Pre-Summer Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

HCIE-Datacom V1.0 Question and Answers

HCIE-Datacom V1.0

Last Update Apr 15, 2026
Total Questions : 322

We are offering FREE H12-891_V1.0 Huawei exam questions. All you do is to just go and sign up. Give your details, prepare H12-891_V1.0 free exam questions and then go for complete pool of HCIE-Datacom V1.0 test questions that will help you more.

H12-891_V1.0 pdf

H12-891_V1.0 PDF

$36.75  $104.99
H12-891_V1.0 Engine

H12-891_V1.0 Testing Engine

$43.75  $124.99
H12-891_V1.0 PDF + Engine

H12-891_V1.0 PDF + Testing Engine

$57.75  $164.99
Questions 1

Which of the following statements about OPS (Open Programmability System) application scenarios is incorrect?

Options:

A.  

To enable a network device to automatically send a configuration file to the server after the device configuration is saved, users can use the maintenance assistant to create a timer trigger condition and periodically run the Python script.

B.  

When the OPS is used to automatically deploy unconfigured devices, a Python script is used to obtain the IP addresses of the software and configuration file server and download the system software and configuration file.

C.  

The OPS can reduce the impact of the network environment in some cases. For example, when collected information is transmitted to a server, the Python script can be used to temporarily store the execution result to the device when the network is disconnected. After the network is reconnected, the execution result is transmitted to the server.

D.  

The OPS can be used to automatically check the health status of devices.

Discussion 0
Questions 2

The following figure shows the inter-AS MPLS VPN Option B solution. If ASBR-PE1 and ASBR-PE2 only transmit VPNv4 routes, you can run the following command on ASBR-PE1:

[ASBR-PE1-bgp-af-vpnv4] undo peer 10.0.34.4 enable

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 3

On a CloudCampus virtualized campus network, service data enters different VNs from physical networks through edge nodes, and the VN that the data will enter is determined by the VLANs to which users belong. Which of the following statements about dynamic VLAN authorization is incorrect?

Options:

A.  

When wired users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

B.  

When wireless users pass Portal authentication, they join the authorization VLANs delivered to edge nodes.

C.  

When wireless users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

D.  

When wired users pass MAC address authentication, they join the authorization VLANs delivered to edge nodes.

Discussion 0
Questions 4

When Huawei iMaster NCE-IP is used to configure SR-MPLS TE tunnels, which of the following protocols is used by the controller to collect device running status information?

Options:

A.  

Telemetry

B.  

Telnet

C.  

BGP-LS

D.  

IS-IS

Discussion 0
Questions 5

In OSPFv3, which of the following types of LSAs can be flooded in the entire AS?

Options:

A.  

AS-external-LSA

B.  

Intra-Area-Prefix-LSA

C.  

Link-LSA

D.  

Inter-Area-Prefix-LSA

Discussion 0
Questions 6

iMaster NCE-Campus restricts RESTful APIs. If a client sends a GET request that invokes a RESTful API to obtain site information from iMaster NCE-Campus, which of the following fields should be included in the request header?

Options:

A.  

ACCESS-TOKEN

B.  

ACCEPT-TOKEN

C.  

X-ACCEPT-TOKEN

D.  

X ACCESS TOKEN

Discussion 0
Questions 7

In the figure, SR-MPLS is enabled on R1, R2, and R3. The SRGB (Segment Routing Global Block) range on R3 is from 20000 to 21000, and the prefix SID index configured on the loopback1 interface of R3 is 30.

In this case, the MPLS label corresponding to the loopback1 interface of R3 is _____.

(Enter an Arabic numeral without symbols.)

Options:

Discussion 0
Questions 8

In the following figure, all routers are running OSPF. Given this, which of the following statements is correct?

Options:

A.  

R2 forwards the Router-LSAs generated by R1 to R3.

B.  

R2 forwards the Router-LSAs generated by R3 to R1.

C.  

R2 generates Router-LSAs only in area 0.

D.  

R2 generates Router-LSAs in both area 1 and area 0.

Discussion 0
Questions 9

In Huawei SD-WAN Solution, which of the following tunneling technologies is used to establish data channels?

Options:

A.  

WLAN

B.  

IPsec

C.  

MPLS

D.  

GRE over IPsec

Discussion 0
Questions 10

IPsec SAs can be established in either manual mode or IKE auto-negotiation mode. Which of the following statements about the two modes is incorrect?

Options:

A.  

The lifetime of an SA established in IKE auto-negotiation mode is controlled by the lifetime parameters configured on both ends of the tunnel.

B.  

In manual mode, all parameters (including encryption and authentication keys) required for establishing an IPsec SA need to be manually configured.

C.  

In IKE auto-negotiation mode, the encryption and authentication keys required for establishing an SA are generated using the DH algorithm.

D.  

SAs established in both manual and IKE auto-negotiation modes can be dynamically updated.

Discussion 0
Questions 11

Which of the following are carried in an HTTP/1.1 response?

Options:

A.  

Status line

B.  

Response body

C.  

Response header

D.  

Empty line

Discussion 0
Questions 12

Drag the IPsec functions on the left to the corresponding function description on the right.

Options:

Discussion 0
Questions 13

Which of the following statements about static VXLAN tunnel configuration are correct?

Options:

A.  

On an NVE interface, the destination address of a VXLAN tunnel is specified based on the address in the ingress replication list. You can create one NVE interface for multiple VXLAN tunnels.

B.  

An NVE interface can be associated with multiple VNIs. Therefore, you can create one NVE interface when there are multiple BDs.

C.  

One NVE interface must be created for each VXLAN tunnel, and the source and destination IP addresses must be specified for the NVE interface. Therefore, the number of NVE interfaces is the same as the number of VXLAN tunnels on the VTEP.

D.  

One NVE interface must be created for each B

D.  

If there are multiple BDs, multiple NVE interfaces must be created.

Discussion 0
Questions 14

Huawei CloudCampus Solution has multiple application scenarios, and iMaster NCE-Campus provides different APIs for each application scenario. Match the following application scenarios with the open APIs provided by iMaster NCE-Campus.

Options:

Discussion 0
Questions 15

SR-MPLS uses the MPLS forwarding plane, and therefore requires MPLS to be enabled. Which of the following conditions must be met for MPLS to be automatically enabled on an interface? (Select all that apply)

Options:

A.  

The SRGB is configured for the IGP process.

B.  

Segment routing is enabled for IGP, and IGP is enabled on the interface.

C.  

The static adjacency label of the corresponding interface is configured in the segment routing view.

D.  

Segment routing is enabled in the system view.

Discussion 0
Questions 16

A network administrator needs to retrieve a token ID from iMaster NCE using the following Python code:

import requests

nbi_name = " demol3@north.com "

nbi_pwd = " qqcOVcVel@ "

host = " 139.9.213.72 "

port = " 18002 "

URI = " /controller/v2/tokens "

post_token_url = " https:// " + host + " : " + port + URI

headers_post = { ' Content-Type ' : ' application/json ' , ' Accept ' : ' application/json ' }

r = requests.post(post_token_url, headers=headers_post, json={ " userName " : nbi_name, " password " : nbi_pwd}, verify=incorrect)

Which of the following statements is incorrect?

Options:

A.  

You can run print(r.json()) to display the response message sent from the server.

B.  

Token resources are located at https://139.9.213.72:18002/controller/v2/tokens.

C.  

The HTTP request uses the GET method to query the token value.

D.  

The request body is in JSON format.

Discussion 0
Questions 17

Which of the following inter-AS MPLS L3VPN solutions needs ASBRs to transmit VPNv4 routes?

Options:

A.  

Option C

B.  

Option B

C.  

Option A

D.  

Option D

Discussion 0
Questions 18

In SSP packages, Jinja2 templates are used to implement mapping. In the Jinja2 syntax, {% ... %} contains control structures, for example, a ' for ' loop.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 19

An engineer often remotely logs in to the device to check the device status. The engineer can use the Python Paramiko and telnetlib libraries to implement automatic remote login through Python scripts. The remote login implemented using telnetlib is more secure.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 20

Which of the following statements does not cause the flapping of a VRRP group?

Options:

A.  

Too small interval between Advertisement packet transmissions

B.  

Inconsistent preemption delay settings

C.  

Packet loss on an interface of the backup device

D.  

Flapping on the link transmitting VRRP Advertisement packets

Discussion 0
Questions 21

SR-MPLS uses IGP extensions to advertise labels and reserve bandwidth to support high-bandwidth services.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 22

As shown in the figure, R1, R2, R3, and R4 reside in the same MPLS domain, and LDP (Label Distribution Protocol) is used to distribute MPLS labels.

R4 is the egress LSR (Label Switching Router) for the FEC (Forwarding Equivalence Class) 4.4.4.0/24.

To make R4 aware of QoS forwarding priority of a packet sent from R1 and destined for 4.4.4.0/24,

Without looking up R4’s label forwarding information base,

The outgoing label of the FEC on R3 should be _____ (Enter an Arabic numeral without symbols).

Options:

Discussion 0
Questions 23

IPsec uses an asymmetric encryption algorithm to encrypt the symmetric algorithm key, which it uses to encrypt/decrypt data, ensuring security and performance.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 24

If SRv6 needs to be deployed on a bearer WAN, which of the following technologies are required? (Select all that apply)

Options:

A.  

MPLS

B.  

BGP

C.  

IGP

D.  

BGP-LU

Discussion 0
Questions 25

iMaster NCE-CampusInsight uses SNMP technology to collect metrics and logs of network devices and detects network exceptions based on real service traffic.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 26

Huawei Open Programmability System (OPS) uses HTTP methods to access managed objects to manage network devices. HTTP is the most widely used network transmission protocol on the Internet. By default, the TCP port number _____ is used. (Fill in Arabic numerals.)

Options:

Discussion 0
Questions 27

iMaster NCE-Campus provides the terminal identification function to display the terminal type, operating system, and manufacturer information.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 28

Which of the following factors does not need to be considered during the selection of core devices for the enterprise bearer WAN?

Options:

A.  

Device naming conventions

B.  

Service volume

C.  

Physical location

D.  

Node quantity

Discussion 0
Questions 29

Which of the following statements is correct about 6PE and 6VPE?

Options:

A.  

In 6PE networking, VPN instances need to be created on PEs.

B.  

In 6PE networking, IPv6 addresses of a CE can be reused.

C.  

In 6VPE networking, IPv6 addresses of a CE can be reused.

D.  

In 6VPE networking, no VPN instance needs to be created on PEs.

Discussion 0
Questions 30

Which of the following protocols is used in the Huawei SD-WAN Solution to report device performance data?

Options:

A.  

NetFlow

B.  

SNMP

C.  

BGP

D.  

HTTP/2

Discussion 0
Questions 31

A client sends an HTTP request to a server, and the server sends back an HTTP response. Which of the following parameters is not carried in the HTTP response?

Options:

A.  

Reason phrase

B.  

Status code

C.  

Protocol version

D.  

URI

Discussion 0
Questions 32

Based on the figure, which of the following statements are correct?

< R1 > tracert 172.17.1.5

1 10.1.12.2 40 ms 10 ms 10 ms

2 10.1.24.2 30 ms 20 ms 20 ms

3 10.1.34.1 20 ms 20 ms 20 ms

4 10.1.13.1 20 ms 20 ms 10 ms

5 10.1.12.2 20 ms 30 ms 20 ms

6 10.1.24.2 30 ms 30 ms 30 ms

7 10.1.34.1 50 ms 40 ms 40 ms

8 10.1.13.1 20 ms 30 ms 30 ms

Options:

A.  

A.  

R1 does not have a route to 172.17.1.5.

B.  

B.  

R1 has a route to 172.17.1.5.

C.  

C.  

The path for R1 to access 172.17.1.5 is normal.

D.  

D.  

A loop occurs when R1 accesses 172.17.1.5.

Discussion 0
Questions 33

If an engineer wants to remotely log in to a Huawei device, the engineer uses the Paramiko library to compile the following code when compiling the SSH Python script:

cli = ssh.invoke_shell()

cli.send( " screen-length 0 temporary\n " )

What is the function of screen-length 0 temporary?

Options:

A.  

Performing automatic word wrap

B.  

Performing split-screen display

C.  

Canceling split-screen display

D.  

Canceling automatic word wrap

Discussion 0
Questions 34

Which of the following statements about SR-MPLS characteristics are correct? (Select all that apply)

Options:

A.  

Only the controller can compute paths based on explicit paths.

B.  

SR-MPLS supports smooth network evolution by extending existing protocols, such as IGPs.

C.  

Efficient TI-LFA FRR protection is provided for fast path fault recovery.

D.  

Such networks can quickly interact with upper-layer applications through the source routing technology.

Discussion 0
Questions 35

In 6PE and 6VPE networking, no VPN instance needs to be created on PEs.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 36

Which of the following number sequences can be matched by the regular expression 100.s?

Options:

A.  

100

B.  

10000

C.  

1000

D.  

1001

Discussion 0
Questions 37

As shown in the following figure, OSPF is deployed on a campus network to implement network interconnection, and Area 1 is deployed as an NSSA. To enable R1 to access R4’s loopback interface address, an engineer imports a direct route to R4’s OSPF process. Which of the following statements about this scenario are correct?

[R4-ospf-1] import-route direct

Loopback0: 10.1.4.4/32

Options:

A.  

R2 is an ABR and translates Type 7 LSAs carrying the default route information into Type 5 LSAs.

B.  

R2 is an ABR and translates Type 7 LSAs that describe external routes into Type 5 LSAs.

C.  

R4 is an ASBR in the NSSA and generates Type 7 LSAs carrying the default route information.

D.  

R4 is an ASBR in the NSSA and generates Type 7 LSAs to describe external routes.

Discussion 0
Questions 38

During WLAN planning and design, channels 1, 6, and 11 are recommended on the 2.4 GHz frequency band, and channels 1, 5, 9, and 13 are recommended in high-density scenarios. On the 5 GHz frequency band, it is recommended that high-frequency and low-frequency channels of adjacent APs be staggered to prevent overlapping.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 39

Refer to the figure.

Which of the following steps are mandatory to enable 802.1X authentication on GE0/0/2 and GE0/0/3 of SW3 and configure a RADIUS server to authenticate and deliver network access rights to users?

Options:

A.  

Configure an AAA scheme.

B.  

Configure an authentication profile.

C.  

Configure an authentication domain.

D.  

Configure an 802.1X access profile.

Discussion 0
Questions 40

Which of the following statements about 802.1X authentication are correct?

Options:

A.  

802.1X authentication uses EAPoL to exchange authentication information between the client, device, and authentication server.

B.  

In EAP termination mode, EAP packets are terminated and re-encapsulated into RADIUS packets on the network access device. The network access device and AAA server use the standard RADIUS protocol to implement authentication, authorization, and accounting.

C.  

EAPoL implements EAP encapsulation on an IEEE 802.3 network, whereas EAPoW implements EAP encapsulation on an IEEE 802.11 network.

D.  

In EAP relay mode, EAP packets are directly encapsulated by the network access device into RADIUS packets (that is, EAP over RADIUS, or EAPoR). The network access device and AAA server use EAPoR to perform authentication, authorization, and accounting.

Discussion 0
Questions 41

When designing IGP routes for an enterprise bearer WAN, ensure that the metric of aggregation-layer links is smaller than that of access-layer links, so that data can be preferentially forwarded over aggregation-layer links.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 42

Before connecting an SSH client to an SSH server in public key authentication mode, a client needs to create a key pair. Which of the following commands is used to create a DSS key pair on the client using Git Bash?

Options:

A.  

ssh-keygen -t dss

B.  

ssh-keygen -t ecc

C.  

ssh-keygen -t dsa

D.  

ssh-keygen -t rsa

Discussion 0
Questions 43

Refer to the following command output on the router R1. Which of the following statements is incorrect?

< R1 > display interface Tunnel

Tunnel0/0/0 current state : UP

Line protocol current state : UP

Last line protocol up time : 15:21:23 UTC-08:00

Description: ! 0.0.3.3

Route Port, The Maximum Transmit Unit is 1500

Internet Address is 20.1.1.1/24

Encapsulation is TUNNEL, loopback not set

Tunnel source 10.0.1.1 (LoopBack0), destination 10.0.3.3

Tunnel protocol/transport GRE/IP, key disabled

keepalive disabled

Checksumming of packets disabled

Current system time: 15:21:37-08:00

300 seconds input rate 0 bits/sec, 0 packets/sec

300 seconds output rate 0 bits/sec, 0 packets/sec

13 seconds input rate 0 bits/sec, 0 packets/sec

13 seconds output rate 448 bits/sec, 0 packets/sec

9 packets output, 824 bytes

0 output error

Input bandwidth utilization : -

Output bandwidth utilization : -

Options:

A.  

Key authentication is disabled for the tunnel.

B.  

The destination IP address of the tunnel is 10.0.3.3.

C.  

The tunnel is a GRE tunnel.

D.  

Keepalive detection is enabled on the tunnel.

Discussion 0
Questions 44

Which of the following statements about the multicast address used by OSPFv3 are correct?

Options:

A.  

All OSPF routers use FF08::5.

B.  

The DR uses FF08::6.

C.  

All OSPF routers use FF02::5.

D.  

The DR uses FF02::6.

Discussion 0
Questions 45

BGP EVPN can be used as the VXLAN control plane protocol to completely prevent traffic flooding, such as broadcast ARP packets, on the VXLAN network.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 46

Which of the following channels are involved in the Huawei SD-WAN Solution?

Options:

A.  

Management channel

B.  

Control channel

C.  

Data channel

D.  

Orchestration channel

Discussion 0
Questions 47

Refer to the following command output on the router R3. Which of the following statements are correct?

< R3 > display interface Tunnel

Tunnel0/0/0 current state : UP

Line protocol current state : UP

Last line protocol up time : 15:21:26 UTC-08:00

Description: HUAWEI, AR Series, Tunnel0/0/0 Interface

Route Port, The Maximum Transmit Unit is 1500

Internet Address is 20.1.1.2/24

Encapsulation is TUNNEL, loopback not set

Tunnel source 10.0.3.3 (LoopBack0), destination 10.0.1.1

Tunnel protocol/transport GRE/IP, key disabled

keepalive disabled

Checksumming of packets disabled

Options:

A.  

The tunnel destination IP address is 10.0.1.1.

B.  

The tunnel interface MTU is 1500 bytes.

C.  

The tunnel interface IP address is 20.1.1.2/24.

D.  

The tunnel source IP address is 10.0.1.1.

Discussion 0
Questions 48

YANG is a data modeling language for the definition of data sent over network management protocols such as NETCONF. Which of the following are basic YANG data models? (Select all that Apply)

Options:

A.  

Set node

B.  

Leaf node

C.  

List node

D.  

Tree node

Discussion 0
Questions 49

By default, the domain ID of an OSPF process is the same as the process ID. You can run the domain-id command in the OSPF process view to change a domain ID.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 50

When you configure a virtualized campus network on iMaster NCE-Campus and enable external networks to connect to the Internet, iMaster NCE-Campus will automatically deliver a specific route to direct traffic to the corresponding external network.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 51

A VGMP packet is encapsulated with a UDP header and a VGMP header. By default, a VGMP packet uses UDP port _____.

Options:

Discussion 0
Questions 52

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following BGP EVPN routes is used to advertise MAC addresses, ARP entries, and IRB routes?

Options:

A.  

Type 3

B.  

Type 4

C.  

Type 2

D.  

Type 1

Discussion 0
Questions 53

Which of the following headend behaviors can insert SRHs into IPv6 packets? (Select All that Apply)

Options:

A.  

H.Encaps.Red

B.  

H.Insert

C.  

H.Encaps

D.  

H.Insert.Red

Discussion 0
Questions 54

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following fields is NOT carried in BGP EVPN Type 5 routes?

Options:

A.  

Route Distinguisher

B.  

MAC Address

C.  

GW IP Address

D.  

IP Prefix Length

Discussion 0
Questions 55

In the LDP session establishment process, the initiator sends an Initialization message for parameter negotiation. Which message will be sent by the responder if it does not accept negotiation parameters?

Options:

A.  

Error Notification Message

B.  

Initialization Message

C.  

Keepalive Message

D.  

Hello Message

Discussion 0
Questions 56

In OSPF, an ABR translates all Type 7 LSAs in a Not-So-Stubby Area (NSSA) into Type 5 LSAs.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 57

Which of the following inter-AS MPLS L3VPN solutions does not require MPLS to run between ASBRs?

Options:

A.  

Option C

B.  

Option D

C.  

Option A

D.  

Option B

Discussion 0
Questions 58

/ifm/interfaces/interface in Huawei Open Programmability System (OPS) is the URL used to identify a device ' s managed object.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 59

In the admission design for large- and medium-sized campus networks, which of the following authentication modes can be used for PCs connected to IP phones?

Options:

A.  

MAC address authentication

B.  

802.1X authentication

C.  

Multi-mode authentication

D.  

Portal authentication

Discussion 0
Questions 60

During the evolution from OSPFv2 to OSPFv3, LSA formats and functions remain unchanged, except that the network layer addresses in LSAs are changed from IPv4 to IPv6.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 61

In the Huawei CloudCampus Solution, which of the following devices can go online through the registration query center?

Options:

A.  

Switch

B.  

AR

C.  

AP

D.  

Firewall

Discussion 0
Questions 62

Which of the following are advantages of GRE tunnels? (Select All that Apply)

Options:

A.  

GRE tunnels enlarge the scope of a hop-limited network

B.  

GRE tunnels can be used to construct VPN networks

C.  

ARP packets can be encapsulated through GRE tunnels

D.  

Multicast data can be encapsulated through GRE tunnels

Discussion 0
Questions 63

MPLS implements data forwarding based on two different planes. Which of the following statements regarding the forwarding mechanism are correct?

Options:

A.  

After an IP packet enters an MPLS domain, the MPLS device forwards the packet based on FIB table queries.

B.  

If the tunnel ID is 0x0, the MPLS forwarding process starts.

C.  

The system automatically assigns an ID to the upper-layer application that uses a tunnel. This ID is also called the tunnel ID.

D.  

If the tunnel ID is not 0x0, the normal IP forwarding process starts.

Discussion 0
Questions 64

The path of an SR-MPLS TE tunnel can be calculated by the controller or tunnel ingress.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 65

Which of the following roles is NOT a core role in Huawei ' s Free Mobility solution?

Options:

A.  

iMaster NCE-Campus

B.  

Policy enforcement device

C.  

Authentication device

D.  

Policy control device

Discussion 0
Questions 66

OSPF is deployed on a campus network to implement network interconnection. The LSDB of R2 is shown in the figure.

What can be determined from the LSDB?

Options:

A.  

Area 1 is an NSS

A.  

B.  

R2 translates Type 7 default route into Type 5 default route.

C.  

R2 advertises the default route in the OSPF process.

D.  

Area 1 does not have Type 3 LSAs. The possible cause is that R2 filters Type 3 LSAs in the outbound direction of area 1.

Discussion 0
Questions 67

When a client invokes the iMaster NCE-Campus RESTful API, it sends an HTTP request. The server then returns the status code 401. Which of the following errors has occurred?

Options:

A.  

Unauthorized

B.  

The requested resource does not exist

C.  

Access denied

D.  

The service is unavailable

Discussion 0
Questions 68

BGP Link State (BGP-LS) introduces a new NLRI into BGP. The NLRI carries link, node, topology prefix, and other information, and is also referred to as the link state NLRI.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 69

The Huawei SD-WAN solution has three types of channels. Drag the channel names to their corresponding callouts.

Options:

Discussion 0
Questions 70

There are multiple SR-MPLS TE tunnel protection mechanisms. FRR (Fast Reroute) constructs a virtual node to convert multiple identical route advertisement nodes into a single route advertisement node, and then computes the backup next hop of the virtual node based on the TI-LFA algorithm. In this way, traffic can be quickly switched when a fault occurs.

What is the name of this protection mechanism?

Options:

Discussion 0
Questions 71

After the reset isis all command is run, the specified IS-IS process is reset, and all involved IS-IS neighbor relationships are re-established; however, IS-IS statistics are not cleared.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 72

Which of the following items are included in static information collection and analysis?

Options:

A.  

Device types

B.  

Interface types

C.  

License

D.  

Packet loss rate

Discussion 0
Questions 73

OSPF is a mature protocol and is unlikely to have route computation errors in a regular networking environment under correct configurations. Which of the following statements are correct about the possible causes preventing an OSPF neighbor relationship from entering Full state?

Options:

A.  

A link works abnormally.

B.  

The OSPF network types on both ends of the link are inconsistent.

C.  

The router IDs of neighbors are the same.

D.  

The OSPF MTU values of interfaces on both ends of the link are different.

Discussion 0
Questions 74

In the Huawei SD-WAN Solution, the topologies of different VNs must be the same.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 75

Which of the following intelligent traffic steering policies can be used to fully utilize link bandwidth and implement link bandwidth-based load balancing on an enterprise network with multiple links?

Options:

A.  

Application priority-based traffic steering

B.  

Link quality-based traffic steering

C.  

Link priority-based traffic steering

D.  

Traffic bandwidth-based traffic steering

Discussion 0
Questions 76

Which of the following methods can be used to establish IPsec SAs? (Select All that Apply)

Options:

A.  

Establish IPsec SAs through template negotiation

B.  

Establish IPsec SAs in IKE auto-negotiation mode

C.  

Establish IPsec SAs through certificate negotiation

D.  

Manually establish IPsec SAs

Discussion 0
Questions 77

Which of the following is not the function of OSPFv3 Link-LSAs?

Options:

A.  

Advertises the interface ID of the local router to other routers attached to the link.

B.  

Advertises the link-local address of the local interface to other routers attached to the link.

C.  

Advertises a list of IPv6 prefixes of the local interface to other routers attached to the link.

D.  

Advertises the Options field in the Network-LSA originated on the local link to other routers attached to the link.

Discussion 0
Questions 78

An SRv6 Policy can be either statically configured on a device or dynamically generated by the controller and then delivered to the device.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 79

K company has two types of network services: UDP-based real-time video streaming services and TCP-based FTP download services. The company ' s network administrator often receives complaints that the FTP download speed is slow or unstable. What are the possible causes?

Options:

A.  

The device uses the tail drop technology. As a result, global TCP synchronization affects the FTP rate.

B.  

The device performs PQ scheduling for FTP services and WFQ scheduling for video services. As a result, the FTP service bandwidth is preempted.

C.  

The device limits the FTP traffic rate to a small value.

D.  

The video service has a higher priority and preempts the bandwidth of the FTP service.

Discussion 0
Questions 80

Which of the following operations is not involved in the middle phase of a migration?

Options:

A.  

Migration preparation

B.  

On-site monitoring

C.  

Migration implementation

D.  

Service test

Discussion 0
Questions 81

Portal authentication is recommended for scenarios with high mobility and numerous terminal types, such as shopping malls and supermarkets. MAC address authentication is recommended for dumb terminals that do not support Portal authentication, such as printers, fax machines, and IP phones.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 82

Which of the following is the drop probability of packets exceeding the upper threshold in WRED?

Options:

A.  

0.2

B.  

0.5

C.  

1

D.  

0.8

Discussion 0
Questions 83

The telemetry network model is broadly and narrowly defined. Which of the following modules are involved in telemetry in a narrow sense (device-side telemetry)?

Options:

A.  

Data generation

B.  

Data push

C.  

Data source

D.  

Data subscription

Discussion 0
Questions 84

Huawei Open Programmability System (OPS) provides openness and programmability capabilities for network devices and enables users to perform secondary development. To facilitate script completion, Huawei OPS provides the Python script template in which the OPSConnection class is created. The member function for creating device resources is def post(self, uri, req_data).

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 85

Congestion avoidance technology can prevent congestion on an interface.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 86

Which of the following functions can be provided by iMaster NCE-Campus when it functions as a relay agent for authentication?

Options:

A.  

User accounting

B.  

User authentication

C.  

User analysis

D.  

Marketing

Discussion 0
Questions 87

In Huawei ' s NAC solution, which of the following cannot be used for Portal authentication?

Options:

A.  

User name and password

B.  

Passcode

C.  

SMS verification code

D.  

User’s MAC address

Discussion 0
Questions 88

Which of the following statements about GRE is incorrect?

Options:

A.  

GRE can encapsulate IPv6 unicast packets.

B.  

GRE can encapsulate IPv4 unicast packets.

C.  

GRE can encapsulate IPv6 broadcast packets.

D.  

GRE is easy to implement and puts little burden on devices at both ends of a tunnel.

Discussion 0
Questions 89

The RR (Route Reflector) is critical to the Huawei SD-WAN Solution, and its deployment mode varies based on the scenario. In which of the following modes can an RR be deployed?

Options:

A.  

Multi-area deployment of the RR

B.  

Independent deployment of the RR

C.  

Co-deployment of the RR and hub site

D.  

Partially independent deployment of the RR

Discussion 0
Questions 90

When an NVE encapsulates a data frame into a VXLAN packet, information of which of the following protocols is encapsulated between the outer IP header and the VXLAN header?

Options:

A.  

IP

B.  

TCP

C.  

UDP

D.  

Ethernet

Discussion 0
Questions 91

Which of the following technologies can be used to measure performance based on actual service traffic in Huawei ' s CloudWAN solution?

Options:

A.  

TWAMP

B.  

BGP FlowSpec

C.  

Telemetry

D.  

iFIT

Discussion 0
Questions 92

On a CloudCampus virtualized campus network, virtual networks are defined based on services. Each virtual network corresponds to a service, and isolation needs to be manually configured between virtual networks.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 93

The TTL field encapsulated in the MPLS label header can prevent infinite loops of MPLS packets. Which of the following statements regarding the TTL field are correct?

Options:

A.  

If TTL copy is disabled, users can use the tracert function to view the LSR of the MPLS domain.

B.  

The processing of IP TTL copy hides the LSR in an MPLS domain, improving network security.

C.  

MPLS provides two processing modes on the TTL field:TTL in the MPLS header copies the IP TTL value when an IP packet enters the MPLS network.The ingress LER sets the TTL value in the MPLS header to 255.

D.  

MPLS encapsulation in frame mode supports the TTL field. MPLS encapsulation in cell mode does not support the TTL field.

Discussion 0
Questions 94

Refer to the configuration in the figure. Which queue on R2 do packets of PC1 enter by default?

Options:

A.  

AF4

B.  

AF2

C.  

AF3

D.  

EF

Discussion 0
Questions 95

How long is an IPv6 prefix assigned to a host when an IPv6 address is configured for the host in SLAAC mode?

Options:

A.  

64 bits

B.  

32 bits

C.  

96 bits

D.  

128 bits

Discussion 0
Questions 96

As shown in the following figure, an engineer tests network interconnection between two branches. To implement network interconnection, OSPF is deployed on R1, R2, and R3 of branch 1, and IS-IS is deployed on R2, R3, and R4 of branch 2. Which of the following operations needs to be performed to allow R1 to access R4 ' s loopback interface address?

Options:

A.  

Run the default-route-advertise command in both the OSPF and IS-IS views on R2.

B.  

No configuration is required.

C.  

Run the default-route-advertise command only in the OSPF view on R2.

D.  

Run the default-route-advertise command only in the IS-IS view on R2.

Discussion 0