Download Huawei.H12-891.PremiumDumps.2024-02-26.365q.vcex

Download Exam

File Info

Exam HCIE-Datacom V1-0
Number H12-891
File Name Huawei.H12-891.PremiumDumps.2024-02-26.365q.vcex
Size 4 MB
Posted Feb 26, 2024
Download Huawei.H12-891.PremiumDumps.2024-02-26.365q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

The means of the LAND attack is that the attacker sends an SVN packet message with the same source and destination addresses to the target host, the source port and the destination port are the same, and the receiver waits for the final ACK packet to be sent , the connection is always in a semi-connected state, resulting in a full limited TCP reception Waste of resources


  1. True 
  2. False
Correct answer: A



Question 2

The following statement about the Security Alliance SA in IPSec is wrong with ?


  1. SA is uniquely identified by a triple that includes the Security Parameter Inder ,Security Parameter Inder), the source IP address, and the Security Protocol Number (ASESP) used
  2. Use the display ipsec command to view information such as the encryption method used with another IPSEC peer, the traffic of interest, and so on.
  3. IPSec only supports encrypting data using the pair encryption algorithm.
  4. IpSec peers must be at a two-way SA to establish an IPSec VPN connection to close
Correct answer: A



Question 3

If there are multiple recipients in a multicast group, the administrator enables the IGMP-Snooping function on the switch connecting the recipient, and when the receiver receives the universal group query packet of the queryer from the switch, how should multiple recipients respond?


  1. The first recipient whose response time time expires sends the Report message, the other receivers do not.
  2. All recipients will respond to Report messages only if ICMPV2 is running.
  3. All recipients will respond to the Report message only if IGMPvl is running.
  4. All recipients will respond to the Report message
Correct answer: D



Question 4

Is the following description of the BSR/RP mechanism correct? 


  1. PIM-SM domain can have more than one C-BSR, but only one BSR can be elected by the C-BSR that receives the C-RP Packets are collected C-one RP information
  2. BSR advertises BSR and C-RP information to all routers in the PIM-SM domain by flooding Bootstrap packets
  3. A C-BSR can also collect C-RP information by receiving C-RP packets
Correct answer: ABC



Question 5

RD is used to distinguish the same IP address in different VPNs, how many bits does RD contain ? (Single choice)


  1. 64
  2. 32
  3. 16
  4. 128
Correct answer: A



Question 6

Regarding the mpLS handling mode of TTL, is the following description correct?


  1. Pipe mode. When an IP message passes through the MPLS network, the IPTTL minus 1 is mapped to the WLSTTL field at the incoming node.
  2. The TTL in the B. MPLS label has the same meaning as the TTL field in the head. TTL prevents mpLS networks from developing bad routing.
  3. Unifore style, when an IP packet passes through the MPLS network, the IPTTL of the incoming node is minus l. The MPLS TTL field is a fixed value.
  4. In MPLSVPI, if you need to hide the structure of the MPLS backbone network, you can use Uniform mode on Ingress for private network messages .
Correct answer: B



Question 7

In an MPLS VPN network, different CE devices exchange routing information with the same PE device using different routing protocols, and different CE devices use routing protocols that are independent of each other


  1. True
  2. False
Correct answer: A



Question 8

BGP4+ is running between two routers, and the neighbor relationship is normal, but the BGP routing table of the router on this side does not have a neighbor route entry.


  1. The route entry in the peer BGP route table is non-optimal.
  2. The next hop address of the
  3. BGP route entry is unreachable
  4. Peer ignore is configured on the peer
  5. The peer is configured with active-route-advertise
Correct answer: ABD



Question 9

A company network runs the OSPF protocol, a project in order to understand the OSPF mechanism in the network to perform packet transfer operations, the following description of ospf messages is correct?


  1. The interface sends a Hello packet immediately after joining the OSPF region
  2. LS update packet is sent only when the adjacency relationship is established
  3. When an LsUpdate packet is received, the router must send an LsAck acknowledgment
  4. LS update packet synchronizes the link state database by sending detailed LSA information
Correct answer: AD



Question 10

Regarding the Stub region in the OSPF protocol , the following statement is correct.


  1. ASBR cannot exist in the Stub zone
  2. Virtual connections cannot traverse the Stub region.
  3. Injecting typeT LSA
  4. backbone areas that are not allowed in Stub regions cannot be configured as Stub regions.
Correct answer: ABCD









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files