Weekend Special Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

H12-821_V1.0 HCIP-Datacom-Core Technology V1.0 Questions and Answers

Questions 4

As shown in the figure, the stateful inspection firewall forwards the packet because the packet matches the session status of the firewall.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 5

Which of the following statements about stack split is false?

Options:

A.

After a stack splits, the MAC addresses of the two stacks change immediately.

B.

If the master and standby switches are still in the same stack after the stack splits, the slave switches separated from the original master and standby switches re-elect the master and standby switches due to protocol packet timeout.

C.

If the master and standby switches are in two stacks after the split, the stack where the original master switch resides updates the topology and selects a new standby switch. The original standby switch becomes the master switch in the new stack and a new standby switch is elected.

D.

After a stack splits, multiple stacks have the same IP address and MAC address. To prevent network faults, the stacks perform MAD detection. The stack that fails the MAD detection shuts down all physical ports except reserved ports.

Buy Now
Questions 6

A Layer 2 switch supports multiple types of Ethernet interfaces. Similar to a trunk interface, a hybrid interface allows data frames from multiple VLANs to pass through. In addition, you can determine whether data frames from a VLAN sent out from a hybrid interface are tagged or untagged.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 7

Which of the following statements regarding OSPF multi-instance is false?

Options:

A.

Route exchange between different OSPF processes is similar to route exchange between different routing protocols.

B.

An interface of a router belongs to only a certain OSPF process.

C.

The OSPF process IDs must be the same when OSPF neighbor relationships are established between different routers.

D.

Multiple OSPF processes can run on the same router, and they are independent of each other.

Buy Now
Questions 8

See the network shown in the following figure.

R1 and R2 run IS-IS and establish an adjacency. IS-IS is enabled on Loopback0 of R2 but disabled on Loopback3 of R2. The configurations shown in the figure are performed in the IS-IS process of R2. Which of the following statements are true?

Options:

A.

The routing table of R1 contains the route 10.0.2.3/32.

B.

The routing table of R1 does not contain the route 10.0.2.3/32.

C.

The routing table of R1 does not contain the routes 10.0.2.2/32 and 10.0.2.3/32.

D.

The routing table of R1 contains the route 10.0.2.2/32.

Buy Now
Questions 9

Which of the following is used as the destination port for single-hop BFD?

Options:

A.

UDP port 3784

B.

UDP port 4784

C.

TCP port 3784

D.

TCP port 4784

Buy Now
Questions 10

When a packet passes through a firewall, the firewall creates a session connection for the packet to guide subsequent forwarding of the packet. However, the firewall does not create session entries for all packets. For which of the following packets does the firewall not create session entries when the packet reaches the firewall?

Options:

A.

ICMP ping packet

B.

GRE packet

C.

Subsequent fragment

D.

UDP packet

Buy Now
Questions 11

A firewall receives a packet that PC1 sends to PC2. Which of the following statements are true?

Options:

A.

The packet does not match any security policy.

B.

The packet matches security policy rule 1, and the firewall forwards the packet.

C.

No source or destination security zone is specified in security policy rule 2, indicating that any security zone is a match.

D.

The packet matches security policy rule 1, and the firewall discards the packet.

Buy Now
Questions 12

By default, if no router ID is configured but multiple loopback interface addresses are configured, BGP selects the largest loopback interface address as the router ID.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 13

On an STP network, the root bridge, root port, and designated port are elected in sequence. The election rules of these ports are different. List the steps for electing the root port in sequence.

Options:

Buy Now
Questions 14

In the OSPF protocol, inter-area route calculation involves only Router LSA, Network LSA, and Summary LSA.

Options:

A.

TRUE

B.

FLASE

Buy Now
Questions 15

The Interface \P address and VRRP virtual IP address can be the same.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 16

On Huawei switches, which of the following planes provides network information and forwarding entries that are mandatory for data plane forwarding?

Options:

A.

Forwarding plane

B.

Control plane

C.

Data plane

D.

Monitoring plane

Buy Now
Questions 17

When a BGP device sends an Open message to establish a peer connection, which of the following information is carried?

Options:

A.

Local AS number

B.

Router ID

C.

NLRI

D.

Hold time

Buy Now
Questions 18

A forwarding information database (FIB) can directly guide packet forwarding on a router.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 19

IP multicast effectively conserves network bandwidth and reduces network load. Therefore, it is widely used in network services, such as IPTV, real-time data transmission, and multimedia conferencing.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 20

Which of the following TLVs is used by ISIS to describe the IP address of an interface?

Options:

A.

129

B.

131

C.

128

D.

132

Buy Now
Questions 21

There are two types of routing entries on a PIM network. (S, G) routing entries are used to set up on a PIM network and are applicable to both PIM-DM and PIM-SM networks.

Options:

Buy Now
Questions 22

The VRID of the VRRP virtual router is 3 and the virtual IP address is 100.1.1.10. What is the virtual MAC address?

Options:

A.

01-00-5E-00-01-64

B.

01-00-5E-00-01-03

C.

00-00-5E-00-01-64

D.

00-00-5E-00-01-03

Buy Now
Questions 23

A wide area network (WAN) is a remote network that connects local area networks (LANs) or metropolitan area networks (MANs) in different areas for communication purposes. It is typically used to interconnect campus networks or data center networks.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 24

In IGMPv1, querier selection depends on a multicast routing protocol, such as PIM. In IGMPv2 and IGMPv3, the interface with the largest IP address acts as the querier.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 25

A route-policy consists of one or more nodes. What is the maximum number of nodes in a route-policy?

Options:

A.

4096

B.

65535

C.

256

D.

1024

Buy Now
Questions 26

When deploying BFD, you need to adjust some parameters so that it can better detect the network status. Which of the following statements is false about BFD optimization?

Options:

A.

After a high priority is configured for BFD packets, BFD packets are preferentially forwarded.

B.

To quickly learn about the network status and performance requirements, you can set the interval for sending BFD packets to the minimum value.

C.

On a live network, some devices switch traffic only when a BFD session changes to the Up state. If a routing protocol goes Up later than an interface, no route is available for switching traffic back, leading to traffic loss. To resolve this issue, configure a delay to compensate for the time difference caused when the routing protocol goes Up later than the interface.

D.

If a BFD session flaps, master/backup switchovers are frequently performed on the application associated with the BFD session. To prevent this, set the WTR time of the BFD session.

Buy Now
Questions 27

A network entity title consists of an area address and a system ID. It is a special NSAP (the SEL has a fixed value of 00) and is mainly used for route calculation.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 28

What is the correct procedure for a VLAN pool to assign terminals to VLANs.

Options:

Buy Now
Questions 29

Which of the following statements regarding OSPF route summarization commands are true?

Options:

A.

The asbr-summary command is executed in the OSPF view.

B.

The abr-summary command is executed in the OSPF area view.

C.

Advertise is the default parameter of the abr-summary command. That is, if not-advertise is not specified in the abr-summary command, the advertise parameter takes effect by default.

D.

Not-advertise is the default parameter of the abr-summary command. That is, if advertise is not specified in the abr-summary command, the not-advertise parameter takes effect by default.

Buy Now
Questions 30

Which of the following statements is false, based on the following IGMP information on an interface of RTA?XC

Options:

A.

The interval for sending group-specific Query messages is 60s.

B.

The maximum time for response to Query messages is 10s.

C.

The IP address of the interface is 192.168.1.1.

D.

The IGMP version is IGMPV2.

Buy Now
Questions 31

Regarding the route-policy set-cost configuration below, which of the following statements is true?

Options:

A.

The route 11.1.0.0/16 is permitted by node 10, and its tost Is set to 300.

B.

The cost of all routes is set to 200.

C.

All the routes that are not permitted by node 10 will be denied.

D.

The route 11.1.0.0/16 will continue to match node 20 after permitted by node 10, and (he final cost is set to 200.

Buy Now
Questions 32

Which of the following statements regarding Local-Preference in BGP is true?

Options:

A.

Local-Preference affects traffic that enters an AS.

B.

Local-Preference can be transmitted between ASs.

C.

The default Local-Preference value is 100.

D.

Local-Preference is a well-known mandatory attribute.

Buy Now
Questions 33

Preferences of routing protocols determine the sequence In which a router selects a route among routes to the same destination /earned through different routing protocols.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 34

VRF, also called VPN instance, is a network virtualization technology that helps VPN technology to isolate users. In normal cases, multiple VPN instances can be created on a physical device, and each VPN instance has independent entries. Which of the following resources can be independently owned by a VPN instance?

Options:

A.

Interface

B.

Routing table

C.

MAC address table

D.

Routing protocol process

Buy Now
Questions 35

An enterprise office network runs OSPF and is divided into multiple OSPF areas. Enterprise network engineers can configure route summarization on ASBRs to reduce the number of inter-area Type 3 LSAs, which in turn reduces the routing table size and improves device resource utilization.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 36

When an SSH client accesses an SSH server for the first time and the SSH server's public key is not configured on the SSH client, you can enable first-time authentication on the SSH client. This allows the SSH client to access the SSH server and saves the SSH server's public key on the SSH client. In this way, the next time the SSH client accesses the SSH server, the SSH client can use the saved public key to authenticate the SSH server.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 37

On an OSPF network, an algorithm is used to prevent loops within an area, but loops may occur between areas. Therefore, OSPF defines a loop prevention mechanism for inter-area routes. Which of the following statements are true about the loop prevention mechanism?

Options:

A.

Inter-area routes cannot be directly transmitted between non-backbone areas.

B.

All non-backbone areas must be directly connected to area 0.

C.

Inter-area routes need to be forwarded through area 0.

D.

An ABR cannot inject Type 3 LSAs that describe routes to a network segment in an area back to the same area.

Buy Now
Questions 38

During routine maintenance, an enterprise administrator runs a command to check VRRP group information. Which of the following statements is false about the command output?

yaml

CopyEdit

display vrrp verbose

Vlanif100 | Virtual Router 1 State: Master

Virtual IP: 10.1.1.100

Master IP: 10.1.1.2

PriorityRun: 120 PriorityConfig: 120

DR: None BDR: None MTU: 0

Preempt: YES Delay Time: 20s

Remain: --

Track: YES Priority Reduced: 20

Auth Type: MD5

BFD-session State: UP

Options:

A.

Preemption is enabled for the VRRP group.

B.

This VRRP group is an mVRRP group.

C.

Authentication is enabled for the VRRP group.

D.

The ID of the VRRP group is 1.

Buy Now
Questions 39

If a router ID is configured in both the system via and the BGP view, BGP uses the router ID configured in the BGP view because the BGP view takes precedence over the system view.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 40

Security policy is the core feature of firewalls. Only valid traffic that complies with security policies can be forwarded by firewalls. Which of the following statements are true about security policy matching rules?

Options:

A.

Multiple values can be configured for a single matching condition, and the values are logically ANDed.

B.

If a security policy contains multiple matching conditions, the relationship between them is AND.

C.

The system has a default security policy named default, where all matching conditions are any and the default action is permit.

D.

When multiple security policy rules are configured, they are sorted in a list by configuration sequence by default. A security policy rule configured earlier is placed higher in the list and has a higher priority.

Buy Now
Questions 41

Which of the following statements regarding the firewall zone security level is false?

Options:

A.

The configured security level cannot be changed.

B.

Two zones cannot be configured with the same security level.

C.

The default security level of the new zone is 1.

D.

Only the security level of the user-defined zone can be configured.

Buy Now
Questions 42

The native AC function allows an agile switch to integrate AC capabilities, achieving wired and wireless convergence. The agile switch centrally manages wired and wireless service traffic.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 43

In an OSPF routing domain, two routers must be specified as one DR and one BDR in a broadcast or NBMA network with at least two routers.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 44

Which of the following attributes cannot be directly referenced in an apply clause of a route-policy?

Options:

A.

community

B.

IP-prefix

C.

tag

D.

origin

Buy Now
Questions 45

On an OSPF network, if a router receives an update of an LSA that exists in the local LSDB, the router updates the LSDB and floods the LSA.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 46

On a P2P IS-IS network, after a neighbor relationship is established between R1 and R2, R2 finds that its LSDB is not synchronized. Then, R2 requests corresponding LSPs from R1 for LSDB synchronization. The following figure shows the synchronization process. Drag the following packet types to the steps in which they are used.(Token is reusable)

Options:

Buy Now
Questions 47

On an IS-IS network, routers send LSPs to exchange link state information. LSPs are classified into Level-1 LSPs and Level-2 LSPs and have the same format. Which of the following parts constitute the LSP ID in an LSP?

Options:

A.

LSP Number

B.

Pseudonode ID

C.

System ID

D.

IS Type

Buy Now
Questions 48

Huawei modular devices have multiple hardware modules that provide different functions. Match the following hardware modules with their functions.

Options:

Buy Now
Questions 49

On a WLAN, engineers can use the VLAN pool mechanism to assign access users to different VLANs, which helps reduce the number of broadcast domains and improve network performance. VLAN pools support two VLAN assignment algorithms: even and hash. Drag the advantages and disadvantages to the two algorithms.(Token is reusable)

Options:

Buy Now
Questions 50

After BGP initiates a TCP connection, the ConnectRetry timer is disabled if the TCP connection is successfully established. If the TCP connection fails to be established, the device tries to reestablish the TCP connection when the ConnectRetry timer expires.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 51

Which of the following statements is false about the default processing of the next hop address when a BGP device advertises a route?

Options:

A.

When advertising a locally originated route to an IBGP peer, a BGP device sets the next hop address to the IP address of its interface connected to the peer.

B.

When advertising a non-labeled route received from an EBGP peer to an IBGP peer, a BGP device changes the next hop address to the IP address of its interface connected to the IBGP peer.

C.

When advertising a route to an EBGP peer, a BGP device sets the next hop address to the IP address of its interface connected to the peer.

D.

A BGP device does not change the next hop address of a route if the route is received from an IBGP peer and is to be sent to another IBGP peer.

Buy Now
Questions 52

On an enterprise network, the directly connected interfaces of two OSPF routers are on different network segments and have different masks. To establish an OSPF neighbor relationship between the two interfaces, you can change their network types to which of the following?

Options:

A.

Point-to-point

B.

NBMA

C.

P2MP

D.

Broadcast

Buy Now
Questions 53

The Origin attribute is used to define the origin of BGP path information. There are three types of Origin attributes. Which of the following lists the Origin attributes in descending order of priority?

Options:

A.

IGP > EGP > Incomplete

B.

Incomplete > IGP > EGP

C.

EGP > IGP > Incomplete

D.

Incomplete > EGP > IGP

Buy Now
Questions 54

See the command output of a router below. Which of the following statements is true?

display ospf interface GigabitEthernet 0/0/0 verbose

OSPF Process 1 with Router ID 10.0.2.2

Interface: 10.0.12.2 (GigabitEthernet 0/0/0)

Cost: 1 State: BDR Type: Broadcast MTU: 1500

Priority: 1

Designated Router: 10.0.12.1

Backup Designated Router: 10.0.12.2

Timers: Hello 10 , Dead 40 , Poll 120 , Retransmit 5 , Transmit Delay 1

Options:

A.

The router ID is 10.0.12.2.

B.

The interface cost is 1500.

C.

This router is a BDR.

D.

The interface IP address is 10.1.12.1.

Buy Now
Questions 55

Which command is used to configure the VRRP preemption delay?

Options:

A.

vrrp vrid 1 timer delay 20

B.

vrrp vrid 1 preempt-delay 20

C.

vrrp vrid 1 preempt-mode timer delay 20

D.

vrrp vrid 1 preempt-timer 20

Buy Now
Questions 56

Compared with RSTP, which of the following port roles are added to MSTP?

Options:

A.

Backup port

B.

Master port

C.

Edge port

D.

Regional edge port

Buy Now
Questions 57

Which of the following statements regarding OSPF is true?

Options:

A.

OSPF does not have an acknowledgement mechanism. Therefore, OSPF relies on the upper-layer protocol, TCP, for acknowledgement.

B.

OSPF performs LSDB update every 30 minutes.

C.

OSPF uses the Bellman-Ford algorithm, and each router independently runs this algorithm.

D.

OSPF floods a LSU packet at an interval of 5s.

Buy Now
Questions 58

As shown in the figure, SWA, SWB, SWC, and SWD run the Rapid Spanning Tree Protocol (RSTP). Which of the following statements are true?

Options:

A.

Once receiving OPOUs, the edge port re-partlci pates in the calculation of the spanning tree.

B.

After a port is Configured as an edge port, the port can quickly enter the Forwarding state.

C.

You can enable the edge port on SWD's GEO/0/2 connected to the terminal so that this port can quickly enter the Forwarding state.

D.

You can enable the edge port on SWC's GE0/0/2 connected to the terminal so that this port can quickly enter the forwarding state.

Buy Now
Questions 59

On the campus OSPF network shown in the following figure, the interfaces connecting the five routers are GE interfaces, and their costs are not changed. The import-route command is run on R1. After the network converges, the route to the server at 192.168.1.0/24 is queried on R2. Which of the following is the cost of this route?

Options:

A.

2

B.

4

C.

3

D.

1

Buy Now
Questions 60

After a BGP peer relationship is established between two ends, changing the router ID of one end resets the BGP peer relationship.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 61

Which of the following statements about BFD operating modes are true?

Options:

A.

In demand mode, once a BFD session is set up, the system no longer periodically sends BFD Control packets.

B.

Asynchronous mode does not support the Echo function.

C.

In asynchronous mode, two systems periodically exchange BFD Control packets at the negotiated interval. If one system does not receive any BFD Control packets from the other within the detection time, the BFD session is declared down.

D.

Asynchronous mode is the primary BFD operating mode.

Buy Now
Questions 62

ON a stateful inspection Firewall where there is no session table, when the status detection mechanism is enabled and the second packet (CYN+ACK) of 3-way hadshakes reaches the firewall. Which of the following statements is true?

Options:

A.

If the firewall security policy permits packets to pass, the session table is created.

B.

By default, when status detection is disabled and the permit policy is configured packets can pass.

C.

Packets must pass the firewall, and a session table is established.

D.

If the firewall security policy permits packets to pass, the packets can pass the firewall.

Buy Now
Questions 63

OSPF supports area authentication and interface authentication. If both authentication modes are configured, Interface authentication takes preference over area authentication.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 64

Link aggregation is a common network technology. Which of the following are advantages of link aggregation?

Options:

A.

Load balancing

B.

Improved reliability

C.

Increased link bandwidth

D.

Route backup

Buy Now
Questions 65

During BGP route summarization configuration, the keyword can be used to suppress all specific routes so that only the summary route is advertised. The summary route carries the Atomic-aggregate attribute rather than the community attributes of specific routes.

Options:

Buy Now
Questions 66

Which of the following methods is usually used by a network administrator to configure a newly purchased device for the first time?

Options:

A.

Telnet

B.

SNMP

C.

Login through the Console port

D.

FTP

Buy Now
Questions 67

When a routing policy is used to filter routes, which of the following route prefixes will be denied by the IP prefix below?

Options:

A.

1.1.1.1/26

B.

1.1.1.2/16

C.

1.1.1.1/32

D.

1.1.1.1/24

Buy Now
Questions 68

Without a prior version check, an engineer configures IGMP snooping on a device and the version of IGMP snooping is earlier than the IGMP versions on user hosts. In this case, which of the following situations will occur?

Options:

A.

Users cannot receive multicast data because the device forwards received IGMP Report messages only to router ports and does not generate group member ports or forwarding entries.

B.

Users cannot receive multicast data, but the device generates forwarding entries after receiving IGMP Report messages.

C.

The IGMP snooping version of the device is automatically degraded, and users can receive multicast data properly.

D.

The IGMP versions of the hosts are automatically upgraded, and users can receive multicast data properly.

Buy Now
Questions 69

There are two BFD operating modes. In_______mode, the local end sends BFD Control packets at specified intervals, and the remote end checks whether the local end periodically sends BFD Control packets. (Use lowercase letters.)

Options:

Buy Now
Questions 70

If the interval for two consecutive packets of a TCP session reaching the firewall is longer than the aging time of the session, the firewall deletes the session information from the session table to ensure network security.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 71

As a next-generation wireless technology, Wi-Fi 6 greatly improves bandwidth rate and performance. Which of the following statements is false about the features of Wi-Fi 6?

Options:

A.

Uses OFDMA technology to achieve high concurrency.

B.

Realizes zero latency, ensuring efficient service running.

C.

Provides high bandwidth, up to 9.6 Gbps.

D.

Uses TWT technology to reduce terminal power consumption.

Buy Now
Questions 72

On the OSPF network shown in the figure, an adjacency has been established between R1 and R2. An engineer configures the commands in the figure on R2. In this case, which of the following routing entries may exist in the routing table of R2?

Options:

A.

10.1.4.0/24

B.

10.1.3.0/24

C.

10.1.2.0/24

D.

10.1.1.0/24

Buy Now
Questions 73

What is the default sending interval of BFD packets?

Options:

A.

10s

B.

5s

C.

100ms

D.

1000ms

Buy Now
Questions 74

On an RSTP network, if a port receives an RST BPDU and finds that its buffered RST BPDU is superior to the received RST BPDU, the port discards the received RST BPDU without responding.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 75

Which of the following statements regarding BGP route advertisement are false?

Options:

A.

All the BGP routes learned from all BGP peer will be advertised to other BGP peers.

B.

Only the optimal routes preferred by BGP can be advertised to other BGP peers.

C.

By default, the routes learned from an IBGP peer will not be forwarded to other IBGP peers.

D.

Only the routes learned from IGPs can be advertised to other BGP peers.

Buy Now
Questions 76

OSPF has five types of packets, which have the same header format. If the Auth Type field in the packet header is 1, which of the following authentication modes is used?

Options:

A.

Non-authentication

B.

MD5 authentication

C.

Plaintext authentication

D.

Hash authentication

Buy Now
Questions 77

Four routers run IS-IS and have established adjacencies. The area IDs and router levels are marked in the following figure. R1 and R2 are connected through a PPP link, and R3 is the DIS. Which of the following statements are true?

Options:

A.

If R2 sends a Level-2 LSP, R3 needs to send a PSNP for acknowledgment.

B.

R3 periodically sends CSNPs to implement Level-2 LSDB synchronization.

C.

R2 sends an LSP to R3 and R4 in unicast mode.

D.

If R1 sends an LSP, R2 needs to send a PSNP for acknowledgment.

Buy Now
Questions 78

In BGP, Keepalive messages are used to maintain BGP peer relationships. When a BGP router receives a Keepalive message from a peer, the BGP router sets the state of the peer to Established and periodically sends Keepalive messages to maintain the connection. By default, the device sends Keepalive messages every seconds.

Options:

Buy Now
Questions 79

Based on IGMP snooping, IGMP snooping proxy enables a switch to act as a substitute for an upstream Layer 3 device to send IGMP Query messages to downstream hosts, and also to act as a substitute for downstream hosts to send IGMP Report/Leave messages to an upstream device. As such, this function conserves bandwidth between the upstream device and the local device.

Options:

A.

TRUE

B.

FALSE

Buy Now
Exam Code: H12-821_V1.0
Exam Name: HCIP-Datacom-Core Technology V1.0
Last Update: Feb 22, 2025
Questions: 264
H12-821_V1.0 pdf

H12-821_V1.0 PDF

$25.5  $84.99
H12-821_V1.0 Engine

H12-821_V1.0 Testing Engine

$30  $99.99
H12-821_V1.0 PDF + Engine

H12-821_V1.0 PDF + Testing Engine

$40.5  $134.99