Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

H12-811_V1.0 Questions and Answers

Question # 6

What is the main function of the DNS protocol?

A.

Remote access

B.

File transfer

C.

Domain name resolution

D.

Email transmission

Full Access
Question # 7

Which SNMP version focuses on two main aspects, namely security and administration. The security aspect is addressed by offering both strong authentication and data encryption for privacy. The administration aspect is focused on two parts, namely notification originators and proxy forwarders.

A.

SNMPv2c

B.

SNMPv1

C.

SNMPv3

D.

SNMPv2

Full Access
Question # 8

Which of the following configurations can prevent Host A and Host B from communicating with each other?

A.

acl number 2000 rule 5 deny source 100.0.12.0 0.0.0.255 interface GigabitEthernet0/0/1 traffic-filter inbound acl 2000

B.

acl number 2000 rule 5 deny source 100.0.12.0 0.0.0.255 interface GigabitEthernet0/0/2 traffic-filter inbound acl 2000

C.

acl number 2000 rule 5 deny source 100.0.12.0 0.0.0.255 interface GigabitEthernet0/0/3 traffic-filter inbound acl 2000

D.

acl number 2000 rule 5 deny source 100.0.12.0 0.0.0.255 interface GigabitEthernet0/0/1 traffic-filter outbound acl 2000

Full Access
Question # 9

What is the number range of an advanced ACL?

A.

2000-2999

B.

3000-3999

C.

6000-6031

D.

4000-4999

Full Access
Question # 10

What is the total length of the port ID in STP?

A.

8 bits

B.

4 bits

C.

16 bits

D.

2 bits

Full Access
Question # 11

SDN requires the control and forwarding planes to be separated.

A.

TRUE

B.

FALSE

Full Access
Question # 12

Which of the following statements about VLANIF interfaces is/are correct?

A.

Different VLANIF interfaces can use the same IP address.

B.

A VLANIF interface is a Layer 3 interface.

C.

VLANIF interfaces do not need to learn MAC addresses.

D.

A VLANIF interface does not have a MAC address.

Full Access
Question # 13

Which SNMP version focuses on two main aspects, namely security and administration? The security aspect is addressed by offering both strong authentication and data encryption for privacy. The administration aspect is focused on two parts, namely notification originators and proxy forwarders.

A.

SNMPv2

B.

SNMPv2c

C.

SNMPv3

D.

SNMPv1

Full Access
Question # 14

The data link layer uses PPP encapsulation. The IP addresses of the two ends of the link can be in different network segments.

A.

TRUE

B.

FALSE

Full Access
Question # 15

What function does Ctrl+Z have in the VRP system?

A.

Exits the console interface view.

B.

Exits the interface view.

C.

Returns from any view to the user view.

D.

Exits the current view.

E.

Returns from the system view to the user view.

Full Access
Question # 16

(Refer to the display startup command output shown in the figure on an AR2200 router. Which of the following statements about the command output is false?)

display startup

MainBoard:

Startup system software: sdl:/ar2220-v200r003c00spc200.cc

Next startup system software: sdl:/ar222b-v200r003c00spc200.cc

Backup system software for next startup: null

Startup saved-configuration file: null

Next startup saved-configuration file: null

Startup license file: null

Next startup license file: null

Startup patch package: null

Next startup patch package: null

Startup voice-files: null

Next startup voice-files: null

A.

The system file for next startup cannot be modified.

B.

The startup system software command can be used to modify the system software for next startup.

C.

The running configuration file is not saved.

D.

The system file used for the current startup is ar2220-v200r003c00spc200.cc.

Full Access
Question # 17

(Which of the following statements is true about active interface election for an Eth-Trunk in LACP mode?)

A.

Only interface priorities are compared.

B.

Device priorities are compared.

C.

Interface priorities are compared first. If priorities of interfaces on the Actor are the same, interfaces with smaller interface numbers are elected as active interfaces.

D.

Only interface numbers are compared.

Full Access
Question # 18

For STP, the Message Age in the configuration BPDUs sent by the root bridge is 0.

A.

TRUE

B.

FALSE

Full Access
Question # 19

A Layer 2 switch works at the data link layer. As such, it can identify MAC addresses in data frames, forward data based on MAC addresses, and record mappings between MAC addresses and interface numbers in its MAC address table.

A.

TRUE

B.

FALSE

Full Access
Question # 20

What is the default lease time of the IP address allocated by the DHCP server?

A.

18 hours

B.

12 hours

C.

1 hour

D.

24 hours

Full Access
Question # 21

What action does an access port take in the process of sending VLAN frames?

A.

The access port sends tagged frames.

B.

The access port strips the VLAN tag and forwards the frame.

C.

The access port exchanges the VLAN tag of the inbound and outbound port of the frame before forwarding the frame.

D.

The access port attaches its PVID information to the frame.

Full Access
Question # 22

On the network shown in the figure, the router receives a data packet with the destination IP address 11.0.12.1 from Host A.

After the packet is forwarded by the router, which of the following are the destination MAC address and destination IP address of the data packet?

A.

MAC-C, 11.0.12.1

B.

MAC-D, 11.0.12.1

C.

MAC-B, 11.0.12.1

D.

MAC-D, 10.0.12.2

Full Access
Question # 23

Network Address and Port Translation (NAPT) allows multiple private IP addresses to be mapped to the same public IP address through different port numbers. Which of the following statements about port numbers in NAPT is true?

A.

Only the port number range needs to be configured.

B.

The mappings between port numbers and private IP addresses must be manually configured.

C.

An ACL is required to allocate port numbers.

D.

No port number needs to be configured.

Full Access
Question # 24

Which of the following states indicates that the OSPF neighbor relationship has been established?

A.

Attempt

B.

Down

C.

Full

D.

2-way

Full Access
Question # 25

Which extension headers are supported by IPv6 packets?

A.

VLAN extension header

B.

Fragment extension header

C.

Destination Options header

D.

Hop-by-Hop Options header

Full Access
Question # 26

Which of the following statements is true?

A.

Routers work at the physical layer.

B.

Switches work at the network layer.

C.

Switches work at the physical layer.

D.

Routers work at the network layer.

Full Access
Question # 27

Making a call on a landline telephone is a type of network communication.

A.

TRUE

B.

FALSE

Full Access
Question # 28

A router in the backbone area has complete LSDBs of routers in other areas.

A.

TRUE

B.

FALSE

Full Access
Question # 29

What is the total length of the interface ID in each link-local unicast address?

A.

96 bits

B.

32 bits

C.

48 bits

D.

64 bits

Full Access
Question # 30

As shown in the figure, the configuration of Router A is as follows. Which of the following statements is/are incorrect?

A.

The host with the source IP address 200.0.12.6 cannot access the Internet.

B.

The host with the source IP address 200.0.12.8 cannot access the Internet.

C.

The host with the source IP address 200.0.12.2 cannot access the Internet.

D.

The host with the source IP address 200.0.12.4 cannot access the Internet.

Full Access
Question # 31

If the value of the "Type/Length" field of an Ethernet data frame is 0x0800, the length range of the upper-layer packet header carried by the data frame is from 20B to 60B.

A.

TRUE

B.

FALSE

Full Access
Question # 32

VLANs can be assigned based on service types during campus network planning.

A.

TRUE

B.

FALSE

Full Access
Question # 33

Which of the following authentication modes does/do not require a user name and a password?

A.

authentication-mode local

B.

authorization-mode hwtacacs

C.

authentication-mode hwtacacs

D.

authentication-mode none

Full Access
Question # 34

(Which of the following is a dynamic IGP routing protocol?)

A.

Static

B.

BGP

C.

Direct

D.

OSPF

Full Access
Question # 35

Which of the following statements regarding Designated Routers (DR) in OSPF are correct?

A.

DR and BDR must establish an adjacency relationship.

B.

If the priorities of two routers are different, the router with the lower priority will be elected as DR.

C.

DR is elected by all the routers in the same network segment.

D.

If the priorities of two routers are equal, the router with the higher Router ID will be elected as DR.

Full Access
Question # 36

(An administrator cannot log in to a Huawei router through Telnet, but other administrators can log in to the router. Which of the following are possible causes?)

A.

The administrator account has been disabled.

B.

The Telnet service has been disabled on the AR2200 router.

C.

The administrator account has been deleted.

D.

The user level of the administrator account has been changed to 0.

Full Access
Question # 37

Which of the following packets are exchanged between STAs and an AP to obtain the AP's SSID before association with the AP?

A.

Probe Request

B.

Discovery

C.

Probe Response

D.

Beacon

Full Access
Question # 38

Which of the following port states is not included in Rapid Spanning Tree Protocol (RSTP)?

A.

Learning

B.

Forwarding

C.

Blocking

D.

Discarding

Full Access
Question # 39

When a switch receives a unicast data frame, if the destination MAC address of the data frame can be found in the MAC address table of the switch, the data frame is definitely forwarded through the port corresponding to the MAC address.

A.

TRUE

B.

FALSE

Full Access
Question # 40

On Huawei VRP platform, which of the following can be used to invoke the history command saved by the command line interface?

A.

Ctrl+P

B.

Upper cursor key

C.

Ctrl+U

D.

Left cursor key

Full Access
Question # 41

Trunk interfaces can send both tagged and untagged frames.

A.

TRUE

B.

FALSE

Full Access
Question # 42

(An Eth-Trunk interface can be used only as a Layer 2 interface.)

A.

TRUE

B.

FALSE

Full Access
Question # 43

Network devices running SNMP can proactively report traps to help network administrators detect faults in a timely manner.

A.

TRUE

B.

FALSE

Full Access
Question # 44

If a device running STP receives an RSTP configuration BPDU, it discards the BPDU.

A.

TRUE

B.

FALSE

Full Access
Question # 45

The Network Management Station uses SNMP to manage devices. Which SNMP message is sent when an SNMP-registered abnormal event occurs?

A.

trap

B.

get-request

C.

set-request

D.

get-response

Full Access
Question # 46

The users who log on the router through Telnet are not permitted to configure an IP address. What is the possible reason?

A.

Privilege level of Telnet is set incorrectly.

B.

SNMP parameters are set incorrectly.

C.

The authentication mode of Telnet is set incorrectly.

D.

Communication failures occur between the user and the router.

Full Access
Question # 47

In the figure, bridge IDs of SWA, SWB, SWC, and SWD have been marked. After the stp root secondary command is run on SWD, which switch will be selected as the root bridge?

A.

SWC

B.

SWA

C.

SWD

D.

SWB

Full Access
Question # 48

A network administrator wishes to assign an IP address to a router interface G0/0/0. Which of the following IP addresses can be assigned?

A.

237.6.1.2/24

B.

127.3.1.4/28

C.

145.4.2.55/26

D.

192.168.10.112/30

Full Access
Question # 49

When forwarding a data packet, a router needs to change the destination IP address of the packet.

A.

TRUE

B.

FALSE

Full Access
Question # 50

Which of the following descriptions about STP designated ports is correct?

A.

Designated ports are responsible for sending BPDU to connected network segments.

B.

Designated ports forward frames destined for the root switch.

C.

Each bridge can have only one designated port.

D.

Designated ports represent the path leading to the root switch.

Full Access
Question # 51

Which type of IPv6 address is FE80::2E0:FCFF:FE6F:4F36?

A.

Global unicast address

B.

Multicast address

C.

Link-local address

D.

Anycast address

Full Access
Question # 52

Refer to the following display vlan command output on SWA. Which of the following interfaces can forward untagged data frames from VLAN 40?

A.

GE0/0/2

B.

GE0/0/3

C.

GE0/0/4

D.

GE0/0/5

Full Access
Question # 53

Which of the following BIDs cannot be contained in a configuration BPDU sent by a switch?

A.

0 10-01-02-03-04-05

B.

0 00-01-02-03-04-05

C.

32768 06-01-02-03-04-05

D.

4096 01-01-02-03-04-05

Full Access
Question # 54

Refer to the captured three packets shown in the figure. Which of the following statements is false?

A.

The Telnet client uses port 50190 to connect to the server.

B.

The three packets represent the three-way handshake process of TCP.

C.

The IP address of the Telnet server is 10.0.12.1, and the IP address of the Telnet client is 10.0.12.2.

D.

None of the three packets contains application-layer data.

Full Access
Question # 55

In the following figure, all links are Ethernet links, and all interfaces on the routers are running OSPF. Given this, how many DRs will be elected on this network?

A.

1

B.

3

C.

4

D.

2

Full Access
Question # 56

In RSTP, an edge port becomes a common STP port after receiving a configuration BPDU.

A.

TRUE

B.

FALSE

Full Access
Question # 57

After switches are virtualized into one logical switch using stacking or CSS, an inter-chassis Eth-Trunk can be deployed to improve network reliability.

A.

TRUE

B.

FALSE

Full Access
Question # 58

Which of the following application-layer protocols are based on TCP?

A.

TFTP

B.

HTTP

C.

FTP

D.

Ping

Full Access
Question # 59

Which of the following WLAN security policies support open link authentication?

A.

WPA2-PSK

B.

WPA

C.

WEP

D.

WPA2-802.1X

Full Access
Question # 60

Which of the following statements about hybrid interfaces is true?

A.

Hybrid interfaces can remove VLAN tags from some outgoing VLAN frames.

B.

Hybrid interfaces do not require PVIDs.

C.

Hybrid interfaces must carry VLAN tags when sending data frames.

D.

Hybrid interfaces receive only data frames with VLAN tags.

Full Access
Question # 61

In the following figure, all links are Ethernet links, and all interfaces on the routers are running OSPF. Given this, how many DRs will be elected on this network?

A.

1

B.

2

C.

3

D.

4

Full Access
Question # 62

When an Ethernet frame is received by an interface on a Layer 2 Ethernet switch, which field is used to generate an entry in the MAC address table?

A.

Destination MAC address

B.

Source MAC address

C.

Source IP address

D.

Destination IP address

Full Access
Question # 63

Which of the following frequency bands are supported by IEEE 802.11n?

A.

2.5 GHz

B.

2.4 GHz

C.

5 GHz

D.

6 GHz

Full Access
Question # 64

Which of the following statements are true about the OSPF neighbor status?

A.

In the Exchange state, routers send DD packets that briefly describe link-state information to each other to describe the content of the local LSDB.

B.

The master/slave relationship of OSPF is formed in the ExStart state.

C.

After LSDB synchronization is completed, the router state changes to Full.

D.

The sequence number of DD packets is determined in the Exchange state.

Full Access
Question # 65

On VRP, the command lines are classified into four levels in increasing priority: Visit level, Monitoring level, Configuration level, and Management level. At which level, the operator is permitted to configure service but is not permitted to operate the file system?

A.

Visit level

B.

Configuration level

C.

Monitoring level

D.

Management level

Full Access
Question # 66

(Each network device running SNMP runs an agent process locally.)

A.

TRUE

B.

FALSE

Full Access
Question # 67

Which of the following parameters is not contained in STP configuration BPDUs?

A.

Bridge ID

B.

VLAN ID

C.

Root ID

D.

Port ID

Full Access
Question # 68

An ACL rule is as follows. Which of the following IP addresses can be matched by the permit rule?

Rule: rule 5 permit ip source 10.0.2.0 0.0.254.255

A.

10.0.4.5

B.

10.0.6.7

C.

10.0.5.6

D.

10.0.2.1

Full Access
Question # 69

The following configuration commands implement route backup on RTA for a route to the same destination 10.1.1.0.

[RTA] ip route-static 10.1.1.0 24 12.1.1.1 permanent

[RTA] ip route-static 10.1.1.0 24 13.1.1.1

A.

TRUE

B.

FALSE

Full Access
Question # 70

On the network shown in the figure, Host A and Host B cannot communicate with each other.

A.

TRUE

B.

FALSE

Full Access
Question # 71

What is used as the data link-layer MAC address that identifies each VAP on an AP?

A.

BSSID

B.

SSID

C.

BSS

D.

ESS

Full Access
Question # 72

After the administrator performs the configuration shown in the figure on a router, which of the following commands can be used to specify a short lease for addresses assigned using DHCP?

A.

dhcp select relay

B.

lease 0

C.

lease day 0 hour 10

D.

lease 24

Full Access
Question # 73

Which of the following commands sets the data forwarding mode on an AC to direct forwarding?

A.

forward mode tunnel

B.

forward-mode direct-forward

C.

forward-mode capwap-forward

D.

forward-mode direct

Full Access
Question # 74

Which of the following are basic parameters for configuring a static route?

A.

Destination network

B.

Outbound interface

C.

MAC address of the outbound interface

D.

Next-hop IP address

Full Access
Question # 75

As shown in the figure, router A has successfully telneted to router B using 10.0.12.2. Which of the following operations will interrupt the Telnet session between router A and router B?

A.

Enable OSPF on G0/0/1

B.

Change the IP address of G0/0/1

C.

Disable G0/0/1

D.

Configure a static route

Full Access
Question # 76

On Huawei AR G3 Series routers, which authentication modes does AAA support?

A.

Radius

B.

None

C.

Local

D.

802.1X

Full Access
Question # 77

(The IP addresses of VLANIF interfaces on the same switch must be different.)

A.

TRUE

B.

FALSE

Full Access
Question # 78

The default bridge priority of a Huawei switch is 32768.

A.

TRUE

B.

FALSE

Full Access
Question # 79

Which of the following authentication methods are supported for Telnet users?

A.

No authentication.

B.

Password authentication.

C.

MD5 authentication.

D.

AAA local authentication.

Full Access
Question # 80

By referring to the topology and the configurations of G0/0/1 interfaces on LSW1 and LSW2 shown in the figure, it can be determined that data frames tagged with VLAN 10 can be normally forwarded between LSW1 and LSW2.

A.

TRUE

B.

FALSE

Full Access
Question # 81

Static NAT can only implement one-to-one mapping between private and public addresses.

A.

TRUE

B.

FALSE

Full Access
Question # 82

The network administrator has decided to configure link aggregation in the enterprise network. Which of the following represent advantages of link aggregation?

A.

Load balancing.

B.

Improved bandwidth.

C.

Enhanced reliability.

D.

Improved security.

Full Access
Question # 83

If the IPv4 address of a host on a LAN is 192.168.1.1/30, the host will process IP packets with specific destination IP addresses. Which of the following IP addresses may be the destination IP addresses?

A.

192.168.1.3

B.

192.168.1.1

C.

192.168.1.2

D.

255.255.255.255

Full Access
Question # 84

The router ID of the OSPF process takes effect immediately after being changed.

A.

TRUE

B.

FALSE

Full Access
Question # 85

If the broadcast address of a network is 172.16.1.255, which of the following addresses is the network address?

A.

172.16.1.128

B.

172.16.1.1

C.

172.16.2.0

D.

172.16.1.253

Full Access
Question # 86

A company applies for a class C IP address for subnetting. It has six branches and the largest branch should have 26 hosts. What would be an appropriate subnet mask for the largest branch?

A.

255.255.255.0

B.

255.255.255.128

C.

255.255.255.192

D.

255.255.255.224

Full Access
Question # 87

On the command line interface of Huawei AR routers, the role of the Save command is to save the current system time.

A.

TRUE

B.

FALSE

Full Access
Question # 88

Assuming that OSPF has been enabled on all routers in the following figure, which router is the BDR on this network?

A.

Router B

B.

Router A

C.

Router D

D.

Router C

Full Access
Question # 89

Which of the following is the default port number of the Telnet server?

A.

22

B.

24

C.

21

D.

23

Full Access
Question # 90

RSTP uses the proposal/agreement mechanism to shorten the time that an upstream port waits before transitioning to the Forwarding state, but no temporary loop occurs. Why?

A.

RSTP introduces the edge port role.

B.

RSTP accelerates port role election.

C.

RSTP uses a synchronization mechanism to prevent temporary loops.

D.

RSTP shortens the time taken by port status transition (Forward Delay).

Full Access
Question # 91

Which of the following network types are supported by OSPF?

A.

Point-to-point (P2P)

B.

Point-to-multipoint (P2MP)

C.

Broadcast

D.

NBMA

Full Access
Question # 92

On an interface that uses PPP as the data link layer protocol, you can configure a static route by specifying a next-hop address or outbound interface.

A.

TRUE

B.

FALSE

Full Access
Question # 93

Link aggregation and stacking technologies can be used to enhance network reliability on a campus network.

A.

TRUE

B.

FALSE

Full Access
Question # 94

How many bytes are there in a basic IPv6 header?

A.

40

B.

48

C.

32

D.

64

Full Access
Question # 95

The router that runs OSPF first enters the Full state and then synchronizes the LSDB.

A.

TRUE

B.

FALSE

Full Access
Question # 96

A Layer 2 ACL can match information such as the source MAC address, destination MAC address, source IP address, and destination IP address.

A.

TRUE

B.

FALSE

Full Access
Question # 97

Which of the following statements is true about the Forward Delay timer of STP?

A.

Reduce the interval for sending BPDUs.

B.

Improve the STP convergence speed.

C.

Improve the configuration BPDU lifetime, ensuring that the configuration BPDUs can be forwarded to more switches.

D.

Prevent temporary loops.

E.

Delay is required when a port transitions between Blocking and Disabled.

Full Access
Question # 98

Which of the following cannot be the length of an IPv4 packet header?

A.

64B

B.

20B

C.

60B

D.

32B

Full Access
Question # 99

As shown in the figure, the host has ARP cache. Host A sends a data packet to host B. Which of the following are the destination MAC address and destination IP address of the data packet?

A.

MAC-A, 11.0.12.1

B.

MAC-C, 11.0.12.1

C.

MAC-C, 10.0.12.2

D.

MAC-B, 11.0.12.1

Full Access
Question # 100

Which of the following statements about the TTL (Time to Live) field in an IP packet are correct?

A.

The TTL field length is 8 bits.

B.

When a routing loop occurs, the TTL value can be used to prevent infinite packet forwarding.

C.

The TTL value decreases by 1 each time a packet passes through a Layer 3 device.

Full Access
Question # 101

Only one SSID can be bound to each radio of an AP.

A.

TRUE

B.

FALSE

Full Access
Question # 102

An administrator wishes to manage the router in the remote branch office, which method can be used?

A.

Console Connection

B.

FTP

C.

Telnet

D.

DHCP

Full Access
Question # 103

Which of the following statements are true about the dynamic MAC address table?

A.

Dynamic MAC address entries are obtained by learning the source MAC addresses of packets received by an interface and can be aged out.

B.

After a device is reset, an interface card is hot-swapped, or an interface card is reset, dynamic MAC address entries on the device or interface card are lost.

C.

You can obtain the number of users communicating on an interface by checking the number of specified dynamic MAC address entries.

D.

After a device is reset, an interface card is hot-swapped, or an interface card is reset, the saved entries on the device or interface card are not lost.

Full Access
Question # 104

The priority of static routes cannot be manually specified.

A.

TRUE

B.

FALSE

Full Access
Question # 105

(Which of the following are not main functions of routers?)

A.

Routers forward data packets based on source IP addresses.

B.

Routers enable devices on the same network segment to communicate with each other.

C.

Routers forward data packets according to routing tables.

D.

Routers learn routes through multiple routing protocols and add them to the routing table.

Full Access