Huawei H12-891-V1-0 Exam Questions

Questions for the H12-891-V1-0 were updated on : Dec 14 ,2024

Page 1 out of 41. Viewing questions 1-15 out of 610

Question 1

What are the following advanced features supported by BGP EVPN?

  • A. ARP broadcast suppression
  • B. VRRP overVXLAN
  • C. Multi-active gateway
  • D. WI-AN Qos
Answer:

ABCD

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Is the following correct statement for the VXLAN message?

  • A. The outer destination IP address is the IP address of the VTEP at the far end of the VXLAN tunnel
  • B. The source UDP port number is 4789
  • C. The destination UDP port number is 4789
  • D. VNI has 24 T bits to distinguish the VIAN segment
Answer:

ACD

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

To achieve an on-machine migration in the BGP EVPN distributed gateway scenario, which of the
following messages is required?

  • A. Type5
  • B. Type4
  • C. Typel
  • D. Type2
  • E. Type3
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 4

The means of the LAND attack is that the attacker sends an SVN packet message with the same
source and destination addresses to the target host, the source port and the destination port are the
same, and the receiver waits for the final ACK packet to be sent , the connection is always in a semi-
connected state, resulting in a full limited TCP reception Waste of resources

  • A. True
  • B. False
Answer:

A

User Votes:
A
50%
B
50%

Discussions
vote your answer:
A
B
0 / 1000

Question 5

The following statement about the Security Alliance SA in IPSec is wrong with ?

  • A. SA is uniquely identified by a triple that includes the Security Parameter Inder ,Security Parameter Inder), the source IP address, and the Security Protocol Number (ASESP) used
  • B. Use the display ipsec command to view information such as the encryption method used with another IPSEC peer, the traffic of interest, and so on.
  • C. IPSec only supports encrypting data using the pair encryption algorithm.
  • D. IpSec peers must be at a two-way SA to establish an IPSec VPN connection to close
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

If there are multiple recipients in a multicast group, the administrator enables the IGMP-Snooping
function on the switch connecting the recipient, and when the receiver receives the universal group
query packet of the queryer from the switch, how should multiple recipients respond?

  • A. The first recipient whose response time time expires sends the Report message, the other receivers do not.
  • B. All recipients will respond to Report messages only if ICMPV2 is running.
  • C. All recipients will respond to the Report message only if IGMPvl is running.
  • D. All recipients will respond to the Report message
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

If you run PIM-SM in a multicast network, you need to build a multicast forwarding tree between the
multicast source and the receiver to enable the receiver to receive the multicast effect, so what are
the following options for the correct tree sketch for the build?

  • A. What is built between the multicast source and the RP is the SPT tree
  • B. RP and the receiver is built between the RPT tree
  • C. Built between the RPT tree
  • D. RP and the swap is the SPT tree
Answer:

AB

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Is the following description of the BSR/RP mechanism correct?

  • A. PIM-SM domain can have more than one C-BSR, but only one BSR can be elected by the C-BSR that receives the C-RP Packets are collected C-one RP information
  • B. BSR advertises BSR and C-RP information to all routers in the PIM-SM domain by flooding Bootstrap packets
  • C. A C-BSR can also collect C-RP information by receiving C-RP packets
Answer:

ABC

User Votes:
A
50%
B
50%
C
50%

Discussions
vote your answer:
A
B
C
0 / 1000

Question 9

What is the following description of LDP reliability?

  • A. LGP GR (Graceful Restart) takes advantage of the high difference between the LS forwarding plane and the control plane to realize that the device forwards without interruption when the protocol is restarted or the master-standby is reversed
  • B. Manually configured LDP FRR policy defaults to a 32-bit backup route that triggers LDP to establish a backup ISP
  • C. The LDP ERR can also generate an ISP for a tag map from a non-optimal next hop, and create a forwarding table entry as a backup of the primary LSP
  • D. LDP and LGP linkage, the need for IGP to suppress the release of routes, to ensure that LDP and LGP paths are consistent
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

RD is used to distinguish the same IP address in different VPNs, how many bits does RD contain ?
(Single choice)

  • A. 64
  • B. 32
  • C. 16
  • D. 128
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Regarding the mpLS handling mode of TTL, is the following description correct?

  • A. Pipe mode. When an IP message passes through the MPLS network, the IPTTL minus 1 is mapped to the WLSTTL field at the incoming node.
  • B. The TTL in the B. MPLS label has the same meaning as the TTL field in the head. TTL prevents mpLS networks from developing bad routing.
  • C. Unifore style, when an IP packet passes through the MPLS network, the IPTTL of the incoming node is minus l. The MPLS TTL field is a fixed value.
  • D. In MPLSVPI, if you need to hide the structure of the MPLS backbone network, you can use Uniform mode on Ingress for private network messages .
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

In an MPLS VPN network, different CE devices exchange routing information with the same PE
device using different routing protocols, and different CE devices use routing protocols that are
independent of each other
A.
True
B. False

Answer:

A

User Votes:

Discussions
vote your answer:
0 / 1000

Question 13

Which of the following options uses an alternate channel to enable communication between IPV6
addresses?

  • A. DualStack
  • B. 6to4
  • C. ISATAP
  • D. NAT64
Answer:

BC

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

If a router only needs to forward iPv6 packets, you do not need to configure any IPV4 agreements
and addresses on that router.

  • A. True
  • B. False
Answer:

A

User Votes:
A
50%
B
50%

Discussions
vote your answer:
A
B
0 / 1000

Question 15

BGP4+ is running between two routers, and the neighbor relationship is normal, but the BGP routing
table of the router on this side does not have a neighbor route entry.

  • A. The route entry in the peer BGP route table is non-optimal.
  • B. The next hop address of the
  • C. BGP route entry is unreachable
  • D. Peer ignore is configured on the peer
  • E. The peer is configured with active-route-advertise
Answer:

ABD

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Discussions
vote your answer:
A
B
C
D
E
0 / 1000
To page 2