Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

H12-891_V1.0 HCIE-Datacom V1.0 Questions and Answers

Questions 4

Free mobility is deployed on a campus network through iMaster NCE-Campus. During this deployment, which of the following steps are performed by administrators and which are automatically performed by iMaster NCE-Campus? Drag the administrators and iMaster NCE-Campus icons on the left to the corresponding steps on the right.

Options:

Buy Now
Questions 5

On a small- or medium-sized campus network deployed based on the Huawei CloudCampus Solution, an AR functioning as the egress gateway supports web-based network management, registration center query, and DHCP Option 148-based deployment, but does not support CLI-based deployment.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 6

MPLS supports Forwarding Equivalence Class (FEC). Which of the following cannot be used as a FEC allocation standard?

Options:

A.

Application protocol

B.

Fragment offset

C.

Class of Service (CoS)

D.

Destination address

Buy Now
Questions 7

Which of the following statements are correct about authentication points and policy enforcement points in Huawei's free mobility solution?

Options:

A.

The policy enforcement point executes inter-group policies based on security groups.

B.

The authentication point and policy enforcement point must be deployed on the same device.

C.

When receiving user traffic, the authentication point enforces a policy to process the traffic based on the source or destination security group corresponding to the source or destination IP address of the traffic.

D.

The authentication point and policy enforcement point can be deployed on different devices.

Buy Now
Questions 8

MACsec can provide secure services during MAC-layer data transmitting and receiving. Which of the following services isnotprovided by MACsec?

Options:

A.

Controllability check

B.

Integrity check

C.

User data encryption

D.

Data source authenticity verification

Buy Now
Questions 9

In BGP4+, what is the content of the next hop network address field carried in the MP_REACH_NLRI attribute of an Update packet?

Options:

A.

The link-local address and global unicast address can be carried at the same time.

B.

It can be only a link-local address.

C.

It must be a global unicast address.

D.

It must be a link-local address.

Buy Now
Questions 10

An enterprise has three types of services. Voice and video services are key services and need to be guaranteed, and FTP services are non-key services. Which of the following scheduling modes is optimal for satisfying the service requirements?

Options:

A.

WFQ scheduling is configured for IP voice, video, and FTP download services.

B.

PQ scheduling is configured for IP voice and video services, and WFQ scheduling is configured for FTP download services.

C.

LPQ scheduling is configured for IP voice services, PQ scheduling is configured for video services, and WFQ scheduling is configured for FTP download services.

D.

PQ scheduling is configured for IP voice, video, and FTP download services.

Buy Now
Questions 11

iMaster NCE-Campus restricts RESTful APIs. If a client sends aGET requestthat invokes a RESTful API to obtain site information from iMaster NCE-Campus, which of the following fields should be included in the request header?

Options:

A.

ACCESS-TOKEN

B.

ACCEPT-TOKEN

C.

X-ACCEPT-TOKEN

D.

X ACCESS TOKEN

Buy Now
Questions 12

Which of the following statements is correct about 6PE and 6VPE?

Options:

A.

In 6PE networking, VPN instances need to be created on PEs.

B.

In 6PE networking, IPv6 addresses of a CE can be reused.

C.

In 6VPE networking, IPv6 addresses of a CE can be reused.

D.

In 6VPE networking, no VPN instance needs to be created on PEs.

Buy Now
Questions 13

The Ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is ______ IRB forwarding. (Capitalize the first letter.)

Options:

Buy Now
Questions 14

OSPFv3 link LSAs are advertised in the entire area.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 15

Which of the following statements is incorrect about the user authentication points on the network?

Options:

A.

Deploying user authentication points at the access layer achieves granular permission management and high network security.

B.

Moving user authentication points from the access layer to the aggregation or core layer greatly reduces the number of user authentication points, thereby effectively mitigating the pressure on the AAA server.

C.

Deploying user authentication points at the access layer has both advantages and disadvantages when compared to doing so at the aggregation or core layer. Policy association can be applied if user authentication points are deployed at the access layer.

D.

When user authentication points are moved from the access layer to the aggregation layer, MAC address authentication for users may fail.

Buy Now
Questions 16

Node segments in SR-MPLS must be manually configured.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 17

In the firewall hot standby scenario, when VGMP works in load balancing mode, which of the following functions must be enabled on the firewalls to prevent the return traffic from being discarded because it does not match any session entry in the case of inconsistent forward and return paths?

Options:

A.

Automatic backup

B.

Manual batch backup

C.

Quick session backup

D.

BFD

Buy Now
Questions 18

Which of the following channels are involved in the Huawei SD-WAN Solution?

Options:

A.

Management channel

B.

Control channel

C.

Data channel

D.

Orchestration channel

Buy Now
Questions 19

Which of the following statements about 802.1X authentication are correct?

Options:

A.

802.1X authentication uses EAPoL to exchange authentication information between the client, device, and authentication server.

B.

In EAP termination mode, EAP packets are terminated and re-encapsulated into RADIUS packets on the network access device. The network access device and AAA server use the standard RADIUS protocol to implement authentication, authorization, and accounting.

C.

EAPoL implements EAP encapsulation on an IEEE 802.3 network, whereas EAPoW implements EAP encapsulation on an IEEE 802.11 network.

D.

In EAP relay mode, EAP packets are directly encapsulated by the network access device into RADIUS packets (that is, EAP over RADIUS, or EAPoR). The network access device and AAA server use EAPoR to perform authentication, authorization, and accounting.

Buy Now
Questions 20

SR-MPLS uses IGP extensions to advertise labels and reserve bandwidth to support high-bandwidth services.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 21

The telemetry network model is broadly and narrowly defined. Which of the following modules are involved intelemetry in a narrow sense (device-side telemetry)?

Options:

A.

Data generation

B.

Data push

C.

Data source

D.

Data subscription

Buy Now
Questions 22

A carrier's home broadband service requires a maximum downstream bandwidth of 100 Mbit/s during off-peak hours and a guaranteed downstream bandwidth of 50 Mbit/s during peak hours. The home broadband service includes the home IP phone service and the home Internet access service. Which of the following configurations best meets the service requirement?

Options:

A.

qos gts cir 100000

B.

qos car inbound cir 50000 pir 100000

C.

qos car inbound cir 100000 pir 50000

D.

qos car inbound cir 100000

Buy Now
Questions 23

In the Huawei SD-WAN Solution, which of the following routing protocols is used to advertise VPN routes between CPEs?

Options:

A.

RIP

B.

OSPF

C.

IS-IS

D.

BGP

Buy Now
Questions 24

What can be determined from the following figure?

Options:

A.

R3 must be a Level-2 device.

B.

The device role of R3 cannot be determined.

C.

R3 must be a Level-1-2 device.

D.

R3 must be a Level-1 device.

Buy Now
Questions 25

In the gRPC-based telemetry protocol, the data model layer consists of theRPC layer,telemetry layer, andservice data layer. Drag the.proto fileto the layer where the file should be located.

Options:

Buy Now
Questions 26

Which of the following inter-AS MPLS L3VPN solutions need VPN user data packets to carry MPLS labels when being forwarded between ASs?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 27

Refer to the following command output on the router R3. Which of the following statements are correct?

display interface Tunnel

Tunnel0/0/0 current state : UP

Line protocol current state : UP

Last line protocol up time : 15:21:26 UTC-08:00

Description: HUAWEI, AR Series, Tunnel0/0/0 Interface

Route Port, The Maximum Transmit Unit is 1500

Internet Address is 20.1.1.2/24

Encapsulation is TUNNEL, loopback not set

Tunnel source 10.0.3.3 (LoopBack0), destination 10.0.1.1

Tunnel protocol/transport GRE/IP, key disabled

keepalive disabled

Checksumming of packets disabled

Options:

A.

The tunnel destination IP address is 10.0.1.1.

B.

The tunnel interface MTU is 1500 bytes.

C.

The tunnel interface IP address is 20.1.1.2/24.

D.

The tunnel source IP address is 10.0.1.1.

Buy Now
Questions 28

On the campus network shown, IPv6 is deployed for service tests. Four routers are deployed on the network, and OSPFv3 is used for IPv6 network connectivity. An engineer checks the LSDB of R2 and obtains a Link-LSA. Which of the following statements about the LSA are correct?

Options:

A.

The link-local address of R2’s GE0/0/0 is FE80::2E0:FCFF:FECD:4F79.

B.

The IPv6 address prefix of R2’s GE0/0/0 is 2001:DB8:2345:23::/64.

C.

This LSA indicates that R2 does not support external routes but can participate in IPv6 route calculation.

D.

This LSA is generated by R2.

Buy Now
Questions 29

Which of the following can be used to transmit traffic to a VXLAN network and implement intra-subnet communication on the same VXLAN network?

Options:

A.

Layer 3 VXLAN gateway

B.

NVE interface

C.

VLANIF interface

D.

Layer 2 VXLAN gateway

Buy Now
Questions 30

Which of the following statements about the multicast address used by OSPFv3 are correct?

Options:

A.

All OSPF routers use FF08::5.

B.

The DR uses FF08::6.

C.

All OSPF routers use FF02::5.

D.

The DR uses FF02::6.

Buy Now
Questions 31

On a VXLAN-based virtualized campus network, BGP EVPN can be used as the control plane protocol. Which of the following EVPN route types are not used in the virtualized campus network scenario?

Options:

A.

Type 3

B.

Type 2

C.

Type 4

D.

Type 1

Buy Now
Questions 32

In 6PE networking, the shared explicit null label function can be enabled on routers to reduce the number of required MPLS labels. With this function, a router assigns a label with the value (enter only digits) to all 6PE routes.

Options:

Buy Now
Questions 33

The channelized sub-interface and FlexE technologies both can be used to implement network slicing, but the application scenarios of the two technologies are slightly different. Which of the following statements about the two technologies are correct?

Options:

A.

It is recommended that channelized sub-interface be used to reserve resources for interfaces with a bandwidth of less than 50 Gbit/s.

B.

It is recommended that FlexE be used to reserve resources for 50GE and higher-rate interfaces.

C.

Only FlexE-based network slicing can be deployed across OTN devices.

D.

Only network slicing based on channelized sub-interface can be deployed across MSTP devices.

Buy Now
Questions 34

Which of the following types of LSAs does OSPF use to support SR-MPLS?

Options:

A.

Type 7 NSSA External LSA

B.

Type 10 Opaque LSA

C.

Type 1 Router LSA

D.

Type 2 Network LSA

Buy Now
Questions 35

If ISIS is used to transmit SIDs on an SR network, the node SIDs advertised by a Level-2 router are transmitted only within the same area.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 36

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following BGP EVPN routes is used to advertise MAC addresses, ARP entries, and IRB routes?

Options:

A.

Type 3

B.

Type 4

C.

Type 2

D.

Type 1

Buy Now
Questions 37

Which of the following protocols is used in the Huawei SD-WAN Solution to report device performance data?

Options:

A.

NetFlow

B.

SNMP

C.

BGP

D.

HTTP/2

Buy Now
Questions 38

Refer to the following command output on the router R1. Which of the following statements isincorrect?

display interface Tunnel

Tunnel0/0/0 current state : UP

Line protocol current state : UP

Last line protocol up time : 15:21:23 UTC-08:00

Description: ! 0.0.3.3

Route Port, The Maximum Transmit Unit is 1500

Internet Address is 20.1.1.1/24

Encapsulation is TUNNEL, loopback not set

Tunnel source 10.0.1.1 (LoopBack0), destination 10.0.3.3

Tunnel protocol/transport GRE/IP, key disabled

keepalive disabled

Checksumming of packets disabled

Current system time: 15:21:37-08:00

300 seconds input rate 0 bits/sec, 0 packets/sec

300 seconds output rate 0 bits/sec, 0 packets/sec

13 seconds input rate 0 bits/sec, 0 packets/sec

13 seconds output rate 448 bits/sec, 0 packets/sec

9 packets output, 824 bytes

0 output error

Input bandwidth utilization : -

Output bandwidth utilization : -

Options:

A.

Key authentication is disabled for the tunnel.

B.

The destination IP address of the tunnel is 10.0.3.3.

C.

The tunnel is a GRE tunnel.

D.

Keepalive detection is enabled on the tunnel.

Buy Now
Questions 39

An HTTP request line consists of three fields. Select the fields to form a complete HTTP request message.

Options:

Buy Now
Questions 40

BFD can implement millisecond-level link status detection.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 41

The naming of SRv6 instructions complies with certain rules. You can quickly determine the function of an instruction based on the instruction name. Which of the following statements about the keywords in SRv6 instruction names are correct?

Options:

A.

T: searches a specified routing table to forward packets.

B.

M: searches a Layer 2 forwarding table for unicast forwarding.

C.

V: searches a VPN instance routing table to forward packets.

D.

X: forwards packets through one or a group of specified Layer 3 interfaces.

Buy Now
Questions 42

In OSPFv3, which of the following LSAs can be flooded within an area?

Options:

A.

Inter-Area-Router-LSA

B.

Intra-Area-Prefix-LSA

C.

Link-LSA

D.

Inter-Area-Prefix-LSA

Buy Now
Questions 43

MPLS implements data forwarding based on two different planes. Which of the following statements regarding the forwarding mechanism are correct?

Options:

A.

After an IP packet enters an MPLS domain, the MPLS device forwards the packet based on FIB table queries.

B.

If the tunnel ID is 0x0, the MPLS forwarding process starts.

C.

The system automatically assigns an ID to the upper-layer application that uses a tunnel. This ID is also called the tunnel ID.

D.

If the tunnel ID is not 0x0, the normal IP forwarding process starts.

Buy Now
Questions 44

To obtain the token ID of iMaster NCE, you need to send an HTTP request message that includes the following Python code to invoke an iMaster NCE RESTful API.

Which of the following statements is incorrect?

import requests

nbi_name = "demo13@north.com"

nbi_pwd = "CgocVcVe1@"

host = "139.9.213.72"

port = "18002"

URI = "/controller/v2/tokens"

post_token_url = "https:// " + host + ":" + port + URI

headers_post = {"Content-Type": "application/json", "Accept": "application/json"}

r = requests.post(post_token_url, headers=headers_post, json={"userName": nbi_name, "password": nbi_pwd}, verify=False)

Options:

A.

You can run the print(r.json()) command to display the response message sent from the server.

B.

Token resources are located at https://139.9.213.72:18002/controller/v2/tokens.

C.

The request body is in JSON format.

D.

The HTTP request uses the GET method to query the token value.

Buy Now
Questions 45

Telemetry is a technology that remotely collects data from physical or virtual devices at high speed, and has a layered protocol stack. Which of the following layers isnotincluded in the telemetry protocol stack?

Options:

A.

Communication layer

B.

Transport layer

C.

Data encoding layer

D.

Data analysis layer

Buy Now
Questions 46

Drag the OSPFv3 LSAs to map them to their corresponding transmission ranges.

Options:

Buy Now
Questions 47

When you configure a virtualized campus network on iMaster NCE-Campus and enable external networks to connect to the Internet, iMaster NCE-Campus will automatically deliver a specific route to direct traffic to the corresponding external network.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 48

How long is an IPv6 prefix assigned to a host when an IPv6 address is configured for the host in SLAAC mode?

Options:

A.

64 bits

B.

32 bits

C.

96 bits

D.

128 bits

Buy Now
Questions 49

On a virtualized network deployed using iMaster NCE-Campus, after creating VNs, you need to configure inter-VN communication. Which of the following configurations is used to achieve VN communication?

Options:

A.

Configure traffic filtering.

B.

Create a static route for the VPN instance corresponding to the VN.

C.

Deploy OSPF for the VPN instance corresponding to the VN.

D.

Deploy a routing policy.

Buy Now
Questions 50

Which of the following statements aboutprefix segments and adjacency segmentsare correct?

Options:

A.

A prefix SID is a local SID out of the SRGB range.

B.

An adjacency SID is an offset value within the SRGB range advertised by the source end.

C.

A prefix segment identifies the prefix of a destination address on a network.

D.

An adjacency segment identifies an adjacency on a network.

Buy Now
Questions 51

Which of the following statements about the SP scheduling algorithm isincorrect?

Options:

A.

If the SP scheduling algorithm is used and a high-priority queue occupies a large amount of bandwidth, the low-priority queue may be starved.

B.

The SP scheduling algorithm preferentially schedules high-priority queues.

C.

When the SP scheduling algorithm is used to schedule multiple low-priority queues, the data packets that enter the queue first are forwarded first.

D.

To ensure the quality of key services, the SP algorithm can be used to schedule services and set the minimum bandwidth.

Buy Now
Questions 52

On a campus network, which of the following problems may occur when you manually create a static VXLAN tunnel?

Options:

A.

Although the static VXLAN tunnel mode supports the distributed gateway scenario, the configuration involves a heavy workload and is complex to adjust.

B.

Remote MAC addresses can be learned by the VTEP only through data flooding.

C.

A static VXLAN tunnel also uses corresponding protocols on the control plane, which consumes device resources.

D.

If N devices need to establish static VXLAN tunnels, a maximum of N(N -1)/2 tunnels need to be manually configured, which involves a heavy workload.

Buy Now
Questions 53

During WLAN planning and design, channels 1, 6, and 11 are recommended on the 2.4 GHz frequency band, and channels 1, 5, 9, and 13 are recommended in high-density scenarios. On the 5 GHz frequency band, it is recommended thathigh-frequency and low-frequency channels of adjacent APs be staggered to prevent overlapping.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 54

Which of the following statements is incorrect about MP-BGP?

Options:

A.

MP-BGP uses the MP_REACH_NLRI and MP_UNREACH_NLRI attributes to advertise VPNv4 routes.

B.

When PEs and CEs exchange routes through BGP, you need to create a BGP process for each VPN instance in the CE.

C.

The packet types and VPNv4 route advertisement policies of MP-BGP are the same as those of BGP-4.

D.

MP-BGP needs to allocate private network labels for VPNv4 routes.

Buy Now
Questions 55

The BGP ORF function can be used to control the maximum number of routes that can be sent by a BGP peer. To achieve this, which of the following tools is used to send such a route list to BGP peers?

Options:

A.

Filter-policy

B.

Route-policy

C.

ACL

D.

IP prefix-list

Buy Now
Questions 56

Which of the following factors does not need to be considered during the selection of core devices for the enterprise bearer WAN?

Options:

A.

Device naming conventions

B.

Service volume

C.

Physical location

D.

Node quantity

Buy Now
Questions 57

Among NETCONF operations, the operation may contain an operation attribute, which is used to specify an operation type for configuration data. Which of the following operation attributes isincorrect?

Options:

A.

remove

B.

merge

C.

create

D.

update

Buy Now
Questions 58

The free mobility function is deployed on the iMaster NCE-Campus on a campus network. Which of the following information should an administrator pay attention to?

Options:

A.

Define security groups.

B.

Deliver the inter-group policy.

C.

Deploy a policy control matrix.

D.

Select the policy enforcement point.

Buy Now
Questions 59

By default, the domain ID of an OSPF process is the same as the process ID. You can run the domain-id command in the OSPF process view to change a domain ID.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 60

Which of the following are advantages of GRE tunnels? (Select All that Apply)

Options:

A.

GRE tunnels enlarge the scope of a hop-limited network

B.

GRE tunnels can be used to construct VPN networks

C.

ARP packets can be encapsulated through GRE tunnels

D.

Multicast data can be encapsulated through GRE tunnels

Buy Now
Questions 61

Which of the following statements aboutSR-MPLS Policy path planningare correct?

Options:

A.

When planning paths based on bandwidth, you need to set the available bandwidth of each interface in advance.

B.

When planning paths based on delay, you must deploy TWAMP or iFIT in advance to measure real-time network delay.

C.

If you use the controller to plan SR-MPLS Policy paths, only primary and backup paths can be deployed, and load balancing cannot be implemented for the primary path.

D.

When statically planning SR-MPLS Policy paths, you can plan load balancing for the primary path.

Buy Now
Questions 62

When configuring a static VXLAN tunnel, you need to manually configure the _____, VTEP IP address, and ingress replication list. (Enter only uppercase letters.)

Options:

Buy Now
Questions 63

O&M personnel for a large-scale event center receive feedback about Wi-Fi access failures. iMaster NCE-CampusInsight provides the function for personnel to view packet exchange processes and locate the root cause. It is found that IP addresses in the DHCP address pool are exhausted, preventing IP addresses from being assigned to mobile terminals. Which of the following functions is used by O&M personnel in this scenario?

Options:

A.

Simulation feedback

B.

Protocol trace

C.

Issue analysis

D.

Client journey

Buy Now
Questions 64

Which of the following methods can be used to establish IPsec SAs? (Select All that Apply)

Options:

A.

Establish IPsec SAs through template negotiation

B.

Establish IPsec SAs in IKE auto-negotiation mode

C.

Establish IPsec SAs through certificate negotiation

D.

Manually establish IPsec SAs

Buy Now
Questions 65

Congestion avoidance technology can prevent congestion on an interface.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 66

In the admission design for large- and medium-sized campus networks, which of the following authentication modes can be used for PCs connected to IP phones?

Options:

A.

MAC address authentication

B.

802.1X authentication

C.

Multi-mode authentication

D.

Portal authentication

Buy Now
Questions 67

On a CloudCampus virtualized campus network, service data enters different VNs from physical networks through edge nodes, and the VN that the data will enter is determined by the VLANs to which users belong. Which of the following statements about dynamic VLAN authorization is incorrect?

Options:

A.

When wired users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

B.

When wireless users pass Portal authentication, they join the authorization VLANs delivered to edge nodes.

C.

When wireless users pass 802.1X authentication, they join the authorization VLANs delivered to edge nodes.

D.

When wired users pass MAC address authentication, they join the authorization VLANs delivered to edge nodes.

Buy Now
Exam Code: H12-891_V1.0
Exam Name: HCIE-Datacom V1.0
Last Update: May 2, 2025
Questions: 275

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99