Special Summer Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

H12-891_V1.0 Sample Questions Answers

Questions 4

MPLS is located between the data link layer and network layer in the TCP/IP protocol stack and can provide services for all network layer protocols.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 5

Which of the following items are included in static information collection and analysis?

Options:

A.

Device types

B.

Interface types

C.

License

D.

Packet loss rate

Buy Now
Questions 6

gRPC (Google Remote Procedure Call) is a language-neutral, platform-neutral, and open-source remote RPC system that supports unary RPCs and streaming RPCs.

Which of the following service methods are NOT supported by gRPC?

Options:

A.

rpc Subscribe(SubsArgs) stream returns(SubsReply) {};

B.

rpc dataPublish(stream serviceArgs) returns(stream serviceArgs) {};

C.

rpc stream LotsOfGreetings(HelloRequest) returns (HelloResponse) {};

D.

rpc Cancel(CancelArgs) returns(CancelReply) {};

Buy Now
Questions 7

In Huawei Open Programmability System (OPS), /ifm/interfaces/interface is the URL used to identify a device's managed object.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 8

Which of the following technologies can be used to measure performance based on actual service traffic in Huawei's CloudWAN solution?

Options:

A.

TWAMP

B.

BGP FlowSpec

C.

Telemetry

D.

iFIT

Buy Now
Questions 9

In the figure, SR-MPLS is enabled on R1, R2, and R3. The SRGB (Segment Routing Global Block) range on R3 is from 20000 to 21000, and the prefix SID index configured on the loopback1 interface of R3 is 30.

In this case, the MPLS label corresponding to the loopback1 interface of R3 is _____.

(Enter an Arabic numeral without symbols.)

Options:

Buy Now
Questions 10

Which of the following statements about IPSG is incorrect?

Options:

A.

IPSG can be used to check the validity of IP packets. If IP packets are invalid, the device reports an alarm to an NMS.

B.

IPSG is a source IP address filtering technology based on Layer 3 interfaces.

C.

IPSG can be used to prevent hosts from changing IP addresses.

D.

IPSG can defend against IP address spoofing attacks.

Buy Now
Questions 11

In SSP packages, Jinja2 templates are used to implement mapping. In the Jinja2 syntax, {% ... %} contains control structures, for example, a 'for' loop.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 12

Which of the following is the type of northbound API used by iMaster NCE-WAN?

Options:

A.

NETCONF

B.

RESTful

C.

CLI

D.

SNMP

Buy Now
Questions 13

A network administrator runs the display telemetry subscription command on a device to check telemetry subscription information. The command output is as follows:

[~CE]display telemetry subscription

Sub-name : Sub1

Sensor group:

Sensor-name Sample-interval(ms) State

Sensor1 1000 RESOLVED

Destination group:

Dest-name Dest-IP Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20000 RESOLVED - GRPC

Sub-state : PASSIVE

Total subscription number is : 1

Which of the following statements is incorrect?

Options:

A.

The subscription name is Sub1.

B.

The IP address of the device is 192.168.56.1.

C.

The subscription mode is static subscription.

D.

The device sends sampled data every second.

Buy Now
Questions 14

In Huawei SD-WAN Solution, which of the following tunneling technologies is used to establish data channels?

Options:

A.

WLAN

B.

IPsec

C.

MPLS

D.

GRE over IPsec

Buy Now
Questions 15

Which of the following statements about BGP EVPN principles are correct in a scenario where a VXLAN tunnel is dynamically established through BGP EVPN?

Options:

A.

MP_REACH_NLRI is used to carry routing information.

B.

Several BGP EVPN routes are defined through BGP extension.

C.

MP_REACH_NLRI is used to carry the RD.

D.

MP_REACH_NLRI is used to carry the RT.

Buy Now
Questions 16

Network Admission Control (NAC) needs to be deployed on the network shown in the figure. Drag a proper authentication mode to each authentication point.

Options:

Buy Now
Questions 17

Which of the following statements about VXLAN principles is incorrect?

Options:

A.

VXLAN uses MAC-in-UDP encapsulation to encapsulate Ethernet packets into UDP packets and thereby extend Layer 2 networks.

B.

When VXLAN is deployed, in addition to devices at both ends of a VXLAN tunnel, intermediate forwarding devices are also required to support VXLAN. Otherwise, VXLAN packets cannot be forwarded.

C.

VXLAN packets are forwarded through routes on the underlay network, and the MAC address of the terminal in the inner data frame is not considered during underlay forwarding.

D.

VXLAN can be deployed on campus networks to implement Layer 2 and Layer 3 communication.

Buy Now
Questions 18

Which of the following statements about SR-MPLS Policy candidate paths are correct?

Options:

A.

A candidate path can contain multiple segment lists, with each segment list carrying the weight attribute.

B.

Load balancing can be implemented among candidate paths and among segment lists.

C.

An SR-MPLS policy can contain multiple candidate paths with the preference attribute.

D.

The valid candidate path with the highest preference functions as the primary path of the SR-MPLS Policy.

Buy Now
Questions 19

Which of the following statements is incorrect about the user authentication points on the network?

Options:

A.

Deploying user authentication points at the access layer achieves granular permission management and high network security.

B.

Moving user authentication points from the access layer to the aggregation or core layer greatly reduces the number of user authentication points, thereby effectively mitigating the pressure on the AAA server.

C.

Deploying user authentication points at the access layer has both advantages and disadvantages when compared to doing so at the aggregation or core layer. Policy association can be applied if user authentication points are deployed at the access layer.

D.

When user authentication points are moved from the access layer to the aggregation layer, MAC address authentication for users may fail.

Buy Now
Questions 20

Which of the following languages is integrated into the OPS?

Options:

A.

Python

B.

C programming language

C.

Java

D.

C++

Buy Now
Questions 21

The path of an SR-MPLS TE tunnel can be calculated by the controller or tunnel ingress.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 22

When you configure a virtualized campus network on iMaster NCE-Campus, Fit APs can immediately go online after you add them to iMaster NCE-Campus.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 23

Which of the following commands is used to adjust the cost of an IS-IS interface?

Options:

A.

isis circuit-type

B.

isis timer hello

C.

isis cost

D.

isis circuit-level

Buy Now
Questions 24

Telemetry data must be encoded in GPB binary format. This format reduces the number of bytes in telemetry messages and improves the transmission efficiency compared with messages encoded in JSON format.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 25

An engineer often remotely logs in to the device to check the device status. The engineer can use the Python Paramiko and telnetlib libraries to implement automatic remote login through Python scripts. The remote login implemented using telnetlib is more secure.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 26

Which of the following statements about static VXLAN tunnel configuration are correct?

Options:

A.

On an NVE interface, the destination address of a VXLAN tunnel is specified based on the address in the ingress replication list. You can create one NVE interface for multiple VXLAN tunnels.

B.

An NVE interface can be associated with multiple VNIs. Therefore, you can create one NVE interface when there are multiple BDs.

C.

One NVE interface must be created for each VXLAN tunnel, and the source and destination IP addresses must be specified for the NVE interface. Therefore, the number of NVE interfaces is the same as the number of VXLAN tunnels on the VTEP.

D.

One NVE interface must be created for each BD. If there are multiple BDs, multiple NVE interfaces must be created.

Buy Now
Questions 27

BGP Link State (BGP-LS) introduces a new NLRI into BGP. The NLRI carries link, node, topology prefix, and other information, and is also referred to as the link state NLRI.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 28

In a BGP/MPLS IP VPN scenario, if a PE and CE use OSPF to exchange routing information, domain IDs are used to identify whether the routes imported to VPN instances are from the same OSPF domain.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 29

On a campus network, which of the following problems may occur when you manually create a static VXLAN tunnel?

Options:

A.

Although the static VXLAN tunnel mode supports the distributed gateway scenario, the configuration involves a heavy workload and is complex to adjust.

B.

Remote MAC addresses can be learned by the VTEP only through data flooding.

C.

A static VXLAN tunnel also uses corresponding protocols on the control plane, which consumes device resources.

D.

If N devices need to establish static VXLAN tunnels, a maximum of N(N -1)/2 tunnels need to be manually configured, which involves a heavy workload.

Buy Now
Questions 30

In the following figure, all routers are running OSPF. Given this, which of the following statements is correct?

Options:

A.

R2 forwards the Router-LSAs generated by R1 to R3.

B.

R2 forwards the Router-LSAs generated by R3 to R1.

C.

R2 generates Router-LSAs only in area 0.

D.

R2 generates Router-LSAs in both area 1 and area 0.

Buy Now
Questions 31

Man-in-the-middle attacks (MITM) or IP/MAC Spoofing attacks are common on intranets and can cause information leakage.

Which configuration method can prevent these attacks?

Options:

A.

Configure the trusted or untrusted interface.

B.

Limit the maximum number of MAC addresses that can be learned on a switch interface.

C.

Configure DHCP snooping to check the CHADDR field carried in a DHCP Request packet.

D.

Configure association between DHCP snooping and IPSG or DAI on the switch.

Buy Now
Questions 32

On a campus network, iMaster NCE-Campus is used to deploy two VNs (Virtual Networks): R&D VN and Marketing VN. Users in these two VNs belong to two separate security groups.

The campus network requires R&D personnel and sales personnel to communicate with each other. To meet this requirement, which of the following tasks does a network administrator need to perform?

Options:

A.

Deploy network service resources.

B.

Deploy a policy control matrix.

C.

Configure inter-VN communication.

D.

Deploy an external network.

Buy Now
Questions 33

Huawei Open Programmability System (OPS) uses standard HTTP methods to access managed objects and manage network devices.

Which of the following HTTP methods is used to configure the value of a network device’s managed object?

Options:

A.

PUT

B.

POST

C.

GET

D.

PATCH

Buy Now
Questions 34

An O&M platform mainly provides unified monitoring and performance management for network devices. Which of the following is NOT device monitoring data?

Options:

A.

Management-plane data

B.

Data-plane data

C.

Control-plane data

D.

Monitoring-plane data

Buy Now
Questions 35

In typical "two-city three-center" networking, into which layers is the bearer WAN divided?

Options:

A.

Core layer

B.

Aggregation layer

C.

Control layer

D.

Access layer

Buy Now
Questions 36

The IS-IS Level-1 neighbor relationship is not established between R3 and R4. Referring to the following information, what is the possible cause?

Options:

A.

The IIH authentication between R3 and R1 fails.

B.

The IS-IS levels of R3 and R4 do not match.

C.

The circuit types of the interfaces connecting R3 and R4 do not match.

D.

The area IDs of R3 and R4 are different.

Buy Now
Questions 37

An LSR (Label Switching Router) supports various label retention modes. Which of the following statements regarding the liberal mode are correct?

Options:

A.

An LSR retains labels from a neighboring LSR only when the neighbor is its next hop.

B.

This label retention mode saves memory and label space.

C.

An LSR reserves all labels distributed by its neighbor.

D.

The liberal mode requires more memory and label space.

Buy Now
Questions 38

On a router, SRv6 is enabled, and the configurations shown below are performed. Which of the following statements about the configurations are correct?

[Router-segment-routing-ipv6] locator srv6_locator1 ipv6-prefix 2001:DB8:ABCD::/64 static 32

Options:

A.

The locator of this node is 2001:DB8:ABCD::.

B.

The static segment of the node occupies 32 bits.

C.

The dynamic segment of the node occupies 32 bits.

D.

The Args field of this node occupies 32 bits.

Buy Now
Questions 39

In the following figure, OSPF is enabled on all router interfaces. The IP addresses marked in the figure belong to Loopback0 of the routers.

The Loopback0 addresses of R1 and R2 are advertised in Area 1, the Loopback0 address of R4 is advertised in Area 0, and the Loopback0 addresses of R3 and R5 are advertised in Area 2. Given this, which of the following IP addresses can ping each other?

Options:

A.

10.0.3.3 and 10.0.5.5

B.

10.0.2.2 and 10.0.5.5

C.

10.0.2.2 and 10.0.3.3

D.

10.0.4.4 and 10.0.2.2

Buy Now
Questions 40

Huawei CloudCampus Solution has multiple application scenarios, and iMaster NCE-Campus provides different APIs for each application scenario. Match the following application scenarios with the open APIs provided by iMaster NCE-Campus.

Options:

Buy Now
Questions 41

Refer to the configuration in the figure. Which queue on R2 do packets of PC1 enter by default?

Options:

A.

AF4

B.

AF2

C.

AF3

D.

EF

Buy Now
Questions 42

In DU label advertisement mode, if the liberal label retention mode is used, the device reserves labels received from all the LDP peers regardless of whether the LDP peer is the optimal next hop for reaching the destination network.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 43

The TTL field encapsulated in the MPLS label header can prevent infinite loops of MPLS packets. Which of the following statements regarding the TTL field are correct?

Options:

A.

If TTL copy is disabled, users can use the tracert function to view the LSR of the MPLS domain.

B.

The processing of IP TTL copy hides the LSR in an MPLS domain, improving network security.

C.

MPLS provides two processing modes on the TTL field:

TTL in the MPLS header copies the IP TTL value when an IP packet enters the MPLS network.

The ingress LER sets the TTL value in the MPLS header to 255.

D.

MPLS encapsulation in frame mode supports the TTL field. MPLS encapsulation in cell mode does not support the TTL field.

Buy Now
Questions 44

In the Huawei SD-WAN Solution, the topologies of different VNs must be the same.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 45

When an SSH client logs in to an SSH server that is configured only with username and password authentication in SSH mode, the key exchange phase is not involved (no key is generated).

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 46

Exhibit:

A loop occurs because Spanning Tree Protocol (STP) is not enabled on the network. Which of the following symptoms may occur?

Options:

A.

A loop alarm is generated on the LAN switch.

B.

CPU usage is too high.

C.

MAC entries flap.

D.

Host receives a large number of broadcast packets.

Buy Now
Questions 47

During the evolution from OSPFv2 to OSPFv3, LSA formats and functions remain unchanged, except that the network layer addresses in LSAs are changed from IPv4 to IPv6.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 48

Which of the following statements does not cause the flapping of a VRRP group?

Options:

A.

Too small interval between Advertisement packet transmissions

B.

Inconsistent preemption delay settings

C.

Packet loss on an interface of the backup device

D.

Flapping on the link transmitting VRRP Advertisement packets

Buy Now
Questions 49

What can be determined from the following figure?

display ipv6 routing-table protocol isis

Public Routing Table : ISIS

Summary Count: 6

ISIS Routing Table's Status : < Active >

Summary Count: 6

Destination : 3000:FDEA::4

NextHop : FE80::2E0:FCFF:FE98:2577

Cost : 20

Interface : GigabitEthernet0/0/1

PrefixLength : 128

Preference : 15

Protocol : ISIS-L2

Flags : D

Options:

A.

R1 has six IS-IS IPv6 routes.

B.

R1 does not have IS-IS IPv6 routes.

C.

IS-IS IPv6 must have been enabled on GigabitEthernet0/0/1 of R1.

D.

R1 is not a Level-1 device.

Buy Now
Questions 50

As shown in the figure, when PE1 receives an ARP request packet, it forwards the packet to PE4. The packet then carries two labels. The label value 201 is carried by the EVPN Type ____ route. (Enter only digits.)

Options:

Buy Now
Questions 51

According to the following information displayed on a router, which of the following are the causes of the failure in establishing an OSPF adjacency relationship?

OSPF error statistics:

    1: Hello timer mismatch

    0: Netmask mismatch

    0: Bad checksum

    0: Bad authentication type

    0: Unknown neighbor

    0: Extern option mismatch

Options:

A.

Hello packets are sent at different intervals.

B.

The area IDs are inconsistent.

C.

The IP address masks of the interfaces are inconsistent.

D.

The area types are inconsistent.

Buy Now
Questions 52

MPLS supports forwarding equivalence class (FEC). Which of the following cannot be used as an FEC allocation standard?

Options:

A.

Fragment offset

B.

Application protocol

C.

Destination address

D.

Class of Service (CoS)

Buy Now
Questions 53

Which of the following are potential risks in HTTP communication?

Options:

A.

Eavesdropping: Third parties can obtain communication data.

B.

Pretending: Third parties can impersonate another user.

C.

Tampering: Third parties can tamper with communication data.

D.

Lost: There is a low probability that data is lost during transmission.

Buy Now
Exam Code: H12-891_V1.0
Exam Name: HCIE-Datacom V1.0
Last Update: Mar 29, 2025
Questions: 177
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now H12-891_V1.0