Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

H12-223 Questions and Answers

Note! Following H12-223 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H12-223 Questions and Answers

Question # 6

Which of the following protocols can be deployed to quickly detect network link faults?

A.

BFD

B.

RSTP

C.

iSPF

D.

Smart-Link

Full Access
Question # 7

Which of the following troubleshooting methods is not based on the TCP/IP reference model?

A.

Configuration comparison

B.

Top-down

C.

Bottom-up

D.

Replacement

Full Access
Question # 8

If a neighbor has not advertised a route, the neighbor may have not put description information about the route to the local OSPF LSDB.

A.

TRUE

B.

FALSE

Full Access
Question # 9

Which of the following statements regarding network maintenance are true? (Multiple Choice)

A.

Routine maintenance belongs to the routine work plan.

B.

Routine maintenance belongs to the Improve phase of Plan, Design, Implement, Operate, Improve (PDIOI).

C.

Routine maintenance is driven by events.

D.

Handling of some issues in troubleshooting can be incorporated into routine maintenance.

Full Access
Question # 10

If you can ping the peer host successfully, which of the following methods is the most appropriate for subsequent troubleshooting?

A.

Configuration comparison

B.

Bottom-up

C.

Service traffic path check

D.

Top-down

Full Access
Question # 11

In the fault determining and analysis phase of the structured network troubleshooting process, summarizing the fault, maintenance, and change information can obtain a network fault cause list.

A.

TRUE

B.

FALSE

Full Access
Question # 12

Which of the following operations should be performed preferentially for Telnet login failure troubleshooting?

A.

Check whether the client can ping the server.

B.

Check whether the number of login users reaches the upper limit.

C.

Check whether an ACL is configured in the VTY user interface view.

D.

Check whether the access protocol is correctly configured in the VTY user interface view.

Full Access
Question # 13

After the project delivery, the O&M expenses are continuously generated. Which of the following items are the expenses generated during the O&M? (Multiple Choice)

A.

Energy expenses

B.

Line construction expenses

C.

Line lease expenses

D.

Equipment depreciation expenses

E.

Staff expenses

Full Access
Question # 14

Which of the following aspects should be considered during preliminary analysis of a migration project?

(Multiple Choice)

A.

Necessity

B.

Feasibility

C.

Risks

D.

Costs

Full Access
Question # 15

Which of the following statements regarding IP address allocation are true? (Multiple Choice)

A.

All IP addresses on a network must be unique except when anycast is used.

B.

IPv4 addresses are classified into Classes A, B, and C.

C.

The mask length of /24 can simplify network design.

D.

Variable length subnet mask (VLSM) is often used for determining mask lengths to improve IP address efficiency.

Full Access
Question # 16

Which of the following information can be learned based on the industry background of the project?

A.

Common solutions in the industry

B.

Problems to be resolved by the project

C.

Organizational structure of customers

D.

Implementation scope of the project

Full Access
Question # 17

Which of the following statements regarding Huawei network optimization service (NOS) is false?

A.

Life cycle assessment (LCA) is a technique to check and analyze the software and hardware life cycles of devices on the live network. With LCA, specific measures are taken for products that will reach the end of sales, production, software update, or technical support, preventing life cycle-caused operation risks.

B.

Software assessment & recommendation is a technique to assess and analyze all software platforms used by Party A in the service period. Based on the assessment result, this service can recommend a proper software version to prevent issues caused by known issues.

C.

Configuration assessment & optimization is a technique to develop and periodically maintain device configuration profiles based on customer requirements. Based on the periodic software assessment & recommendation result, this service applies related software features to command lines in the recommended target version, implementing refined configuration management.

D.

Network health check enables Huawei technology experts to review the rationality, security, and scalability of the network architecture based on industry-leading optimal experience, and to provide improvement suggestions based on the assessment result.

Full Access
Question # 18

Which of the following work is not performed in network optimization?

A.

Hardware optimization

B.

Software optimization

C.

Network expansion

D.

Air conditioner replacement in the equipment room

Full Access
Question # 19

Which of the following is the purpose of access security optimization?

A.

To ensure that sensitive management information will not be intercepted.

B.

To prevent or reduce external network attacks and harm.

C.

To ensure secure access to key services.

D.

To achieve secure user access control.

Full Access
Question # 20

Which of the following networks are involved during construction of a large enterprise network? (Multiple Choice)

A.

Backbone network

B.

Transport network

C.

Data center network

D.

Wireless network

E.

Storage network

Full Access
Question # 21

Which of the following statements is not included in network security optimization?

A.

Management security

B.

Border security

C.

Access control

D.

Log management

Full Access
Question # 22

When the DHCP relay function is configured on a device, VLANIF interfaces connected to DHCP clients must be bound to a DHCP server group containing the IP address of the DHCP server.

A.

TRUE

B.

FALSE

Full Access
Question # 23

Which of the following operations are performed during migration acceptance? (Multiple Choice)

A.

Documentation transfer

B.

Transfer-to-maintenance training

C.

Acceptance meeting

D.

Business expense accounting

Full Access
Question # 24

Which of the following statements regarding the operation window time for a software upgrade is false?

A.

It is determined by the accepted service interruption duration.

B.

It must be longer than the upgrade execution time.

C.

Troubleshooting time must be reserved.

D.

Only network maintenance personnel need to be notified of the operation window time, while the customer does not.

Full Access