Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Ace Your H12-841_V1.5 HCIP-Datacom Exam

HCIP-Datacom-Campus Network Planning and Deployment V1.5 Questions and Answers

Question 17

(On the Device Management page of iMaster NCE-Campus, which of the following functions will automatically enable the SSH proxy tunnel of the network device?)

Options:

A.

Summary

B.

Entry Query

C.

Device Configuration

D.

Command Line

Question 18

(On a CloudCampus virtualized campus network, service data enters different VNs from physical networks through edge nodes and the VN that the data will enter is determined by the VLANs to which users belong. Which of the following statements about dynamic VLAN authorization isfalse?)

Options:

A.

When wireless users pass Portal authentication, they join the authorization VLANs delivered to edge nodes.

B.

When wireless users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

C.

When wired users pass MAC address authentication, they join the authorization VLANs delivered to edge nodes.

D.

When wired users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

Question 19

(Which of the following statements about authentication profile configuration is true?)

Options:

A.

By default, users access the default domain, which cannot be modified using the CLI.

B.

On the same interface of the same device, all authentication types (such as Portal, MAC address, and 802.1X) must be configured with the same default domain or forcible domain.

C.

When multiple access profiles are bound to an authentication profile, authentication is triggered in the following sequence: 802.1X authentication → Portal authentication → MAC address authentication.

D.

If a forcible domain is configured for a user, the user is forcibly authenticated in the forcible domain regardless of whether the user name contains the domain name.

Question 20

When planning a VXLAN-based virtualized campus network, you need to design underlay, fabric, and overlay networks. Drag the modules on the left to the correct locations on the right. (Token is reusable)

Options: