Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Selected H12-821_V1.0 HCIP-Datacom Questions Answers

Page: 22 / 23
Total 329 questions

HCIP-Datacom-Core Technology V1.0 Questions and Answers

Question 85

In addition to a route reflector, the confederation is another method that reduces the number of IBGP connections in an AS.

Which of the following statements are true about the confederation technology? (Choose all that apply)

Options:

A.

This technology is applicable to large-scale networks.

B.

Special EBGP connections are established among sub-ASs in a confederation, and the sub-ASs need to be fully meshed.

C.

All member devices in a confederation need to be reconfigured.

D.

The logical topology does not need to be changed when a confederation is used.

Question 86

The traffic limiting policy feature only supports the number of connections initiated by the specified IP or the number of connections received.

Options:

A.

TRUE

B.

FALSE

Question 87

Which of the following statements is true about BGP?

Options:

A.

If the export routing policy applied to a BGP peer changes, manual intervention is required so that the device resends Update messages to the peer.

B.

IGP routes can be converted into BGP routes only through the network command.

C.

A router cannot be configured with multiple BGP processes.

D.

Open messages carry only the BGP header.

Question 88

Security policy is the core feature of firewalls. Only valid traffic that complies with security policies can be forwarded by firewalls. Which of the following statements are true about security policy matching rules?

Options:

A.

Multiple values can be configured for a single matching condition, and the values are logically ANDed.

B.

If a security policy contains multiple matching conditions, the relationship between them is AND.

C.

The system has a default security policy nameddefault, where all matching conditions areanyand the default action ispermit.

D.

When multiple security policy rules are configured, they are sorted in a list by configuration sequence by default. A security policy rule configured earlier is placed higher in the list and has a higher priority.

Page: 22 / 23
Total 329 questions