Spring Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

H12-891_V1.0 Questions and Answers

Question # 6

To deploy a virtual campus network using iMaster NCE-Campus, the following steps are performed. From top to bottom, sort the steps in the order in which they occur during network deployment and management.

Full Access
Question # 7

The channelized sub-interface and FlexE technologies both can be used to implement network slicing, but the application scenarios of the two technologies are slightly different. Which of the following statements about the two technologies are correct?

A.

It is recommended that channelized sub-interface be used to reserve resources for interfaces with a bandwidth of less than 50 Gbit/s.

B.

It is recommended that FlexE be used to reserve resources for 50GE and higher-rate interfaces.

C.

Only FlexE-based network slicing can be deployed across OTN devices.

D.

Only network slicing based on channelized sub-interface can be deployed across MSTP devices.

Full Access
Question # 8

Huawei Open Programmability System (OPS) uses standard HTTP methods to access managed objects and manage network devices.

Which of the following HTTP methods is used to configure the value of a network device’s managed object?

A.

PUT

B.

POST

C.

GET

D.

PATCH

Full Access
Question # 9

The Ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is _____ IRB forwarding. (Capitalize the first letter.)

Full Access
Question # 10

Refer to the figure.

Which of the following steps are mandatory to enable 802.1X authentication on GE0/0/2 and GE0/0/3 of SW3 and configure a RADIUS server to authenticate and deliver network access rights to users?

A.

Configure an AAA scheme.

B.

Configure an authentication profile.

C.

Configure an authentication domain.

D.

Configure an 802.1X access profile.

Full Access
Question # 11

During the configuration of L3VPNv4 over SRv6 BE, if an RR is deployed in the SR domain, which command must be run on the RR to ensure that the PEs at both ends can correctly learn VPNv4 routes?

Full Access
Question # 12

Which of the following parameters is not included in an IPsec security association (SA)?

A.

Security parameter index (SPI)

B.

Destination IP address

C.

Security protocol ID (AH or ESP)

D.

Source IP address

Full Access
Question # 13

A VGMP packet is encapsulated with a UDP header and a VGMP header. By default, a VGMP packet uses UDP port _____.

Full Access
Question # 14

During the migration test, which of the following indicates that the test is completed?

A.

Tested network services are running properly.

B.

Command outputs are correct.

C.

The network is running properly.

D.

Tested upper-layer application services are running properly on the network.

Full Access
Question # 15

A network administrator needs to retrieve a token ID from iMaster NCE using the following Python code:

import requests

nbi_name = " demol3@north.com "

nbi_pwd = " qqcOVcVel@ "

host = " 139.9.213.72 "

port = " 18002 "

URI = " /controller/v2/tokens "

post_token_url = " https:// " + host + " : " + port + URI

headers_post = { ' Content-Type ' : ' application/json ' , ' Accept ' : ' application/json ' }

r = requests.post(post_token_url, headers=headers_post, json={ " userName " : nbi_name, " password " : nbi_pwd}, verify=incorrect)

Which of the following statements is incorrect?

A.

You can run print(r.json()) to display the response message sent from the server.

B.

Token resources are located at https://139.9.213.72:18002/controller/v2/tokens.

C.

The HTTP request uses the GET method to query the token value.

D.

The request body is in JSON format.

Full Access
Question # 16

In the firewall hot standby scenario, when VGMP works in load balancing mode, which of the following functions must be enabled on the firewalls to prevent the return traffic from being discarded because it does not match any session entry in the case of inconsistent forward and return paths?

A.

Automatic backup

B.

Manual batch backup

C.

Quick session backup

D.

BFD

Full Access
Question # 17

Which of the following is the type of northbound API used by iMaster NCE-WAN?

A.

NETCONF

B.

SNMP

C.

CLI

D.

RESTful

Full Access
Question # 18

If the number of MAC addresses learned on an interface enabled with port security reaches the upper limit, which of the following actions may the switch take?

A.

Discards packets with unknown source MAC addresses without generating any alarm.

B.

Sets the interface state to error-down without generating any alarm.

C.

Discards packets with unknown source MAC addresses and generates an alarm.

D.

Sets the interface state to error-down and generates an alarm.

Full Access
Question # 19

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following statements about the functions of BGP EVPN Type 3 routes is incorrect?

A.

If the VTEP IP address of a Type 3 route is reachable at Layer 3 and the peer VNI is the same as the local VNI, an ingress replication list is created for forwarding BUM packets.

B.

Type 3 routes carry L2VNIs and VTEP IP addresses.

C.

Type 3 routes carry L3VNIs.

D.

If the VTEP IP address carried in the received Type 3 route is reachable at Layer 3, a VXLAN tunnel to the peer end is established.

Full Access
Question # 20

When a client invokes the iMaster NCE-Campus RESTful API, it sends an HTTP request. The server then returns the status code 401.

Which of the following errors has occurred?

A.

The service is unavailable.

B.

Access denied.

C.

The requested resource does not exist.

D.

Unauthorized.

Full Access
Question # 21

On the network shown in the figure, OSPF-based SR-MPLS TE is enabled on all routers. Which of the following adjacency labels are allocated by P3?

A.

9006

B.

9002

C.

9003

D.

9005

Full Access
Question # 22

Port isolation can be deployed on an Ethernet network to implement both Layer 2 communication and Layer 3 isolation, making the networking more flexible.

A.

TRUE

B.

FALSE

Full Access
Question # 23

On a VXLAN-based virtualized campus network, BGP EVPN can be used as the control plane protocol. Which of the following EVPN route types are not used in the virtualized campus network scenario?

A.

Type 3

B.

Type 2

C.

Type 4

D.

Type 1

Full Access
Question # 24

An LSR supports various label retention modes. Which of the following statements regarding the liberal mode are correct?

A.

This label retention mode saves the memory and label space.

B.

An LSR retains labels from a neighboring LSR only when the neighbor is its next hop.

C.

An LSR reserves all labels distributed by its neighbor.

D.

Liberal mode allows the device to retain labels from all LSRs, not just the next hop.

Full Access
Question # 25

In Huawei Open Programmability System (OPS), /ifm/interfaces/interface is the URL used to identify a device ' s managed object.

A.

TRUE

B.

FALSE

Full Access
Question # 26

MPLS is located between the data link layer and network layer in the TCP/IP protocol stack and can provide services for all network layer protocols.

A.

TRUE

B.

FALSE

Full Access
Question # 27

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, run the command on the VTEP to view BGP EVPN routes. The route entries shown in the following figure are displayed. Which of the following statements about these routing entries are correct?

Network (EthTagId/IP Prefix/IP PrefixLen)

NextHop

* > i 0:172.16.2.0:24 1.1.1.2

* > i 0:172.16.13.0:24 1.1.1.2

* > i 0:192.168.122.0:30 1.1.1.2

A.

These routes are Type 5 routes and carry network segment or mask information.

B.

These routes are Type 2 routes and carry host IP addresses.

C.

These routes carry the L2VNI.

D.

These routes carry the L3VNI.

Full Access
Question # 28

Which of the following statements is incorrect about intranet security design for a large or medium-sized virtualized campus network?

A.

Traffic suppression can be configured on the wired network to block broadcast traffic by shutting down interfaces.

B.

Intranet security refers to both wired and wireless network security.

C.

To secure data transmission, the CAPWAP tunnel between the AC and AP supports DTLS encryption.

D.

In addition to terminal access security, air interface security must be considered during wireless network security design.

Full Access
Question # 29

Huawei Open Programmability System (OPS) provides openness and programmability capabilities for network devices and enables users to perform secondary development. To facilitate script completion, Huawei OPS provides the Python script template in which the OPSConnection class is created. The member function for creating device resources is def post(self, uri, req_data).

A.

TRUE

B.

FALSE

Full Access
Question # 30

Which of the following is not the function of OSPFv3 Link-LSAs?

A.

Advertises the interface ID of the local router to other routers attached to the link.

B.

Advertises the link-local address of the local interface to other routers attached to the link.

C.

Advertises a list of IPv6 prefixes of the local interface to other routers attached to the link.

D.

Advertises the Options field in the Network-LSA originated on the local link to other routers attached to the link.

Full Access
Question # 31

Which of the following statements about 802.1X authentication are correct?

A.

802.1X authentication uses EAPoL to exchange authentication information between the client, device, and authentication server.

B.

In EAP termination mode, EAP packets are terminated and re-encapsulated into RADIUS packets on the network access device. The network access device and AAA server use the standard RADIUS protocol to implement authentication, authorization, and accounting.

C.

EAPoL implements EAP encapsulation on an IEEE 802.3 network, whereas EAPoW implements EAP encapsulation on an IEEE 802.11 network.

D.

In EAP relay mode, EAP packets are directly encapsulated by the network access device into RADIUS packets (that is, EAP over RADIUS, or EAPoR). The network access device and AAA server use EAPoR to perform authentication, authorization, and accounting.

Full Access
Question # 32

iMaster NCE-WAN is the core component of the Huawei SD-WAN Solution and is responsible for SD-WAN network management and service orchestration.

A.

TRUE

B.

FALSE

Full Access
Question # 33

In Huawei SD-WAN Solution, which of the following tunneling technologies is used to establish data channels?

A.

IPsec

B.

GRE over IPsec

C.

VXLAN

D.

MPLS

Full Access
Question # 34

Which of the following can be used to transmit traffic to a VXLAN network and implement intra-subnet communication on the same VXLAN network?

A.

Layer 3 VXLAN gateway

B.

NVE interface

C.

VLANIF interface

D.

Layer 2 VXLAN gateway

Full Access
Question # 35

New IS-IS TLVs are used to carry IPv6 addresses and reachability information to support IPv6 route processing and calculation.

A.

TRUE

B.

FALSE

Full Access
Question # 36

Which of the following statements does not cause the flapping of a VRRP group?

A.

Too small interval between Advertisement packet transmissions

B.

Inconsistent preemption delay settings

C.

Packet loss on an interface of the backup device

D.

Flapping on the link transmitting VRRP Advertisement packets

Full Access
Question # 37

There are multiple SR-MPLS TE tunnel protection mechanisms. FRR (Fast Reroute) constructs a virtual node to convert multiple identical route advertisement nodes into a single route advertisement node, and then computes the backup next hop of the virtual node based on the TI-LFA algorithm. In this way, traffic can be quickly switched when a fault occurs.

What is the name of this protection mechanism?

Full Access
Question # 38

Which of the following commands are mandatory for configuring an OSPF-based SR-MPLS TE tunnel? (Select All that Apply)

A.

Configure the LSR ID for routers.

B.

Enable segment routing in the OSPF process view.

C.

Enable the opaque capability of OSPF.

D.

Enable MPLS TE in the OSPF process view.

Full Access
Question # 39

Which of the following statements is incorrect about MP-BGP?

A.

MP-BGP uses the MP_REACH_NLRI and MP_UNREACH_NLRI attributes to advertise VPNv4 routes.

B.

When PEs and CEs exchange routes through BGP, you need to create a BGP process for each VPN instance in the CE.

C.

The packet types and VPNv4 route advertisement policies of MP-BGP are the same as those of BGP-4.

D.

MP-BGP needs to allocate private network labels for VPNv4 routes.

Full Access
Question # 40

BGP Link State (BGP-LS) introduces a new NLRI into BGP. The NLRI carries link, node, topology prefix, and other information, and is also referred to as the link state NLRI.

A.

TRUE

B.

FALSE

Full Access
Question # 41

What can be determined from the following figure?

< R1 > display ipv6 routing-table protocol isis

Public Routing Table : ISIS

Summary Count: 6

ISIS Routing Table ' s Status : < Active >

Summary Count: 6

Destination : 3000:FDEA::4

NextHop : FE80::2E0:FCFF:FE98:2577

Cost : 20

Interface : GigabitEthernet0/0/1

PrefixLength : 128

Preference : 15

Protocol : ISIS-L2

Flags : D

A.

R1 has six IS-IS IPv6 routes.

B.

R1 does not have IS-IS IPv6 routes.

C.

IS-IS IPv6 must have been enabled on GigabitEthernet0/0/1 of R1.

D.

R1 is not a Level-1 device.

Full Access
Question # 42

Which of the following are application optimization functions in the Huawei SD-WAN Solution?

A.

Application identification

B.

Intelligent traffic steering

C.

WAN optimization

D.

QoS

Full Access
Question # 43

What is the router ID length supported by OSPFv3?

A.

128 bits

B.

64 bits

C.

100 bits

D.

32 bits

Full Access
Question # 44

When you configure a virtualized campus network on iMaster NCE-Campus, Fit APs can immediately go online after you add them to iMaster NCE-Campus.

A.

TRUE

B.

FALSE

Full Access
Question # 45

In the firewall hot standby scenario, which of the following status information can be backed up between the active and standby firewalls?

A.

Server mapping table

B.

AAA user table (excluding the default user admin)

C.

Session table

D.

Dynamic MAC address table

Full Access
Question # 46

NETCONF provides a set of mechanisms for managing network devices. What layers can NETCONF be conceptually partitioned into?

A.

Encrypted transport layer, messages layer, operations layer, and content layer

B.

Encrypted transport layer, messages layer, configuration layer, and content layer

C.

Secure transport layer, messages layer, configuration layer, and content layer

D.

Secure transport layer, messages layer, operations layer, and content layer

Full Access
Question # 47

A network administrator runs the display telemetry destination command on a device to check information about a destination group that sampled data is sent to. The command output is as follows. Which of the following statements is incorrect?

[~CE-telemetry-sensor-group-Sensor1]display telemetry destination

Dest-name Dest-addr Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20000 RESOLVED - GRPC

A.

The IP address of the destination group is 192.168.56.1

B.

The destination group name is Dest1.

C.

VPN encapsulation is used for data push.

D.

The gRPC protocol is used for data push.

Full Access
Question # 48

An SRv6 Policy can be either statically configured on a device, or be delivered to a device after being dynamically generated by the controller.

A.

TRUE

B.

FALSE

Full Access
Question # 49

R1 receives a common IPv6 packet from the CE and generates a packet carrying the SRH (Segment Routing Header), as shown in the figure. The packet is forwarded along the path R1 → R2 → R3 → R4. Identify the node type of each device based on their role in SRv6 processing.

Full Access
Question # 50

Which of the following commands needs to be run in the BGP view to enable a VPN instance to advertise IP routes to the BGP-EVPN address family?

A.

advertise irbvfi

B.

advertise vpnv4

C.

advertise irb

D.

advertise l2vpn evpn

Full Access
Question # 51

Which of the following technologies can be used to isolate users in the same VLAN?

A.

Super VLAN

B.

Port isolation

C.

IPSG

D.

Ethernet port security

Full Access
Question # 52

/ifm/interfaces/interface in Huawei Open Programmability System (OPS) is the URL used to identify a device ' s managed object.

A.

TRUE

B.

FALSE

Full Access
Question # 53

Which MPLS label will be used by PE2 for forwarding traffic to 10.0.1.1 based on the following SR-MPLS database?

Given Data (LSDB Information):

    Prefix-SID: 100

    SRGB Base: 40000

A.

39002

B.

40002

C.

38002

D.

36002

Full Access
Question # 54

In the small and midsize campus network design based on the Huawei CloudCampus Solution, when over 100 branches need to communicate with each other, which of the following interconnection networking models is recommended?

A.

Direct networking

B.

Full-mesh networking

C.

Hub-spoke networking

D.

Partial-mesh networking

Full Access
Question # 55

Which of the following inter-AS MPLS L3VPN solutions does not require MPLS to run between ASBRs?

A.

Option C

B.

Option D

C.

Option A

D.

Option B

Full Access
Question # 56

Which of the following statements about prefix segments and adjacency segments are correct?

A.

A prefix SID is a local SID out of the SRGB range.

B.

An adjacency SID is an offset value within the SRGB range advertised by the source end.

C.

A prefix segment identifies the prefix of a destination address on a network.

D.

An adjacency segment identifies an adjacency on a network.

Full Access
Question # 57

Which of the following link types may appear in OSPF Router-LSAs?

A.

TransNet

B.

P-2-P

C.

Vlink

D.

StubNet

Full Access
Question # 58

SR-MPLS is enabled on all routers. The label information encapsulated by R1 into a data packet is shown in the figure.

Which of the following is the forwarding path of the data packet?

A.

R1-R2-R3-R5-R6

B.

R1-R2-R4-R6

C.

R1-R3-R2-R4-R6

Full Access
Question # 59

The free mobility function is deployed on the iMaster NCE-Campus on a campus network. Which of the following information should an administrator pay attention to?

A.

Define security groups.

B.

Deliver the inter-group policy.

C.

Deploy a policy control matrix.

D.

Select the policy enforcement point.

Full Access
Question # 60

Which of the following issues do DiffServ model-based QoS have?

A.

It involves only single-hop behaviors and does not change the network topology.

B.

Independent resources cannot be provided for users.

C.

It does not change service behaviors. If bursty traffic in a single flow is too heavy, congestion still occurs.

D.

The number of queues is small, and SLA assurance cannot be provided for specific users. As a result, deterministic delay assurance cannot be provided.

Full Access
Question # 61

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following BGP EVPN routes is used to advertise MAC addresses, ARP entries, and IRB routes?

A.

Type 3

B.

Type 4

C.

Type 2

D.

Type 1

Full Access
Question # 62

BFD can implement millisecond-level link status detection.

A.

TRUE

B.

FALSE

Full Access
Question # 63

BGP EVPN can be used as the VXLAN control plane protocol to completely prevent traffic flooding, such as broadcast ARP packets, on the VXLAN network.

A.

TRUE

B.

FALSE

Full Access
Question # 64

Which of the following roles is NOT a core role in Huawei ' s Free Mobility solution?

A.

iMaster NCE-Campus

B.

Policy enforcement device

C.

Authentication device

D.

Policy control device

Full Access
Question # 65

An engineer often remotely logs in to the device to check the device status. The engineer can use the Python Paramiko and telnetlib libraries to implement automatic remote login through Python scripts. The remote login implemented using telnetlib is more secure.

A.

TRUE

B.

FALSE

Full Access
Question # 66

On a router, SRv6 is enabled, and the configurations shown below are performed. Which of the following statements about the configurations are correct?

[Router-segment-routing-ipv6] locator srv6_locator1 ipv6-prefix 2001:DB8:ABCD::/64 static 32

A.

The locator of this node is 2001:DB8:ABCD::.

B.

The static segment of the node occupies 32 bits.

C.

The dynamic segment of the node occupies 32 bits.

D.

The Args field of this node occupies 32 bits.

Full Access
Question # 67

A network administrator runs the display telemetry subscription command on a device to check telemetry subscription information. The command output is as follows. Which of the following statements is incorrect?

[~CE] display telemetry subscription

Sub name : Sub1

Sensor group:

Sensor-name Sample-interval(ms) State

Sensor1 1000 RESOLVED

Destination group:

Dest-name Dest-IP Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20030 RESOLVED - GRPC

Sub state : PASSIVE

Total subscription number is : 1

A.

The device sends sampled data every second.

B.

The subscription mode is static subscription.

C.

The IP address of the device is 192.168.56.1.

D.

The subscription name is Sub1.

Full Access
Question # 68

Refer to the following command output on the router R3. Which of the following statements are correct?

< R3 > display interface Tunnel

Tunnel0/0/0 current state : UP

Line protocol current state : UP

Last line protocol up time : 15:21:26 UTC-08:00

Description: HUAWEI, AR Series, Tunnel0/0/0 Interface

Route Port, The Maximum Transmit Unit is 1500

Internet Address is 20.1.1.2/24

Encapsulation is TUNNEL, loopback not set

Tunnel source 10.0.3.3 (LoopBack0), destination 10.0.1.1

Tunnel protocol/transport GRE/IP, key disabled

keepalive disabled

Checksumming of packets disabled

A.

The tunnel destination IP address is 10.0.1.1.

B.

The tunnel interface MTU is 1500 bytes.

C.

The tunnel interface IP address is 20.1.1.2/24.

D.

The tunnel source IP address is 10.0.1.1.

Full Access
Question # 69

Prefix segments and adjacency segments are globally visible and unique.

A.

TRUE

B.

FALSE

Full Access
Question # 70

As shown in the following figure, OSPF is deployed on a campus network to implement network interconnection, and Area 1 is deployed as an NSSA. To enable R1 to access R4’s loopback interface address, an engineer imports a direct route to R4’s OSPF process. Which of the following statements about this scenario are correct?

[R4-ospf-1] import-route direct

Loopback0: 10.1.4.4/32

A.

R2 is an ABR and translates Type 7 LSAs carrying the default route information into Type 5 LSAs.

B.

R2 is an ABR and translates Type 7 LSAs that describe external routes into Type 5 LSAs.

C.

R4 is an ASBR in the NSSA and generates Type 7 LSAs carrying the default route information.

D.

R4 is an ASBR in the NSSA and generates Type 7 LSAs to describe external routes.

Full Access
Question # 71

In OSPFv3, which of the following types of LSAs can be flooded in the entire AS?

A.

AS-external-LSA

B.

Intra-Area-Prefix-LSA

C.

Link-LSA

D.

Inter-Area-Prefix-LSA

Full Access
Question # 72

The TTL field encapsulated in the MPLS label header can prevent infinite loops of MPLS packets. Which of the following statements regarding the TTL field are correct?

A.

If TTL copy is disabled, users can use the tracert function to view the LSR of the MPLS domain.

B.

The processing of IP TTL copy hides the LSR in an MPLS domain, improving network security.

C.

MPLS provides two processing modes on the TTL field:TTL in the MPLS header copies the IP TTL value when an IP packet enters the MPLS network.The ingress LER sets the TTL value in the MPLS header to 255.

D.

MPLS encapsulation in frame mode supports the TTL field. MPLS encapsulation in cell mode does not support the TTL field.

Full Access
Question # 73

An SR-MPLS Policy needs to divert service traffic to a tunnel for forwarding. If traffic from various services is destined for the same address, which of the following traffic diversion modes is recommended to ensure the quality of each service?

A.

Endpoint-based traffic diversion

B.

Color-based traffic diversion

C.

5-tuple-based traffic diversion

D.

DSCP-based traffic diversion

Full Access
Question # 74

Among NETCONF operations, the < config > operation may contain an operation attribute, which is used to specify an operation type for configuration data. Which of the following operation attributes is incorrect?

A.

remove

B.

merge

C.

create

D.

update

Full Access
Question # 75

iMaster NCE-Campus provides the terminal identification function to display the terminal type, operating system, and manufacturer information.

A.

TRUE

B.

FALSE

Full Access
Question # 76

Which of the following items are included in static information collection and analysis?

A.

Device types

B.

Interface types

C.

License

D.

Packet loss rate

Full Access
Question # 77

The RR (Route Reflector) is critical to the Huawei SD-WAN Solution, and its deployment mode varies based on the scenario. In which of the following modes can an RR be deployed?

A.

Multi-area deployment of the RR

B.

Independent deployment of the RR

C.

Co-deployment of the RR and hub site

D.

Partially independent deployment of the RR

Full Access
Question # 78

What can be determined from the following IS-IS peer output?

Peer information for ISIS(1):

    Peer System ID: ee8c.a0c2.baf3

    Interface: GE0/0/0

    State: Up

    HoldTime: 7s

    Type: L1

    PRI: 64

    MT IDs supported: 0(UP), 2(UP)

    Local MT IDs: 0, 2

    Area Address(es): 49.0022

    Peer IP Address(es): 10.1.34.1

    Peer IPv6 Address(es): FE80::2E0:FCFF:FE98:2576

A.

Both IPv4 and IPv6 IS-IS neighbor relationships are established between R4 and ee8c.a0c2.baf3.

B.

R4 does not have any IS-IS neighbors.

C.

Only an IPv4 IS-IS neighbor relationship is established between R4 and ee8c.a0c2.baf3.

D.

Only an IPv6 IS-IS neighbor relationship is established between R4 and ee8c.a0c2.baf3.

Full Access
Question # 79

Which of the following statements about static VXLAN tunnel configuration are correct?

A.

On an NVE interface, the destination address of a VXLAN tunnel is specified based on the address in the ingress replication list. You can create one NVE interface for multiple VXLAN tunnels.

B.

An NVE interface can be associated with multiple VNIs. Therefore, you can create one NVE interface when there are multiple BDs.

C.

One NVE interface must be created for each VXLAN tunnel, and the source and destination IP addresses must be specified for the NVE interface. Therefore, the number of NVE interfaces is the same as the number of VXLAN tunnels on the VTEP.

D.

One NVE interface must be created for each BD. If there are multiple BDs, multiple NVE interfaces must be created.

Full Access
Question # 80

Huawei Open Programmability System (OPS) uses HTTP methods to access managed objects to manage network devices. To facilitate script compilation, Huawei OPS provides the Python script template. In the Python script template, what are the contents of the Content-type and Accept fields in the header of an HTTP request packet?

A.

text/xml, text/json

B.

text/json, text/json

C.

text/xml, text/xml

D.

text/json, text/xml

Full Access
Question # 81

To enhance reliability, you can deploy Huawei iMaster NCE-WAN controllers in active/standby mode. Which of the following IP addresses must be configured to be the same for the active and standby controllers so that the controllers can be accessed properly? (Select All that Apply)

A.

Southbound public IP addresses

B.

Internal interconnection addresses

C.

Southbound private IP addresses

D.

Northbound IP addresses

Full Access
Question # 82

In the Huawei CloudCampus Solution, which of the following deployment modes are supported by Huawei switches?

A.

DHCP Option 148

B.

CLI

C.

Web interface

D.

Huawei registration center

Full Access
Question # 83

In the firewall hot standby scenario, in which of the following conditions will the local device proactively send VGMP packets?

A.

Hot standby being disabled

B.

Priority increase

C.

Link detection packet timeout

D.

Hot standby being enabled

Full Access
Question # 84

Which of the following technologies can be used to measure performance based on actual service traffic in Huawei ' s CloudWAN solution?

A.

TWAMP

B.

BGP FlowSpec

C.

Telemetry

D.

iFIT

Full Access
Question # 85

Free mobility implements policy management and permission control based on users ' VLAN IDs and IP addresses.

A.

TRUE

B.

FALSE

Full Access
Question # 86

This figure shows an SRv6 (Segment Routing over IPv6) packet. If the Destination Address field in the IPv6 basic header is FC04::4, the value of the SL (Segment Left) field in the SRv6 header should be ____. (Enter only digits.)

Full Access
Question # 87

OSPFv3 link LSAs are advertised in the entire area.

A.

TRUE

B.

FALSE

Full Access
Question # 88

Which of the following types of LSAs does OSPF use to support SR-MPLS?

A.

Type 7 NSSA External LSA

B.

Type 10 Opaque LSA

C.

Type 1 Router LSA

D.

Type 2 Network LSA

Full Access
Question # 89

Which of the following methods can be used to establish IPsec SAs? (Select All that Apply)

A.

Establish IPsec SAs through template negotiation

B.

Establish IPsec SAs in IKE auto-negotiation mode

C.

Establish IPsec SAs through certificate negotiation

D.

Manually establish IPsec SAs

Full Access
Question # 90

In addition to indicating priority, the DSCP value can also indicate the drop probability. Which of the following DSCP values is set with the highest drop probability?

A.

AF43

B.

AF10

C.

AF12

D.

AF11

Full Access
Question # 91

Which of the following statements regarding RT are correct?

A.

Each VPN instance is associated with one or more pairs of VPN Target attributes, used to control VPN routing information advertisement and reception between sites.

B.

Export Target and Import Target are independent of each other and support multiple values to implement flexible VPN routing information advertisement and reception control.

C.

RTs are classified into two types: Export Target and Import Target.

D.

The RT value is advertised to neighbors through the BGP extended community attribute in Update messages.

Full Access
Question # 92

Which of the following statements about SR-MPLS Policy path planning are correct?

A.

When planning paths based on bandwidth, you need to set the available bandwidth of each interface in advance.

B.

When planning paths based on delay, you must deploy TWAMP or iFIT in advance to measure real-time network delay.

C.

If you use the controller to plan SR-MPLS Policy paths, only primary and backup paths can be deployed, and load balancing cannot be implemented for the primary path.

D.

When statically planning SR-MPLS Policy paths, you can plan load balancing for the primary path.

Full Access
Question # 93

When an NVE encapsulates a data frame into a VXLAN packet, information of which of the following protocols is encapsulated between the outer IP header and the VXLAN header?

A.

IP

B.

TCP

C.

UDP

D.

Ethernet

Full Access
Question # 94

Which of the following statements about IPSG is incorrect?

A.

IPSG can be used to check the validity of IP packets. If IP packets are invalid, the device reports an alarm to an NMS.

B.

IPSG is a source IP address filtering technology based on Layer 3 interfaces.

C.

IPSG can be used to prevent hosts from changing IP addresses.

D.

IPSG can defend against IP address spoofing attacks.

Full Access
Question # 95

During WLAN planning and design, channels 1, 6, and 11 are recommended on the 2.4 GHz frequency band, and channels 1, 5, 9, and 13 are recommended in high-density scenarios. On the 5 GHz frequency band, it is recommended that high-frequency and low-frequency channels of adjacent APs be staggered to prevent overlapping.

A.

TRUE

B.

FALSE

Full Access
Question # 96

Free mobility is deployed on a campus network through iMaster NCE-Campus. During this deployment, which of the following steps are performed by administrators and which are automatically performed by iMaster NCE-Campus? Drag the administrators and iMaster NCE-Campus icons on the left to the corresponding steps on the right.

Full Access