Special Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

H12-891_V1.0 HCIE-Datacom V1.0 Questions and Answers

Questions 4

Which of the following roles is NOT a core role in Huawei's Free Mobility solution?

Options:

A.

iMaster NCE-Campus

B.

Policy enforcement device

C.

Authentication device

D.

Policy control device

Buy Now
Questions 5

Which of the following statements about 802.1X authentication are correct?

Options:

A.

802.1X authentication uses EAPoL to exchange authentication information between the client, device, and authentication server.

B.

In EAP termination mode, EAP packets are terminated and re-encapsulated into RADIUS packets on the network access device. The network access device and AAA server use the standard RADIUS protocol to implement authentication, authorization, and accounting.

C.

EAPoL implements EAP encapsulation on an IEEE 802.3 network, whereas EAPoW implements EAP encapsulation on an IEEE 802.11 network.

D.

In EAP relay mode, EAP packets are directly encapsulated by the network access device into RADIUS packets (that is, EAP over RADIUS, or EAPoR). The network access device and AAA server use EAPoR to perform authentication, authorization, and accounting.

Buy Now
Questions 6

Portal authentication is recommended for scenarios with high mobility and numerous terminal types, such as shopping malls and supermarkets. MAC address authentication is recommended for dumb terminals that do not support Portal authentication, such as printers, fax machines, and IP phones.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 7

Exhibit:

A loop occurs because Spanning Tree Protocol (STP) is not enabled on the network. Which of the following symptoms may occur?

Options:

A.

A loop alarm is generated on the LAN switch.

B.

CPU usage is too high.

C.

MAC entries flap.

D.

Host receives a large number of broadcast packets.

Buy Now
Questions 8

BGP Link State (BGP-LS) introduces a new NLRI into BGP. The NLRI carries link, node, topology prefix, and other information, and is also referred to as the link state NLRI.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 9

What can be determined from the following figure?

display ipv6 routing-table protocol isis

Public Routing Table : ISIS

Summary Count: 6

ISIS Routing Table's Status : < Active >

Summary Count: 6

Destination : 3000:FDEA::4

NextHop : FE80::2E0:FCFF:FE98:2577

Cost : 20

Interface : GigabitEthernet0/0/1

PrefixLength : 128

Preference : 15

Protocol : ISIS-L2

Flags : D

Options:

A.

R1 has six IS-IS IPv6 routes.

B.

R1 does not have IS-IS IPv6 routes.

C.

IS-IS IPv6 must have been enabled on GigabitEthernet0/0/1 of R1.

D.

R1 is not a Level-1 device.

Buy Now
Questions 10

MPLS supports forwarding equivalence class (FEC). Which of the following cannot be used as an FEC allocation standard?

Options:

A.

Fragment offset

B.

Application protocol

C.

Destination address

D.

Class of Service (CoS)

Buy Now
Questions 11

What can be determined from the following IS-IS peer output?

Peer information for ISIS(1):

    Peer System ID: ee8c.a0c2.baf3

    Interface: GE0/0/0

    State: Up

    HoldTime: 7s

    Type: L1

    PRI: 64

    MT IDs supported: 0(UP), 2(UP)

    Local MT IDs: 0, 2

    Area Address(es): 49.0022

    Peer IP Address(es): 10.1.34.1

    Peer IPv6 Address(es): FE80::2E0:FCFF:FE98:2576

Options:

A.

Both IPv4 and IPv6 IS-IS neighbor relationships are established between R4 and ee8c.a0c2.baf3.

B.

R4 does not have any IS-IS neighbors.

C.

Only an IPv4 IS-IS neighbor relationship is established between R4 and ee8c.a0c2.baf3.

D.

Only an IPv6 IS-IS neighbor relationship is established between R4 and ee8c.a0c2.baf3.

Buy Now
Questions 12

Which of the following statements is incorrect about access control on small and midsize campus networks based on the Huawei CloudCampus solution?

Options:

A.

iMaster NCE can function as an authentication server.

B.

Cloud APs support local Portal authentication.

C.

iMaster NCE can function as a Portal relay device.

D.

iMaster NCE can interconnect with a third-party RADIUS server.

Buy Now
Questions 13

Refer to the configuration in the figure. Which queue on R2 do packets of PC1 enter by default?

Options:

A.

AF4

B.

AF2

C.

AF3

D.

EF

Buy Now
Questions 14

OSPFv2 is an IGP running on IPv4 networks, whereas OSPFv3 is an IGP running on IPv6 networks. OSPFv2 and OSPFv3 have similar LSA types, but their LSA functions are slightly different. Which of the following is not an OSPFv3 LSA type?

Options:

A.

ASBR-Summary-LSA

B.

AS-External-LSA

C.

Router-LSA

D.

Network-LSA

Buy Now
Questions 15

How long is an IPv6 prefix assigned to a host when an IPv6 address is configured for the host in SLAAC mode?

Options:

A.

64 bits

B.

32 bits

C.

96 bits

D.

128 bits

Buy Now
Questions 16

On the network shown in the figure, OSPF-based SR-MPLS TE is enabled on all routers. Which of the following adjacency labels are allocated by P3?

Options:

A.

9006

B.

9002

C.

9003

D.

9005

Buy Now
Questions 17

In the Huawei SD-WAN Solution, the topologies of different VNs must be the same.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 18

HTTP is an application layer protocol for distributed, collaborative, and hypermedia information systems.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 19

Which of the following commands is used to adjust the cost of an IS-IS interface?

Options:

A.

isis circuit-type

B.

isis timer hello

C.

isis circuit-level

D.

isis cost

Buy Now
Questions 20

Huawei Open Programmability System (OPS) uses HTTP methods to access managed objects to manage network devices. HTTP is the most widely used network transmission protocol on the Internet. By default, which TCP port number is used?

Options:

Buy Now
Questions 21

The on-premise mode is recommended for controller deployment on small and midsize campus networks.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 22

NETCONF uses an XML-based encoding format. NETCONF uses text files to represent complex hierarchical data. Which of the following statements are correct about the following XML file?

Learners

Huawei

Reminder

Don't forget Reading!

Options:

A.

encoding: indicates the character set encoding format. Currently, only UTF-8 encoding is supported.

B.

/: indicates the end of the current tag.

C.

D.

?>: indicates the end of an instruction.

Buy Now
Questions 23

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following statements about the functions of BGP EVPN Type 3 routes is incorrect?

Options:

A.

If the VTEP IP address of a Type 3 route is reachable at Layer 3 and the peer VNI is the same as the local VNI, an ingress replication list is created for forwarding BUM packets.

B.

Type 3 routes carry L2VNIs and VTEP IP addresses.

C.

Type 3 routes carry L3VNIs.

D.

If the VTEP IP address carried in the received Type 3 route is reachable at Layer 3, a VXLAN tunnel to the peer end is established.

Buy Now
Questions 24

NAFTIR policing can only be applied to the inbound direction. Its purpose is to monitor the traffic entering the device and ensure that the upstream device does not unnecessarily consume network resources.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 25

A VGMP packet is encapsulated with a UDP header and a VGMP header. By default, a VGMP packet uses UDP port _____.

Options:

Buy Now
Questions 26

In Huawei SD-WAN Solution, which of the following tunneling technologies is used to establish data channels?

Options:

A.

WLAN

B.

IPsec

C.

MPLS

D.

GRE over IPsec

Buy Now
Questions 27

At the NETCONF content layer, the <config> operation may contain an operation attribute, which is used to specify an operation type for configuration data. Which of the following operation attributes are supported?

Options:

A.

create: The configuration data identified by the element that contains this attribute is added to the configuration datastore only if the configuration data does not already exist in the configuration datastore. If it already exists in the configuration datastore, with the value being data-exists is returned.

B.

delete: The configuration data identified by the element that contains this attribute is deleted from the configuration datastore. If the configuration data does not exist in the configuration datastore, a deletion success message is returned.

C.

merge: The configuration data identified by the element that contains this attribute is modified if the configuration data already exists in the configuration datastore. If not, the configuration data is created in the datastore.

D.

remove: The configuration data identified by the element that contains this attribute is deleted from the configuration datastore. If the configuration data does not exist in the configuration datastore, a deletion success message is returned.

Buy Now
Questions 28

Which of the following statements regarding OSPF neighbor relationship faults is incorrect?

Options:

A.

For non-DR and non-BDR routers on an Ethernet link, the 2-Way state is acceptable.

B.

The Init state indicates that the router has received Hello packets from its neighbors, but the received Hello packets do not contain the OSPF RID of the receiving router.

C.

The ExStart state indicates that two neighbor routers have inconsistent MTUs or the same OSPF Router ID (RID).

D.

The Attempt state indicates that the router does not send unicast Hello packets to configured neighbors.

Buy Now
Questions 29

When static IPsec VPN is used for WAN interconnection in the Huawei CloudCampus Solution, the AP, Router, and ____ can be used as egress devices.

Options:

Buy Now
Questions 30

iMaster NCE-CampusInsight uses SNMP technology to collect metrics and logs of network devices and detects network exceptions based on real service traffic.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 31

As shown in the figure, what is known about the default routes on R4?

Routing Table on R4:

display ip routing-table protocol isis

Destination/Mask Proto Pre Cost Flags NextHop Interface

0.0.0.0/0 ISIS-L1 15 10 D 10.1.24.1 GigabitEthernet0/0/1

ISIS-L1 15 10 D 10.1.34.1 GigabitEthernet0/0/0

172.16.1.2/32 ISIS-L1 15 10 D 10.1.24.1 GigabitEthernet0/0/1

172.16.1.3/32 ISIS-L1 15 10 D 10.1.34.1 GigabitEthernet0/0/0

Options:

A.

Four equal-cost default routes

B.

One default route

C.

Two default routes with different costs

D.

Two equal-cost default routes

Buy Now
Questions 32

Huawei CloudCampus Solution has multiple application scenarios, and iMaster NCE-Campus provides different APIs for each application scenario. Match the following application scenarios with the open APIs provided by iMaster NCE-Campus.

Options:

Buy Now
Questions 33

Flavors are additional behaviors defined to enhance the End series instructions in SRv6. Which of the following End instructions can the PSP flavor be attached to?

Options:

A.

End.X

B.

End.BM

C.

End.T

D.

End

Buy Now
Questions 34

Which of the following commands is used to adjust the cost of an IS-IS interface?

Options:

A.

isis circuit-type

B.

isis timer hello

C.

isis cost

D.

isis circuit-level

Buy Now
Questions 35

Congestion management technology can be used to discard data packets in the buffer queue to prevent the buffer queue from being exhausted.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 36

Which of the following are carried in the HTTP/1.1 response header?

Options:

A.

Status code

B.

Reason phrase

C.

Protocol version

D.

Response method

Buy Now
Questions 37

The figure shows an L3VPN over an SRv6 BE (Best Effort) network. According to the information displayed on PE2, which of the following statements is incorrect?

Options:

A.

An IBGP peer relationship is established between PE2 and PE1, and PE2 leams the route to 192.168.1.0/24 over an IBGP peer relationship.

B.

The instruction type corresponding to FO00:2 :: 1:79 is End.DT4.

C.

PE2 imports the route 192.168.1.0/24 through the import-route command.

D.

The router ID of the BGP process on the P is 1.0.0.6.

Buy Now
Questions 38

Python Paramiko implements the SSH protocol. In the Python Paramiko module, which of the following classes is used to create SFTP sessions and perform remote file operations?

Options:

A.

Packetizer class

B.

SFTPClient class

C.

Channel class

D.

Transport class

Buy Now
Questions 39

An LSR (Label Switching Router) supports various label retention modes. Which of the following statements regarding the liberal mode are correct?

Options:

A.

An LSR retains labels from a neighboring LSR only when the neighbor is its next hop.

B.

This label retention mode saves memory and label space.

C.

An LSR reserves all labels distributed by its neighbor.

D.

The liberal mode requires more memory and label space.

Buy Now
Questions 40

An SRLB is a set of user-specified local labels reserved for SR-MPLS. These labels are locally configured and have only local significance. Therefore, they are not advertised through the IGP.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 41

Before connecting an SSH client to an SSH server in public key authentication mode, a client needs to create a key pair. Which of the following commands is used to create a DSS key pair on the client using Git Bash?

Options:

A.

ssh-keygen -t dss

B.

ssh-keygen -t ecc

C.

ssh-keygen -t dsa

D.

ssh-keygen -t rsa

Buy Now
Questions 42

In an MPLS VPN network, two-layer MPLS labels are added into data packets before they are transmitted over the public network. Which of the following statements regarding data packet processing are correct?

Options:

A.

The egress PE sends the data packet to the correct VPN based on the inner label.

B.

The penultimate hop removes the outer label before forwarding the data packet to a peer egress PE.

C.

The IP data packet received by egress LSR is without labels.

D.

The penultimate-hop device receives a packet with an outer label.

Buy Now
Questions 43

On a CloudCampus virtualized campus network, which of the following modes can be used by a fabric to connect to external networks?

Options:

A.

Layer 3 shared egress

B.

Layer 2 shared egress

C.

Layer 3 exclusive egress

D.

Layer 2 exclusive egress

Buy Now
Questions 44

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following statements about symmetric IRB forwarding are correct?

Options:

A.

Both the ingress VTEP and egress VTEP forward packets based on the Layer 3 forwarding table.

B.

The ingress VTEP forwards packets based only on the Layer 2 forwarding table.

C.

The egress VTEP forwards packets based only on the Layer 2 forwarding table.

D.

When VTEPs forward inter-subnet user communication packets, the VNI carried in the VXLAN header is the L3VNI.

Buy Now
Questions 45

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following statements about symmetric IRB forwarding are correct?

Options:

A.

When VTEPs forward inter-subnet user communication packets, the VNI carried in the VXLAN header is the L3VNI.

B.

Both the ingress VTEP and egress VTEP forward packets based on the Layer 3 forwarding table.

C.

The ingress VTEP forwards packets based only on the Layer 2 forwarding table.

D.

The egress VTEP forwards packets based only on the Layer 2 forwarding table.

Buy Now
Questions 46

As shown in the figure, PE1 establishes an EVPN peer relationship with each of PE2 and PE3. When the network is initialized, CE1 sends an ARP request packet.

Which of the following statements are correct about how a PE processes the packet?

Options:

A.

When forwarding the packet to PE3, PE1 needs to add the BUM traffic label allocated by PE3 to the packet.

B.

PE1 sends a MAC/IP advertisement route carrying the MAC address of CE1.

C.

PE2 forwards the packet to CE1.

D.

PE3 forwards the packet to CE1.

Buy Now
Questions 47

An SR-MPLS Policy needs to divert service traffic to a tunnel for forwarding. If traffic from various services is destined for the same address, which of the following traffic diversion modes is recommended to ensure the quality of each service?

Options:

A.

Endpoint-based traffic diversion

B.

Color-based traffic diversion

C.

5-tuple-based traffic diversion

D.

DSCP-based traffic diversion

Buy Now
Questions 48

Which of the following items are included in static information collection and analysis?

Options:

A.

Device types

B.

Interface types

C.

License

D.

Packet loss rate

Buy Now
Questions 49

In addition to indicating priority, the DSCP value can also indicate the drop probability. Which of the following DSCP values is set with the highest drop probability?

Options:

A.

AF43

B.

AF10

C.

AF12

D.

AF11

Buy Now
Questions 50

Which of the following statements is incorrect about the user authentication points on the network?

Options:

A.

Deploying user authentication points at the access layer achieves granular permission management and high network security.

B.

Moving user authentication points from the access layer to the aggregation or core layer greatly reduces the number of user authentication points, thereby effectively mitigating the pressure on the AAA server.

C.

Deploying user authentication points at the access layer has both advantages and disadvantages when compared to doing so at the aggregation or core layer. Policy association can be applied if user authentication points are deployed at the access layer.

D.

When user authentication points are moved from the access layer to the aggregation layer, MAC address authentication for users may fail.

Buy Now
Questions 51

Free mobility implements policy management and permission control based on users' VLAN IDs and IP addresses.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 52

As shown in the following figure, an engineer tests network interconnection between two branches. To implement network interconnection, OSPF is deployed on R1, R2, and R3 of branch 1, and IS-IS is deployed on R2, R3, and R4 of branch 2. Which of the following operations needs to be performed to allow R1 to access R4's loopback interface address?

Options:

A.

Run the default-route-advertise command in both the OSPF and IS-IS views on R2.

B.

No configuration is required.

C.

Run the default-route-advertise command only in the OSPF view on R2.

D.

Run the default-route-advertise command only in the IS-IS view on R2.

Buy Now
Questions 53

The IS-IS Level-1 neighbor relationship is not established between R3 and R4. Referring to the following information, what is the possible cause?

Options:

A.

The IIH authentication between R3 and R1 fails.

B.

The IS-IS levels of R3 and R4 do not match.

C.

The circuit types of the interfaces connecting R3 and R4 do not match.

D.

The area IDs of R3 and R4 are different.

Buy Now
Exam Code: H12-891_V1.0
Exam Name: HCIE-Datacom V1.0
Last Update: Apr 1, 2025
Questions: 177
H12-891_V1.0 pdf

H12-891_V1.0 PDF

$25.5  $84.99
H12-891_V1.0 Engine

H12-891_V1.0 Testing Engine

$30  $99.99
H12-891_V1.0 PDF + Engine

H12-891_V1.0 PDF + Testing Engine

$40.5  $134.99