ExamGecko
Home Home / Huawei / H12-224

Huawei H12-224 Practice Test - Questions Answers, Page 70

Question list
Search
Search

Which of the following operations is performed in the risky operation process?

A.
Solution formulation
A.
Solution formulation
Answers
B.
Authorization obtaining
B.
Authorization obtaining
Answers
C.
Technical review
C.
Technical review
Answers
D.
Implementation and result feedback
D.
Implementation and result feedback
Answers
Suggested answer: C

Which of the following statements regarding the operation window time for a software upgrade is false?

A.
It is determined by the accepted service interruption duration.
A.
It is determined by the accepted service interruption duration.
Answers
B.
It must be longer than the upgrade execution time.
B.
It must be longer than the upgrade execution time.
Answers
C.
Troubleshooting time must be reserved.
C.
Troubleshooting time must be reserved.
Answers
D.
Only network maintenance personnel need to be notified of the operation window time, while the customer does not.
D.
Only network maintenance personnel need to be notified of the operation window time, while the customer does not.
Answers
Suggested answer: D

Which of the following statements regarding the device running check is true?

A.
You can run the display memory-usage command to check the memory usage of the device. If the value of Memory Using Percentage exceeds 80%, pay attention to the memory usage.
A.
You can run the display memory-usage command to check the memory usage of the device. If the value of Memory Using Percentage exceeds 80%, pay attention to the memory usage.
Answers
B.
You can run the display device command to check the running status of a board. If the board is online, the value of Online should be Present.
B.
You can run the display device command to check the running status of a board. If the board is online, the value of Online should be Present.
Answers
C.
You can run the display fan command to check the fan status. If the value of Present is NO, the fan is in normal state.
C.
You can run the display fan command to check the fan status. If the value of Present is NO, the fan is in normal state.
Answers
D.
You can run the display ftp-server command to check FTP ports. The FTP ports not in use should be recorded.
D.
You can run the display ftp-server command to check FTP ports. The FTP ports not in use should be recorded.
Answers
Suggested answer: B

Which of the following statements regarding the software and configuration backup is true?

A.
The software version needs to be backed up for multiple times for the same product and the same version.
A.
The software version needs to be backed up for multiple times for the same product and the same version.
Answers
B.
Licenses do not need to be backed up.
B.
Licenses do not need to be backed up.
Answers
C.
After the device configuration changes, the configuration file does not need to be backed up.
C.
After the device configuration changes, the configuration file does not need to be backed up.
Answers
D.
Backup is used to restore network functions in extreme cases.
D.
Backup is used to restore network functions in extreme cases.
Answers
Suggested answer: D

Ethernet supports broadcast. Once a network loop occurs, this simple broadcast mechanism will cause catastrophic consequences. Which of the following symptoms may be caused by a loop? (Choose all that apply.)

A.
Users cannot log in to the device remotely.
A.
Users cannot log in to the device remotely.
Answers
B.
The display interface command output shows a large number of broadcast packets received on an interface.
B.
The display interface command output shows a large number of broadcast packets received on an interface.
Answers
C.
The CPU usage exceeds 70%.
C.
The CPU usage exceeds 70%.
Answers
D.
A lot of ICMP packets are lost in ping tests.
D.
A lot of ICMP packets are lost in ping tests.
Answers
Suggested answer: A, B, C, D

Which of the following troubleshooting methods is not based on the TCP/IP reference model?

A.
Configuration comparison
A.
Configuration comparison
Answers
B.
Top-down
B.
Top-down
Answers
C.
Bottom-up
C.
Bottom-up
Answers
D.
Replacement
D.
Replacement
Answers
Suggested answer: D

In a complex network environment containing finance, OA, production, and more service systems, which of the following items is the first concern for troubleshooting?

A.
IP address assignment
A.
IP address assignment
Answers
B.
Network device model
B.
Network device model
Answers
C.
Data flow direction of each service system
C.
Data flow direction of each service system
Answers
D.
Equipment room environment
D.
Equipment room environment
Answers
Suggested answer: C

Which of the following is the purpose of access security optimization?

A.
To ensure that sensitive management information will not be intercepted.
A.
To ensure that sensitive management information will not be intercepted.
Answers
B.
To prevent or reduce external network attacks and harm.
B.
To prevent or reduce external network attacks and harm.
Answers
C.
To ensure secure access to key services.
C.
To ensure secure access to key services.
Answers
D.
To achieve secure user access control.
D.
To achieve secure user access control.
Answers
Suggested answer: D

Which of the following aspects should be considered during preliminary analysis of a migration project? (Choose all that apply.)

A.
Necessity
A.
Necessity
Answers
B.
Feasibility
B.
Feasibility
Answers
C.
Risks
C.
Risks
Answers
D.
Costs
D.
Costs
Answers
Suggested answer: A, B, C, D

Which of the following are migration difficulties? (Choose all that apply.)

A.
Minimizing on services
A.
Minimizing on services
Answers
B.
Achieving optimal risk prevention
B.
Achieving optimal risk prevention
Answers
C.
Formulating a complete migration solution
C.
Formulating a complete migration solution
Answers
D.
Carrying out the migration smoothly
D.
Carrying out the migration smoothly
Answers
Suggested answer: B, C, D
Total 803 questions
Go to page: of 81