Month End Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

HCIE-Datacom V1.0 Question and Answers

HCIE-Datacom V1.0

Last Update Sep 30, 2025
Total Questions : 322

We are offering FREE H12-891_V1.0 Huawei exam questions. All you do is to just go and sign up. Give your details, prepare H12-891_V1.0 free exam questions and then go for complete pool of HCIE-Datacom V1.0 test questions that will help you more.

H12-891_V1.0 pdf

H12-891_V1.0 PDF

$36.75  $104.99
H12-891_V1.0 Engine

H12-891_V1.0 Testing Engine

$43.75  $124.99
H12-891_V1.0 PDF + Engine

H12-891_V1.0 PDF + Testing Engine

$57.75  $164.99
Questions 1

In a scenario where aVXLAN tunnelis dynamically established throughBGP EVPN, which of the following statements about the functions ofBGP EVPN Type 3 routesis incorrect?

Options:

A.  

If the VTEP IP address of a Type 3 route is reachable at Layer 3 and the peer VNI is the same as the local VNI, an ingress replication list is created for forwarding BUM packets.

B.  

Type 3 routes carryL2VNIs and VTEP IP addresses.

C.  

Type 3 routes carryL3VNIs.

D.  

If the VTEP IP address carried in the received Type 3 route is reachable at Layer 3, a VXLAN tunnel to the peer end is established.

Discussion 0
Questions 2

The channelized sub-interface and FlexE technologies both can be used to implement network slicing, but the application scenarios of the two technologies are slightly different. Which of the following statements about the two technologies are correct?

Options:

A.  

It is recommended that channelized sub-interface be used to reserve resources for interfaces with a bandwidth of less than 50 Gbit/s.

B.  

It is recommended that FlexE be used to reserve resources for 50GE and higher-rate interfaces.

C.  

Only FlexE-based network slicing can be deployed across OTN devices.

D.  

Only network slicing based on channelized sub-interface can be deployed across MSTP devices.

Discussion 0
Questions 3

If the number of MAC addresses learned on an interface enabled with port security reaches the upper limit, which of the following actions may the switch take?

Options:

A.  

Discards packets with unknown source MAC addresses without generating any alarm.

B.  

Sets the interface state to error-down without generating any alarm.

C.  

Discards packets with unknown source MAC addresses and generates an alarm.

D.  

Sets the interface state to error-down and generates an alarm.

Discussion 0
Questions 4

Network Admission Control (NAC) needs to be deployed on the network shown in the figure. Drag a proper authentication mode to each authentication point.

Options:

Discussion 0
Questions 5

In Huawei SD-WAN Solution, which of the following tunneling technologies is used to establish data channels?

Options:

A.  

WLAN

B.  

IPsec

C.  

MPLS

D.  

GRE over IPsec

Discussion 0
Questions 6

In the following figure, all routers are running OSPF. Given this, which of the following statements is correct?

Options:

A.  

R2 forwards the Router-LSAs generated by R1 to R3.

B.  

R2 forwards the Router-LSAs generated by R3 to R1.

C.  

R2 generates Router-LSAs only in area 0.

D.  

R2 generates Router-LSAs in both area 1 and area 0.

Discussion 0
Questions 7

Which of the following commands needs to be run in the BGP view to enable a VPN instance to advertise IP routes to the BGP-EVPN address family?

Options:

A.  

advertise irbvfi

B.  

advertise vpnv4

C.  

advertise irb

D.  

advertise l2vpn evpn

Discussion 0
Questions 8

Refer to the configuration in the figure. Which queue on R2 do packets of PC1 enter by default?

Options:

A.  

AF4

B.  

AF2

C.  

AF3

D.  

EF

Discussion 0
Questions 9

The TTL field encapsulated in the MPLS label header can prevent infinite loops of MPLS packets. Which of the following statements regarding the TTL field are correct?

Options:

A.  

If TTL copy is disabled, users can use the tracert function to view the LSR of the MPLS domain.

B.  

The processing of IP TTL copy hides the LSR in an MPLS domain, improving network security.

C.  

MPLS provides two processing modes on the TTL field:TTL in the MPLS header copies the IP TTL value when an IP packet enters the MPLS network.The ingress LER sets the TTL value in the MPLS header to 255.

D.  

MPLS encapsulation in frame mode supports the TTL field. MPLS encapsulation in cell mode does not support the TTL field.

Discussion 0
Questions 10

BGP Link State (BGP-LS) introduces a new NLRI into BGP. The NLRI carries link, node, topology prefix, and other information, and is also referred to as the link state NLRI.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 11

In an MPLS VPN network, two-layer MPLS labels are added into data packets before they are transmitted over the public network. Which of the following statements regarding data packet processing are correct?

Options:

A.  

The egress PE sends the data packet to the correct VPN based on the inner label.

B.  

The penultimate hop removes the outer label before forwarding the data packet to a peer egress PE.

C.  

The IP data packet received by egress LSR is without labels.

D.  

The penultimate-hop device receives a packet with an outer label.

Discussion 0
Questions 12

To prevent hackers from attacking user devices or networks using MAC addresses, you can configure MAC addresses of untrusted users as blackhole MAC addresses to filter out such invalid MAC addresses. When receiving a packet whose source or destination MAC address is a blackhole MAC address on a device, the device discards the packet.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 13

On a CloudCampus virtualized campus network, virtual networks are defined based on services. Each virtual network corresponds to a service, and isolation needs to be manually configured between virtual networks.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 14

In addition to indicating priority, the DSCP value can also indicate the drop probability. Which of the following DSCP values is set with the highest drop probability?

Options:

A.  

AF43

B.  

AF10

C.  

AF12

D.  

AF11

Discussion 0
Questions 15

To enhance reliability, you can deploy Huawei iMaster NCE-WAN controllers in active/standby mode. Which of the following IP addresses must be configured to be the same for the active and standby controllers so that the controllers can be accessed properly? (Select All that Apply)

Options:

A.  

Southbound public IP addresses

B.  

Internal interconnection addresses

C.  

Southbound private IP addresses

D.  

Northbound IP addresses

Discussion 0
Questions 16

Which of the following is the purpose of configuring IS-IS fragmentation on an IS-IS device?

Options:

A.  

Disable the device from establishing IS-IS neighbor relationships.

B.  

Enable the device to support more IS-IS routes.

C.  

There is no practical purpose.

D.  

Disable the device from learning IS-IS link-state information.

Discussion 0
Questions 17

Which of the following statements is incorrect about MP-BGP?

Options:

A.  

MP-BGP uses the MP_REACH_NLRI and MP_UNREACH_NLRI attributes to advertise VPNv4 routes.

B.  

When PEs and CEs exchange routes through BGP, you need to create a BGP process for each VPN instance in the CE.

C.  

The packet types and VPNv4 route advertisement policies of MP-BGP are the same as those of BGP-4.

D.  

MP-BGP needs to allocate private network labels for VPNv4 routes.

Discussion 0
Questions 18

A network administrator runs the display telemetry subscription command on a device to check telemetry subscription information. The command output is as follows. Which of the following statements is incorrect?

[~CE] display telemetry subscription

Sub name : Sub1

Sensor group:

Sensor-name Sample-interval(ms) State

Sensor1 1000 RESOLVED

Destination group:

Dest-name Dest-IP Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20030 RESOLVED - GRPC

Sub state : PASSIVE

Total subscription number is : 1

Options:

A.  

The device sends sampled data every second.

B.  

The subscription mode is static subscription.

C.  

The IP address of the device is 192.168.56.1.

D.  

The subscription name is Sub1.

Discussion 0
Questions 19

MPLS implements data forwarding based on two different planes. Which of the following statements regarding the forwarding mechanism are correct?

Options:

A.  

After an IP packet enters an MPLS domain, the MPLS device forwards the packet based on FIB table queries.

B.  

If the tunnel ID is 0x0, the MPLS forwarding process starts.

C.  

The system automatically assigns an ID to the upper-layer application that uses a tunnel. This ID is also called the tunnel ID.

D.  

If the tunnel ID is not 0x0, the normal IP forwarding process starts.

Discussion 0
Questions 20

To allow only authorized users (users who obtain IP addresses through authorized DHCP servers or use specified static IP addresses) to access the network shown in the figure, which of the following solutions can be used?

Options:

A.  

DAI + Port Security

B.  

DHCP Snooping + IPSG

C.  

DHCP Snooping + DAI

D.  

DAI + IPSG

Discussion 0
Questions 21

If ISIS is used to transmit SIDs on an SR network, the node SIDs advertised by a Level-2 router are transmitted only within the same area.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 22

Which of the following are potential risks in HTTP communication?

Options:

A.  

Eavesdropping: Third parties can obtain communication data.

B.  

Pretending: Third parties can impersonate another user.

C.  

Tampering: Third parties can tamper with communication data.

D.  

Lost: There is a low probability that data is lost during transmission.

Discussion 0
Questions 23

On a router,SRv6is enabled, and the configurations shown below are performed. Which of the following statements about the configurations are correct?

[Router-segment-routing-ipv6] locator srv6_locator1 ipv6-prefix 2001:DB8:ABCD::/64 static 32

Options:

A.  

The locator of this node is2001:DB8:ABCD::.

B.  

The static segment of the node occupies32 bits.

C.  

The dynamic segment of the node occupies32 bits.

D.  

The Args field of this node occupies32 bits.

Discussion 0
Questions 24

iMaster NCE-Campus provides the terminal identification function to display the terminal type, operating system, and manufacturer information.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 25

In a scenario whereSR Policiesare dynamically established through thecontroller, which of the following statements about theSR Policy solution architectureis incorrect?

Options:

A.  

The controller uses NETCONF to deliver configurations such as service interfaces and routing policies.

B.  

The controller uses BGP-LS to collect tunnel topology information and computes SR Policy paths.

C.  

The controller uses telemetry to deliver information such as SRv6 SIDs to construct SID entries.

D.  

The controller uses BGP IPv6 SR Policy to deliver SR Policy information, such as the color, headend, and endpoint information.

Discussion 0
Questions 26

On an SR-MPLS network, manually configured prefix SIDs on different devices may conflict with each other. Assume that there are four routes (prefix/mask SID) as follows. Which of the following routes will be selected according to the conflict handling principle?

Options:

A.  

1.1.1.1/32 → SID 2

B.  

1.1.1.1/32 → SID 1

C.  

2.2.2.2/32 → SID 3

D.  

3.3.3.3/32 → SID 1

Discussion 0
Questions 27

In the firewall hot standby scenario, when VGMP works in load balancing mode, which of the following functions must be enabled on the firewalls to prevent the return traffic from being discarded because it does not match any session entry in the case of inconsistent forward and return paths?

Options:

A.  

Automatic backup

B.  

Manual batch backup

C.  

Quick session backup

D.  

BFD

Discussion 0
Questions 28

As shown in the figure,ARP broadcast suppression is enabled on VTEP1inBD 20 (VNI 200).

VTEP1 learns ARP informationaboutPC2 through BGP EVPN routes.

WhenVTEP1 forwards the ARP request for PC1’s MAC address to VTEP2,

What is the destination MAC address of the inner data frame?

Options:

A.  

MAC B

B.  

MAC C

C.  

MAC A

D.  

MAC D

Discussion 0
Questions 29

Network administrator A wants to view the BGP peer status of R2. The BGP peer status of R2 is shown in this figure. Obtain the following information: R2 resides in AS _____ (Enter only digits. Do not add punctuations or spaces.)

Options:

Discussion 0
Questions 30

Which of the following items are included in static information collection and analysis?

Options:

A.  

Device types

B.  

Interface types

C.  

License

D.  

Packet loss rate

Discussion 0
Questions 31

Which of the following statements about BGP EVPN principles are correct in a scenario where a VXLAN tunnel is dynamically established through BGP EVPN?

Options:

A.  

MP_REACH_NLRI is used to carry routing information.

B.  

Several BGP EVPN routes are defined through BGP extension.

C.  

MP_REACH_NLRI is used to carry the RD.

D.  

MP_REACH_NLRI is used to carry the RT.

Discussion 0
Questions 32

If an engineer wants to remotely log in to a Huawei device, the engineer uses the Paramiko library to compile the following code when compiling the SSH Python script:

cli = ssh.invoke_shell()

cli.send("screen-length 0 temporary\n")

What is the function of screen-length 0 temporary?

Options:

A.  

Performing automatic word wrap

B.  

Performing split-screen display

C.  

Canceling split-screen display

D.  

Canceling automatic word wrap

Discussion 0
Questions 33

New IS-IS TLVs are used to carry IPv6 addresses and reachability information to support IPv6 route processing and calculation.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 34

Which of the following statements are correct about the command:

ping -aX -cY -sZ -vpn-instance M 10.5.16.2

Options:

A.  

The source IP address of the ping packets is X.

B.  

The ping packets belong to VPN instance M.

C.  

During the ping operation, the quantity of ICMP Request packets is Y.

D.  

The size of each ICMP Request packet for the ping operation is Z bytes.

Discussion 0
Questions 35

When aclient invokes the iMaster NCE-Campus RESTful API, it sends anHTTP request. The server then returns thestatus code 401.

Which of the following errors has occurred?

Options:

A.  

The service is unavailable.

B.  

Access denied.

C.  

The requested resource does not exist.

D.  

Unauthorized.

Discussion 0
Questions 36

Before connecting an SSH client to an SSH server in public key authentication mode, a client needs to create a key pair. Which of the following commands is used to create a DSS key pair on the client using Git Bash?

Options:

A.  

ssh-keygen -t dss

B.  

ssh-keygen -t ecc

C.  

ssh-keygen -t dsa

D.  

ssh-keygen -t rsa

Discussion 0
Questions 37

Flavors are additional behaviors defined to enhance theEnd series instructionsinSRv6. Which of the followingEnd instructionscan thePSP flavorbe attached to?

Options:

A.  

End.X

B.  

End.BM

C.  

End.T

D.  

End

Discussion 0
Questions 38

Prefix segments and adjacency segments are globally visible and unique.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 39

Which of the following statements about static VXLAN tunnel configuration are correct?

Options:

A.  

On an NVE interface, the destination address of a VXLAN tunnel is specified based on the address in the ingress replication list. You can create one NVE interface for multiple VXLAN tunnels.

B.  

An NVE interface can be associated with multiple VNIs. Therefore, you can create one NVE interface when there are multiple BDs.

C.  

One NVE interface must be created for each VXLAN tunnel, and the source and destination IP addresses must be specified for the NVE interface. Therefore, the number of NVE interfaces is the same as the number of VXLAN tunnels on the VTEP.

D.  

One NVE interface must be created for each B

D.  

If there are multiple BDs, multiple NVE interfaces must be created.

Discussion 0
Questions 40

The Ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is ______ IRB forwarding. (Capitalize the first letter.)

Options:

Discussion 0
Questions 41

Which of the following statements is correct about the differences between NSR and NSF?

Options:

A.  

NSR requires the collaboration of neighboring routers.

B.  

NSF requires the collaboration of neighboring routers.

C.  

NSF does not require the collaboration of neighboring routers.

D.  

Both NSR and NSF require the collaboration of neighboring routers.

Discussion 0
Questions 42

Huawei Open Programmability System (OPS) uses HTTP methods to access managed objects to manage network devices. HTTP is the most widely used network transmission protocol on the Internet. By default, the TCP port number _____ is used. (Fill in Arabic numerals.)

Options:

Discussion 0
Questions 43

In OSPF, an ABR translates all Type 7 LSAs in a Not-So-Stubby Area (NSSA) into Type 5 LSAs.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 44

With telemetry, certain data can be sampled based on specific sampling paths. Which of the following sampling paths are supported by telemetry?

Options:

A.  

Interface statistics

B.  

Information about the optical module on an interface

C.  

CPU information

D.  

Memory information

Discussion 0
Questions 45

BGP routing policies can be used to control the advertisement and acceptance of routes.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 46

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following fields is NOT carried in BGP EVPN Type 5 routes?

Options:

A.  

Route Distinguisher

B.  

MAC Address

C.  

GW IP Address

D.  

IP Prefix Length

Discussion 0
Questions 47

Node segments in SR-MPLS must be manually configured.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 48

On a broadcast network, if the DR priorities of two interfaces connecting two routers are set to 0, in which of the following states will the OSPF neighbor relationship stay?

Options:

A.  

Full

B.  

Down

C.  

2-way

D.  

Exchange

Discussion 0
Questions 49

Exhibit:

A loop occurs because Spanning Tree Protocol (STP) is not enabled on the network. Which of the following symptoms may occur?

Options:

A.  

A loop alarm is generated on the LAN switch.

B.  

CPU usage is too high.

C.  

MAC entries flap.

D.  

Host receives a large number of broadcast packets.

Discussion 0
Questions 50

Based on the figure, which of the following statements are correct?

tracert 172.17.1.5

1 10.1.12.2 40 ms 10 ms 10 ms

2 10.1.24.2 30 ms 20 ms 20 ms

3 10.1.34.1 20 ms 20 ms 20 ms

4 10.1.13.1 20 ms 20 ms 10 ms

5 10.1.12.2 20 ms 30 ms 20 ms

6 10.1.24.2 30 ms 30 ms 30 ms

7 10.1.34.1 50 ms 40 ms 40 ms

8 10.1.13.1 20 ms 30 ms 30 ms

Options:

A.  

A.  

R1 does not have a route to 172.17.1.5.

B.  

B.  

R1 has a route to 172.17.1.5.

C.  

C.  

The path for R1 to access 172.17.1.5 is normal.

D.  

D.  

A loop occurs when R1 accesses 172.17.1.5.

Discussion 0
Questions 51

An SRv6 Policy can be either statically configured on a device or dynamically generated by the controller and then delivered to the device.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 52

As shown in the figure, when PE1 receives an ARP request packet, it forwards the packet to PE4. The packet then carries two labels. The label value 201 is carried by the EVPN Type ____ route. (Enter only digits.)

Options:

Discussion 0
Questions 53

iMaster NCE-CampusInsightuses SNMP technology to collect metrics and logs of network devices and detects network exceptions based on real service traffic.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 54

SSH connections are usually established based on TCP/IP connections. In specific cases, SSH connections can be established based on UDP connections.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 55

You write the following Python code to invoke a RESTful API to obtain the token ID of iMaster NCE. Which of the following statements are correct?

import requests

response = requests.get("https://139.9.213.72 ")

print(response.json())

Error returned:

requests.exceptions.SSLError: HTTPSConnectionPool(host='139.9.213.72', port=18002): Max retries exceeded with url: /controller/v2/tokens (Caused by SSLError(CertificateError('hostname '139.9.213.72' doesn't match 'devzone.huawei.com')))

Options:

Options:

A.  

The client does not trust the SSL certificate of the server.

B.  

The SSL certificate verification fails.

C.  

The code can be modified as follows:import requestsresponse = requests.get("https://139.9.213.72 ", verify=False)print(response.json())

D.  

The code can be modified as follows:import requestsresponse = requests.post("http://139.9.213.72 ", verify=False)print(response.json())

Discussion 0
Questions 56

SR-MPLS uses the MPLS forwarding plane, and therefore requires MPLS to be enabled. Which of the following conditions must be met for MPLS to be automatically enabled on an interface? (Select all that apply)

Options:

A.  

The SRGB is configured for the IGP process.

B.  

Segment routing is enabled for IGP, and IGP is enabled on the interface.

C.  

The static adjacency label of the corresponding interface is configured in the segment routing view.

D.  

Segment routing is enabled in the system view.

Discussion 0
Questions 57

Which of the following is not the function of OSPFv3 Link-LSAs?

Options:

A.  

Advertises the interface ID of the local router to other routers attached to the link.

B.  

Advertises the link-local address of the local interface to other routers attached to the link.

C.  

Advertises a list of IPv6 prefixes of the local interface to other routers attached to the link.

D.  

Advertises the Options field in the Network-LSA originated on the local link to other routers attached to the link.

Discussion 0
Questions 58

Which of the following inter-AS MPLS L3VPN solutions needsASBRs to transmit VPNv4 routes?

Options:

A.  

Option C

B.  

Option B

C.  

Option A

D.  

Option D

Discussion 0
Questions 59

Refer to the figure.

Which of the following steps are mandatory to enable 802.1X authentication on GE0/0/2 and GE0/0/3 of SW3 and configure a RADIUS server to authenticate and deliver network access rights to users?

Options:

A.  

Configure an AAA scheme.

B.  

Configure an authentication profile.

C.  

Configure an authentication domain.

D.  

Configure an 802.1X access profile.

Discussion 0
Questions 60

During the implementation of iMaster NCE-Campus Wi-Fi location-based services (LBS), terminal location data is sent to an LBS platform through HTTP requests. Which of the following data formats is used in such HTTP requests?

Options:

A.  

XML

B.  

HTML

C.  

JSON

D.  

YAML

Discussion 0
Questions 61

On the campus network shown, IPv6 is deployed for service tests. Four routers are deployed on the network, and OSPFv3 is used for IPv6 network connectivity. An engineer checks the LSDB of R2 and obtains a Link-LSA. Which of the following statements about the LSA are correct?

Options:

A.  

The link-local address of R2’s GE0/0/0 is FE80::2E0:FCFF:FECD:4F79.

B.  

The IPv6 address prefix of R2’s GE0/0/0 is 2001:DB8:2345:23::/64.

C.  

This LSA indicates that R2 does not support external routes but can participate in IPv6 route calculation.

D.  

This LSA is generated by R2.

Discussion 0
Questions 62

Theon-premise modeis recommended for controller deployment onsmall and midsize campus networks.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 63

What can be determined from the following figure?

display ipv6 routing-table protocol isis

Public Routing Table : ISIS

Summary Count: 6

ISIS Routing Table's Status : < Active >

Summary Count: 6

Destination : 3000:FDEA::4

NextHop : FE80::2E0:FCFF:FE98:2577

Cost : 20

Interface : GigabitEthernet0/0/1

PrefixLength : 128

Preference : 15

Protocol : ISIS-L2

Flags : D

Options:

A.  

R1 has six IS-IS IPv6 routes.

B.  

R1 does not have IS-IS IPv6 routes.

C.  

IS-IS IPv6 must have been enabled on GigabitEthernet0/0/1 of R1.

D.  

R1 is not a Level-1 device.

Discussion 0
Questions 64

In OSPFv3, which of the following LSAs can be flooded within an area?

Options:

A.  

Inter-Area-Router-LSA

B.  

Intra-Area-Prefix-LSA

C.  

Link-LSA

D.  

Inter-Area-Prefix-LSA

Discussion 0
Questions 65

As shown in the following figure, an engineer tests network interconnection between two branches. To implement network interconnection,OSPFis deployed onR1, R2, and R3of branch 1, andIS-ISis deployed onR2, R3, and R4of branch 2. Which of the following operations needs to be performed to allowR1 to access R4's loopback interface address?

Options:

A.  

Run the default-route-advertise command in both the OSPF and IS-IS views on R2.

B.  

No configuration is required.

C.  

Run the default-route-advertise commandonly in the OSPF viewon R2.

D.  

Run the default-route-advertise commandonly in the IS-IS viewon R2.

Discussion 0
Questions 66

In Huawei SD-WAN Solution, which of the following tunneling technologies is used to establish data channels?

Options:

A.  

IPsec

B.  

GRE over IPsec

C.  

VXLAN

D.  

MPLS

Discussion 0
Questions 67

During the configuration of L3VPNv4 over SRv6 BE, if an RR is deployed in the SR domain, which command must be run on the RR to ensure that the PEs at both ends can correctly learn VPNv4 routes?

Options:

Discussion 0
Questions 68

Which of the following are advantages of GRE tunnels? (Select All that Apply)

Options:

A.  

GRE tunnels enlarge the scope of a hop-limited network

B.  

GRE tunnels can be used to construct VPN networks

C.  

ARP packets can be encapsulated through GRE tunnels

D.  

Multicast data can be encapsulated through GRE tunnels

Discussion 0
Questions 69

Which of the following statements does not cause the flapping of a VRRP group?

Options:

A.  

Too small interval between Advertisement packet transmissions

B.  

Inconsistent preemption delay settings

C.  

Packet loss on an interface of the backup device

D.  

Flapping on the link transmitting VRRP Advertisement packets

Discussion 0
Questions 70

On the campus network shown, IPv6 is deployed for service tests. Four routers are deployed on the network, and these routers use OSPFv3 for network connectivity. Which of the following statements about LSAs generated by the OSPFv3 network is incorrect?

Options:

A.  

R1 generates Router-LSAs describing interface information and receives Router-LSAs generated by R2 and R3.

B.  

R1 receives two Link-LSAs generated by R2. The two Link-LSAs describe information about the two links connected to R2.

C.  

The LSDB of R1 contains Network-LSAs generated by R3, indicating that R3 may be the DR on the local link.

D.  

R2 functions as an area border router (ABR), generates Inter-Area-Prefix-LSAs that describe the IPv6 address prefix of area 1, and advertises these Inter-Area-Prefix-LSAs to R1 and R3.

Discussion 0
Questions 71

When a client invokes the iMaster NCE-Campus RESTful API, it sends an HTTP request. The server then returns the status code 401. Which of the following errors has occurred?

Options:

A.  

Unauthorized

B.  

The requested resource does not exist

C.  

Access denied

D.  

The service is unavailable

Discussion 0
Questions 72

When MPLS/BGP IP VPN is deployed, which of the following statements is incorrect about BGP route exchange between PEs and CEs?

Options:

A.  

When PEs and CEs use BGP to exchange routing information, you do not need to import private network routes to BGP on PEs.

B.  

In a Hub&Spoke scenario, when Hub-CE and Hub-PE run an IGP for communication, EBGP cannot be configured on Spoke-PE or Spoke-CE.

C.  

In a scenario where PEs and CEs use BGP to exchange routing information, if two VPN sites have the same private AS number, the AS number replacement function can be used to replace the AS number in a received private network route with any specified AS number. This prevents routes from being discarded because of repeated AS numbers.

D.  

In a CE multi-homing scenario, the BGP AS number replacement function may cause routing loops. BGP SoO can be used to prevent routing loops at a VPN site.

Discussion 0
Questions 73

In the LDP session establishment process, the initiator sends an Initialization message for parameter negotiation. Which message will be sent by the responder if it does not accept negotiation parameters?

Options:

A.  

Error Notification Message

B.  

Initialization Message

C.  

Keepalive Message

D.  

Hello Message

Discussion 0
Questions 74

In thesmall and midsize campus network designbased on theHuawei CloudCampus Solution, when over100 branchesneed to communicate with each other, which of the following interconnection networking models is recommended?

Options:

A.  

Direct networking

B.  

Full-mesh networking

C.  

Hub-spoke networking

D.  

Partial-mesh networking

Discussion 0
Questions 75

BGP EVPN can be used as the VXLAN control plane protocol to completely prevent traffic flooding, such as broadcast ARP packets, on the VXLAN network.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 76

Complete the basic processing procedure for DiffServ model-based QoSshown in the figure

Options:

Discussion 0
Questions 77

An SRv6 Policy can be either statically configured on a device, or be delivered to a device after being dynamically generated by the controller.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 78

Refer to the following command output on the router R1. Which of the following statements isincorrect?

display interface Tunnel

Tunnel0/0/0 current state : UP

Line protocol current state : UP

Last line protocol up time : 15:21:23 UTC-08:00

Description: ! 0.0.3.3

Route Port, The Maximum Transmit Unit is 1500

Internet Address is 20.1.1.1/24

Encapsulation is TUNNEL, loopback not set

Tunnel source 10.0.1.1 (LoopBack0), destination 10.0.3.3

Tunnel protocol/transport GRE/IP, key disabled

keepalive disabled

Checksumming of packets disabled

Current system time: 15:21:37-08:00

300 seconds input rate 0 bits/sec, 0 packets/sec

300 seconds output rate 0 bits/sec, 0 packets/sec

13 seconds input rate 0 bits/sec, 0 packets/sec

13 seconds output rate 448 bits/sec, 0 packets/sec

9 packets output, 824 bytes

0 output error

Input bandwidth utilization : -

Output bandwidth utilization : -

Options:

A.  

Key authentication is disabled for the tunnel.

B.  

The destination IP address of the tunnel is 10.0.3.3.

C.  

The tunnel is a GRE tunnel.

D.  

Keepalive detection is enabled on the tunnel.

Discussion 0
Questions 79

When configuring a static VXLAN tunnel, you need to manually configure the _____, VTEP IP address, and ingress replication list. (Enter only uppercase letters.)

Options:

Discussion 0
Questions 80

In an MPLS domain, LSRs can be classified into ingress, transit, and egress LSRs based on how they process data. For the same FEC, an LSR can be both an ingress and a transit LSR of the FEC.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 81

Which of the following types of EVPN routes does not carry MPLS labels?

Options:

A.  

Ethernet A-D route

B.  

MAC/IP advertisement route

C.  

Ethernet segment route

D.  

Inclusive multicast route

Discussion 0
Questions 82

Huawei Open Programmability System (OPS) uses standard HTTP methods to access managed objects to manage network devices. Which of the following HTTP methods is used to configure the value of a network device's managed object?

Options:

A.  

PUT

B.  

POST

C.  

PATCH

D.  

GET

Discussion 0
Questions 83

An SRLB is a set of user-specified local labels reserved for SR-MPLS. These labels are locally configured and have only local significance. Therefore, they are not advertised through the IGP.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 84

Which of the following inter-AS MPLS L3VPN solutions does not require MPLS to run between ASBRs?

Options:

A.  

Option C

B.  

Option D

C.  

Option A

D.  

Option B

Discussion 0
Questions 85

Which of the following are carried in an HTTP/1.1 response?

Options:

A.  

Status line

B.  

Response body

C.  

Response header

D.  

Empty line

Discussion 0
Questions 86

A network administrator runs the display telemetry destination command on a device to check information about a destination group that sampled data is sent to. The command output is as follows. Which of the following statements is incorrect?

[~CE-telemetry-sensor-group-Sensor1]display telemetry destination

Dest-name Dest-addr Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20000 RESOLVED - GRPC

Options:

A.  

The IP address of the destination group is 192.168.56.1

B.  

The destination group name is Dest1.

C.  

VPN encapsulation is used for data push.

D.  

The gRPC protocol is used for data push.

Discussion 0
Questions 87

As shown in the following figure, an engineer tests network interconnection between two branches. To implement network interconnection,OSPFis deployed onR1, R2, and R3of branch 1, andIS-ISis deployed onR2, R3, and R4of branch 2. Which of the following operations needs to be performed to allowR1 to access R4's loopback interface address?

Options:

A.  

Run the default-route-advertise command in both the OSPF and IS-IS views on R2.

B.  

No configuration is required.

C.  

Run the default-route-advertise commandonly in the OSPF viewon R2.

D.  

Run the default-route-advertise commandonly in the IS-IS viewon R2.

Discussion 0
Questions 88

A network administrator needs to retrieve atoken IDfromiMaster NCEusing the following Python code:

import requests

nbi_name = "demol3@north.com"

nbi_pwd = "qqcOVcVel@"

host = "139.9.213.72"

port = "18002"

URI = "/controller/v2/tokens"

post_token_url = "https:// " + host + ":" + port + URI

headers_post = {'Content-Type': 'application/json', 'Accept': 'application/json'}

r = requests.post(post_token_url, headers=headers_post, json={"userName": nbi_name, "password": nbi_pwd}, verify=incorrect)

Which of the following statements is incorrect?

Options:

A.  

You can run print(r.json()) to display the response message sent from the server.

B.  

Token resources are located at https://139.9.213.72:18002/controller/v2/tokens.

C.  

The HTTP request uses the GET method to query the token value.

D.  

The request body is inJSON format.

Discussion 0
Questions 89

Which of the following number sequences can be matched by the regular expression 100.s?

Options:

A.  

100

B.  

10000

C.  

1000

D.  

1001

Discussion 0
Questions 90

Which of the following operations is not involved in the middle phase of a migration?

Options:

A.  

Migration preparation

B.  

On-site monitoring

C.  

Migration implementation

D.  

Service test

Discussion 0
Questions 91

An engineer needs todownload the configuration file vrpcfg.cfgto a local device throughSFTP, rename the configuration file to backup.cfg, and upload it to thedefault directory of the device.

The configuration file is located at /vrpcfg.cfg (default directory of the remote device), and the local directory is C:\.

Which of the followingPython Paramikocode lines can implement the required operations?

Options:

A.  

sftp.get('/vrpcfg.cfg', r'C:\')sftp.put(r'C:\backup.cfg', '/')

B.  

sftp.get('/vrpcfg.cfg', r'C:\backup.cfg')sftp.put(r'C:\backup.cfg', '/')

C.  

sftp.get('/vrpcfg.cfg', r'C:\vrpcfg.cfg')sftp.put('/backup.cfg', r'C:\vrpcfg.cfg')

D.  

sftp.get('/vrpcfg.cfg', r'C:\backup.cfg')sftp.put(r'C:\backup.cfg', '/backup.cfg')

Discussion 0
Questions 92

During the evolution from OSPFv2 to OSPFv3, LSA formats and functions remain unchanged, except that the network layer addresses in LSAs are changed from IPv4 to IPv6.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 93

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, run the command on the VTEP to view BGP EVPN routes. The route entries shown in the following figure are displayed. Which of the following statements about these routing entries are correct?

Network (EthTagId/IP Prefix/IP PrefixLen)

NextHop

*>i 0:172.16.2.0:24 1.1.1.2

*>i 0:172.16.13.0:24 1.1.1.2

*>i 0:192.168.122.0:30 1.1.1.2

Options:

A.  

These routes are Type 5 routes and carry network segment or mask information.

B.  

These routes are Type 2 routes and carry host IP addresses.

C.  

These routes carry the L2VNI.

D.  

These routes carry the L3VNI.

Discussion 0
Questions 94

Which of the following protocols is used in the Huawei SD-WAN Solution to report device performance data?

Options:

A.  

NetFlow

B.  

SNMP

C.  

BGP

D.  

HTTP/2

Discussion 0
Questions 95

At the NETCONF content layer, the operation may contain an operation attribute, which is used to specify an operation type for configuration data. Which of the following operation attributes are supported?

Options:

A.  

create: The configuration data identified by the element that contains this attribute is added to the configuration datastore only if the configuration data does not already exist in the configuration datastore. If it already exists in the configuration datastore, with the value being data-exists is returned.

B.  

delete: The configuration data identified by the element that contains this attribute is deleted from the configuration datastore. If the configuration data does not exist in the configuration datastore, a deletion success message is returned.

C.  

merge: The configuration data identified by the element that contains this attribute is modified if the configuration data already exists in the configuration datastore. If not, the configuration data is created in the datastore.

D.  

remove: The configuration data identified by the element that contains this attribute is deleted from the configuration datastore. If the configuration data does not exist in the configuration datastore, a deletion success message is returned.

Discussion 0
Questions 96

Which of the following statements is incorrect about access control on small and midsize campus networks based on the Huawei CloudCampus solution?

Options:

A.  

iMaster NCE can function as an authentication server.

B.  

Cloud APs support local Portal authentication.

C.  

iMaster NCE can function as a Portal relay device.

D.  

iMaster NCE can interconnect with a third-party RADIUS server.

Discussion 0