Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

H12-261_V3.0 Questions and Answers

Note! Following H12-261_V3.0 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H12-261_V3.0 Questions and Answers

Question # 6

Which of the following statements is false about TCP's sliding window? (Multiple Choice)

A.

The sender announces the initial window size

B.

The sender does not need to transmit the full window size of the message

C.

TCPSliding window allows multiple packets to be sent before an acknowledgment is received

D.

After the retransmission timer expires, the sender has not received the acknowledgment and will retransmit the unacknowledged data

E.

The receiver needs to confirm the data packet of the sender

F.

Sliding window size can only increase or stay the same

Full Access
Question # 7

ION NO: 41

The following G about ISISIs R's description correct?

A.

ISIS GThe R feature is enabled by default.

B.

ISIS GR has a total of four timers.

C.

ISIS GR notifies events and maintains neighbor relationships through CSNP messages.

D.

ISIS GR defines a whole new TLV structure to support this feature.

Full Access
Question # 8

What command can be used to prevent users from accessing multiple devices through the HUB on the access port of the switch? (Single Choice)

A.

[Huawei]interface GigabitEthernet 0/0/1 [Huawei-GigabitEthernet0/0/1]port link type trunk

[Huawei-GigabitEthernet0/0/1port trunk allow pass vlan 10

[Huaweijinterface GigabitEthernet 0/0/1

B.

[Huawei-GigabitEthernet0/0/1]port link type access [Huawei GigabitEthernet0/0/1]ipsg enable

. [Huawei]interface GigabitEthernet 0/0/1

C.

[Huawei-GigabitEthernet0/0l]port link-type access [Huawei-GigabitEthernet0/0/1 ]port-security enable

[Huawei]interface GigabitEthernet 0/0/1

D.

[Huawei-GigabitEthernet0/0/1 ]port link type access [Huawei-GigabitEthernet0/0/1]port isolate enable

Full Access
Question # 9

VRRPThe priority cannot be set to 0. The device that sends the VRRP priority of 0 stops participating in the VRRP backup group, and notifies the backup device to become the master device as soon as possible without waiting for the Master-Down-Interval timer to expire.

A.

True

B.

false

Full Access
Question # 10

The DHCPv6 server supports providing the host with other configuration information such as the DNS server address.

A.

TRUE

B.

FALSE

Full Access
Question # 11

By default, for a router running IS-IS in a broadcast network, how many seconds is the period for DIS to send CSNP packets?

A.

10

B.

30

C.

3.3

D.

40

Full Access
Question # 12

The association between LDP and IGP means that IGP suppresses the advertisement of reachable routes to ensure that LDP and IGP cooperate to complete network convergence, so that IGP and LDP maintain the same path, minimize traffic loss, and improve the reliability of the entire network.

A.

True

B.

false

Full Access
Question # 13

In order to enable the VPN instance to advertise IP routes to the BGP-EVPN address family, what command needs to be enabled in the BGP view

A.

advertise vpnv4

B.

to advertise irb

C.

advertise 12vpn vpn

D.

advertise irbv6

Full Access
Question # 14

When DLDP detects the existence of a unidirectional link in the fiber, the default actions of Huawei equipment include:The DLDP state machine transitions to the Disable state; outputs Trap information; automatically sets the interface to the blocked state. ( confirmed)

A.

True

B.

false

Full Access
Question # 15

VXLAN based UDP encapsulation, which encapsulates Ethernet data frames in IPin the message over UDP, so called MAC in UDP encapsulation.

A.

TRUE

B.

FALSE

Full Access
Question # 16

Which of the following descriptions about the properties of BGP is correct?

A.

The AS number of the adjacent AS, listed in the AS in the BGP routing entry_ The far right of the Path list.

B.

BGP Speaker When the route learned from the EBCP peer is advertised to the IBGP peer, the next hop attribute of the route information is not changed.

C.

Local Prefs are only valid between EBGP peers and are not advertised to third-party ASs.

D.

A route can only have one community attribute value.

Full Access
Question # 17

The data result of a router is as shown in the figure below. According to this analysis, the correct conclusion is:

A.

R3's GE0/0/0 port and its neighbor are in different areas

B.

Eth0/0/1 of the R3 router enables both IPv4 and IPv6 ISIS

C.

R3 is Level-1 and L on the link where Eth0/0/0 is located evel-2 DIS

D.

The circuit-level of Eth0/0/1 of the R3 router is Level-1-2

Full Access
Question # 18

Different from STP, RSTP BPDU typeonly one, its value 2, noTCN BPDU.

A.

TRUE

B.

FALSE

Full Access
Question # 19

If a router only needs to forward IPv6 packets, then there is no need to configure any IPv4 protocol and address on the router.

A.

True .

B.

false

Full Access
Question # 20

Which of the following statements about the BFD single-arm echo function is correct

A.

BFDThe one-arm echo function must configure the local identifier and the terminal identifier

B.

BPThe default destination IP address of the protocol packet of the D one-arm echo is 224.0.0.184

C.

BAfter the FD one-arm echo function is enabled, the destination IP and source IP of BFD packets are the same

D.

BFDThe one-arm echo function is suitable for scenarios where one device supports BD and the other device does not.

Full Access
Question # 21

Regarding route introduction, which of the following descriptions is wrong?

A.

Support impo when BGP generates routes. There are two methods, rt and Network, and the Network method is more accurate.

B.

By default, the default metric value of external routes imported by OSPF is 1, and the type of imported external routes is Type2.

C.

ISIS level-2 netAfter the work route is imported to level-1, if the import policy is not manually configured, a routing loop will be formed.

D.

Importing IBGP routes into OSPF may cause routing loops.

Full Access
Question # 22

Which scenarios can use AS-path-filter?

A.

A carried by routeSPATH attribute to filter routes received from BGP neighbors. For example the command peer xxxx as-path-fliter import

B.

Route apply clause in policy

C.

A carried by routeSPATH attribute to filter routes sent to BGP neighbors. For example the command peer xxxx as-path-ilter export

D.

if-match clause in Route-policy

Full Access
Question # 23

When the ACL in the RP has multiple matching rules (rules) , which of the following statements is true about the matching order? ( confirmed)

A.

By default, matching is performed according to the "depth first" principle.

B.

By default, match pe first rmit, then match the order of deny.

C.

By default, according to Rule-ID, matching from small to large.

D.

There is only one matching order and cannot be modified.

Full Access
Question # 24

aboutRoute Policy, the following description is correct? (multiple choice)

A.

Advanced ACL can be applied to route In policy, filter routes

B.

entry pemit :: 0 less-equal 128 means allow all IPv6 routes to pass through

C.

ifMore than one node is defined in Route-policy, and at least one of each node should have a matching mode of permit

D.

Route-Policy can filter only default routes

Full Access
Question # 25

The following is about IGMPv1 and IGMPv2description, which is correct? (multiple choice)

A.

IGMPv2Specific group queries are not supported

B.

IGMPv2Message types include member leave messages

C.

IGMPv1Support general group query

D.

IGMPv1The message type does not contain a member leave message

Full Access
Question # 26

VXLAN subnets under different VPNs need to be accessed. One of the subnets information is as follows, RT under EVPN 10:10 both, RT 1000:1000 export,

VPN lower RT 100:100. Another subnet can be configured as?

A.

VPConfigure 1000:1000 under N both evpn.

B.

EVPConfigure 1000:1000 under N both

C.

Configure 1000:100 under EVPN0 export

D.

VPConfiguration under N 10:10 both.

Full Access
Question # 27

As shown in the following topology, EBGP is run between AS100, AS200, AS300, and AS400, and the neighbor relationship has been established. When AS400 receives the BGP route of the network segment 1.1.1.1/32 sent by AS100, the correct order of the paths recorded in the AS Path attribute is: ?

A.

100, 200, 300

B.

400, 300, 200, 100

C.

100, 200, 300, 400

D.

300, 200, 100

Full Access
Question # 28

Which of the following statements about OSPFv3 LSAs is correct?

A.

Inter-Area Plink of refixLSA State ID, contains prefix information

B.

Router-LSA and Network-LSA do not contain routing information

C.

when Intra-Area PReferenced of refixLSA Link State Type 2 o'clock,Referenced Link State ID containsInterface ID of the DR

D.

Inter-Area PrefixLSA also contains Link-local information

Full Access
Question # 29

As shown in the figure, an enterprise hopes to realize the secure mutual access between the head office and each branch through MPLS/VPN, and requires that the VPN traffic of the branches must be forwarded through the head office to monitor the traffic. Which of the options described in this solution is wrong?

A.

BGP packets can be used to exchange VPN routing information between CEs and PEs

B.

Hub-CE and When the Hub-PE transmits routing information, the Hub-PE It is necessary to configure a route that allows the receiving AS number to be repeated once to receiveRoutes advertised by the Hub-CE

C.

Hub-CE and Hub-PE, Spoke-PE with Spoke-CEs can use OSPF to exchange routing information

D.

Spoke- Establish an MP-IBGP peer relationship between PEs to exchange VPN routing information.

Full Access
Question # 30

A bookstore provides a wired network for customers to study online, but one day it is found that some users cannot access the network. After inspection, it is found that the IP resource of the DHCP address pool isRunning out, which of the following is the best way to solve the problem at hand?

A.

configure staticARP binding table

B.

Configure IPSG

C.

Limit what the interface allows to learnDHCP The maximum number of Snooping binding entries

D.

configureDAI

Full Access
Question # 31

A routerRouter LSA As shown in the picture, which of the following statements is wrong? (single choice)

A.

This router is the DR

B.

This router has established an adjacency relationshipC. This router supports external route import

C.

The router of this router ID for 10.0.12.1

Full Access
Question # 32

VXLAN uses BGP EVPN to establish a tunnel, what type of packets are used?

A.

Type1

B.

Type2

C.

Type3

D.

Type4

E.

Type5

Full Access
Question # 33

SSH uses asymmetric encryption algorithms AES and DES to realize the security of data transmission, and uses HMAC to ensure the security of data transmission.

Integrity check for data integrity

A.

TRUE

B.

FALSE

Full Access
Question # 34

Adjust IS-IS What is the command for the interface link cost value? (single choice)

A.

isis cost

B.

isis timer hello

C.

isis circuit-type

D.

isis circuit-leve1

Full Access
Question # 35

Which of the following technologies can improve the reliability of MPLS BGP VPN?

A.

Configuring CE Dual-homing Networking at the Access Layer

B.

VPN FRR

C.

VPN-GR

D.

PE- Private network IP routing FRR between CEs

Full Access
Question # 36

Which of the following statements about VXLAN gateways is false?

A.

Layer 2 gateway:It is used to solve the problem of tenants accessing the VXLAN virtual network, and can also be used for subnet communication of the same VXLAN virtual network.

B.

Layer 3 gateway:Used for cross-subnet communication of VXLAN virtual networks and access to external networks.

C.

VXLAN Layer 3 gateways can be divided into centralized gateways and distributed gateways.

D.

The Layer 2 gateway is bound to the VPN instance.

Full Access
Question # 37

The network administrator plans to use the 6to4 automatic tunnel to carry IPv6 data on the IPv4 network. The IPv4 address of the router interface is 138.14.85.210, so the corresponding tunnel address is 2001:8a0e:55d2:1:230:65f.fe2:9a6

A.

True

B.

false

Full Access
Question # 38

What is Huawei's SDN controller using VXLAN technology?

A.

Agile Controller-Campus

B.

Agile Controller-WAN

C.

Agile Controller-DCN

Full Access
Question # 39

the following aboutWhich EVPN Type 5 Routing Statement is Wrong?

A.

Type5 routes carry Layer 3 VNI.

B.

Type5 routes carry both Layer 2 VWI and Layer 3 VNI.

C.

IP PThe refx field can carry both the host IP address and the network segment address.

D.

Type5 is IP prefix routing.

Full Access
Question # 40

In a broadcast network, the process starts after the neighbor relationship is established.DIS elections.

A.

True

B.

false

Full Access
Question # 41

Which of the following IEE standards were developed for Gigabit Ethernet?

A.

802.3z

B.

802.3ab

C.

802.3ad

D.

802.3af

Full Access
Question # 42

When the administrator configures VRRP, which of the following are not required to be configured? (multiple choice)

A.

Preemption mode

B.

The priority of the virtual router

C.

Preemption delay

D.

virtual IP address

Full Access
Question # 43

TION NO: 3

BGP EVPNWhich of the following types of packets are required to implement virtual machine migration in a distributed gateway scenario?

A.

Type5

B.

Type4

C.

Type1

D.

Type2

E.

Type3

Full Access
Question # 44

In an intra-domain MPLS BGP VPN network, when a data packet enters the public network for forwarding, it will be encapsulated with two layers of MPLS labels. Which of the following descriptions about the two layers of labels is wrong? (single choice)

A.

Private network label by MP-BGP carries and distributes routes when delivering routes, and public network labels are distributed by LDP.

B.

MPLS BGP VPNTwo layers of labels are used in the network: public network labels (also called outer labels) and private network labels (also called inner labels).

C.

By default, the router assigns the same label value to all VPNv4 routes destined for the peer end.

D.

exitThe PE uses the inner label when judging which egress CE the packet should be sent to.

Full Access
Question # 45

As shown below,R1, R2, R3 established Level2's neighbor relationship. aboutR3's IP routing table statement is correct:

A.

The 2022::/64 route will appear in the IP routing table

B.

The 2019::/64 route will appear in the IP routing table

C.

The 2020::/64 route will appear in the IP routing table

D.

The 2021::/64 route will appear in the IP routing table

Full Access
Question # 46

Which of the following information can be included in a basic network layer packet? (Multiple Choice)

A.

data link layer header

B.

upper layer data

C.

network layer header

D.

path record

E.

network layer tail

Full Access
Question # 47

IPv6 Link-local addresses can be generated by stateless autoconfiguration

A.

TRUE

B.

FALSE

Full Access
Question # 48

Deploying port isolation technology in Ethernet can realize Layer 2 intercommunication and Layer 3 isolation, making networking more flexible.

A.

TRUE

B.

FALSE

Full Access
Question # 49

aboutMPLSBasic forwarding process, which of the following descriptions is wrong? (single choice)

A.

The transmission node device will replace the existing stack top label (outermost label) with the label allocated by the next hop device.

B.

When IP Packet enters MPLS domain, check the destination IP Tunne corresponding to the addressl ID Is the value 0x0 if Tunnel ID value is 0x0, then enter MPLS forwarding process.

C.

when IP Packet enters MPLS domain, MPLS The boundary device is in the packet layer 2 header and IP Insert a new label between the headers

sign.

D.

By default, PHP is supported Egress The label value assigned by the node to the penultimate hop node is 3.

Full Access
Question # 50

Which of the following statements about NSSA areas is true

A.

existIn the hello packet sent by the OSPF neighbor in the NSSA area, in the option field ofN position 0, E position 1

B.

NSSAA default LSA will be automatically generated in the area to access the external network

C.

The NSSA area will generate seven types of L SAs to advertise external routes. The FA addresses in the seven types of L SAs are used to prevent loops.

D.

existIn the hello packet sent by the OSPF neighbor in the NSSA area, the position of the option field is 1, and the position of E is 0.

Full Access
Question # 51

run SNMS for NMPv1 ( Network Managementt What messages will Station) send to the Agent?

A.

Trap, Get and Set

B.

Get, Set and Getnext

C.

Get, Set, Getnext and GetBulk

D.

Get, Set and GetBulk

E.

Trap only

Full Access
Question # 52

Regarding BGP4+, which of the following statements is correct?

A.

BGP4+ carries the next hop address of IPv6 routes through the Next_hop attribute

B.

There is no Next_hop attribute in BGP4+

C.

BGP4+ carries the next hop address of the route through the Network Address of Next Hop in the MP_Reach_NLRI attribute

D.

BGP4+ carries the prefix and mask length of IPv6 routes through the NLRI attribute

Full Access
Question # 53

Which of the following packets does the BGP protocol support?

A.

Open

B.

Keepalive

C.

Update

D.

Hello

Full Access
Question # 54

Regarding the description of IGMP Snooping, is it correct?

A.

IGMP Snooping does not consume the CPU of the switch

B.

IGMP Snooping solves the problem of multicast multicast broadcast at Layer 3

C.

IGMP Snooping runs at the link layer and is a multicast constraint mechanism on a Layer 2 Ethernet switch to manage and control multicast groups.

D.

IGMP Snooping establishes a MAC multicast address table by monitoring the IGMP messages sent by the host.

Full Access
Question # 55

Router HW1 asMPLS LSR routers exist in the network of the operator HW. The router receives a packet with a label, but the Label table entry does not exist in its Lin the FIB. So how does the router process the packet?

A.

Router HW1 strips the label and looks forFIB uses IP destination address

B.

Router HW1 will use LDP to create an LSP and create a new path in LFIB for the label carried in the packet

C.

Router HW1will discard the message

D.

Router HW1The message will be forwarded with the default label

Full Access
Question # 56

In the intra-domain MPLS BGP VPN network, when the data packet enters the public network for forwarding, it will be encapsulated with two layers of MPLS labels. Which of the following descriptions about the two layers of labels is wrong?

A.

By default, the router assigns the same label value to all VPNv4 routes destined for the peer PE.

B.

The egress PE uses the inner layer label when judging which egress CE the message should be sent to.

C.

MPLS BGP VPN uses two layers of labels, the public network label (also called the outer label) and the private network label (also called the inner label).

D.

The private network label is used by NP-BGP It is carried and distributed when the route is passed, and the public network label is set by LDP Agreement distribution.

Full Access
Question # 57

as shown, C1ient1, Client2 and Client3 at the same time as RR1 client, R1 introduced

10route. Assuming that the BGP configuration is correct and all neighbor relationships have been established, how many routing entries exist in the BGP routing table of c1ient3? (single choice)

A.

0

B.

15

C.

20

D.

10

Full Access
Question # 58

Assume that BGP/MPLS has been enabled on the PE routerIPv4 VPN, OSPF, LDP, and static routing protocols. Which of the following protocols need to enable GR on PE to obtain NSF function?

A.

BGP

B.

static routing protocol

C.

OSPF

D.

MPLS LDP

Full Access
Question # 59

About PIM-Description of He1lo message in SM, what is wrong?

A.

Hello packets are sent to the multicast address 224.0.0.5

B.

pass throughHe11o message elects DR in multi-router network segment

C.

Used periodically between routersHello, keep in touch

D.

at P1M- In the SM network, the newly started multicast router needs to useHello message to discover neighbors and maintain neighborsresidential relationship

Full Access
Question # 60

The routing attributes of the three routing entries are shown in the figure. Assuming that the next hops of the three routing entries are reachable, when the three routing entries arrive at the BGP router in sequence, by default, which routing entry will be preferred by BGP in the end ?

A.

Route CB, Route A

B.

Route B and Route

C.

will be selected at the same time-and form load sharing

D.

Route B

Full Access
Question # 61

four routers running IS-IS And the adjacency relationship has been established, the area number and router level are marked in the figure, in R1 Configure routing penetration on the device, thenR4 arrive 10.0.2.2/32 ofCcost What is the value? (Singleselect)

A.

30

B.

80

C.

50

D.

40

Full Access
Question # 62

OSPThe Option field in Fv3 appears in all LSAs

A.

True

B.

false

Full Access
Question # 63

BGP4+ carries the next-hop address of the IPv6 route through the next-Hop attribute in the Update packet.

A.

TRUE

B.

FALSE

Full Access
Question # 64

Which of the following statements about OSPF route filtering is incorrect?

A.

In the NSSA area, filtering for external route import and advertisement can be configured on ASBR or ABR.

B.

Filtering for three types of LSAs needs to be configured on ABRs between OSPF areas

C.

Filter LSA based on interface, can filter in and out direction, except Grace All LS except LSAA

D.

When calculating routes based on the link state database, use filter-policy import command, this filtering method only affects the routing entries in the routing table. plus, for OSPF the link state database has no effect

Full Access
Question # 65

There is no routing protocol running on the router HW and only a default route is used to reach the remote network. Use the extension to ping the remote file server address 10.5.40.1 on the router. The result of pinging on the router is presented as "Request time out". According to the above description, the following analysis is wrong

Yes?

A.

The next-hop router of router HW has no path to reach the destination address

B.

Ping was successful, but congestion occurred on the path to the destination

C.

ICMP packets can reach the destination address, but the destination device fails to reply

D.

router HWThere is no valid route to the destination address

E.

There is a firewall in the remote destination network, and I have not been releasedCMP traffic

Full Access
Question # 66

What is the difference between traffic policing and traffic shaping?

A.

Use traffic shaping in the ingress direction and traffic policing in the egress direction

B.

For traffic shaping, routers buffer excess packets until bandwidth is available again

C.

Traffic policing uses the token bucket algorithm, and traffic shaping uses the SPD algorithm

D.

For traffic policing, it can be more thanCIR Traffic Adjustment Buffer Usage

E.

For traffic shaping, can be more thanCIR Traffic Adjustment Buffer Usage

Full Access
Question # 67

BGP4+ is running between the two routers, and the neighbor relationship is normal, but the BGP routing table of the local router does not have any neighbor routing entries. What are the following possible reasons?

A.

The routing entry in the peer BGP routing table is not optimal.

B.

The next hop address of the BGP routing entry is unreachable

C.

Peer ignore is configured on the peer

D.

The peer is configured with active-route-advertise

Full Access
Question # 68

Four routers run IS-IS and have established adjacency relationship. The area number and router level are marked as shown in the figure. If route penetration is configured on the R3 device, what is the Cost value of R4 reaching 10.0.2.2/32?

A.

30

B.

50

C.

80

D.

40

Full Access
Question # 69

In the intra-domain MPLS VPNI network, when the data packet enters the public network and is forwarded, it will be encapsulated with two layers of MPLS labels. The description of the two layers of labels in the following options is wrong?

A.

The outer label of MPLS VPN is called the private network label, and the inner label is called the public network label.

B.

By default, the outer label is popped before the data packet is forwarded to the last hop device.

C.

The outer label is used for Correctly send packets to the corresponding VPN on the PE device

D.

The outer label of MPLS VPN is assigned by the LDP protocol or statically, and the inner label is assigned by the MP-BGP neighbor of the opposite end

Full Access
Question # 70

Regarding the stub area in the OSPF protocol, the following statements are correct:

A.

ASBR cannot be stored in stub area.

B.

Virtual connections cannot pass through stubsarea.

C.

Type injection is not allowed in stub area7 LSA

D.

The backbone area cannot be configured as a stubarea.

Full Access
Question # 71

In PIM-SM , the following about PIM Join Message. Is the description correct? (single choice)

A.

PIM Join information.Every 60 Sent once per second to refresh the upstream router m for the multicast treeroute State

B.

PIM Join message per 3 Sent once every minute to refresh the upstream router mroute for the multicast tree State

C.

the upstream router sends a PIMJoin acknowledgement in response to each received from the downstream router

D.

PIM Join message PIM Join message. Only sent when the multicast tree is first established

Full Access