Spring Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

H12-841_V1.5 Questions and Answers

Question # 6

(Which of the following is not an advantage of Huawei CloudCampus solution?)

A.

Supports automatic deployment of physical networks

B.

Supports plug-and-play of devices

C.

Unified management of Huawei switches, routers, and storage servers

D.

Supports free mobility

Full Access
Question # 7

(Which of the following can be used to classify campus networks?)

A.

Network scale

B.

Served objects

C.

Access mode

D.

Service complexity

Full Access
Question # 8

(The egress zone is the boundary between a campus network and external networks, including the Internet and WAN. It bridges the intranet and extranet and protects the security of the campus network. Which of the following are requirements for egress zone design?)

A.

Service control capability

B.

Various and flexible access modes

C.

Network connectivity

D.

Network secure ensurance

Full Access
Question # 9

Drag the user authentication results to the corresponding network access rights.

Full Access
Question # 10

(The following figure shows the MAC address table of a Layer 2 VXLAN gateway. Which of the following statements are true?Choose all that apply.)

A.

Both 0000-0000-0010 and 5489-9893-48a3 belong to BD 10 and are in the same Layer 2 broadcast domain.

B.

The outbound interface corresponding to 5489-982d-77e2 is GE1/0/1.20. Because this interface belongs to BD 20, the host with 5489-982d-77e2 can directly communicate with the host with 5489-9893-48a3 at Layer 2.

C.

The MAC address entry with the outbound interface 10.3.3.3 is learned from the remote VTEP through the VXLAN tunnel.

D.

The outbound interface corresponding to 5489-9893-48a3 is GE1/0/1.10, which belongs to BD 10.

Full Access
Question # 11

(MAC address learning of a static VXLAN tunnel depends on exchange of packets, such as ARP packets, between hosts.)

A.

TRUE

B.

FALSE

Full Access
Question # 12

(On a campus network, which of the following address allocation modes is recommended to facilitate management of devices such as servers, print servers, and video surveillance devices?)

A.

Dynamic IP address allocation through DHCP

B.

Address binding during PPPoE authentication

C.

Dynamic IP address allocation through the BOOT protocol

D.

Static address allocation through DHCP based on MAC addresses

Full Access
Question # 13

(The following figure shows a policy control matrix on a virtualized network deployed using iMaster NCE-Campus. Which of the following statements about the policy control matrix are true?Choose all that apply.)

A.

Users in Guest_Group cannot communicate with those in Research_Group.

B.

Users within Sales_Group can communicate with each other.

C.

If a user is not within Guest Group, Research Group, or Sales Group, that user cannot access any network resources.

D.

Users in Research_Group cannot communicate with those in Guest_Group.

Full Access
Question # 14

(On a CloudCampus virtualized campus network, service data enters different VNs from physical networks through edge nodes and the VN that the data will enter is determined by the VLANs to which users belong. Which of the following statements about dynamic VLAN authorization isfalse?)

A.

When wireless users pass Portal authentication, they join the authorization VLANs delivered to edge nodes.

B.

When wireless users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

C.

When wired users pass MAC address authentication, they join the authorization VLANs delivered to edge nodes.

D.

When wired users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

Full Access
Question # 15

(If the number of MAC addresses learned on an interface enabled with port security reaches the upper limit, which of the following actions may the switch take?)

A.

Sets the interface state to error-down and generates an alarm.

B.

Sets the interface state to error-down without generating any alarm.

C.

Discards packets with unknown source MAC addresses without generating any alarm.

D.

Discards packets with unknown source MAC addresses and generates an alarm.

Full Access
Question # 16

(During WLAN planning and design, channels 1, 6, and 11 are recommended on the 2.4 GHz frequency band, and channels 1, 5, 9, and 13 are recommended in high-density scenarios. On the 5 GHz frequency band, it is recommended that high-frequency and low-frequency channels of adjacent APs be staggered to prevent overlapping.)

A.

TRUE

B.

FALSE

Full Access
Question # 17

(When a network device sends a registration request to iMaster NCE-Campus, which of the following is the destination port number?)

A.

53

B.

179

C.

10020

D.

18008

Full Access
Question # 18

(On a campus network, iMaster NCE-Campus is used to deploy two VNs: R&D VN and marketing VN, users in these two VNs belong to two security groups, respectively. The campus network requires R&D personnel and sales personnel to communicate with each other. To meet this requirement, which of the following tasks does a network administrator need to perform?)

A.

Deploy a policy control matrix.

B.

Deploy an external network.

C.

Configure access management.

D.

Configure inter-VN communication.

Full Access
Question # 19

(When you configure a virtualized campus network on iMaster NCE-Campus, creating a virtual network is equivalent to creating a VPN instance to isolate different services.)

A.

TRUE

B.

FALSE

Full Access
Question # 20

(In the Huawei CloudCampus Solution, which of the following provisioning modes isnot supportedby firewalls?)

A.

Web interface

B.

Registration center query

C.

DHCP Option 148

D.

CLI

Full Access
Question # 21

(iMaster NCE-Campus provides independent working interfaces on different planes: management plane and service plane. You can log in to each plane through a specific IP address and port number. The port number of the service plane is _____.)

A.

18008

B.

18009

C.

10020

D.

443

Full Access
Question # 22

(On a VXLAN-based virtualized campus network, terminals communicate with each other through VXLAN tunnels. When the campus network needs to communicate with external networks, the data must pass through border nodes.)

A.

TRUE

B.

FALSE

Full Access
Question # 23

(When configuring access authentication, you need to define the items authorized to users in the authorization result. Which of the following items does not need to be defined?)

A.

VLAN

B.

IP address

C.

Security group

D.

ACL

Full Access
Question # 24

(On a virtualized network deployed using iMaster NCE-Campus, which of the following methods can be used by a network administrator during VN creation to create user network segments?)

A.

Manually create them one by one.

B.

Import them in a batch using a template.

C.

Directly invoke the user network segments in the global resource pool of the fabric.

D.

Create them in a batch through automatic allocation.

Full Access
Question # 25

(Which of the following is used to implement inter-subnet communication on a VXLAN network and allow access from a VXLAN network to an external non-VXLAN network?)

A.

Layer 3 VXLAN gateway

B.

VLANIF interface

C.

NVE interface

D.

Layer 2 VXLAN gateway

Full Access
Question # 26

(Which of the following statements about authentication profile configuration is true?)

A.

By default, users access the default domain, which cannot be modified using the CLI.

B.

On the same interface of the same device, all authentication types (such as Portal, MAC address, and 802.1X) must be configured with the same default domain or forcible domain.

C.

When multiple access profiles are bound to an authentication profile, authentication is triggered in the following sequence: 802.1X authentication → Portal authentication → MAC address authentication.

D.

If a forcible domain is configured for a user, the user is forcibly authenticated in the forcible domain regardless of whether the user name contains the domain name.

Full Access
Question # 27

(When advertising routes, BGP EVPN uses EVPN Router's MAC Extended Community to carry the Router MAC field of a VTEP.)

A.

TRUE

B.

FALSE

Full Access
Question # 28

(Refer to the following route queried using a command on the VTEP. Which of the following statements about the route are true?)

[VTEP] display bgp evpn all routing-table mac-route 0:48:b0d5-9dc7-3c41:32:172.16.1.173

BGP local router ID : 1.1.1.1

Local AS number : 100

Total routes of Route Distinguisher(1:3): 1

BGP routing table entry information of 0:48:b0d5-9dc7-3c41:32:172.16.1.173:

Imported route.

Label information (Received/Applied): 3 2/NULL

From: 0.0.0.0 (0.0.0.0)

Route Duration: 1d00h15m21s

Direct Out-interface:

Original nexthop: 1.1.1.1

Qos information : 0x0

Ext-Community: RT <0:2>, RT <0:3>, Tunnel Type , Router's MAC <1c20-dbb3-3650>

AS-path Nil, origin incomplete, pref-val 0, valid, local, best, select, pre 0

Route Type: 2 (MAC Advertisement Route)

Ethernet Tag ID: 0

MAC Address/Len: b0d5-9dc7-3c41/48, IP Address/Len: 172.16.1.173/32, ESI: 0000.0000.0000.0000.0000

Advertised to such peers:

1.1.1.2

A.

This is an IRB Type 2 route.

B.

This is an ARP Type 2 route.

C.

The VPN instance whose IRT is 0:2 or 0:3 can learn the host route information contained in the route.

D.

This route contains the RT and EVPN Router's MAC Extended Community attribute.

Full Access
Question # 29

(Refer to the following figure.

Which of the following solutions can be used to prevent users from accessing the network using statically configured IP addresses?)

A.

DAI + IPSG

B.

DHCP Snooping + DAI

C.

DHCP Snooping + IPSG

D.

DAI + Port Security

Full Access
Question # 30

(Which of the following statements about configuring user access authentication is false?)

A.

To implement network access control on users, you need to determine the domains to which they belong and the AAA schemes that they use.

B.

You need to bind an access profile to an authentication profile to specify the user authentication mode. Then, apply the authentication profile to an interface or VAP profile to enable network access control.

C.

iMaster NCE-Campus cannot interconnect with a third-party RADIUS server.

D.

If the RADIUS or HWTACACS server is used for authentication, you need to configure parameters for interconnection with the authentication server in the AAA scheme.

Full Access
Question # 31

(Which of the following encryption algorithms isnot supportedby IPsec VPN?)

A.

DSA

B.

3DES

C.

DES

D.

AES

Full Access