Winter Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

H12-811_V1.0 HCIA-Datacom V1.0 Exam Questions and Answers

Questions 4

Which of the following commands is used to display the CPU usage of a router?

Options:

A.

display cpu-state

B.

display interface

C.

display cpu-usage

D.

display memory

Buy Now
Questions 5

If the network administrator assigns the IPv4 address 192.168.1.1/28 to a host on the network, how many hosts can be added to the network where the host resides?

Options:

A.

13

B.

15

C.

14

D.

12

Buy Now
Questions 6

How many bytes are there in a basic IPv6 header?

Options:

A.

40

B.

48

C.

32

D.

64

Buy Now
Questions 7

What function does Ctrl+Z have in the VRP system?

Options:

A.

Exits the console interface view.

B.

Exits the interface view.

C.

Returns from any view to the user view.

D.

Exits the current view.

E.

Returns from the system view to the user view.

Buy Now
Questions 8

When a host uses the IP address 192.168.1.2 to access the Internet, NAT must be performed.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 9

The Priority field in a VLAN tag can be used to identify the priority of a data frame. What is the value range of the field?

Options:

A.

0 to 3

B.

0 to 15

C.

0 to 7

D.

0 to 63

Buy Now
Questions 10

Which of the following is not a type of OSPF LSA?

Options:

A.

LSA

B.

LSU

C.

LSR

D.

LSACK

Buy Now
Questions 11

The network administrator performs the configuration shown in the following figure on RTA. If a user needs to be authenticated in the authentication domain named huawei, which of the following statements is true?

Options:

A.

The authentication scheme au2 is used for authentication.

B.

The authentication scheme aul is used for authentication.

C.

The authentication scheme au2 is used for authentication. If the authentication scheme au2 is deleted, the authentication scheme aul is used.

D.

The authentication scheme aul is used for authentication. If the authentication scheme aul is deleted, the authentication scheme au2 is used.

Buy Now
Questions 12

Which of the following statements regarding static routing and dynamic routing is incorrect?

Options:

A.

Dynamic routing will use more resources than static routes.

B.

The static routing can automatically recover when a link failure is encountered.

C.

The use of dynamic routing is more convenient for the administrator to manage the network following network convergence.

D.

The static routing can be easily configured and managed on the enterprise network.

Buy Now
Questions 13

In RSTP, a backup port can replace a faulty root port.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 14

By referring to the network structure and OSPF areas shown in the figure, it can be determined that all routers on the network except RTA are ABRs.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 15

When the host accesses the web service of the server, the value of the "Protocol" field at the network layer is 6.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 16

Which SNMP version focuses on two main aspects, namely security and administration? The security aspect is addressed by offering both strong authentication and data encryption for privacy. The administration aspect is focused on two parts, namely notification originators and proxy forwarders.

Options:

A.

SNMPv2

B.

SNMPv2c

C.

SNMPv3

D.

SNMPv1

Buy Now
Questions 17

A Layer 2 ACL can match information such as the source MAC address, destination MAC address, source IP address, and destination IP address.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 18

Which statement is true regarding the following command?

ip route-static 10.0.12.0 255.255.255.0 192.168.1.1

Options:

A.

The configuration represents a static route to the 10.0.12.0 network.

B.

The configuration represents a static route to the 192.168.1.1 network.

C.

If the router has learned the same destination network via a dynamic routing protocol, the static route will always take precedence.

D.

The preference value of this configured route is 100.

Buy Now
Questions 19

Which of the following MAC addresses cannot be used as the MAC address of host network adapters?

Options:

A.

0002-0304-05-06

B.

02-03-04-05-06-07

C.

01-02-03-04-05-06

D.

03-04-05-06-07-08

Buy Now
Questions 20

If the transport-layer protocol is UDP, the value of the "Protocol" field at the network layer is 6.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 21

The rules in an ACL may overlap. If packets match the rules with loose conditions, the later ACL rules are not processed. In this case, packets cannot match the rules with strict conditions. Therefore, the rules with strict conditions must be arranged in front lines and those with loose conditions must be arranged towards the end.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 22

Which of the following IPv4 addresses can be directly used by a host to access the Internet?

Options:

A.

172.32.1.1/24

B.

10.255.255.254/24

C.

192.168.1.1/24

D.

172.16.255.254/24

Buy Now
Questions 23

(Refer to the display startup command output shown in the figure on an AR2200 router. Which of the following statements about the command output is false?)

display startup

MainBoard:

Startup system software: sdl:/ar2220-v200r003c00spc200.cc

Next startup system software: sdl:/ar222b-v200r003c00spc200.cc

Backup system software for next startup: null

Startup saved-configuration file: null

Next startup saved-configuration file: null

Startup license file: null

Next startup license file: null

Startup patch package: null

Next startup patch package: null

Startup voice-files: null

Next startup voice-files: null

Options:

A.

The system file for next startup cannot be modified.

B.

The startup system software command can be used to modify the system software for next startup.

C.

The running configuration file is not saved.

D.

The system file used for the current startup is ar2220-v200r003c00spc200.cc.

Buy Now
Questions 24

On VRP, the command lines are classified into four levels in increasing priority: Visit level, Monitoring level, Configuration level, and Management level. At which level, the operator is permitted to configure service but is not permitted to operate the file system?

Options:

A.

Visit level

B.

Configuration level

C.

Monitoring level

D.

Management level

Buy Now
Questions 25

Which of the following configurations can prevent Host A and Host B from communicating with each other?

H12-811_V1.0 Question 25

Options:

A.

acl number 2000

rule 5 deny source 100.0.12.0 0.0.0.255

interface GigabitEthernet0/0/1

traffic-filter inbound acl 2000

B.

acl number 2000

rule 5 deny source 100.0.12.0 0.0.0.255

interface GigabitEthernet0/0/2

traffic-filter inbound acl 2000

C.

acl number 2000

rule 5 deny source 100.0.12.0 0.0.0.255

interface GigabitEthernet0/0/3

traffic-filter inbound acl 2000

D.

acl number 2000

rule 5 deny source 100.0.12.0 0.0.0.255

interface GigabitEthernet0/0/1

traffic-filter outbound acl 2000

Buy Now
Questions 26

Which of the following port numbers is used by the FTP control plane?

Options:

A.

22

B.

23

C.

21

D.

24

Buy Now
Questions 27

(An Eth-Trunk interface can be used only as a Layer 2 interface.)

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 28

What is used as the data link-layer MAC address that identifies each VAP on an AP?

Options:

A.

BSSID

B.

SSID

C.

BSS

D.

ESS

Buy Now
Questions 29

Which of the following is a link-state routing protocol?

Options:

A.

FTP

B.

OSPF

C.

Direct

D.

Static

Buy Now
Questions 30

The data link layer uses PPP encapsulation. The IP addresses of the two ends of the link can be in different network segments.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 31

For STP, the Message Age in the configuration BPDUs sent by the root bridge is 0.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 32

Which of the following mask lengths is recommended for device interconnection IP addresses during campus network planning?

Options:

A.

30

B.

32

C.

24

D.

16

Buy Now
Questions 33

Loops may cause broadcast storms on a Layer 2 network.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 34

Dynamic routing protocols can automatically adapt to network topology changes.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 35

Following a failure of services in the network, an administrator discovered that the configuration in one of the enterprise routers had been changed. What actions can be taken by the administrator to prevent further changes?

Options:

A.

The administrator should configure an ACL to allow only the administrator to manage the router.

B.

The administrator should configure port-security on the router.

C.

The administrator should limit access by setting the login privilege of users to level 0.

D.

The administrator should configure AAA to manage user authorization on the router.

Buy Now
Questions 36

Which of the following is not a common network layer in a midsize campus network?

Options:

A.

Core layer

B.

Network layer

C.

Access layer

D.

Aggregation layer

Buy Now
Questions 37

(Which of the following is a dynamic IGP routing protocol?)

Options:

A.

Static

B.

BGP

C.

Direct

D.

OSPF

Buy Now
Questions 38

Refer to the following configuration of a switch interface. Which of the following statements is false?

interface GigabitEthernet0/0/1

port link-type trunk

port trunk pvid vlan 200

port trunk allow-pass vlan 100

Options:

A.

If the VLAN tag carried in a data frame is 100, the switch removes the VLAN tag before sending the data frame.

B.

If the interface receives data frames without VLAN tags, the switch needs to tag the data frames with VLAN 200.

C.

The interface cannot send data frames tagged with VLAN 200.

D.

The link type of the interface is trunk.

Buy Now
Questions 39

The router that runs OSPF first enters the Full state and then synchronizes the LSDB.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 40

(Which of the following are not main functions of routers?)

Options:

A.

Routers forward data packets based on source IP addresses.

B.

Routers enable devices on the same network segment to communicate with each other.

C.

Routers forward data packets according to routing tables.

D.

Routers learn routes through multiple routing protocols and add them to the routing table.

Buy Now
Questions 41

(When a network engineer enters a command, the following information is displayed:

Error: Unrecognized command found at 'A' position. Which of the following statements is true about such information?)

Options:

A.

The entered parameter is not specified.

B.

The entered command is incomplete.

C.

The parameter type is incorrect.

D.

No keyword is found.

Buy Now
Questions 42

(The IPv6 address architecture does not include which of the following address types?)

Options:

A.

Unicast.

B.

Anycast.

C.

Multicast.

D.

Broadcast.

Buy Now
Questions 43

(Which of the following methods can be used to assign service VLANs during campus network planning?)

Options:

A.

VLAN assignment by service type

B.

VLAN assignment by logical area

C.

VLAN assignment by geographic area

D.

VLAN assignment by personnel structure

Buy Now
Questions 44

Which of the following packets are OSPF packets?

Options:

A.

LSA

B.

HELLO

C.

LSR

D.

LSU

Buy Now
Questions 45

It is advised to assign static IP addresses to servers during campus network planning.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 46

When an AP and an AC are located on different Layer 3 networks, which of the following methods is recommended for the AP when discovering the AC?

Options:

A.

Broadcast

B.

DHCP

C.

Manually specified on the AP

D.

DNS

Buy Now
Questions 47

The users who log on the router through Telnet are not permitted to configure an IP address. What is the possible reason?

Options:

A.

Privilege level of Telnet is set incorrectly.

B.

SNMP parameters are set incorrectly.

C.

The authentication mode of Telnet is set incorrectly.

D.

Communication failures occur between the user and the router.

Buy Now
Questions 48

In the following figure, all links are Ethernet links, and all interfaces on the routers are running OSPF. Given this, how many DRs will be elected on this network?

H12-811_V1.0 Question 48

Options:

A.

1

B.

2

C.

3

D.

4

Buy Now
Questions 49

Which of the following elements are included in a routing table?

Options:

A.

Cost

B.

Next-hop address

C.

Protocol

D.

Interface

E.

Destination/Mask

Buy Now
Questions 50

Which of the following statements about static routes on Huawei devices is false?

Options:

A.

The default preference value of a static route is 60.

B.

When the preference value of a static route is 0, this static route is selected as the optimal route.

C.

The cost of a static route cannot be changed.

D.

The preference value of a static route is in the range 1 to 255.

Buy Now
Questions 51

SWA and SWB run RSTP. Which of the following statements are true?

H12-811_V1.0 Question 51

Options:

A.

G0/0/3 of SWB is a backup port.

B.

G0/0/3 of SWA is a designated port.

C.

G0/0/3 of SWB is an alternate port.

D.

G0/0/2 of SWA is a designated port.

Buy Now
Questions 52

The following figure shows the configuration of a sub-interface on a router. For which VLAN does the sub-interface receive tagged data frames?

Options:

A.

20

B.

1

C.

30

D.

100

Buy Now
Questions 53

For the Versatile Routing Platform (VRP), the login timeout period can be set only on a VTY interface.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 54

On the network shown in the following figure, assuming that SWA, SWB, and SWC retain factory defaults, which of the following ports will be selected as a designated port?

H12-811_V1.0 Question 54

Options:

A.

G0/0/2 on SWC

B.

G0/0/3 on SWA

C.

G0/0/1 on SWB

D.

G0/0/1 on SWC

Buy Now
Questions 55

Which of the following is the default value of the Router Dead Interval field in OSPF Hello packets on a broadcast network?

Options:

A.

20 seconds

B.

30 seconds

C.

40 seconds

D.

10 seconds

Buy Now
Questions 56

Which of the following commands sets the data forwarding mode on an AC to direct forwarding?

Options:

A.

forward mode tunnel

B.

forward-mode direct-forward

C.

forward-mode capwap-forward

D.

forward-mode direct

Buy Now
Questions 57

An administrator wishes to manage the router in the remote branch office, which method can be used?

Options:

A.

Console Connection

B.

FTP

C.

Telnet

D.

DHCP

Buy Now
Questions 58

You can run the user-interface maximum-vty command to configure the maximum number of users who can log in to the device through Telnet simultaneously.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 59

(The administrator performs the configuration shown in the figure on a router, and a host is connected to Gi/0/0 of the router. Which of the following statements is true about the IP address obtained by the host through DHCP?)

Options:

A.

The host cannot obtain an IP address.

B.

The IP address obtained by the host belongs to the 10.10.10.0/24 network segment.

C.

The IP address obtained by the host belongs to the 10.20.20.0/24 network segment.

D.

The IP address obtained by the host may belong to the 10.10.10.0/24 or 10.20.20.0/24 network segment.

Buy Now
Questions 60

Which of the following methods is not supported by the Versatile Routing Platform (VRP) to configure a router?

Options:

A.

Configure the router through FTP.

B.

Configure the router through the mini USB port.

C.

Configure the router through Telnet.

D.

Configure the router through the console port.

Buy Now
Questions 61

An ACL rule is as follows. Which of the following IP addresses can be matched by the permit rule?

rule 5 permit ip source 10.0.2.0 0.0.254.255

Options:

A.

10.0.6.7

B.

10.0.5.6

C.

10.0.4.5

D.

10.0.2.1

Buy Now
Questions 62

Refer to the display startup command output shown in the figure. Which of the following statements are true?

Options:

A.

The current VRP configuration file is different from that used for next startup.

B.

The current VRP configuration file is the same as that used for next startup.

C.

The current VRP version file is different from that used for next startup.

D.

The current VRP version file is the same as that used for next startup.

Buy Now
Questions 63

What is the total length of the port ID in STP?

Options:

A.

8 bits

B.

4 bits

C.

16 bits

D.

2 bits

Buy Now
Questions 64

When an Ethernet frame is received by an interface on a Layer 2 Ethernet switch, which field is used to generate an entry in the MAC address table?

Options:

A.

Destination MAC address

B.

Source MAC address

C.

Source IP address

D.

Destination IP address

Buy Now
Questions 65

What is the default lease time of the IP address allocated by the DHCP server?

Options:

A.

18 hours

B.

12 hours

C.

1 hour

D.

24 hours

Buy Now
Questions 66

Which of the following networks are LANs?

Options:

A.

Home network

B.

Metropolitan Area Network (MAN)

C.

Internet

D.

Office network of a company

Buy Now
Questions 67

For STP, the default root path cost of the root bridge is 0.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 68

telnetlib is a module provided by Python to implement the Telnet protocol.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 69

On the Huawei VRP, what is the default preference of different route types, in descending order?

Options:

A.

Direct > Static > RIP > OSPF

B.

Direct > OSPF > RIP > Static

C.

Direct > RIP > Static > OSPF

D.

Direct > OSPF > Static > RIP

Buy Now
Questions 70

If Proto of a route displayed in the routing table is OSPF, the preference of the route must be 10.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 71

A network administrator wishes to assign an IP address to a router interface G0/0/0. Which of the following IP addresses can be assigned?

Options:

A.

237.6.1.2/24

B.

127.3.1.4/28

C.

145.4.2.55/26

D.

192.168.10.112/30

Buy Now
Questions 72

Which of the following methods can be used to add APs on an AC?

Options:

A.

Import APs when they are offline.

B.

Add APs when they are online.

C.

Configure the AC to automatically discover APs.

D.

Manually confirm APs in the list of unauthorized APs.

Buy Now
Questions 73

Refer to the following configuration of an interface on a switch. For which VLAN does the interface remove VLAN tags before forwarding data frames?

go

CopyEdit

interface GigabitEthernet0/0/1

port link-type trunk

port trunk pvid vlan 10

port trunk allow-pass vlan 10 20 30 40

Options:

A.

10

B.

30

C.

20

D.

40

Buy Now
Questions 74

On the network shown in the figure, Host A and Host B cannot communicate with each other.

H12-811_V1.0 Question 74

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 75

In the following figure, all links are Ethernet links, and all interfaces on the routers are running OSPF. Given this, how many DRs will be elected on this network?

H12-811_V1.0 Question 75

Options:

A.

1

B.

3

C.

4

D.

2

Buy Now
Questions 76

An ACL is essentially a packet filter. An ACL takes effect only after it is applied to a service module.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 77

A Layer 2 switch works at the data link layer. As such, it can identify MAC addresses in data frames, forward data based on MAC addresses, and record mappings between MAC addresses and interface numbers in its MAC address table.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 78

Which of the following states indicates that the OSPF neighbor relationship has been established?

Options:

A.

Attempt

B.

Down

C.

Full

D.

2-way

Buy Now
Questions 79

The IP address 192.168.1.127/25 represents a ( ) address.

Options:

A.

Broadcast

B.

Multicast

C.

Host

D.

Network

Buy Now
Questions 80

Which is a valid EUI-64 address?

Options:

A.

00E0-FCEF-FFFE-0FEC

B.

02E0-FCFF-FEEF-0FEC

C.

02E0-FCEF-FFFE-0FEC

D.

00E0-FCFF-FEEF-0FEC

Buy Now
Questions 81

Which of the following is not a characteristic of small campus networks?

Options:

A.

Simple network requirements

B.

Wide coverage

C.

Simple network architecture

D.

Small number of users

Buy Now
Questions 82

After a switch restarts, static MAC address entries saved on the switch remain in the MAC address table.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 83

If the value of the "Type/Length" field of an Ethernet data frame is 0x0800, the length range of the upper-layer packet header carried by the data frame is from 20B to 60B.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 84

According to the one-armed routing configurations shown in the figure, even if ARP proxy is disabled on the sub-interface of R1, the Administration Dept and Finance Dept can still communicate with each other.

H12-811_V1.0 Question 84

Options:

A.

TRUE

B.

FALSE

Buy Now
Exam Code: H12-811_V1.0
Exam Name: HCIA-Datacom V1.0 Exam
Last Update: Feb 1, 2025
Questions: 304

PDF + Testing Engine

$66  $164.99

Testing Engine

$50  $124.99
buy now H12-811_V1.0 testing engine

PDF (Q&A)

$42  $104.99
buy now H12-811_V1.0 pdf