Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

H12-224 Questions and Answers

Note! Following H12-224 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H12-224 Questions and Answers

Question # 6

Which are the new requirements on the enterprise network stimulated by the mobility trend

A.

Unfiled wired and wireless management

B.

Consistent service experience anytime. anywhere

C.

Fast deployment of mobile applications

D.

Strict hierarchical networking

Full Access
Question # 7

on the USC series firewall, which zone can be deleted by the administrator

A.

Security zone

B.

Trusted zone

C.

Untrusted zone

D.

DMZ

Full Access
Question # 8

VPN models are classified into two types overlay vpn and peer-to-peer vpn iliw —

A.

TRUE

B.

FALSE

Full Access
Question # 9

The SDN controller can intelligently adjust traffic paths based on the network status,

so that can improve the entire network throughput.

A.

TRUE

B.

FALSE

Full Access
Question # 10

In the act configuration command ad (number) ad-number (match-order{auto|config}], the ad-number parameter specifies an

A.

1000-3999

B.

2000-2999

C.

3000-3999 0-1000

Full Access
Question # 11

If there are no receivers on a PIM-SM network, which of the following routers will have multicast routing entries?

A.

Source DR

B.

Receiver s router

C.

Last-hop router

D.

RP router

Full Access
Question # 12

Which of the following formulas is used to calculate availability?

A.

MTBF/MTTR*100%

B.

MTTR/MTBF*100%

C.

(MTBF+MTTR)/MTBF*100%

D.

MTBF/(MTBF+MTTR)*100%

Full Access
Question # 13

Which of the following statements regarding multicast protocols is false?

A.

K3MP runs between receiver hosts and multicast routers and defines the mechanism

for creating and maintaining group member

B.

Distance Vector Multicast Routing Protocol (DVMRP) is a dense mode protocol it defines a route hop cunt limit of 32

C.

EM is a typical intra-domain multicast routing protocol and can operate in the dense mode(DM)or sparse mode(AM)

D.

MSDP can spread multicast routes across ASs

Full Access
Question # 14

For inter zone packet filtering, which traffic is belong to transmitted to outbound direction?

A.

Trusted zone — Untrusted zone

B.

Untrusted zone --Trusted zone

C.

Untrusted zone --DMZ

D.

Trusted zone — Local zone

Full Access
Question # 15

DHCP snooping is a security feature that can be used to defend against carious attacks, including

A.

Starvation attacks by changing the CHADDR field value

B.

Bogus DHCP server attacks

C.

TCP flag attacks J

D.

Man-in-the-middle attacks and IP/MAC spoofing attacks

Full Access
Question # 16

Which of the following are migration difficulties?

A.

Minimizing on services

B.

Achieving optimal risk prevention

C.

Formulating a complete migration solution

D.

Carrying out the migration smoothly

Full Access
Question # 17

Which of the following statements regarding isolation is false?

A.

Port isolation controls access between interfaces of switches

B.

Port isolation prevents the computers connects to differ faces from accessing each other

C.

Port isolation can be configured based on VLANs

D.

Port isolation is an isolation mechanism at the physical layer

Full Access
Question # 18

which of the following statements regarding the OSPF protocol is false?

A.

An ABR is connected to multiple areas and maintains the same LSDB for all areas.

B.

The metric of an AS-external-LSA can be specified during the import of external mutes

and defaults to 1.

C.

External muting information can carry a tag, the tag information is contained in a Type 5

or Type 7 LSA.

D.

The Link State ID. in an ASBR-Summary-LSA is ser as the muter ID. of this ASBR.

Full Access
Question # 19

NFV and SDN depend on each other and must be used together

A.

TRUE

B.

FALSE

Full Access
Question # 20

Which of the following causes will lead a failure to establish BGP peer relationships?

A.

An ACL is configured to prohibit all TCP connections between two BGP neighbor

B.

Two IBGP peers are not physically directly connected

C.

BGP synchronization is enabled on fully-meshed IBGP peers

D.

Two BGP peers are configured with different routing Update intervals

Full Access
Question # 21

Which of the following statements regarding buffer overflow attacks is false?

A.

the buffer overflow attack indicates that an attacker uses defects of memory operations of the software system and runs attack codes with high operation rights.

B.

the buffer overflow attack is irrelevant to the OS vulnerabilities and architecture.

C.

the buffer overflow attack is the most common attack of the software system.

D.

the buffer overflow attack is an application-layer attack.

Full Access
Question # 22

Which of the following statements regarding huawei network optimization service is false?

A.

Life cycle assessment ( LAC ) is a technique to check and analyze life cycles of devices on the live network. With lea, end of sales, production, software update, or technical support, preventing life cycle-caused operation risks.

B.

Software assessment & recommendation is a technique to assess and analyze all software used by party a in the service period. Base proper software version to prevent issues caused by know issues.

C.

Configuration assessment & optimization is a Technique to develop and periodical! maintain device configuration profiles on customer recommendation result, this service applies related software to command lines in the recommended target version, implementing refined configure

D.

Network health check enables huawei technology experts to review the

Rationality security and scalability of the network architecture based on improvement suggestions based on the assessment result.

Full Access
Question # 23

Which of the following are possible causes for an MSTP failure in a LAN?

A.

MSTP is configured incorrectly

B.

A physical link alternates between up and Down triggering the device to send a large number of TC packets

C.

The MSTP-enabled device receives MSTP TC packets that are transparently sent or from the client

D.

The priority of the port in the specified MSTL is not configured

Full Access
Question # 24

During configuration of the WRB3 drop profile, the lower drop threshold and upper drop threshold for AF21 traffic are 35 and 90, the lower drop threshold and upper drop threshold for. and the lower drop threshold and upper drop threshold for AF23 traffic are 25 and 90. The maximum drop probability for AF21, AF22, and AF23 traffic is 10%. Before congestion occurs, which type of traffic can obtain bandwidth guarantee?

A.

AF21

B.

AF22

C.

AF23

D.

AF21 AF22 and AF23 traffic

Full Access
Question # 25

Which of the following values can be used to set security levels of user-defined zones of USG series firewalls?

A.

150

B.

100

C.

80

D.

40

Full Access
Question # 26

Which of the following BGP routing policy tools can filter routes?

A.

ip extcommunity-filter

B.

route-policy

C.

filter-policy

D.

peer-list

Full Access
Question # 27

Which are lower-layer physical devices of NFV framework?

A.

Storage device

B.

Network device

C.

Server

D.

Air conditioning system

Full Access
Question # 28

On the DiffServ network, what is the main purpose of defining the service type of the EF classification?

A.

Preferentially guarantee the services that require short delay low packet loss low jitter

and assured bandwidth

B.

Provide channels for packet forwarding

C.

Ensure bandwidth for specific traffic

D.

Ensure that packets are forwarded with the minimum delay

Full Access
Question # 29

Which of the following statements regarding MUX VLAN is true?

A.

You do not need to configure the principal VLAN and subordinate VLAN in sequence

B.

The MUX VLAN function must be enabled on an interface so that it can take effect

C.

The principal VLAN and the subordinate VLAN of the MUX VLAN can be the same

VLAN

D.

The MUX VLAN can contain only one subordinate group VLAN

Full Access
Question # 30

Which of the following commands can display OSPF neighbor status information?

A.

Display ospf peer

B.

Display ip ospf peer

C.

Display ospf neighbor

D.

Display ip ospf neighbor

Full Access
Question # 31

Which of the following statements regarding BGp route reliability is true?

A.

BGP routes do not need to be periodically updated.

B.

BGP sends complete routing table information during each router update.

C.

BGP periodically sends Open messages to detect TCP connectivity.

D.

BGP updates routes in multicast mode.

Full Access
Question # 32

In a route-policy, which of the following BGP attributes can be used in apply clauses?

A.

local-Preference

B.

Tag

C.

MED

D.

AS. Path

Full Access
Question # 33

When BGP path load balancing is not enabled, which type of BGP routes will be sent to BGP peers?

A.

All BGP routes learned from all BGP peer

B.

Routes learned only from an IBGP peer

C.

Routes learned only from an EBGP peer

D.

Optimal route preferred by BGP

Full Access
Question # 34

What is the broadcast domain of VXLAN called?

A.

Broadcast domain

B.

Switching domain

C.

Bridge domain

D.

VLAN domain

Full Access
Question # 35

What features must a risky operation solution have?

A.

Accuracy

B.

Good portability

C.

Verification

D.

Rollback

Full Access
Question # 36

AR series routers provide various slots, which of the following is not included?

A.

SIC

B.

SWIC

C.

HSIC

D.

XSIC

Full Access
Question # 37

What happens when the topology of a network running RSTP changes?

A.

Packets are flooded on the entire network

B.

The aging time of MAC address entries is changed.

C.

Some MAC address entries are deleted.

D.

The entire MAC address table is deleted.

Full Access
Question # 38

On a network running RSTP, some devices use STP. When SRTP-enabled switches detect a topology change, which method is used by the RSTP-enabled switches.

A.

RSTP BPDUs with the TC are used

B.

STP BPDUs with the TC are used

C.

RSTP BPDUs with the TCA are used

D.

STP BPDUs with the TCA are used

Full Access
Question # 39

Which of the following operation is performed in the risky operation process?

A.

Solution formulation

B.

Authorization obtaining

C.

Technical review

D.

Implementation and result feedback

Full Access
Question # 40

During MSTP troubleshooting, the display current-configuration command is executed

to obtain the configuration file of the device, which of the following statements is false?

A.

Check the port configuration to verify that the MSTP-enabled port is configured (for example using the bpdu enable command) to

B.

The port connected to a user device has MSTP disabled or is configured as the edge port

C.

The BPDU tunnel configuration has no impact on MSTP

D.

Check whether the interface is added to the correct VLAN

Full Access
Question # 41

To improve stp running stability a network administrator wants to configure some stp features or protection mechanism on switches. Which of the following configuration roadmaps is correct?

A.

Configure the user access port as an edge to prevent the user from connecting to the switch on this port.

B.

Configure root protection on the user access port to ensure that the user does not connect to a switch with a higher priority

C.

Configure loop protection on positions where loops have occurred so that loops are always blocked

D.

Configure BPDU protection so that the switch checks the validity of each received

BPDU to prevent attacks of forged

Full Access
Question # 42

What are differences between the DiffServ and IntServ models?

A.

The DiffServ model provides different services destined for different destinations.

B.

The DiffServ model provides different services destined for different sources.

C.

The DiffServ model does not need to maintain the status of each flow.

D.

The DiffServ model applies to large-scale backbone network.

Full Access
Question # 43

Which of the following procedures are included in IS-IS route calculation?

A.

Neighbor relationship establishment

B.

Route calculation

C.

Link information exchange

D.

Router advertisement

Full Access
Question # 44

BFD is a universal fast detection technology that can implement fast switchover, so BFD does not need to be used with other fast switching technologies.

A.

TRUE

B.

FALSE

Full Access
Question # 45

Which of the following statements regarding the operation window time for a software upgrade is false?

A.

it is determined by the accepted service interruption duration.

B.

It must be longer than the upgrade execution time

C.

Troubleshooting time must be reserved.

D.

Only network maintenance personnel need to notified of the operation window time while the customer does not

Full Access
Question # 46

In the port mirroring, real and reliable data must be collected in real time.

A.

TRUE

B.

FALSE

Full Access
Question # 47

Which of the following statements regarding selection of active links in LACP mode are false?

A.

In static LACP mode after joining the Eth-Trunk the member interfaces send the system priority. System priority system MAC address

B.

A larger LACP system priority indicates a higher priority. The end with a larger LACP system priority functions as the Active MAC address functions as the active side

C.

The passive side determines active interfaces based on the LACP priority and ID. (interface number ) of an interface on

D.

Data can be forward and normally even both devices select different interfaces.

Full Access
Question # 48

Which of the following statements regarding the static LACP mode are false?

A.

If a high bandwidth of the link between two directly connected devices is required but the remote does not support LACP you

B.

In static LACP mode a larger LACP priority of an interface indicates a higher priority of

the interface and a high probability of become

C.

The interface that forwards data is called the active interface that does not forward data

is called the inactive interface fails.

D.

When preemption is enabled and an active interface fails , the backup interface with a larger priority becomes the active interface after become the active interface.

Full Access
Question # 49

The master/salve relationship of ospf neighbors is negotiated using DD. packets

A.

TRUE

B.

FALSE

Full Access
Question # 50

IGMP not only supports IGMP General query and IGMPv2 group-specific query and also IGMPv3 source/group-specific query

A.

TRUE

B.

FALSE

Full Access
Question # 51

The essence of SDN is to construct a brain for a network and achieve optimal global traffic through the global view and centralized control

A.

TRUE

B.

FALSE

Full Access
Question # 52

In DU label advertisement mode if the liberal label retention modes is used the device reserves labels received from all the LDP peers regardless of whether the LDP destination network.

A.

TRUE

B.

FALSE

Full Access
Question # 53

MPLS uses LDP to provide different label distribution modes. Which of the following statements regarding LDP label distribution control modes are false?

A.

LDP label distribution can be controlled in ordered mode

B.

ln ordered mode when an LSR is the origin of a route it can send label mapping messages to the upstream router in

C.

LDP label distribution cannot be controlled in independent mode

D.

ln independent mode an LSR cannot send label mapping messages to the upstream router before it receives label m

Full Access
Question # 54

When bgp route load balancing is configured and there are two load balancing routes whose first eight bgp attributes described in bgp route the two routes prefix be advertised to neighbors?

A.

The two routes will be both advertised to other BGP peers

B.

One optimal route is selected from the two routes and then advertised to other BGP peers

C.

The two routes will not be advertised to other BGP peers

D.

One optimal route is selected from the two routes and then advertised to IBGP peers

Full Access
Question # 55

which drop policy is not induced by congestion avoidance?

A.

FIFO

B.

RED

C.

WRED

D.

WFQ

Full Access
Question # 56

Which of the following protocols can be deployed to quickly detect network link faults?

A.

BFD

B.

RSTP

C.

iSPF

D.

Smart-Link

Full Access
Question # 57

What is the multicast destination address of VRRP packets?

A.

224.0.0.18

B.

224.0.0.20

C.

224.0.1.18

D.

224.0.1.20

Full Access
Question # 58

In network define a redundant network topology can be used to precuide higher reliability for customer services which of the following topologies can be used to provide redundancy

A.

Star topology

B.

Ring topology

C.

Bus topology

D.

Dual-star topology

Full Access