Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

H12-891_V1.0 HCIE-Datacom V1.0 Questions and Answers

Questions 4

IS-IS supports multi-instance and multi-process. Which of the following statements are correct about IS-IS multi-instance and multi-process?

Options:

A.

One IS-IS process can be associated with only one VPN instance.

B.

One VPN instance can be associated with multiple different IS-IS processes.

C.

One IS-IS process can be associated with multiple different VPN instances.

D.

If multiple IS-IS processes are created on an IS-IS router, these processes are independent of each other.

Buy Now
Questions 5

Which of the following commands are mandatory for configuring an OSPF-based SR-MPLS TE tunnel? (Select All that Apply)

Options:

A.

Configure the LSR ID for routers.

B.

Enable segment routing in the OSPF process view.

C.

Enable the opaque capability of OSPF.

D.

Enable MPLS TE in the OSPF process view.

Buy Now
Questions 6

MPLS supports both static and dynamic LSP establishment. Which of the following protocols cannot dynamically establish LSPs in MPLS TE scenarios? (Select all that apply)

Options:

A.

OSPF

B.

RSVP-TE

C.

BGP

D.

IS-IS

Buy Now
Questions 7

Exhibit:

The following figure shows the inter-AS MPLS VPN Option C (solution 2). RRs are deployed, and no traffic passes through the RRs during forwarding. If a data packet sent from PE2 to 192.168.1.1 carries two labels, which of the following statements about the two labels are correct?

Options:

A.

T1 is allocated by RR2.

B.

T1 is allocated by P2.

C.

V1 is allocated by PE1.

D.

V1 is allocated by P2.

Buy Now
Questions 8

On a CloudCampus virtualized campus network, service data enters different VNs from physical networks through edge nodes, and the VN that the data will enter is determined by the VLANs to which users belong. Which of the following statements about dynamic VLAN authorization is incorrect?

Options:

A.

When wired users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

B.

When wireless users pass Portal authentication, they join the authorization VLANs delivered to edge nodes.

C.

When wireless users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

D.

When wired users pass MAC address authentication, they join the authorization VLANs delivered to edge nodes.

Buy Now
Questions 9

NETCONF uses an XML-based encoding format. NETCONF uses text files to represent complex hierarchical data. Which of the following statements are correct about the following XML file?

< ?xml version= " 1.0 " encoding= " UTF-8 " ? >

< note >

< to > Learners < /to >

< from > Huawei < /from >

< heading > Reminder < /heading >

< body > Don ' t forget Reading! < /body >

< /note >

Options:

A.

encoding: indicates the character set encoding format. Currently, only UTF-8 encoding is supported.

B.

/: indicates the end of the current tag.

C.

< ?: indicates the start of an instruction.

D.

? > : indicates the end of an instruction.

Buy Now
Questions 10

iMaster NCE-CampusInsight uses SNMP technology to collect metrics and logs of network devices and detects network exceptions based on real service traffic.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 11

On a CloudCampus virtualized campus network, virtual networks are defined based on services. Each virtual network corresponds to a service, and isolation needs to be manually configured between virtual networks.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 12

On the campus network shown, IPv6 is deployed for service tests. Four routers are deployed on the network, and OSPFv3 is used for IPv6 network connectivity. An engineer checks the LSDB of R2 and obtains a Link-LSA. Which of the following statements about the LSA are correct?

Options:

A.

The link-local address of R2’s GE0/0/0 is FE80::2E0:FCFF:FECD:4F79.

B.

The IPv6 address prefix of R2’s GE0/0/0 is 2001:DB8:2345:23::/64.

C.

This LSA indicates that R2 does not support external routes but can participate in IPv6 route calculation.

D.

This LSA is generated by R2.

Buy Now
Questions 13

Collecting information before a cutover helps you determine whether services are normal before and after the cutover.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 14

Which of the following inter-AS MPLS L3VPN solutions does not require MPLS to run between ASBRs?

Options:

A.

Option C

B.

Option D

C.

Option A

D.

Option B

Buy Now
Questions 15

To obtain the token ID of iMaster NCE, you need to send an HTTP request using the following Python code to invoke an iMaster NCE RESTful API:

Which of the following statements is incorrect?

Options:

A.

You can run print(r.json()) to display the response message sent from the server.

B.

Token resources are located at https://139.9.213.72:18002/controller/v2/tokens.

C.

The HTTP request uses the GET method to query the token value.

D.

The request body is in JSON format.

Buy Now
Questions 16

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following command needs to be run on the VBDIF interface to enable the VTEP peer to generate BGP EVPN Type 2 routes based on ARP information of the local terminal?

Options:

A.

mac-address xxxx-xxxx-xxxx

B.

arp-proxy enable

C.

arp collect host enable

D.

arp distribute-gateway enable

Buy Now
Questions 17

Which of the following user logout modes are supported by 802.1X authentication?

Options:

A.

An authentication server forces a user to log out.

B.

A user logs out manually.

C.

An access device forces a user to log out.

D.

An accounting server forces a user to log out.

Buy Now
Questions 18

Which of the following operations is not involved in the middle phase of a migration?

Options:

A.

Migration preparation

B.

On-site monitoring

C.

Migration implementation

D.

Service test

Buy Now
Questions 19

The ________ command can be run to completely isolate Layer 2 and Layer 3 of different interfaces in a VLAN. (Use lowercase letters to supplement the command, which cannot be abbreviated.)

Options:

Buy Now
Questions 20

Which of the following types of LSAs does OSPF use to support SR-MPLS?

Options:

A.

Type 7 NSSA External LSA

B.

Type 10 Opaque LSA

C.

Type 1 Router LSA

D.

Type 2 Network LSA

Buy Now
Questions 21

The following figure shows the inter-AS MPLS VPN Option B solution. If ASBR-PE1 and ASBR-PE2 only transmit VPNv4 routes, you can run the following command on ASBR-PE1:

[ASBR-PE1-bgp-af-vpnv4] undo peer 10.0.34.4 enable

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 22

On a campus network, iMaster NCE-Campus is used to deploy two VNs (Virtual Networks): R & D VN and Marketing VN. Users in these two VNs belong to two separate security groups.

The campus network requires R & D personnel and sales personnel to communicate with each other. To meet this requirement, which of the following tasks does a network administrator need to perform?

Options:

A.

Deploy network service resources.

B.

Deploy a policy control matrix.

C.

Configure inter-VN communication.

D.

Deploy an external network.

Buy Now
Questions 23

Which of the following headend behaviors can insert SRHs into IPv6 packets? (Select All that Apply)

Options:

A.

H.Encaps.Red

B.

H.Insert

C.

H.Encaps

D.

H.Insert.Red

Buy Now
Questions 24

As shown in the figure, when PE1 receives an ARP request packet, it forwards the packet to PE4. The packet then carries two labels. The label value 201 is carried by the EVPN Type ____ route. (Enter only digits.)

Options:

Buy Now
Questions 25

SSH connections are usually established based on TCP/IP connections. In specific cases, SSH connections can be established based on UDP connections.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 26

The free mobility function is deployed on the iMaster NCE-Campus on a campus network. Which of the following information should an administrator pay attention to?

Options:

A.

Define security groups.

B.

Deliver the inter-group policy.

C.

Deploy a policy control matrix.

D.

Select the policy enforcement point.

Buy Now
Questions 27

Refer to the following command output on the router R1. Which of the following statements is incorrect?

< R1 > display interface Tunnel

Tunnel0/0/0 current state : UP

Line protocol current state : UP

Last line protocol up time : 15:21:23 UTC-08:00

Description: ! 0.0.3.3

Route Port, The Maximum Transmit Unit is 1500

Internet Address is 20.1.1.1/24

Encapsulation is TUNNEL, loopback not set

Tunnel source 10.0.1.1 (LoopBack0), destination 10.0.3.3

Tunnel protocol/transport GRE/IP, key disabled

keepalive disabled

Checksumming of packets disabled

Current system time: 15:21:37-08:00

300 seconds input rate 0 bits/sec, 0 packets/sec

300 seconds output rate 0 bits/sec, 0 packets/sec

13 seconds input rate 0 bits/sec, 0 packets/sec

13 seconds output rate 448 bits/sec, 0 packets/sec

9 packets output, 824 bytes

0 output error

Input bandwidth utilization : -

Output bandwidth utilization : -

Options:

A.

Key authentication is disabled for the tunnel.

B.

The destination IP address of the tunnel is 10.0.3.3.

C.

The tunnel is a GRE tunnel.

D.

Keepalive detection is enabled on the tunnel.

Buy Now
Questions 28

Network administrator A wants to use an IP prefix list to match specific routes. Which of the following routes can be matched by the IP prefix list shown in this figure?

ip ip-prefix TEST permit 10.0.0.0 24 less-equal 30

Options:

A.

10.0.2.0/24

B.

10.0.1.0/24

C.

10.0.0.1/30

D.

10.0.0.0/24

Buy Now
Questions 29

During telemetry static subscription, the NMS delivers subscription configuration to devices for data sampling. Which of the following statements is incorrect about the sampling path huawei-debug:debug/cpu-infos/cpu-info?

Options:

A.

cpu-info may be a list node of the YANG model.

B.

The sampling path uses the YANG model structure.

C.

debug may be the top node of the YANG model.

D.

cpu-infos may be a container node of the YANG model.

Buy Now
Questions 30

In Huawei ' s NAC solution, which of the following cannot be used for Portal authentication?

Options:

A.

User name and password

B.

Passcode

C.

SMS verification code

D.

User’s MAC address

Buy Now
Questions 31

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following statements about symmetric IRB forwarding are correct?

Options:

A.

Both the ingress VTEP and egress VTEP forward packets based on the Layer 3 forwarding table.

B.

The ingress VTEP forwards packets based only on the Layer 2 forwarding table.

C.

The egress VTEP forwards packets based only on the Layer 2 forwarding table.

D.

When VTEPs forward inter-subnet user communication packets, the VNI carried in the VXLAN header is the L3VNI.

Buy Now
Questions 32

Which of the following statements about SR-MPLS characteristics are correct? (Select all that apply)

Options:

A.

Only the controller can compute paths based on explicit paths.

B.

SR-MPLS supports smooth network evolution by extending existing protocols, such as IGPs.

C.

Efficient TI-LFA FRR protection is provided for fast path fault recovery.

D.

Such networks can quickly interact with upper-layer applications through the source routing technology.

Buy Now
Questions 33

An LSR supports various label retention modes. Which of the following statements regarding the liberal mode are correct?

Options:

A.

This label retention mode saves the memory and label space.

B.

An LSR retains labels from a neighboring LSR only when the neighbor is its next hop.

C.

An LSR reserves all labels distributed by its neighbor.

D.

Liberal mode allows the device to retain labels from all LSRs, not just the next hop.

Buy Now
Questions 34

The IS-IS Level-1 neighbor relationship is not established between R3 and R4. Referring to the following information, what is the possible cause?

Options:

A.

The IIH authentication between R3 and R1 fails.

B.

The IS-IS levels of R3 and R4 do not match.

C.

The circuit types of the interfaces connecting R3 and R4 do not match.

D.

The area IDs of R3 and R4 are different.

Buy Now
Questions 35

Telemetry is a technology that remotely collects data from physical or virtual devices at high speed, and has a layered protocol stack. Which of the following layers is not included in the telemetry protocol stack?

Options:

A.

Communication layer

B.

Transport layer

C.

Data encoding layer

D.

Data analysis layer

Buy Now
Questions 36

Which of the following statements about VXLAN principles is incorrect?

Options:

A.

VXLAN uses MAC-in-UDP encapsulation to encapsulate Ethernet packets into UDP packets and thereby extend Layer 2 networks.

B.

When VXLAN is deployed, in addition to devices at both ends of a VXLAN tunnel, intermediate forwarding devices are also required to support VXLAN. Otherwise, VXLAN packets cannot be forwarded.

C.

VXLAN packets are forwarded through routes on the underlay network, and the MAC address of the terminal in the inner data frame is not considered during underlay forwarding.

D.

VXLAN can be deployed on campus networks to implement Layer 2 and Layer 3 communication.

Buy Now
Questions 37

Which of the following statements about static VXLAN tunnel configuration are correct?

Options:

A.

On an NVE interface, the destination address of a VXLAN tunnel is specified based on the address in the ingress replication list. You can create one NVE interface for multiple VXLAN tunnels.

B.

An NVE interface can be associated with multiple VNIs. Therefore, you can create one NVE interface when there are multiple BDs.

C.

One NVE interface must be created for each VXLAN tunnel, and the source and destination IP addresses must be specified for the NVE interface. Therefore, the number of NVE interfaces is the same as the number of VXLAN tunnels on the VTEP.

D.

One NVE interface must be created for each BD. If there are multiple BDs, multiple NVE interfaces must be created.

Buy Now
Questions 38

IPsec SAs can be established in either manual mode or IKE auto-negotiation mode. Which of the following statements about the two modes is incorrect?

Options:

A.

The lifetime of an SA established in IKE auto-negotiation mode is controlled by the lifetime parameters configured on both ends of the tunnel.

B.

In manual mode, all parameters (including encryption and authentication keys) required for establishing an IPsec SA need to be manually configured.

C.

In IKE auto-negotiation mode, the encryption and authentication keys required for establishing an SA are generated using the DH algorithm.

D.

SAs established in both manual and IKE auto-negotiation modes can be dynamically updated.

Buy Now
Questions 39

Python Paramiko implements the SSH protocol. In the Python Paramiko module, which of the following classes is used to create SFTP sessions and perform remote file operations?

Options:

A.

Packetizer class

B.

SFTPClient class

C.

Channel class

D.

Transport class

Buy Now
Questions 40

Network administrator A wants to view the BGP peer status of R2. The BGP peer status of R2 is shown in this figure. Obtain the following information: R2 resides in AS _____ (Enter only digits. Do not add punctuations or spaces.)

Options:

Buy Now
Questions 41

O & M personnel for a large-scale event center receive feedback about Wi-Fi access failures. iMaster NCE-CampusInsight provides the function for personnel to view packet exchange processes and locate the root cause. It is found that IP addresses in the DHCP address pool are exhausted, preventing IP addresses from being assigned to mobile terminals. Which of the following functions is used by O & M personnel in this scenario?

Options:

A.

Simulation feedback

B.

Protocol trace

C.

Issue analysis

D.

Client journey

Buy Now
Questions 42

In the figure, SR-MPLS is enabled on R1, R2, and R3. The SRGB (Segment Routing Global Block) range on R3 is from 20000 to 21000, and the prefix SID index configured on the loopback1 interface of R3 is 30.

In this case, the MPLS label corresponding to the loopback1 interface of R3 is _____.

(Enter an Arabic numeral without symbols.)

Options:

Buy Now
Questions 43

Which of the following statements is incorrect about intranet security design for a large or medium-sized virtualized campus network?

Options:

A.

In addition to terminal access security, interface security must be considered during wireless network security design.

B.

Traffic suppression can be configured on the wired network to block broadcast traffic by shutting down interfaces.

C.

To secure data transmission, the CAPWAP tunnel between the AC and AP supports DTLS encryption.

D.

Intranet security refers to both wired and wireless network security.

Buy Now
Questions 44

As shown in the figure, a sham link is established between PE1 and PE2 through the loopback interfaces. CE2 can learn the 192.168.1.0/24 route (directed route on CE1) through the sham link and backdoor link. If other parameters use their default settings, the cost of the 192.168.1.0/24 route on CE2 should be ______. (Enter an Arabic numeral without symbols.)

Options:

Buy Now
Questions 45

In the firewall hot standby scenario, which of the following status information can be backed up between the active and standby firewalls?

Options:

A.

Server mapping table

B.

AAA user table (excluding the default user admin)

C.

Session table

D.

Dynamic MAC address table

Buy Now
Questions 46

In a VXLAN scenario, which of the following features can be enabled to reduce ARP packet flooding between VTEPs?

Options:

A.

Local proxy ARP

B.

ARP broadcast suppression

C.

Host information collection

D.

Port isolation

Buy Now
Questions 47

gRPC (Google Remote Procedure Call) is a language-neutral, platform-neutral, and open-source remote RPC system that supports unary RPCs and streaming RPCs.

Which of the following service methods are NOT supported by gRPC?

Options:

A.

rpc Subscribe(SubsArgs) stream returns(SubsReply) {};

B.

rpc dataPublish(stream serviceArgs) returns(stream serviceArgs) {};

C.

rpc stream LotsOfGreetings(HelloRequest) returns (HelloResponse) {};

D.

rpc Cancel(CancelArgs) returns(CancelReply) {};

Buy Now
Questions 48

When MPLS/BGP IP VPN is deployed, which of the following statements is incorrect about BGP route exchange between PEs and CEs?

Options:

A.

When PEs and CEs use BGP to exchange routing information, you do not need to import private network routes to BGP on PEs.

B.

In a Hub & Spoke scenario, when Hub-CE and Hub-PE run an IGP for communication, EBGP cannot be configured on Spoke-PE or Spoke-CE.

C.

In a scenario where PEs and CEs use BGP to exchange routing information, if two VPN sites have the same private AS number, the AS number replacement function can be used to replace the AS number in a received private network route with any specified AS number. This prevents routes from being discarded because of repeated AS numbers.

D.

In a CE multi-homing scenario, the BGP AS number replacement function may cause routing loops. BGP SoO can be used to prevent routing loops at a VPN site.

Buy Now
Questions 49

During the configuration of L3VPNv4 over SRv6 BE, if an RR is deployed in the SR domain, which command must be run on the RR to ensure that the PEs at both ends can correctly learn VPNv4 routes?

Options:

Buy Now
Questions 50

The RR (Route Reflector) is critical to the Huawei SD-WAN Solution, and its deployment mode varies based on the scenario. In which of the following modes can an RR be deployed?

Options:

A.

Multi-area deployment of the RR

B.

Independent deployment of the RR

C.

Co-deployment of the RR and hub site

D.

Partially independent deployment of the RR

Buy Now
Questions 51

An SRv6 Policy can be either statically configured on a device or dynamically generated by the controller and then delivered to the device.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 52

There are multiple SR-MPLS TE tunnel protection mechanisms. FRR (Fast Reroute) constructs a virtual node to convert multiple identical route advertisement nodes into a single route advertisement node, and then computes the backup next hop of the virtual node based on the TI-LFA algorithm. In this way, traffic can be quickly switched when a fault occurs.

What is the name of this protection mechanism?

Options:

Buy Now
Questions 53

In OSPFv3, which of the following LSAs can be flooded within an area?

Options:

A.

Inter-Area-Router-LSA

B.

Intra-Area-Prefix-LSA

C.

Link-LSA

D.

Inter-Area-Prefix-LSA

Buy Now
Questions 54

Which of the following is the mapping between VNIs and BDs in VXLAN implementation?

Options:

A.

N:M

B.

1:1

C.

N:1

D.

1:N

Buy Now
Questions 55

Refer to the output information of a device below. According to the information, which of the following MPLS labels is carried in a data packet forwarded by the device to 10.0.1.1?

Options:

A.

36100

B.

36200

C.

40100

D.

40200

Buy Now
Questions 56

Which of the following statements is incorrect about a BGP/MPLS IP VPN?

Options:

A.

In most cases, CEs are unaware of VPNs and do not need to support MPLS or MP-BGP.

B.

A BGP/MPLS IP VPN consists of customer edges (CEs), provider edges (PEs), and providers (Ps). PEs and Ps are carrier devices, whereas CEs are BGP/MPLS IP VPN customer devices.

C.

Inter-site communication can be implemented through VPN. A site can only belong to only one VPN.

D.

Ps only need to provide basic MPLS forwarding capabilities and do not need to maintain VPN-related information.

Buy Now
Questions 57

In the firewall hot standby scenario, when VGMP works in load balancing mode, which of the following functions must be enabled on the firewalls to prevent the return traffic from being discarded because it does not match any session entry in the case of inconsistent forward and return paths?

Options:

A.

Automatic backup

B.

Manual batch backup

C.

Quick session backup

D.

BFD

Buy Now
Questions 58

In the Huawei SD-WAN Solution, which of the following routing protocols is used to advertise VPN routes between CPEs?

Options:

A.

RIP

B.

OSPF

C.

IS-IS

D.

BGP

Buy Now
Questions 59

Congestion avoidance technology can prevent congestion on an interface.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 60

An engineer needs to download the configuration file vrpcfg.cfg to a local device through SFTP, rename the configuration file to backup.cfg, and upload it to the default directory of the device.

The configuration file is located at /vrpcfg.cfg (default directory of the remote device), and the local directory is C:\.

Which of the following Python Paramiko code lines can implement the required operations?

Options:

A.

sftp.get( ' /vrpcfg.cfg ' , r ' C:\ ' )sftp.put(r ' C:\backup.cfg ' , ' / ' )

B.

sftp.get( ' /vrpcfg.cfg ' , r ' C:\backup.cfg ' )sftp.put(r ' C:\backup.cfg ' , ' / ' )

C.

sftp.get( ' /vrpcfg.cfg ' , r ' C:\vrpcfg.cfg ' )sftp.put( ' /backup.cfg ' , r ' C:\vrpcfg.cfg ' )

D.

sftp.get( ' /vrpcfg.cfg ' , r ' C:\backup.cfg ' )sftp.put(r ' C:\backup.cfg ' , ' /backup.cfg ' )

Buy Now
Questions 61

OSPF is deployed on a campus network to implement network interconnection. An engineer configures R2 as shown in the figure. Which of the following statements is incorrect about LSAs on the OSPF network?

Options:

A.

Type 5 LSAs are flooded in Area 1.

B.

Type 3 LSAs are not flooded in Area 1.

C.

Type 3 LSAs are not flooded in Area 2.

D.

Type 5 LSAs are flooded in Area 2.

Buy Now
Questions 62

K company has two types of network services: UDP-based real-time video streaming services and TCP-based FTP download services. The company ' s network administrator often receives complaints that the FTP download speed is slow or unstable. What are the possible causes?

Options:

A.

The device uses the tail drop technology. As a result, global TCP synchronization affects the FTP rate.

B.

The device performs PQ scheduling for FTP services and WFQ scheduling for video services. As a result, the FTP service bandwidth is preempted.

C.

The device limits the FTP traffic rate to a small value.

D.

The video service has a higher priority and preempts the bandwidth of the FTP service.

Buy Now
Questions 63

Which of the following is not the function of OSPFv3 Link-LSAs?

Options:

A.

Advertises the interface ID of the local router to other routers attached to the link.

B.

Advertises the link-local address of the local interface to other routers attached to the link.

C.

Advertises a list of IPv6 prefixes of the local interface to other routers attached to the link.

D.

Advertises the Options field in the Network-LSA originated on the local link to other routers attached to the link.

Buy Now
Questions 64

The display current-configuration command displays the running configurations in memory.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 65

An engineer uses two routers to perform IPv6 tests and wants to use OSPFv3 for IPv6 network connectivity. Which of the following OSPFv3 configurations for R1 are correct?

Options:

A.

[R1-GigabitEthernet0/0/1] ospfv3 1 area 0

B.

[R1-ospfv3-1] router-id 10.1.1.1

C.

[R1-ospfv3-1-area-0.0.0.0] network 2001:DB8:2345:12::1 ::

D.

[R1] router id 10.1.1.1

Buy Now
Questions 66

Drag the IPsec functions on the left to the corresponding function description on the right.

Options:

Buy Now
Questions 67

In a scenario where SR Policies are dynamically established through the controller, which of the following statements about the SR Policy solution architecture is incorrect?

Options:

A.

The controller uses NETCONF to deliver configurations such as service interfaces and routing policies.

B.

The controller uses BGP-LS to collect tunnel topology information and computes SR Policy paths.

C.

The controller uses telemetry to deliver information such as SRv6 SIDs to construct SID entries.

D.

The controller uses BGP IPv6 SR Policy to deliver SR Policy information, such as the color, headend, and endpoint information.

Buy Now
Questions 68

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following statements about the functions of BGP EVPN Type 3 routes is incorrect?

Options:

A.

If the VTEP IP address of a Type 3 route is reachable at Layer 3 and the peer VNI is the same as the local VNI, an ingress replication list is created for forwarding BUM packets.

B.

Type 3 routes carry L2VNIs and VTEP IP addresses.

C.

Type 3 routes carry L3VNIs.

D.

If the VTEP IP address carried in the received Type 3 route is reachable at Layer 3, a VXLAN tunnel to the peer end is established.

Buy Now
Questions 69

During the implementation of iMaster NCE-Campus Wi-Fi location-based services (LBS), terminal location data is sent to an LBS platform through HTTP requests. Which of the following data formats is used in such HTTP requests?

Options:

A.

XML

B.

HTML

C.

JSON

D.

YAML

Buy Now
Questions 70

On the network shown in the figure, OSPF-based SR-MPLS TE is enabled on all routers. Which of the following adjacency labels are allocated by P3?

Options:

A.

9006

B.

9002

C.

9003

D.

9005

Buy Now
Questions 71

HTTP is an application layer protocol for distributed, collaborative, and hypermedia information systems.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 72

On traditional campus networks, network admission control (NAC), VLAN, and ACL technologies are used to control users ' network access rights. This results in heavy network O & M workload. Which of the following improvements does the free mobility solution of iMaster NCE-Campus make to traditional campus networks in terms of policy management and control?

Options:

A.

Administrators can use iMaster NCE-Campus to centrally manage service policies on network-wide policy enforcement points.

B.

Administrators can define service policies based on security groups to decouple service policies from IP addresses.

C.

Administrators need to configure service policies multiple times for each policy enforcement point through iMaster NCE-Campus, which then automatically delivers the policies to the corresponding policy enforcement points.

D.

Policy enforcement points on a network can subscribe to IP-security group entries through iMaster NCE-Campus to obtain the mapping between users and IP addresses on the entire network.

Buy Now
Questions 73

Which of the following channels are involved in the Huawei SD-WAN Solution?

Options:

A.

Management channel

B.

Control channel

C.

Data channel

D.

Orchestration channel

Buy Now
Questions 74

On a CloudCampus virtualized campus network, which of the following modes can be used by a fabric to connect to external networks?

Options:

A.

Layer 3 shared egress

B.

Layer 2 shared egress

C.

Layer 3 exclusive egress

D.

Layer 2 exclusive egress

Buy Now
Questions 75

Which of the following is the type of northbound API used by iMaster NCE-WAN?

Options:

A.

NETCONF

B.

SNMP

C.

CLI

D.

RESTful

Buy Now
Questions 76

NETCONF provides a set of mechanisms for managing network devices. NETCONF operations take place on a configuration datastore of network devices. Which of the following statements is incorrect about the configuration datastore?

Options:

A.

The configuration datastore of network devices can be classified into the candidate, running, and startup configuration datastores.

B.

The < delete-config > operation is oriented at the startup configuration datastore.

C.

The < validate > operation is oriented at the candidate configuration datastore.

D.

The < commit > operation submits the configuration in a startup configuration datastore to a running configuration datastore.

Buy Now
Questions 77

This figure shows an SRv6 (Segment Routing over IPv6) packet. If the Destination Address field in the IPv6 basic header is FC04::4, the value of the SL (Segment Left) field in the SRv6 header should be ____. (Enter only digits.)

Options:

Buy Now
Questions 78

By default, the domain ID of an OSPF process is the same as the process ID. You can run the domain-id command in the OSPF process view to change a domain ID.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 79

Which of the following statements about SR-MPLS Policy candidate paths are correct?

Options:

A.

A candidate path can contain multiple segment lists, with each segment list carrying the weight attribute.

B.

Load balancing can be implemented among candidate paths and among segment lists.

C.

An SR-MPLS policy can contain multiple candidate paths with the preference attribute.

D.

The valid candidate path with the highest preference functions as the primary path of the SR-MPLS Policy.

Buy Now
Questions 80

A network administrator runs the display telemetry destination command on a device to check information about a destination group that sampled data is sent to. The command output is as follows. Which of the following statements is incorrect?

[~CE-telemetry-sensor-group-Sensor1]display telemetry destination

Dest-name Dest-addr Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20000 RESOLVED - GRPC

Options:

A.

The IP address of the destination group is 192.168.56.1

B.

The destination group name is Dest1.

C.

VPN encapsulation is used for data push.

D.

The gRPC protocol is used for data push.

Buy Now
Questions 81

To allow only authorized users (users who obtain IP addresses through authorized DHCP servers or use specified static IP addresses) to access the network shown in the figure, which of the following solutions can be used?

Options:

A.

DAI + Port Security

B.

DHCP Snooping + IPSG

C.

DHCP Snooping + DAI

D.

DAI + IPSG

Buy Now
Questions 82

In OSPFv3, which of the following types of LSAs can be flooded in the entire AS?

Options:

A.

AS-external-LSA

B.

Intra-Area-Prefix-LSA

C.

Link-LSA

D.

Inter-Area-Prefix-LSA

Buy Now
Questions 83

Which of the following statements about DHCP snooping is incorrect?

Options:

A.

After DHCP snooping is enabled in the view of a VLAN, it takes effect for the VLAN ' s DHCP messages received by all the interfaces of the device.

B.

After DHCP snooping is enabled globally, the device processes only DHCPv4 messages by default if no parameter is specified.

C.

DHCP snooping can prevent attacks by configuring trusted interfaces.

D.

After DHCP snooping is enabled in the view of an interface, it takes effect for all DHCP messages on the interface.

Buy Now
Questions 84

Which of the following statements are correct about authentication points and policy enforcement points in Huawei ' s free mobility solution?

Options:

A.

The policy enforcement point executes inter-group policies based on security groups.

B.

The authentication point and policy enforcement point must be deployed on the same device.

C.

When receiving user traffic, the authentication point enforces a policy to process the traffic based on the source or destination security group corresponding to the source or destination IP address of the traffic.

D.

The authentication point and policy enforcement point can be deployed on different devices.

Buy Now
Questions 85

Which of the following statements is incorrect about MP-BGP?

Options:

A.

MP-BGP uses the MP_REACH_NLRI and MP_UNREACH_NLRI attributes to advertise VPNv4 routes.

B.

When PEs and CEs exchange routes through BGP, you need to create a BGP process for each VPN instance in the CE.

C.

The packet types and VPNv4 route advertisement policies of MP-BGP are the same as those of BGP-4.

D.

MP-BGP needs to allocate private network labels for VPNv4 routes.

Buy Now
Questions 86

To deploy a virtual campus network using iMaster NCE-Campus, the following steps are performed. From top to bottom, sort the steps in the order in which they occur during network deployment and management.

Options:

Buy Now
Questions 87

In the admission design for large- and medium-sized campus networks, which of the following authentication modes can be used for PCs connected to IP phones?

Options:

A.

MAC address authentication

B.

802.1X authentication

C.

Multi-mode authentication

D.

Portal authentication

Buy Now
Questions 88

The following figure shows some configurations of R1. Based on these configurations, which of the following statements about IS-IS on R1 are correct?

isis 1

is-level level-2

cost-style wide

network-entity 49.0022.ee8c.a0c2.baf1.00

isis 2 vpn-instance tt

is-level level-2

cost-style wide

network-entity 47.00ce.390d.efdc.b3e1.00

isis 3 vpn-instance rr

is-level level-2

cost-style wide

network-entity 47.cc0a.3efb.bbdd.aae1.00

Options:

A.

Process 1 contains the global routing information and routing information of VRFs tt and rr.

B.

Routing information is shared between processes 2 and 3.

C.

Process 1 contains only global routing information.

D.

Routing information of process 2 is isolated from that of process 3.

Buy Now
Questions 89

In the Huawei CloudCampus Solution, which of the following deployment modes are supported by Huawei switches?

Options:

A.

DHCP Option 148

B.

CLI

C.

Web interface

D.

Huawei registration center

Buy Now
Questions 90

During WLAN planning and design, channels 1, 6, and 11 are recommended on the 2.4 GHz frequency band, and channels 1, 5, 9, and 13 are recommended in high-density scenarios. On the 5 GHz frequency band, it is recommended that high-frequency and low-frequency channels of adjacent APs be staggered to prevent overlapping.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 91

What can be determined from the following IS-IS peer output?

Peer information for ISIS(1):

    Peer System ID: ee8c.a0c2.baf3

    Interface: GE0/0/0

    State: Up

    HoldTime: 7s

    Type: L1

    PRI: 64

    MT IDs supported: 0(UP), 2(UP)

    Local MT IDs: 0, 2

    Area Address(es): 49.0022

    Peer IP Address(es): 10.1.34.1

    Peer IPv6 Address(es): FE80::2E0:FCFF:FE98:2576

Options:

A.

Both IPv4 and IPv6 IS-IS neighbor relationships are established between R4 and ee8c.a0c2.baf3.

B.

R4 does not have any IS-IS neighbors.

C.

Only an IPv4 IS-IS neighbor relationship is established between R4 and ee8c.a0c2.baf3.

D.

Only an IPv6 IS-IS neighbor relationship is established between R4 and ee8c.a0c2.baf3.

Buy Now
Questions 92

When you configure a virtualized campus network on iMaster NCE-Campus and enable external networks to connect to the Internet, iMaster NCE-Campus will automatically deliver a specific route to direct traffic to the corresponding external network.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 93

Which of the following statements about the SP scheduling algorithm is incorrect?

Options:

A.

If the SP scheduling algorithm is used and a high-priority queue occupies a large amount of bandwidth, the low-priority queue may be starved.

B.

The SP scheduling algorithm preferentially schedules high-priority queues.

C.

When the SP scheduling algorithm is used to schedule multiple low-priority queues, the data packets that enter the queue first are forwarded first.

D.

To ensure the quality of key services, the SP algorithm can be used to schedule services and set the minimum bandwidth.

Buy Now
Questions 94

Which MPLS label will be used by PE2 for forwarding traffic to 10.0.1.1 based on the following SR-MPLS database?

Given Data (LSDB Information):

    Prefix-SID: 100

    SRGB Base: 40000

Options:

A.

39002

B.

40002

C.

38002

D.

36002

Buy Now
Questions 95

Which of the following is the default port used by iMaster NCE-Campus northbound open APIs?

Options:

A.

18008

B.

18006

C.

18002

D.

18000

Buy Now
Questions 96

The channelized sub-interface and FlexE technologies both can be used to implement network slicing, but the application scenarios of the two technologies are slightly different. Which of the following statements about the two technologies are correct?

Options:

A.

It is recommended that channelized sub-interface be used to reserve resources for interfaces with a bandwidth of less than 50 Gbit/s.

B.

It is recommended that FlexE be used to reserve resources for 50GE and higher-rate interfaces.

C.

Only FlexE-based network slicing can be deployed across OTN devices.

D.

Only network slicing based on channelized sub-interface can be deployed across MSTP devices.

Buy Now
Exam Code: H12-891_V1.0
Exam Name: HCIE-Datacom V1.0
Last Update: Mar 31, 2026
Questions: 322
H12-891_V1.0 pdf

H12-891_V1.0 PDF

$25.5  $84.99
H12-891_V1.0 Engine

H12-891_V1.0 Testing Engine

$30  $99.99
H12-891_V1.0 PDF + Engine

H12-891_V1.0 PDF + Testing Engine

$40.5  $134.99