Huawei H12-222_V2.5-ENU HCIP-Routing & Switching-IENP V2.5 Online Training
Huawei H12-222_V2.5-ENU Online Training
The questions for H12-222_V2.5-ENU were last updated at Nov 22,2024.
- Exam Code: H12-222_V2.5-ENU
- Exam Name: HCIP-Routing & Switching-IENP V2.5
- Certification Provider: Huawei
- Latest update: Nov 22,2024
In response to different needs, the DHCP server supports multiple types of address allocation strategies, not including:
- A . Automatic allocation method
- B . Dynamic allocation method
- C . Duplicate allocation method
- D . Manual allocation method
Regarding the description of the LDP Session establishment process, which of the following is correct? (Multiple Choice)
- A . Two LSRs send HELLO messages to each other. The HELLO message carries the transmission address, and the party with the larger transmission address acts as the active party to initiate the establishment of a TCP connection.
- B . If the Hello Message does not carry the Transport Address, the destination IP address of the Hello Message is used to establish a TCP connection, and the party with the larger IP address is the active party to initiate the establishment of the TCP connection.
- C . The proactive party will send an Advertisement Message to negotiate the relevant parameters for establishing an LDP session, including the LDP protocol version and label distribution method. KeePalive maintains the timer value, maximum PDU length, and label space.
- D . If the passive party can accept the relevant parameters, it will send Initialization I, message, and at the same time send a keepalive message to the active party.
The interface IP address and virtual IP address of VRRP can be the same.
- A . True
- B . False
Man-in-the-middle attacks or IP/MAC spoofing attacks can cause information leakage and other hazards, and they are more common in intranets.
In order to prevent man-in-the-middle attacks or IP/MAC spoofing attacks, the configuration methods that can be taken are:
- A . Configure Trusted/Untrusted interface.
- B . Limit the maximum number of MAC addresses that can be learned on the switch interface.
- C . Enable DHCP snooping to check the function of CHADDR field in the DHCP REQUEST message.
- D . Configure the linkage between DHCP snooping and DAI or IPSG on the switch.
Regarding the description of the MAC address spoofing attack, which of the following is wrong?
- A . MAC address spoofing attack mainly uses the MAC address learning mechanism of the switch.
- B . The attacker can implement MAC address spoofing attacks by sending a forged source Mac address data frame to the switch.
- C . MAC address spoofing attacks will cause the switch to learn the wrong mapping relationship between MAC address and IP address.
- D . MAC address spoofing attacks will cause the switch to send data to the correct destination instead of the attacker.
The command to configure the linkage between BFD and static default route is:
- A . IP route-static 0.0.0.0.0.0.0.0 10.0.12.2 bfd-session 1
- B . IP route-static 0.0.0.0.0.0.0.0 10.0.12.2 track bfd-session 1
- C . IP route-static 0.0.0.0.0.0.0.0 10.0.12.2 track 1
- D . IP route-static 0.0.0.0.0.0.0.0 10.0.12.2 track session1
Intserv model, before the application sends a message, needs to apply to the network to reserve resources.
- A . True
- B . False
NAT technology can realize data secure transmission by encrypting data.
- A . True
- B . False
To realize all interfaces of the device, the command to enable the linkage function between BFD and OSPF is:
- A . bfd enable
- B . bfd all-interface enable
- C . all-interface bfd enable
- D . undo bfdall-interface disable
Single-packet attack means that an attacker controls a zombie host and sends a large number of attack messages to the target network, causing the congestion of the attacked network link and exhaustion of system resources.
- A . True
- B . False