ExamGecko
Home Home / Huawei / H12-224

Huawei H12-224 Practice Test - Questions Answers, Page 4

Question list
Search
Search

After detecting a user with a new MAC address, the switch initiates an EAP authentication request. If the client does not respond and the MAC address bypass authentication is not configured, which statement is false?

A.
If the client does not respond after the number of authentication requests reaches a specified value, the switch considers that the client software is not installed.
A.
If the client does not respond after the number of authentication requests reaches a specified value, the switch considers that the client software is not installed.
Answers
B.
All permissions of the user are prohibited.
B.
All permissions of the user are prohibited.
Answers
C.
The user is allowed to access only the isolated zone.
C.
The user is allowed to access only the isolated zone.
Answers
D.
Detection is initiated again after a period of time.
D.
Detection is initiated again after a period of time.
Answers
Suggested answer: B

As shown in the figure, which switch is the root switch according to the configuration?

A.
SWA
A.
SWA
Answers
B.
SWB
B.
SWB
Answers
C.
SWC
C.
SWC
Answers
D.
None of the above
D.
None of the above
Answers
Suggested answer: A

The STP protocol can prevent broadcast storms caused by loops on the Layer 2 network.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

According to the figure, what is the status of Ethernet1/0/13 in MSTI 1?

A.
Forwarding
A.
Forwarding
Answers
B.
Discarding
B.
Discarding
Answers
C.
Learning
C.
Learning
Answers
D.
None of the above
D.
None of the above
Answers
Suggested answer: B

Which types of interfaces can be configured with selective QinQ? (Choose two.)

A.
Access interface
A.
Access interface
Answers
B.
Trunk interface
B.
Trunk interface
Answers
C.
Hybrid interface
C.
Hybrid interface
Answers
D.
dot1q-tunnel interface
D.
dot1q-tunnel interface
Answers
Suggested answer: B, C

Which of the following statements about the link failure detection in STP protocol is not true?

A.
When network topology is stable, the Designated Port sends BPDU packet at every Hello Time interval.
A.
When network topology is stable, the Designated Port sends BPDU packet at every Hello Time interval.
Answers
B.
When network topology is stable, BPDU packets will be transmitted periodically.
B.
When network topology is stable, BPDU packets will be transmitted periodically.
Answers
C.
When the port does not receive new BPDU within a certain interval, the old configuration BPDU will time out and the link failure can be detected.
C.
When the port does not receive new BPDU within a certain interval, the old configuration BPDU will time out and the link failure can be detected.
Answers
D.
The port sends Configuration BPDU at every Hello Time interval. When the link fails, Configuration BPDU cannot be sent out. As a result, this port can detect the link failure.
D.
The port sends Configuration BPDU at every Hello Time interval. When the link fails, Configuration BPDU cannot be sent out. As a result, this port can detect the link failure.
Answers
Suggested answer: D

Which statement about the hybrid interface is true?

A.
A hybrid interface can only be connected to network device.
A.
A hybrid interface can only be connected to network device.
Answers
B.
A hybrid interface can only be connected to host.
B.
A hybrid interface can only be connected to host.
Answers
C.
A hybrid interface can be connected to host or network device.
C.
A hybrid interface can be connected to host or network device.
Answers
D.
A hybrid interface cannot be configured with VLAN ID.
D.
A hybrid interface cannot be configured with VLAN ID.
Answers
Suggested answer: C

Which statements are true? (Choose three.)

A.
Port isolation is a mechanism that controls the access between switch interfaces.
A.
Port isolation is a mechanism that controls the access between switch interfaces.
Answers
B.
Port isolation is an isolation mechanism at the physical layer.
B.
Port isolation is an isolation mechanism at the physical layer.
Answers
C.
Port isolation prevents the computers connected to different ports from accessing each other.
C.
Port isolation prevents the computers connected to different ports from accessing each other.
Answers
D.
Port isolation can be configured based on VLANs.
D.
Port isolation can be configured based on VLANs.
Answers
Suggested answer: A, B, C

On the RSTP network as shown in the figure, what RSTP operations will occur after the E1 port of SWB fails? (Choose three.)

A.
SWB deletes the MAC address entries with the E1 port as the destination interface.
A.
SWB deletes the MAC address entries with the E1 port as the destination interface.
Answers
B.
The spanning tree is recalculated and the E2 port is elected as the new root port.
B.
The spanning tree is recalculated and the E2 port is elected as the new root port.
Answers
C.
All the interfaces in forwarding state send topology change notifications (TCNs) to notify other switches of the topology change.
C.
All the interfaces in forwarding state send topology change notifications (TCNs) to notify other switches of the topology change.
Answers
D.
All the non-edge ports in forwarding state send TCNs to notify other switches of the topology change.
D.
All the non-edge ports in forwarding state send TCNs to notify other switches of the topology change.
Answers
Suggested answer: A, B, D

According to the MSTP protocol, each MST instance calculates an independent spanning tree by using the RSTP algorithm.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A
Total 803 questions
Go to page: of 81