

Options:

A.

Multi-mode authentication

B.

Portal authentication

C.

802.1X authentication

D.

MAC address authentication

Question 4

(Huawei iMaster NCE-Campus provides the financial SD-WAN SRv6 solution to help the financial industry implement end-to-end scheduling. To use this function, you need to obtain the SRv6 function package license.)

Options:

A.

TRUE

B.

FALSE

Question 5

(What are the respective protocol numbers of AH and ESP?)

Options:

A.

6 and 17

B.

51 and 50

C.

50 and 51

D.

17 and 57

Question 6

(If the number of MAC addresses learned on an interface enabled with port security reaches the upper limit, which of the following actions may the switch take?)

Options:

A.

Sets the interface state to error-down and generates an alarm.

B.

Sets the interface state to error-down without generating any alarm.

C.

Discards packets with unknown source MAC addresses without generating any alarm.

D.

Discards packets with unknown source MAC addresses and generates an alarm.

Question 7

(Which of the following encryption algorithms isnot supportedby IPsec VPN?)

Options:

A.

DSA

B.

3DES

C.

DES

D.

AES

Question 8

(Which of the following fields is not carried in a BGP EVPN Type 5 route?)

Options:

A.

GW IP Address

B.

Route Distinguisher

C.

MAC Address

D.

IP Prefix Length

Question 9

(iMaster NCE-CampusInsight uses SNMP technology to collect metrics and logs of network devices and detects network exceptions based on real service traffic.)

Options:

A.

TRUE

B.

FALSE

Question 10

(In Huawei's free mobility solution, after receiving user traffic, the policy enforcement device searches for the corresponding policy based on the information carried in the traffic, and enforces the policy to forward or discard the traffic. What is the information carried in the traffic?)

Options:

A.

Source or destination security group

B.

Source or destination port number

C.

Source or destination MAC address

D.

Source or destination IP address

Question 11

(After the Huawei CloudCampus Solution is deployed on a campus network, which of the following protocol packets may be exchanged between the management layer and network layer?)

Options:

A.

NETCONF

B.

SNMP

C.

RADIUS

D.

YANG

Question 12

(On a virtualized network deployed using iMaster NCE-Campus, after an administrator performs an operation, iMaster NCE-Campus delivers the following configuration to devices. Which operation did the administrator perform?

ip vpn-instance MKT

ipv4-family

route-distinguisher 3:6

vpn-target 0:6 export-extcommunity

vpn-target 0:6 export-extcommunity evpn

vpn-target 0:6 import-extcommunity

vpn-target 0:6 import-extcommunity evpn

vxlan vni 6

Options:

A.

Create a network service resource named MKT.

B.

Create a fabric named MKT.

C.

Create an external network named MKT.

D.

Create a VN named MKT.

Question 13

(Refer to the figure.

Which of the following steps aremandatoryto enable 802.1X authentication on GE0/0/2 and GE0/0/3 of SW3 and configure a RADIUS server to authenticate and deliver network access rights to users?Choose all that apply.)

Options:

A.

Configure an authentication domain.

B.

Configure an authentication profile.

C.

Configure an 802.1X access profile.

D.

Configure an AAA scheme.

Question 14

(Which of the following is used to implement inter-subnet communication on a VXLAN network and allow access from a VXLAN network to an external non-VXLAN network?)

Options:

A.

Layer 3 VXLAN gateway

B.

VLANIF interface

C.

NVE interface

D.

Layer 2 VXLAN gateway

Question 15

(The Huawei CloudCampus Solution divides the network architecture into three layers: network layer, management layer, and application layer.)

Options:

A.

TRUE

B.

FALSE

Question 16

(On a small- or medium-sized campus network deployed based on the Huawei CloudCampus Solution, if a single AP is used as the network egress and needs to be managed by iMaster NCE-Campus, in which of the following modes should the AP work?)

Options:

A.

RU

B.

Fit

C.

Cloud

D.

Fat

Question 17

(On the Device Management page of iMaster NCE-Campus, which of the following functions will automatically enable the SSH proxy tunnel of the network device?)

Options:

A.

Summary

B.

Entry Query

C.

Device Configuration

D.

Command Line

Question 18

(On a CloudCampus virtualized campus network, service data enters different VNs from physical networks through edge nodes and the VN that the data will enter is determined by the VLANs to which users belong. Which of the following statements about dynamic VLAN authorization isfalse?)

Options:

A.

When wireless users pass Portal authentication, they join the authorization VLANs delivered to edge nodes.

B.

When wireless users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

C.

When wired users pass MAC address authentication, they join the authorization VLANs delivered to edge nodes.

D.

When wired users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

Question 19

(Which of the following statements about authentication profile configuration is true?)

Options:

A.

By default, users access the default domain, which cannot be modified using the CLI.

B.

On the same interface of the same device, all authentication types (such as Portal, MAC address, and 802.1X) must be configured with the same default domain or forcible domain.

C.

When multiple access profiles are bound to an authentication profile, authentication is triggered in the following sequence: 802.1X authentication → Portal authentication → MAC address authentication.

D.

If a forcible domain is configured for a user, the user is forcibly authenticated in the forcible domain regardless of whether the user name contains the domain name.

Question 20

When planning a VXLAN-based virtualized campus network, you need to design underlay, fabric, and overlay networks. Drag the modules on the left to the correct locations on the right. (Token is reusable)

Options:

Question 21

(Which of the following can be used to classify campus networks?)

Options:

A.

Network scale

B.

Served objects

C.

Access mode

D.

Service complexity

Question 22

(As shown in the figure,

SW1 and SW2 use asymmetric IRB forwarding, and PC1 and PC2 communicate with each other. Which of the following is the destination MAC address of the original data frame in the packet sent from VTEP1 to VTEP2?)

Options:

A.

MAC D

B.

MAC A

C.

MAC B

D.

MAC C

Question 23

(Which of the following statements about the fabric global resource pool isfalse?)

Options:

A.

A bridge domain is a Layer 2 broadcast domain used to forward data packets on a VXLAN.

B.

VLANs for connecting to external networks, VLANs for connecting to network service resources, and VLANs for connecting underlay devices are allocated from the VLAN resource pool.

C.

A VXLAN network identifier identifies a VXLAN.

D.

Configure a service VLAN pool when you need to configure external gateway interconnection VLANs, network service resource interconnection VLANs, management VLANs for policy association, and VN access VLANs.

Question 24

(Which of the following roles is not a core role in Huawei's free mobility solution?)

Options:

A.

Policy enforcement device

B.

Policy control device

C.

iMaster NCE-Campus

D.

Authentication device

Question 25

(Which of the following fields is not carried in a BGP EVPN Type 2 route?)

Options:

A.

L3VNI

B.

IP Address

C.

IP Prefix

D.

L2VNI

Question 26

(As shown in the following figure, R1 and R2 establish an IPsec VPN in ISAKMP mode for communication. For IPsec proposals on R1 and R2, ESP is used, the encapsulation mode is set to tunnel mode, SHA1 is configured as the authentication algorithm, and AES-256 is configured as the encryption algorithm. In addition, IKEv1 is configured for IKE peers, the main mode is configured for IKEv1 negotiation phase 1, and the PSK Huawei@123 is configured for PSK authentication between IKE peers. For IKE proposals on R1 and R2, SHA1 is configured as the authentication algorithm, AES-256 is configured as the encryption algorithm, and DH group 1 is configured for IKE negotiation. Based on these configurations on R1 and R2, drag the configuration items on the left to the correct locations on the right.)

Options:

Question 27

(On a campus network, iMaster NCE-Campus is used to deploy two VNs: R&D VN and marketing VN, users in these two VNs belong to two security groups, respectively. The campus network requires R&D personnel and sales personnel to communicate with each other. To meet this requirement, which of the following tasks does a network administrator need to perform?)

Options:

A.

Deploy a policy control matrix.

B.

Deploy an external network.

C.

Configure access management.

D.

Configure inter-VN communication.

Question 28

(iMaster NCE-Campus has multiple networking planes. The single-plane networking is optional only in single-node system deployment.)

Options:

A.

TRUE

B.

FALSE

Question 29

(Which of the following functions isnot supportedby AH?)

Options:

A.

Anti-replay

B.

Data origin authentication

C.

Data integrity check

D.

Data encryption

Question 30

(Traffic of a traditional network is transmitted to the VXLAN network through the edge node. A VXLAN network accesses an external network through the ______ node.)

Options:

A.

Edge

B.

Spine

C.

Border

D.

Access

Question 31

(A supermarket chain wants to manage all its branch networks through iMaster NCE-Campus. However, it does not want to purchase physical servers or software. In this case, which of the following deployment modes is recommended?)

Options:

A.

On-premise

B.

Cloud management

C.

Huawei public cloud

D.

MSP-owned cloud