Summer Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

H12-891_V1.0 HCIE-Datacom V1.0 Questions and Answers

Questions 4

Free mobility implements policy management and permission control based on users' VLAN IDs and IP addresses.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 5

SR-MPLS uses the MPLS forwarding plane, and therefore requires MPLS to be enabled. Which of the following conditions must be met for MPLS to be automatically enabled on an interface? (Select all that apply)

Options:

A.

The SRGB is configured for the IGP process.

B.

Segment routing is enabled for IGP, and IGP is enabled on the interface.

C.

The static adjacency label of the corresponding interface is configured in the segment routing view.

D.

Segment routing is enabled in the system view.

Buy Now
Questions 6

A 32-bit MPLS header consists of a 20-bit label used for packet forwarding, a 3-bit EXP field that identifies the IP packet priority, a 1-bit bottom-of-stack flag that identifies the last label, and an 8-bit TTL field. Which statement regarding the TTL field is correct?

Options:

A.

This field is used to control the upstream device in label distribution.

B.

This field is used for label management.

C.

This field limits the LSR.

D.

This field is used to prevent packet forwarding loops, similar to the TTL field in an IP header.

Buy Now
Questions 7

OSPF is deployed on a campus network to implement network interconnection. The LSDB of R2 is shown in the figure.

H12-891_V1.0 Question 7

What can be determined from the LSDB?

Options:

A.

Area 1 is an NSSA.

B.

R2 translates Type 7 default route into Type 5 default route.

C.

R2 advertises the default route in the OSPF process.

D.

Area 1 does not have Type 3 LSAs. The possible cause is that R2 filters Type 3 LSAs in the outbound direction of area 1.

Buy Now
Questions 8

OSPF is a mature protocol and is unlikely to have route computation errors in a regular networking environment under correct configurations. Which of the following statements are correct about the possible causes preventing an OSPF neighbor relationship from entering Full state?

Options:

A.

A link works abnormally.

B.

The OSPF network types on both ends of the link are inconsistent.

C.

The router IDs of neighbors are the same.

D.

The OSPF MTU values of interfaces on both ends of the link are different.

Buy Now
Questions 9

Which of the following statements are correct about authentication points and policy enforcement points in Huawei's free mobility solution?

Options:

A.

The policy enforcement point executes inter-group policies based on security groups.

B.

The authentication point and policy enforcement point must be deployed on the same device.

C.

When receiving user traffic, the authentication point enforces a policy to process the traffic based on the source or destination security group corresponding to the source or destination IP address of the traffic.

D.

The authentication point and policy enforcement point can be deployed on different devices.

Buy Now
Questions 10

Huawei Open Programmability System (OPS) uses HTTP methods to access managed objects to manage network devices. HTTP is the most widely used network transmission protocol on the Internet. By default, the TCP port number _____ is used. (Fill in Arabic numerals.)

Options:

Buy Now
Questions 11

NETCONF uses an XML-based encoding format. NETCONF uses text files to represent complex hierarchical data. Which of the following statements are correct about the following XML file?

Learners

Huawei

<heading>Reminder</heading>

<body>Don't forget Reading!</body>

Options:

A.

encoding: indicates the character set encoding format. Currently, only UTF-8 encoding is supported.

B.

/: indicates the end of the current tag.

C.

D.

?>: indicates the end of an instruction.

Buy Now
Questions 12

An engineer uses two routers to perform IPv6 tests and wants to use OSPFv3 for IPv6 network connectivity. Which of the following OSPFv3 configurations for R1 are correct?

H12-891_V1.0 Question 12

Options:

A.

[R1-GigabitEthernet0/0/1] ospfv3 1 area 0

B.

[R1-ospfv3-1] router-id 10.1.1.1

C.

[R1-ospfv3-1-area-0.0.0.0] network 2001:DB8:2345:12::1 ::

D.

[R1] router id 10.1.1.1

Buy Now
Questions 13

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following fields is not carried in BGP EVPN Type 2 routes?

Options:

A.

IP Prefix

B.

IP Address

C.

L3VNI

D.

L2VNI

Buy Now
Questions 14

Which of the following are application optimization functions in the Huawei SD-WAN Solution?

Options:

A.

Application identification

B.

Intelligent traffic steering

C.

WAN optimization

D.

QoS

Buy Now
Questions 15

In an MPLS VPN network, two-layer MPLS labels are added into data packets before they are transmitted over the public network. Which of the following statements regarding data packet processing are correct?

Options:

A.

The egress PE sends the data packet to the correct VPN based on the inner label.

B.

The penultimate hop removes the outer label before forwarding the data packet to a peer egress PE.

C.

The IP data packet received by egress LSR is without labels.

D.

The penultimate-hop device receives a packet with an outer label.

Buy Now
Questions 16

Which of the following statements is incorrect about intranet security design for a large or medium-sized virtualized campus network?

Options:

A.

In addition to terminal access security, interface security must be considered during wireless network security design.

B.

Traffic suppression can be configured on the wired network to block broadcast traffic by shutting down interfaces.

C.

To secure data transmission, the CAPWAP tunnel between the AC and AP supports DTLS encryption.

D.

Intranet security refers to both wired and wireless network security.

Buy Now
Questions 17

In the CloudCampus public cloud scenario, if deployment through the Huawei registration query center is used, you do not need to configure DHCP Option 148 on the DHCP server of the campus network.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 18

Which of the following is not the function of OSPFv3 Link-LSAs?

Options:

A.

Advertises the interface ID of the local router to other routers attached to the link.

B.

Advertises the link-local address of the local interface to other routers attached to the link.

C.

Advertises a list of IPv6 prefixes of the local interface to other routers attached to the link.

D.

Advertises the Options field in the Network-LSA originated on the local link to other routers attached to the link.

Buy Now
Questions 19

Which of the following statements isincorrectabout adding devices on a virtualized network deployed using iMaster NCE-Campus?

Options:

A.

iMaster NCE-Campus allows users to add devices in batches.

B.

iMaster NCE-Campus allows users to add devices by device role.

C.

iMaster NCE-Campus allows users to add devices by device ESN.

D.

iMaster NCE-Campus allows users to add devices by device model.

Buy Now
Questions 20

Refer to the following command output on the router R3. Which of the following statements are correct?

display interface Tunnel

Tunnel0/0/0 current state : UP

Line protocol current state : UP

Last line protocol up time : 15:21:26 UTC-08:00

Description: HUAWEI, AR Series, Tunnel0/0/0 Interface

Route Port, The Maximum Transmit Unit is 1500

Internet Address is 20.1.1.2/24

Encapsulation is TUNNEL, loopback not set

Tunnel source 10.0.3.3 (LoopBack0), destination 10.0.1.1

Tunnel protocol/transport GRE/IP, key disabled

keepalive disabled

Checksumming of packets disabled

Options:

A.

The tunnel destination IP address is 10.0.1.1.

B.

The tunnel interface MTU is 1500 bytes.

C.

The tunnel interface IP address is 20.1.1.2/24.

D.

The tunnel source IP address is 10.0.1.1.

Buy Now
Questions 21

IS-IS supports multi-instance and multi-process. Which of the following statements are correct about IS-IS multi-instance and multi-process?

Options:

A.

One IS-IS process can be associated with only one VPN instance.

B.

One VPN instance can be associated with multiple different IS-IS processes.

C.

One IS-IS process can be associated with multiple different VPN instances.

D.

If multiple IS-IS processes are created on an IS-IS router, these processes are independent of each other.

Buy Now
Questions 22

The Ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is ______ IRB forwarding. (Capitalize the first letter.)

Options:

Buy Now
Questions 23

Which of the following statements about DHCP snooping isincorrect?

Options:

A.

After DHCP snooping is enabled in the view of a VLAN, it takes effect for the VLAN's DHCP messages received by all the interfaces of the device.

B.

After DHCP snooping is enabled globally, the device processes only DHCPv4 messages by default if no parameter is specified.

C.

DHCP snooping can prevent attacks by configuring trusted interfaces.

D.

After DHCP snooping is enabled in the view of an interface, it takes effect for all DHCP messages on the interface.

Buy Now
Questions 24

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following BGP EVPN routes is used to advertise MAC addresses, ARP entries, and IRB routes?

Options:

A.

Type 3

B.

Type 4

C.

Type 2

D.

Type 1

Buy Now
Questions 25

In the Huawei SD-WAN Solution, which of the following routing protocols is used to advertise VPN routes between CPEs?

Options:

A.

RIP

B.

OSPF

C.

IS-IS

D.

BGP

Buy Now
Questions 26

Based on the figure, which of the following statements are correct?

tracert 172.17.1.5

1 10.1.12.2 40 ms 10 ms 10 ms

2 10.1.24.2 30 ms 20 ms 20 ms

3 10.1.34.1 20 ms 20 ms 20 ms

4 10.1.13.1 20 ms 20 ms 10 ms

5 10.1.12.2 20 ms 30 ms 20 ms

6 10.1.24.2 30 ms 30 ms 30 ms

7 10.1.34.1 50 ms 40 ms 40 ms

8 10.1.13.1 20 ms 30 ms 30 ms

Options:

A.

A. R1 does not have a route to 172.17.1.5.

B.

B. R1 has a route to 172.17.1.5.

C.

C. The path for R1 to access 172.17.1.5 is normal.

D.

D. A loop occurs when R1 accesses 172.17.1.5.

Buy Now
Questions 27

The Ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is _____ IRB forwarding. (Capitalize the first letter.)

Options:

Buy Now
Questions 28

Huawei Open Programmability System (OPS) provides openness and programmability capabilities for network devices and enables users to perform secondary development. To facilitate script completion, Huawei OPS provides the Python script template in which the OPSConnection class is created. The member function for creating device resources is def post(self, uri, req_data).

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 29

Which of the following commands needs to be run in the BGP view to enable a VPN instance to advertise IP routes to the BGP-EVPN address family?

Options:

A.

advertise irbvfi

B.

advertise vpnv4

C.

advertise irb

D.

advertise l2vpn evpn

Buy Now
Questions 30

In BGP4+, what is the content of the next hop network address field carried in the MP_REACH_NLRI attribute of an Update packet?

Options:

A.

The link-local address and global unicast address can be carried at the same time.

B.

It can be only a link-local address.

C.

It must be a global unicast address.

D.

It must be a link-local address.

Buy Now
Questions 31

An HTTP request line consists of three fields. Select the fields to form a complete HTTP request message.

H12-891_V1.0 Question 31

Options:

Buy Now
Questions 32

Congestion avoidance technology can prevent congestion on an interface.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 33

What can be determined from the following figure?

H12-891_V1.0 Question 33

Options:

A.

R3 must be a Level-2 device.

B.

The device role of R3 cannot be determined.

C.

R3 must be a Level-1-2 device.

D.

R3 must be a Level-1 device.

Buy Now
Questions 34

Which of the following link types may appear in OSPF Router-LSAs?

Options:

A.

TransNet

B.

P-2-P

C.

Vlink

D.

StubNet

Buy Now
Questions 35

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following command needs to be run on the VBDIF interface to enable the VTEP peer to generate BGP EVPN Type 2 routes based on ARP information of the local terminal?

Options:

A.

mac-address xxxx-xxxx-xxxx

B.

arp-proxy enable

C.

arp collect host enable

D.

arp distribute-gateway enable

Buy Now
Questions 36

Which of the following is the drop probability of packets exceeding the upper threshold in WRED?

Options:

A.

0.2

B.

0.5

C.

1

D.

0.8

Buy Now
Questions 37

Which of the following statements about BGP EVPN principles are correct in a scenario where a VXLAN tunnel is dynamically established through BGP EVPN?

Options:

A.

MP_REACH_NLRI is used to carry routing information.

B.

Several BGP EVPN routes are defined through BGP extension.

C.

MP_REACH_NLRI is used to carry the RD.

D.

MP_REACH_NLRI is used to carry the RT.

Buy Now
Questions 38

On a CloudCampus virtualized campus network, service data enters different VNs from physical networks through edge nodes, and the VN that the data will enter is determined by the VLANs to which users belong. Which of the following statements about dynamic VLAN authorization is incorrect?

Options:

A.

When wired users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

B.

When wireless users pass Portal authentication, they join the authorization VLANs delivered to edge nodes.

C.

When wireless users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

D.

When wired users pass MAC address authentication, they join the authorization VLANs delivered to edge nodes.

Buy Now
Questions 39

What can be determined from the following figure?

display ipv6 routing-table protocol isis

Public Routing Table : ISIS

Summary Count: 6

ISIS Routing Table's Status : < Active >

Summary Count: 6

Destination : 3000:FDEA::4

NextHop : FE80::2E0:FCFF:FE98:2577

Cost : 20

Interface : GigabitEthernet0/0/1

PrefixLength : 128

Preference : 15

Protocol : ISIS-L2

Flags : D

Options:

A.

R1 has six IS-IS IPv6 routes.

B.

R1 does not have IS-IS IPv6 routes.

C.

IS-IS IPv6 must have been enabled on GigabitEthernet0/0/1 of R1.

D.

R1 is not a Level-1 device.

Buy Now
Questions 40

HTTP is an application layer protocol for distributed, collaborative, and hypermedia information systems.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 41

Which of the following statements aboutOPS (Open Programmability System) application scenariosisincorrect?

Options:

A.

To enable a network device to automatically send a configuration file to the server after the device configuration is saved, users can use the maintenance assistant to create a timer trigger condition and periodically run the Python script.

B.

When the OPS is used to automatically deploy unconfigured devices, a Python script is used to obtain the IP addresses of the software and configuration file server and download the system software and configuration file.

C.

The OPS can reduce the impact of the network environment in some cases. For example, when collected information is transmitted to a server, the Python script can be used to temporarily store the execution result to the device when the network is disconnected. After the network is reconnected, the execution result is transmitted to the server.

D.

The OPS can be used to automatically check the health status of devices.

Buy Now
Questions 42

When you configure a virtualized campus network on iMaster NCE-Campus and enable external networks to connect to the Internet, iMaster NCE-Campus will automatically deliver a specific route to direct traffic to the corresponding external network.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 43

Huawei CloudCampus Solution has multiple application scenarios, and iMaster NCE-Campus provides different APIs for each application scenario. Match the following application scenarios with the open APIs provided by iMaster NCE-Campus.

H12-891_V1.0 Question 43

Options:

Buy Now
Questions 44

After a wireless user passes Portal authentication, which of the following parameterscannotbe used for authorizing the user?

Options:

A.

free-rule

B.

UCL

C.

IP address

D.

ACL

Buy Now
Questions 45

To prevent hackers from attacking user devices or networks using MAC addresses, you can configure MAC addresses of untrusted users as blackhole MAC addresses to filter out such invalid MAC addresses. When receiving a packet whose source or destination MAC address is a blackhole MAC address on a device, the device discards the packet.

Options:

A.

TRUE

B.

FALSE

Buy Now
Exam Code: H12-891_V1.0
Exam Name: HCIE-Datacom V1.0
Last Update: Apr 16, 2025
Questions: 275

PDF + Testing Engine

$66  $164.99

Testing Engine

$50  $124.99
buy now H12-891_V1.0 testing engine

PDF (Q&A)

$42  $104.99
buy now H12-891_V1.0 pdf