Exam4Training

Huawei H12-921_V1.0-ENU HCIE-Data Center Network (Written) V1.0 Online Training

Question #1

Which of the following devices can be used as service nodes in the service chain?

  • A . Firewall
  • B . WAF
  • C . LoadBalance
  • D . NIP

Reveal Solution Hide Solution

Correct Answer: A B C D
Question #2

Which of the following descriptions of the open source OpenStack Glance component is correct?

  • A . Modifying an instance that is started based on an image is actually modifying the image
  • B . Glance provides the ability to discover, register, and retrieve virtual machine images
  • C . Virtual Machine Instance images provided by Glance can only be placed in object storage provided by Swift
  • D . You can launch only one instance from the same image

Reveal Solution Hide Solution

Correct Answer: B
Question #3

An MPI collection operation is when all processes in a communication space work together to accomplish a specific data operation and transmission.

Which of the following items fall into a common collection action type?

  • A . MPI_Scatter
  • B . MPI_AllReduce
  • C . MPI_Gather
  • D . P2P

Reveal Solution Hide Solution

Correct Answer: A B C
Question #4

Which of the following components in Huawei’s intelligent lossless network solution architecture for multi-computing scenarios offloads the RDMA input layer and the following protocol stacks to the NIC hardware, so that peripherals can directly access the memory of the remote host?

  • A . NIC driver
  • B . SmartNIC
  • C . Network equipment
  • D . iMasterNCEFabric

Reveal Solution Hide Solution

Correct Answer: B
Question #5

Which of the following device statistics cannot be viewed in the device management of iMaster NCE-Fabric?

  • A . switchboard
  • B . router
  • C . firewall
  • D . server

Reveal Solution Hide Solution

Correct Answer: D
Question #6

What is correct about the following description of Docker?

  • A . Image in Docker can be regarded as a special file system, which only provides the programs required by the container runtime, and the libraries, resources, configurations, and other files required by the container runtime are hosted by the host Machine OS provides
  • B . The Docker engine obtains the image from the repository and runs the container on the corresponding host
  • C . Image files are stored centrally in a repository and can be public or private
  • D . Docker containers are created based on images, and a running container is a process running on a Docker host

Reveal Solution Hide Solution

Correct Answer: B C D
B C D

Explanation:

Parse:



Question #7

Which of the following describes the error in the CloudFabric network virtualization scenario?

  • A . Network administrators control the network through iMaster NCE-Fabric
  • B . When the compute administrator creates the VM, select the PortGroup for the corresponding network
  • C . Compute administrators manage compute resources through VMM
  • D . iMaster NCE-Fabric obtains the connection between the host and the TOR port through VMM

Reveal Solution Hide Solution

Correct Answer: D
Question #8

When the cloud platform creates a VM resource, it needs to call multiple components, such as Nova, Cinder, Glance, etc., and the authentication and authentication between the components depends on which of the following options?

  • A . Freezer
  • B . Watcher
  • C . Keystone
  • D . Zun

Reveal Solution Hide Solution

Correct Answer: C
Question #9

In Huawei’s CloudFabric solution, in the scenario where the Border Leaf and Service Leaf are separated, what are the correct descriptions of the following principles for traffic orchestration between internal and external networks?

  • A . The controller creates the corresponding tenant VRF and egress VRF on the Border Leaf based on the tenant network and the external network
  • B . The route to the external network on the border leaf is delivered by the iMaster NCE-Fabric controller, and only static routes can be delivered to connect with the external network
  • C . The controller creates the corresponding tenant VRF and egress VRF on the Service Leaf based on the tenant network and the external network
  • D . The backhaul route from the external network to the tenant network needs to be configured by the external network and cannot be delivered by the iMaster NCE-Fabric controller

Reveal Solution Hide Solution

Correct Answer: C D
Question #10

Runbook action (An action is composed of multiple steps, in which of the following APIs should each step be required??)

  • A . RESTful
  • B . NETCONF
  • C . OpenFlow
  • D . gRPC

Reveal Solution Hide Solution

Correct Answer: A

Question #11

Which of the following falls under the technical layer of the AI industry?

  • A . Autonomous driving
  • B . machine learning
  • C . artificial intelligence
  • D . robot

Reveal Solution Hide Solution

Correct Answer: B
Question #12

Which of the following server components is used as a temporary place to store program instructions, data, and intermediate results during computation?

  • A . memory
  • B . hard disk
  • C . flash memory
  • D . CPU

Reveal Solution Hide Solution

Correct Answer: A
Question #13

As shown in the figure in the Multi-PoD solution of the CloudFabric solution, in the active/standby egress scenario, when the Border Leaf is the primary failure, the VM belonging to VPC1 is located.

What traffic path will be used to access the external network?

  • A . 1
  • B . 2
  • C . 3
  • D . 4

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Analysis: The borderleaf is mainly suspended, and the traffic is accessed to the Internet through the border leaf standby.

Question #14

Which of the following IPv6 transformation solutions for data center networks only needs to transform the egress gateway to support IPV4/IPv6 dual-stack services, which requires less transformation effort and less impact on existing network services?

  • A . Dual-stack renovation scheme for Internet access area
  • B . Create an IPv6 single-stack solution for Internet access zones
  • C . Export NAT64 retrofit scheme
  • D . Dual-stack transition and transformation scheme for Internet access area

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Analysis: Features: It is suitable for temporary solutions in the initial stage, and is not recommended. Advantages: Only need to transform the egress to dual-stack and deploy NAT64, which requires less transformation work, less impact on live network services, and can quickly provide IPv6 services. Disadvantages: NAT conversion will cause ALG problems, and the solution cannot smoothly evolve to the long-term goal of "network-wide single-stack", and the evolution ability is poor.

Question #15

Which of the following protocol standards is led by Huawei to solve the PFC head-resistance problem?

  • A . IEEE 802.1AB
  • B . IEEE P802.1CQ
  • C . IEEE 802.1Qcp
  • D . IEEE P802.1Qcz

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Resolution: • ECN was originally defined in RFC3168 and is used to define network congestion identity. PFC is defined in 802.1Qbb, similar to IEEE 802.3x Pause flow control mechanism, but supports independent operation based on each priority, precise control, so that different priorities do not affect each other. 802.1Q has been evolving, 802.1Qcz (CI, Congestion Isolation) is a newly defined protocol standard led by Huawei to solve the problem of PFC Head of Line Blocking (HOLB).

Question #16

Which of the following types does the iMasterNCEFabricRunbook work contain?

  • A . Do
  • B . Retry
  • C . Rollback
  • D . DryRun

Reveal Solution Hide Solution

Correct Answer: A B C D
Question #17

Which of the following is not included in the PCIe fabric?

  • A . Router
  • B . Switch
  • C . Root Complex
  • D . PCIe Endpoint

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:



Question #18

What are the correct terms of the following descriptions of underlays and overlay networks?

  • A . Underlay is logically isolated from overlay, and as long as the routes between tunnel endpoints are reachable, the failure of the underlay network will not directly affect the overlay network
  • B . Overlay Routes for the network are generated by routes that are ingested into the underlay network
  • C . When implementing the overlay technology in the underlay network, the original underlay network needs to be modified to a certain extent
  • D . From the perspective of an overlay network, the underlay network is transparent to devices connected outside of the VXLAN tunnel endpoints

Reveal Solution Hide Solution

Correct Answer: A D
Question #19

What are the correct items in the following descriptions of the design of the CloudFabric intelligent lossless multivariate computing physical network?

  • A . You can choose a two-layer or three-layer networking architecture based on the scale
  • B . The number of Spine switches needs to be considered based on the total number of upstream interfaces across all Leaf switches
  • C . Leaf switches can be deployed independently
  • D . To ensure high reliability on the access side, the server must be single-homed to the LEAF switch

Reveal Solution Hide Solution

Correct Answer: A B C
Question #20

Which of the following types of virtual NICs can be created by the Linux server?

  • A . Tun
  • B . Tap
  • C . Linux Bridge
  • D . OVS

Reveal Solution Hide Solution

Correct Answer: A B

Question #21

Which of the following types of routes does BGPMVPN advertise multicast source information?

  • A . Type 1 Routing (Intra-ASI-PMSIA-Droute).
  • B . 5 Class Routing (SourceActiveA-Droute).
  • C . 6 Class Routing (Share Tree Join route).
  • D . 7 Class Routing (SourceTreeJoinroute).

Reveal Solution Hide Solution

Correct Answer: B
Question #22

Which of the following is wrong in the description of communication between VMs in a DVS distributed virtual switch environment in server virtualization?

  • A . VMs in the same port group, if they are on different hosts, can reach DVS on the destination host through the uplink of DVS and finally complete communication with the remote VM
  • B . VMs in different port groups (belonging to different VLANs) need to go through the uplink of the DVS to the physical switch, through which the VLAN is implemented Communications
  • C . VMs in the same port group, if they are in the same host, can communicate directly via DVS
  • D . VMs that are in different DVSs but belong to the same VLAN port group can communicate directly over DVS

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Resolution: VMs that are in different DVSs but belong to the same VLAN port group cannot communicate directly with the DVS

Question #23

In an HPC solution, which of the following nodes is typically installed on a GPU?

  • A . Accelerate the node
  • B . Fat nodes
  • C . MPI node
  • D . Log in to the node

Reveal Solution Hide Solution

Correct Answer: A
Question #24

Which of the following components of open-source OpenStack provides a Dashboard for users to use?

  • A . Cinder
  • B . Heat
  • C . Horizon
  • D . Keystone

Reveal Solution Hide Solution

Correct Answer: C
Question #25

Which of the following is not part of the analysis scope of the iMaster NCE-FabricInsight network snapshot function?

  • A . BGP and OSPF protocols
  • B . Device startup configuration
  • C . Number of packets lost on the interface
  • D . ARP entries

Reveal Solution Hide Solution

Correct Answer: B
Question #26

In the Huawei CloudFabric solution, the network controller uses the NETCONF device to deliver configurations.

Which of the following encodings does NETCONF information use?

  • A . XML
  • B . HTML
  • C . JSON
  • D . PROTOBUF

Reveal Solution Hide Solution

Correct Answer: A
Question #27

Which of the following describes the error of the three-level rollback function supported by iMaster NCE-Fabric?

  • A . Network-wide rollback allows you to roll back the entire network configuration to before the configuration change to quickly restore services
  • B . The three-level rollback function supports manual backup and automatic backup, and supports automatic recovery when the network is abnormal
  • C . Tenant snapshots are backups and restores of the network at tenant granularity
  • D . Service rollback supports single-point service recovery

Reveal Solution Hide Solution

Correct Answer: B
Question #28

In Huawei’s CloudFabric solution, if you want to use a third-party VAS device to provide value-added services, which of the following VAS device management modes should you use if the VAS device cannot be managed by the controller?

  • A . Service Policy
  • B . Network Policy
  • C . Service Manager
  • D . Network Manager

Reveal Solution Hide Solution

Correct Answer: B
Question #29

In the process of open and programmable evolution of CloudFabric network services, APIs evolve from atomic APIs to network service APIs and then to intent APIs

Which of the following is a web service API?

  • A . RESTful API
  • B . RESFCONF API
  • C . NETCONF API
  • D . Service Chain API

Reveal Solution Hide Solution

Correct Answer: D
Question #30

Which of the following in server virtualization provides a user interface, has functions such as monitoring and managing virtualized resource pools, simplifying virtual machine management processes, and configuring resource scheduling policies and execution rules?

  • A . Hypervisor
  • B . Virtualization management platform
  • C . Virtual machines
  • D . Host OS

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Analysis: The virtualization management platform provides a simple user interface, and has the functions of monitoring and managing virtualization resources, simplifying the creation process of virtual machines, and configuring resource scheduling policies and execution rules.

Question #31

If a company provides services with large bursts of traffic, large gaps in business needs between peaks and valleys, and a wide distribution of users, which of the following methods should the company adopt to deploy its services based on cost and user experience considerations?

  • A . Intra-city active-active
  • B . Two places and three centers
  • C . Hybrid cloud
  • D . Edge DC

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Analysis: Typical application scenarios of hybrid cloud: business bursts, application load expansion: In order to cope with the peak demand caused by seasonality or emergencies, public cloud resources are temporarily leased to quickly improve business response capabilities and computing processing capabilities.

Question #32

In the computing linkage scenario of the CloudFabric solution, when the VM is wired, iMasterNCEFabric senses the port on which of the host connects to the leaf point through which of the following protocols?

  • A . LLDP
  • B . NETCONF
  • C . HTTP
  • D . gRPC

Reveal Solution Hide Solution

Correct Answer: A
Question #33

Network-wide intelligent O&M is a feature of Huawei’s CloudFabric solution, which provides intelligent O&M compared with traditional device-centric O&M

It is centered on which of the following, minutes Level of identifying cyber risks?

  • A . Business
  • B . Configuration
  • C . Hardware
  • D . Agreement

Reveal Solution Hide Solution

Correct Answer: A
Question #34

Which of the following descriptions of firewalls is wrong when deploying a data center network?

  • A . After different security zones are divided on the firewall, the different security zones are isolated by default
  • B . Firewalls can be deployed alongside Border Leaf to control secure access to incoming and outgoing traffic
  • C . The firewall can be managed through SecoManager, but the service needs to be configured manually
  • D . Firewalls can be deployed in active and standby image mode to enhance reliability

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Analysis: FW’ s services can be automatically delivered through SecoManager

Question #35

Which of the following descriptions of the RTT requirements between different PoDs is correct in the Multi-PoD scenario of the CloudFabric solution?

  • A . No more than 50ms
  • B . No more than 100ms
  • C . No more than 10ms
  • D . No more than 1s

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Analysis: When using the Multi-PoD solution, it is recommended that the iMaster NCE-Fabric and the central DC device pull the RTT latency by <=50 ms. It is recommended that the iMaster NCE-Fabric and Edge DC Leaf extend the RTT latency by <=300 ms. If the active/standby disaster recovery deployment mode of iMaster NCE-Fabric controllers is used, the latency between controllers is < = 20 ms.

Question #36

Which one is wrong in the description of calico, the networking solution for Kubernetes?

  • A . Felix is primarily used to store the metadata of the calico and to serve as a communication hub for the various components of the calico
  • B . Think of the server running the container as a router, and then run the specified routing protocol on the router
  • C . In large-scale networking, a route reflector is used to synchronize pod routes across the network
  • D . Use BGP as the routing protocol

Reveal Solution Hide Solution

Correct Answer: A
Question #37

Centralized storage generally provides data storage by the storage array, which of the following components does the storage array contain?

  • A . Power module
  • B . controller
  • C . Hard disk enclosure
  • D . Interface modules

Reveal Solution Hide Solution

Correct Answer: A B C D
A B C D

Explanation:



Question #38

Which of the following descriptions of the business chain is wrong?

  • A . In the NSH implementation, the service chain function is implemented by inserting the NSH header into VXLAN packets
  • B . In the PBR implementation, the controller delivers PBR diversion policy routes to SFF and SC nodes hop-by-hop through NETCONF
  • C . In PBR implementation, the controller delivers filtering and redirection policies to the SC nodes to selectively redirect service traffic
  • D . In the NSH implementation, the SF node must support NSH

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:



Question #39

In a data center network, which of the following technologies can be used to achieve sub-second data collection?

  • A . SNMP
  • B . Telemetry
  • C . NETCONF
  • D . RESTCONF

Reveal Solution Hide Solution

Correct Answer: B
Question #40

After the dual-stack transformation of the Internet access area of the data center network, which of the following methods can the network egress choose to interconnect with the operator’s IPv network?

  • A . Static IPv6 routes
  • B . OSPFv3
  • C . IBGP4+
  • D . EBGP+

Reveal Solution Hide Solution

Correct Answer: A D

Question #41

Which of the following terms is NOT a hard disk media?

  • A . SAN
  • B . SCM
  • C . SSD
  • D . HDD

Reveal Solution Hide Solution

Correct Answer: A
Question #42

In which of the following storage network architectures does the storage array provide file storage to the server?

  • A . DAS
  • B . IP SAN
  • C . NAS
  • D . FC SAN

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Resolution: Both AB and D are block storage.

Question #43

Which of the following is not within the scope of the iMaster NCE-FabricInsight protocol layer health assessment?

  • A . OSPF connection
  • B . BGP peer connection
  • C . M-LAG group status
  • D . VXLAN tunnels

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Resolution: ABC These three options are failures at the protocol layer, while option D is failures at the overlay layer.

Question #44

Which of the following types of network overlay networking does the CloudFabric solution consist of?

  • A . Hub-Spoke
  • B . Full-mesh
  • C . Centralized gateways
  • D . Distributed gateways

Reveal Solution Hide Solution

Correct Answer: C D
Question #45

Which of the following descriptions of container technology and virtual machine technology is wrong?

  • A . Container images are smaller than virtual machines
  • B . Containers start up faster than virtual machines
  • C . Containers don’t need separate kernels
  • D . Containers are more isolated than virtual machines

Reveal Solution Hide Solution

Correct Answer: D
Question #46

Which of the following components of open-source OpenStack provides management services for the lifecycle of bare metal servers?

  • A . Ironic
  • B . Nova
  • C . Horizon
  • D . Heat

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Analysis: Ironic is responsible for the management of bare metal services.

Question #47

Centralized storage generally provides data storage by the storage array, which of the following components does the storage array contain?

  • A . Power module
  • B . controller
  • C . Hard disk enclosure
  • D . Interface modules

Reveal Solution Hide Solution

Correct Answer: A B C D
Question #48

In the container network scenario of the CloudFabric solution, when the container accesses the network through the L3 route mode, which of the following components establishes a BGP neighbor relationship with the ToR?

  • A . CNI Plugin
  • B . vRouter
  • C . bird
  • D . etcd

Reveal Solution Hide Solution

Correct Answer: C
Question #49

Which of the following does not support cross-site L2 interoperability in the Multi-Site interconnection scenario of the CloudFabric solution?

  • A . VLAN Hand-off
  • B . L3 Underlay
  • C . End-to-end VXLAN
  • D . Segment VXLAN

Reveal Solution Hide Solution

Correct Answer: B
Question #50

In a CloudFabric multi-computing lossless network, if a device wants to remove the PFC deadlock by not responding to a backpressure frame, which of the following lossless functions needs to be deployed?

  • A . PFC deadlock prevention
  • B . PFC deadlock detection
  • C . AI ECN
  • D . DCQCN

Reveal Solution Hide Solution

Correct Answer: A

Question #51

Which of the following is the role of SI in the NSH service chain?

  • A . The path number of the service chain
  • B . Used to indicate the next-hop IP address
  • C . Used to prevent loops
  • D . The SI value can be used to calculate the number of business function points that are currently eclips

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Analysis: SI: service index, the service function index, which can be used to calculate the current number of business function points through the SI value

Question #52

Which of the following options are included in the action type of a runbook in the CloudFabric network business open programmable overall solution?

  • A . Rollback
  • B . WithDraw
  • C . Commit
  • D . DryRun

Reveal Solution Hide Solution

Correct Answer: A D
A D

Explanation:

Analysis: There are 5 types of runbook actions:



Question #53

Device configuration parameters can be adjusted when using the edge intelligence function of iMaster NCE-FabricInsight for specified stream analysis.

Which of the following device configurations cannot be automatically delivered during UDP specified stream analysis?

  • A . Active aging time
  • B . ACL Number
  • C . Whether the VXLAN packet is matched
  • D . Whether to match TAG packets with a layer 1 VLAN

Reveal Solution Hide Solution

Correct Answer: A
Question #54

iMaster NCE-Fabric provides an intelligent event function based on user intent, which can close the loop on fault events.

Which of the following is a closed-loop approach to business failures?

  • A . This section displays the details of the abnormal re-insurance flow monitoring
  • B . Notify the user of a failure
  • C . Provide a remediation plan
  • D . Fix the network configuration associated with an unknown link

Reveal Solution Hide Solution

Correct Answer: D
Question #55

Which of the following is the destination MAC address of the PFC backpressure frame?

  • A . 0180-c200-0001
  • B . 0280-c200-0001
  • C . 0100-5e00-0003
  • D . 0080-c200-0002

Reveal Solution Hide Solution

Correct Answer: A
Question #56

When service packets are connected to a VXLAN network through a Layer 2 sub-interface, different flow encapsulation types need to be configured on different Layer 2 sub-interfaces.

The same physical interface can access different data packets.

Which of the following is NOT a stream encapsulation type that is supported by a Layer 2 sub-interface?

  • A . QinQ
  • B . Untag
  • C . Dotlq
  • D . Trunk

Reveal Solution Hide Solution

Correct Answer: D
Question #57

Which of the following descriptions of the VPC routing table in the AWS public cloud model is wrong?

  • A . By default, subnets associated with different route tables within the same VPC are isolated from each other
  • B . The main route table is the route table that comes with the VPC, and the subnet in the VPC is associated with the main route table by default
  • C . A VPC can have one or more VPC route tables in a VPC
  • D . Each subnet needs to be associated with a VPC routing table that guides the routing and forwarding of EC2 instances within that subnet

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Analysis: VPC route table: A route table is a series of routing and forwarding rules that determine where network traffic is forwarded. A VPC can have one or more VPC route tables in a VPC. The main route table is the route table that comes with the VPC, and the subnet in the VPC is associated with the main route table by default. A custom route table is a route table that can be created by a user in addition to the main route table. You can create as many custom route tables as you need. Each subnet needs to be associated with a VPC routing table that guides the routing and forwarding of EC2 instances within that subnet. Except for one route entry with target of local in the VPC route table, which is used for subnet communication in the VPC, the other route entries are different VPC route tables are isolated from each other.

Question #58

How many core-layer switches are required in a typical 4-element Fat-Tree topology in an HPC solution?

  • A . 6
  • B . 8
  • C . 2
  • D . 4

Reveal Solution Hide Solution

Correct Answer: D
Question #59

In the CloudFabric solution, iMaster NCE-Fabric supports network O&M based on physical topology.

When the color of a device in a physical topology is red, which of the following meanings is indicated?

  • A . The device is offline
  • B . There is an emergency alarm
  • C . Both the device and the link are normal
  • D . The link is disconnected and a non-emergency alarm exists

Reveal Solution Hide Solution

Correct Answer: B
Question #60

Which of the following descriptions of distributed training is wrong?

  • A . In data parallelism, each computing node trains the complete model based on local data
  • B . Distributed training can support the training of massive data and complex models
  • C . Data parallelism and model parallelism are common distributed training methods
  • D . In model parallelism, each compute node will only interact with the trained sub-model and obtain the final model through model aggregation

Reveal Solution Hide Solution

Correct Answer: D
Exit mobile version