Site icon Exam4Training

Huawei H12-821_V1.0-ENU HCIP-Datacom-Core Technology V1.0 Online Training

Question #50

Hard drives are non-volatile memory on the host computer that uses a hard spinning platter It stores and retrieves data on a flat magnetic surface.

So which of the following options does the data hard disk save file saved in the hard disk?

  • A . cluster
  • B . object
  • C . slice
  • D . piece

Reveal Solution Hide Solution

Correct Answer: A
Question #50

Hard drives are non-volatile memory on the host computer that uses a hard spinning platter It stores and retrieves data on a flat magnetic surface.

So which of the following options does the data hard disk save file saved in the hard disk?

  • A . cluster
  • B . object
  • C . slice
  • D . piece

Reveal Solution Hide Solution

Correct Answer: A
Question #50

Hard drives are non-volatile memory on the host computer that uses a hard spinning platter It stores and retrieves data on a flat magnetic surface.

So which of the following options does the data hard disk save file saved in the hard disk?

  • A . cluster
  • B . object
  • C . slice
  • D . piece

Reveal Solution Hide Solution

Correct Answer: A
Question #50

Hard drives are non-volatile memory on the host computer that uses a hard spinning platter It stores and retrieves data on a flat magnetic surface.

So which of the following options does the data hard disk save file saved in the hard disk?

  • A . cluster
  • B . object
  • C . slice
  • D . piece

Reveal Solution Hide Solution

Correct Answer: A
Question #50

Hard drives are non-volatile memory on the host computer that uses a hard spinning platter It stores and retrieves data on a flat magnetic surface.

So which of the following options does the data hard disk save file saved in the hard disk?

  • A . cluster
  • B . object
  • C . slice
  • D . piece

Reveal Solution Hide Solution

Correct Answer: A
Question #6

OpenSent

  • A . 3-1-2-5-4
  • B . 1-3-5-2-4
  • C . 3-5-1-2-4
  • D . 3-1-5-2-4

Reveal Solution Hide Solution

Correct Answer: D
Question #7

As shown in the figure, in the network running the RSTP protocol, the original root port of SWC fails and the port is in the Down state. At this time, which of the following processes will the network go through to achieve stability?

  • A .  The standby port on the SWC becomes the new root port and enters the Forwarding state after going through the Learning state
  • B . SWC re-elects the root port and directly enters the Forwarding state
  • C .  The standby port on the SWC becomes the new root port and directly enters the Forwarding state
  • D . SWC re-elects the root port and enters the Forwarding state after Learning

Reveal Solution Hide Solution

Correct Answer: C
Question #8

About the description about the OSPF calculating the shortest path tree stage, which is the correct?

  • A .  The first stage calculates the Stub network segment, and the second stage calculates the router node and Transit network segment.
  • B .  The first stage calculates routing nodes and Transit network segments, and the second stage calculates Stub network segments.
  • C .  The first stage calculates the stub segment, and the second stage calculates the routing node.
  • D .  The first stage calculates the routing nodes, and the second stage calculates the Stub network segment.

Reveal Solution Hide Solution

Correct Answer: B
Question #9

Regarding the description of IGMP Snooping-working mechanism, which is the correct?

  • A . The layer 2 switch establishes and maintains the PIM routing table on the layer 2 by continuously monitoring IGMP messages.
  • B . When IGMP Snooping is not running, the multicast message will be broadcast on the second layer. After running IGMP Snooping, the message will no longer be broadcast on the second layer, but will be multicast on the second layer.
  • C .  If the host sends an IGMP leave message, the switch will add the host to the corresponding multicast table.
  • D .  If the host sends an IGMP host report message, the switch will delete the multicast entry corresponding to the hos.t

Reveal Solution Hide Solution

Correct Answer: B
Question #10

What is the minimum total length of the address in IS-IS Byte?

  • A . 2
  • B . 8
  • C . 20
  • D . 16

Reveal Solution Hide Solution

Correct Answer: B

Question #11

Which of the following does not include the advantages of address translation technology?

  • A . Address translation allows internal network users (private IP addresses) to easily access the Internet
  • B . Address translation can shield users on the internal network and improve the security of the internal network.
  • C . Address translation can enable many hosts in the internal office network to share a P address for accessing the Internet.
  • D . Address translation can handle the case of IP header encryption

Reveal Solution Hide Solution

Correct Answer: D
Question #12

Which of the following does not include the switch role in the stack system?

  • A . Main switch
  • B . Candidate switch
  • C . Slave switch
  • D . Standby switch

Reveal Solution Hide Solution

Correct Answer: B
Question #13

Which of the following tools is used to filter routing information and set routing attributes for filtered routing information?

  • A . route-policy
  • B . as-path-filter
  • C . policy-based-route
  • D . IP-prefix

Reveal Solution Hide Solution

Correct Answer: A
Question #14

Regarding the description of the routing tool, which of the following statement is wrong?

  • A . route-policy can only match routes and data packets, and cannot be used to modify routing attributes or data packet forwarding behavior
  • B .  Prefix list (ip-prefix) matching object is the destination address of routing information
  • C .  The access control list (ACL) is used to match the IP routing information or the address of the data packet
  • D . as-path-filter is used to match the AS-PATH attribute in BGP routing information, so it can only be used to filter BGP routes

Reveal Solution Hide Solution

Correct Answer: A
Question #15

Which of the following descriptions about setting Community through routing policies to affect routing selection is wrong?

  • A .  It can be indirectly affected. By setting the Community attribute of the route, the route can be classified, and then set different route selection-related attributes according to the category, such as Local_Pre, MED, etc., to achieve the purpose of affecting route selection
  • B .  It cannot be affected, because the Community attribute of the route is a non-transitional attribute and cannot be passed between routers
  • C .  It can be affected indirectly. By setting the Community attribute of the route, the route can be classified, and then different attributes related to route selection can be set according to the category. These attributes only include Loacal_Pre and MED, so as to achieve the purpose of affecting route selection
  • D . After the router receives the routing update whose Commmity attribute is No_ Advertise, it will not advertise it outside the local AS.

Reveal Solution Hide Solution

Correct Answer: A
Question #16

Regarding the description of the summary automatic command and BGP aggregation, which is wrong?

  • A .  This command is used to implement automatic aggregation, and its priority is higher than manual aggregation
  • B .  After configuring this command, BGP will aggregate routes according to natural network segments
  • C .  This command is used to enable automatic aggregation of locally imported routes
  • D .  After configuring this command, BGP only sends the aggregated route to the peer

Reveal Solution Hide Solution

Correct Answer: A
Question #17

There is a message in the BGP protocol that is periodically sent between BGP neighbors to maintain the neighbor relationship. This message is:

  • A . Update
  • B . Hello
  • C . open
  • D . Keepalive

Reveal Solution Hide Solution

Correct Answer: D
Question #18

Which BGP route will send BGP neighbors without BGP path load sharing enabled?

  • A . All BGP routes learned from all neighbors
  • B .  Only the best route preferred by BGP
  • C .  Only routes learned from IBGP
  • D .  Only routes learned from EBGP

Reveal Solution Hide Solution

Correct Answer: B
Question #19

When using authentication in BGP configuration, how should it be configured?

  • A .  A pair of BGP peers must use the same MD5 password
  • B .  All routers in the AS must use the same password
  • C . All BGP peers on a router must use the same password
  • D .  All routers in the same AS must use the same password

Reveal Solution Hide Solution

Correct Answer: A
Question #20

Which of the following descriptions about the Keepalive message in BGP is wrong?

  • A . Keepalive messages are mainly used to maintain the connection between BGP peers
  • B . The Keepalive message contains only one BGP data header
  • C .  By default, the Keepalive interval is 180 seconds
  • D . Keepalive messages are periodically sent between two BGP neighbors

Reveal Solution Hide Solution

Correct Answer:   C

Question #21

When a stateful inspection firewall forwards subsequent data packets (not the first packet), which of the following is mainly based on?

  • A . Route table
  • B . OFIB table
  • C . MAC address table
  • D . Session table

Reveal Solution Hide Solution

Correct Answer: D
Question #22

ACL command ac1 [number] ac1-number [ match-order {autol config}], where ac1-numnbe is used to specify the number of the access control list, and the value range of ac1-number of the basic access control list is ().

  • A . 1000~3999
  • B . 0~1000
  • C . 3000~3999
  • D . 2000 ~2999

Reveal Solution Hide Solution

Correct Answer: D
Question #23

Which of the following tools cannot be directly referenced by the apply clause of a route-policy?

  • A . IP-Prefix
  • B . tag
  • C . community
  • D . origin

Reveal Solution Hide Solution

Correct Answer: A
Question #24

Regarding the default routes of each protocol, which of the following description is wrong?

  • A . BGP can deliver default routes
  • B . ISIS can issue default routes
  • C . OSPF cannot deliver the default route
  • D .  Static default routing can be configured

Reveal Solution Hide Solution

Correct Answer: C
Question #25

In a broadcast network, what is the default interval for sending Hello by DIS?

  • A . 5s
  • B . 10s
  • C . 40s
  • D . 3.3s

Reveal Solution Hide Solution

Correct Answer: D 
Question #26

Regarding LSA3, LSA4 and LSA5, which of the following description is correct?

  • A . LSA5 will not change after passing through different areas, but LSA3 will change
  • B . LSA3, LSA4 and LSA5 will not change after passing through different areas
  • C . LSA3 will not change after passing through different areas, but LSA4 and LSA5 will change
  • D . LSA4 will not change after passing through different areas, but LSA3 and LSA5 will change

Reveal Solution Hide Solution

Correct Answer: A
Question #27

Which of the following description about OSPF is correct?

  • A . OSPF LSA is regularly updated every 30 minutes
  • B . OSPF floods an LSU every 5s
  • C . OSPF uses the Bellman-Ford algorithm, and each router runs the algorithm independently
  • D . OSPF itself has no confirmation mechanism, so 0SPP relies on the lower layer protocol, namely TCP confirmation.

Reveal Solution Hide Solution

Correct Answer: A
Question #28

Among the matters needing attention in configuring the Stub area, the correct description is:

  • A .  The virtual connection can pass through the stub area
  • B .  If an area is configured as a Stub area, all routers in the area must be configured with Stub area attributes
  • C .  The backbone area can be configured as a stub area
  • D .  ASBR can exist in the Stub area

Reveal Solution Hide Solution

Correct Answer: B
Question #29

Which of the following scenarios is the SD-WAN solution suitable for?

  • A . Enterprise branch interconnection
  • B . Internal interconnection of enterprise data center network
  • C . Enterprise campus wireless network deployment

Reveal Solution Hide Solution

Correct Answer: A
Question #30

Which of the following descriptions about OSPF route aggregation is incorrect?

  • A . Any router in OSPF can perform route aggregation operations.
  • B . OSPF has two route aggregation methods: ABR aggregation and ASBR aggregation
  • C . Route aggregation refers to aggregating routing information with the same prefix and publishing only one route to other areas.
  • D . Through route aggregation, routing information can be reduced, thereby reducing the size of the routing table and improving router performance.

Reveal Solution Hide Solution

Correct Answer: A

Question #31

 Which of the following description of how to establish a BFD session is wrong?

  • A . BFD sessions can only be established dynamically
  • B .  Static configuration of the BFD session refers to configuring the BFD session parameters through the command line, including local identifiers and remote identifiers, etc.
  • C . When dynamically establishing a BFD session, dynamically assign a local identifier.
  • D . The system distinguishes between static BFD sessions and dynamic BFD sessions by dividing the identifier area.

Reveal Solution Hide Solution

Correct Answer: A
Question #32

During the operation of the DHCP protocol, the process from when the client applies to obtain an IP address is:

① The host sends a DHCP Request to request an IP address

② Server sends DHCP Offer message response

③ The host sends a DHCP Discover message to find DHCP

④ Server 4 Server responds with ACK response request after receiving the request

  • A . ③ – ② – ① – ④
  • B . ① – ② – ③ – ④
  • C . ① – ④ – ③ – ④
  • D . ③ – ④ – ① – ②

Reveal Solution Hide Solution

Correct Answer: A
Question #33

The filter-policy 2000 export is configured in the IS-IS process, which statement about the function of this command is wrong?

  • A .  It needs to be used in combination with route import, so that only part of the imported external routes can be advertised to neighbors
  • B .  This command will filter the link state information published externally
  • C . If this command is not configured, the device will advertise all the routes imported to S-IS by the external routing protocol by default.
  • D .  It will restrict the publishing of routing entries generated by the device itself

Reveal Solution Hide Solution

Correct Answer: D
Question #34

When performing source NAT configuration and having no-pat configuration parameters, which of the following statements is correct?

  • A .  Only the destination IP address is translated
  • B .  Simultaneous source IP address and source port translation
  • C .  Only source IP address translation is performed
  • D .  Perform destination IP address and destination port translation

Reveal Solution Hide Solution

Correct Answer: C
Question #35

Which of the following description about the prefix list is wrong?

  • A .  The prefix list can match the prefix number and prefix length
  • B .  The prefix list can be used for packet filtering
  • C .  The prefix list can be used to filter IP prefixes
  • D .  The prefix list has a stronger matching function for routing masks than the access control list

Reveal Solution Hide Solution

Correct Answer: B
Question #36

In SSM, which version of IGMP needs to be used?

  • A . IGMPv1
  • B . IGMPv3
  • C . IGMPv2
  • D . IGMPv4

Reveal Solution Hide Solution

Correct Answer: B
Question #37

 Which of the following descriptions about configuring roaming groups is wrong?

  • A . After the AC is enabled with the Master Controller function, it joins the roaming group by default and can manage other ACs
  • B . Master Controller is a logical role that can be assumed by any common entity AC
  • C .  Member ACs need to designate an AC as their own Master Controller
  • D . The Master Controller manages each AC through the CAPWAP tunnel

Reveal Solution Hide Solution

Correct Answer: A
Question #38

Which of the following description of OSPF neighbor relationship and adjacency relationship is correct?

  • A .  The adjacency relationship is maintained by OSPF DD packets
  • B . OSPF routers must establish an adjacency before exchanging Hello packets
  • C .  The neighbor relationship is selected from the adjacency relationship and formed to exchange routing information
  • D .  Not all neighbor relationships can be adjacencies

Reveal Solution Hide Solution

Correct Answer: D
Question #39

Which of the following does not belong to IGP?

  • A . RIP
  • B . IS-IS
  • C . BGP
  • D . OSPF

Reveal Solution Hide Solution

Correct Answer: C
Question #40

What are the key components of building an IP wide-area bearer network solution together with Huawei NetEngine intelligent routers?

  • A . iMaster NCE-Fabric
  • B . iMaster NCE-IP
  • C . iMaster NCE-Campus
  • D . iMaster NCE-WAN

Reveal Solution Hide Solution

Correct Answer: D

Question #41

Which of the following statements about the address used by AC to establish a CAPWAP tunnel in VRRP hot backup is correct?

  • A .  The physical address of the primary AC
  • B .  The physical address of the standby MC
  • C .  Any address configured in the AC is fine
  • D .  VRRP virtual addresses of the active and standby ACs

Reveal Solution Hide Solution

Correct Answer: D
Question #42

The default priority of the VRRP device in the backup group is:

  • A . 0
  • B . 200
  • C . 150
  • D . 100

Reveal Solution Hide Solution

Correct Answer: D
Question #43

In the IS-IS broadcast network, which multicast MAC address does the Level-1 router use as the destination address for sending IIH?

  • A . 0180-c200-0000
  • B . 0180-c200-0015
  • C . 0100-5E00-0001
  • D . 0180-c200-0014

Reveal Solution Hide Solution

Correct Answer: D
Question #44

Which of the following statements about OSPF protocol packets is wrong?

  • A . The header format of all OSPF packets is the same
  • B . All OSPF packet headers carry the Router-ID field
  • C . The OSPF protocol uses five types of packets to complete the transfer of routing information
  • D . OSPF packets are encapsulated in UDP packets, and the port number is 89

Reveal Solution Hide Solution

Correct Answer: D
Question #45

Regarding the ABR in OSPF, which is the wrong description?

  • A . ABR cannot generate Type 3, Type 4, and Type 5 LSAs
  • B . Convert the Type 1 and Type 2 LSAs in the connected non-bone thousand areas into Type 3 LSAs and publish them to the backbone area
  • C . The Type 1, Type 2, and Type 3 LSAs in the backbone area of ​​the ABR grid are converted into Type 3 LSAs and advertised to the connected non-bone thousand areas
  • D .  There are multiple LSDBs on the ABR, and the ABR maintains an LSDB for each area

Reveal Solution Hide Solution

Correct Answer: A
Question #46

Which of the following descriptions about OSPF default routing is wrong?

  • A . The OSPF default route can be issued by the Area Border Router (ABR) to issue Type 3 default LSAs to guide routers in the area to forward packets between areas
  • B .  When the router has no exact matching route, it can forward the message through the default route
  • C .  Due to the hierarchical management of OSPF routes, the priority of class 5 and class 7 default routes is higher than that of class 3 default routes
  • D .  Autonomous System Boundary Router (ASBR) publishes default LSA of type 5 or default LSA of type 7, which is used to guide routes in the autonomous system (AS) to access the outside of the autonomous system

Reveal Solution Hide Solution

Correct Answer: D
Question #47

Regarding the description of LSA header information in OSPF AS -External C LSA, which is wrong?

  • A . Link State ID indicates the destination network address
  • B . Forwarding Address is always 0.0.0.0
  • C . Advertising Router indicates the Router ID of ASBR
  • D . Net mask indicates the network mask of the destination network segment

Reveal Solution Hide Solution

Correct Answer: B
Question #48

Which function does the switch control plane not include?

  • A .  Business processing
  • B .  Routing operation
  • C .  System loading
  • D .  Traffic Statistics

Reveal Solution Hide Solution

Correct Answer: C
Question #49

By default, on a router running IS-IS in a broadcast network, how many seconds does DIS send CSNP messages?

  • A . 10
  • B . 3.3
  • C . 30
  • D . 40

Reveal Solution Hide Solution

Correct Answer: A
Question #50

The MAC address of a certain PC is 5489-98FB-65D8. The administrator wants this PC to obtain the specified IP address 192.168.1.11/24 from the DHCP server, so the command configured by the administrator should be?

  • A . dhcp static-bind ip-address 192.168.1.11 24 mac-address 5489-98FB-65D8
  • B . dhcp server static-bind ip-address 192.168.1.11 mac-address 5489-98FB-65D8
  • C . dhcp server static-bind ip-address 192.168.1.11 255.255.255.0 mac-address 5489-98FB-65D8
  • D . dhcp static-bind ip-address 192.168.1.11 mac-address 5489-98FB-65D8

Reveal Solution Hide Solution

Correct Answer: B

Question #51

Which of the following is not the main function of NDP?

  • A .  Path MTU Discovery
  • B .  Neighbor Status Tracking
  • C .  Duplicate address detection
  • D . Address

Reveal Solution Hide Solution

Correct Answer: A
Question #52

Which of the following is the configuration command for linkage between VRRP and BFD?

  • A . vrrp vrid 1 track bfd-session session-name 1 reduced 100
  • B . bfd-session vrrp vrid 1 track session-name 1 reduced 100
  • C . vrrp vrid 1 track bfd-session-name 1 reduced 100
  • D . track vrrp vrid 1 bfd-session session-name 1 reduced 100

Reveal Solution Hide Solution

Correct Answer: A
Question #53

Regarding the description of configuring the security level of the security zone of the firewall, which of the following is wrong?

  • A .  In the same system, two security zones are not allowed to configure the same security level
  • B .  Security levels can only be set for custom security areas
  • C .  Once the security level is set, it is not allowed to change
  • D .  The newly created security area, the system defaults its security level to 1

Reveal Solution Hide Solution

Correct Answer: D
Question #54

Which of the following is the command to configure the VRRP preemption delay?

  • A . vrrp vrid 1 preempt-mode timer delay 20
  • B . vrrp vrid 1 timer delay 20
  • C . vrrp vrid 1 preempt-timer 20
  • D . vrrp vrid 1 preempt-delay 20

Reveal Solution Hide Solution

Correct Answer: A
Question #55

Compared with routers and switching machines, what is the unique forwarding module of the firewall?

  • A . Switch fabric board
  • B . MPU
  • C . LPU
  • D . SPU

Reveal Solution Hide Solution

Correct Answer: D
Question #56

Regarding the description of network address port translation (NAP) and network address translation only (No-PAT), which of the following statements is correct?

  • A . No-PAT supports protocol address translation at the network layer
  • B . No-PAT only supports protocol port translation at the transport layer
  • C .  After NATP conversion, for external network users, all packets will only come from the same IP address
  • D . NAPT only supports protocol address translation at the network layer

Reveal Solution Hide Solution

Correct Answer: A
Question #57

When the IPv6 address of the host is configured in the stateless address configuration method, and other parameters except the address are obtained through DHCPv6, how to set the M bit and 0 bit in the RA message?

  • A . M=0 0=0
  • B . M=1 0=0
  • C . M=1 0=1
  • D . M=0 0=1

Reveal Solution Hide Solution

Correct Answer: D
Question #58

The RSTP protocol provides a variety of protection functions. For example, when the edge terminal port is configured in the protection state, the processing method of the edge port after receiving the BPDU message is:

  • A . Forward BPDU messages as required
  • B .  Obtain relevant information after the BPDU message
  • C .  Close the port
  • D .   Directly discard the BPDUmessage

Reveal Solution Hide Solution

Correct Answer: C
Question #59

Among the routing policy tools commonly used in BGP, the one that can be used to match a specific AS_path is:

  • A . filter-policy
  • B . ip-prefix
  • C . ip as-path-filer
  • D . community-filter

Reveal Solution Hide Solution

Correct Answer: C
Question #60

Which of the description about IBGP neighbors and EBGP neighbors is wrong?

  • A .  If two peers exchanging BGP packets belong to different autonomous systems, then these two peers are EBGP peers
  • B .  If two peers exchanging BGP packets belong to the same autonomous system, then these two peers are IBGP peers
  • C . IBGP peers must be directly connected physically
  • D .  Two routers running BGP must have IP connectivity to establish a TCP session

Reveal Solution Hide Solution

Correct Answer: C

Question #61

Which of the following strategies or tools cannot be applied to OSPF?

  • A . access-list
  • B . prefix-list
  • C . route-policy
  • D . as-path filter

Reveal Solution Hide Solution

Correct Answer: D
Question #62

The IP protocol number of the VRRP message is:

  • A . 116
  • B . 114
  • C . 112
  • D . 118

Reveal Solution Hide Solution

Correct Answer: C
Question #63

In inter-domain packet filtering, which of the following options belongs to the outbound direction?

  • A . trust-untrust
  • B . untrust-dmz
  • C . trust-local
  • D . untrust-trust

Reveal Solution Hide Solution

Correct Answer: A
Question #64

In PIM-SM, which of the following description of RP is wrong?

  • A . The initial multicast streams of all groups in the shared tree are forwarded to the receiver through the RP
  • B . One RP can connect to multiple multicast services at the same time, and one multicast group can correspond to multiple RPs.
  • C . RP can be responsible for the forwarding of several or all multicast groups. There can be one RP in the network
  • D . All members of the group and multicast sources that send multicast data to the group converge to the only RP.

Reveal Solution Hide Solution

Correct Answer: B
Question #65

Which of the following description about verifying whether a received Hello message is legal is wrong?

  • A .  If the network type of the receiving port is point-to-point or virtual link, the Network Mask field is not checked
  • B .  The RouterDeadIntera1 field in the received Hello message must be consistent with the configuration of the receiving port
  • C .  If the network type of the receiving port is broadcast, point-to-multipoint or NBMA, the Network Mask field in the received Hello message may be inconsistent with that of the interface
  • D .  The E-bit in the Options field in the received Hello message must be consistent with the configuration of the relevant area

Reveal Solution Hide Solution

Correct Answer: C
Exit mobile version