ExamGecko
Home Home / Huawei / H12-224

Huawei H12-224 Practice Test - Questions Answers, Page 73

Question list
Search
Search

Which of the following statements regarding the static LACP mode are false?

A.
If a high bandwidth of the link between two directly connected devices is required bot the remote device does not support LACP, you can use the manual load balancing mode.
A.
If a high bandwidth of the link between two directly connected devices is required bot the remote device does not support LACP, you can use the manual load balancing mode.
Answers
B.
In static LACP mode, a larger LACP priority of an interface indicates a higher priority of the interface and a high probability of becoming the active interface.
B.
In static LACP mode, a larger LACP priority of an interface indicates a higher priority of the interface and a high probability of becoming the active interface.
Answers
C.
The interface that forwards data is called the active interface, whereas the interfaces that does not forward data is called the inactive interface. The backup interface changes from inactive to active only when the active interface dails.
C.
The interface that forwards data is called the active interface, whereas the interfaces that does not forward data is called the inactive interface. The backup interface changes from inactive to active only when the active interface dails.
Answers
D.
When preemption is enabled and an active interface fails, the backup interface with a larger priority becomes the active interface after a delay. If preemption is disabled, the faulty interface cannot automatically become the active interface.
D.
When preemption is enabled and an active interface fails, the backup interface with a larger priority becomes the active interface after a delay. If preemption is disabled, the faulty interface cannot automatically become the active interface.
Answers
Suggested answer: B

Which of the following statements regarding MUX VLAN is false?

A.
Each group VLAN must be bound to a principal VLAN.
A.
Each group VLAN must be bound to a principal VLAN.
Answers
B.
If the VLAN ID has been used by the principal VLAN, this VLAN cannot be used for the VLANIF interface, super-VLAN, or sub-VLAN.
B.
If the VLAN ID has been used by the principal VLAN, this VLAN cannot be used for the VLANIF interface, super-VLAN, or sub-VLAN.
Answers
C.
After MUX VLAN is enabled on an interface, VLAN mapping and VLAN stacking can be configured on the interface.
C.
After MUX VLAN is enabled on an interface, VLAN mapping and VLAN stacking can be configured on the interface.
Answers
D.
An enterprise can use the principal port to connect to the enterprise server, a separate port to connect to enterprise customers, and a group port to connect to enterprise employees. Enterprise customers and employees can both accessenterprise servers, enterprise employees can communicate with each other, enterprise customers cannot communicate with each other, and enterprise customers and employees cannot communicate with each other.
D.
An enterprise can use the principal port to connect to the enterprise server, a separate port to connect to enterprise customers, and a group port to connect to enterprise employees. Enterprise customers and employees can both accessenterprise servers, enterprise employees can communicate with each other, enterprise customers cannot communicate with each other, and enterprise customers and employees cannot communicate with each other.
Answers
Suggested answer: C

Port isolation provides secure and flexible networking solutions for users. Which of the following statements regarding port isolation is false?

A.
Port isolation can be used for configuring Layer 2 isolation.
A.
Port isolation can be used for configuring Layer 2 isolation.
Answers
B.
By default, interfaces are isolated at Layer 2 but can communicate at Layer 3.
B.
By default, interfaces are isolated at Layer 2 but can communicate at Layer 3.
Answers
C.
Before the port isolation function takes effect on an interface, the port isolation function must be enabled.
C.
Before the port isolation function takes effect on an interface, the port isolation function must be enabled.
Answers
D.
The port-isolate enable command can run in the system view.
D.
The port-isolate enable command can run in the system view.
Answers
Suggested answer: D

Which are the two subfields in the port identifier of the uplink port on a non-root switch in RSTP?

A.
1-byte port priority and 1-byte port number
A.
1-byte port priority and 1-byte port number
Answers
B.
1-byte port priority and 2-byte port number
B.
1-byte port priority and 2-byte port number
Answers
C.
2-byte port priority and 1-byte port number
C.
2-byte port priority and 1-byte port number
Answers
D.
2-byte port priority and 2-byte port number
D.
2-byte port priority and 2-byte port number
Answers
Suggested answer: A

RSTP provides faster convergence than STP. What are causes? (Choose all that apply.)

A.
RSTP defines the edge port role. The edge port does not receive and process configuration BPDUs, and not participate in RSTP calculation. The edge port can directly change from the Disable state to the Forwarding state.
A.
RSTP defines the edge port role. The edge port does not receive and process configuration BPDUs, and not participate in RSTP calculation. The edge port can directly change from the Disable state to the Forwarding state.
Answers
B.
When the root port fails, the optimal alternate port will become the root port and enter the Forwarding state.
B.
When the root port fails, the optimal alternate port will become the root port and enter the Forwarding state.
Answers
C.
In RSTP, when a port is elected as the designated port, it enters the Discarding state. Then the port immediately enters the Forwarding state through theProposal/Agreement mechanism.
C.
In RSTP, when a port is elected as the designated port, it enters the Discarding state. Then the port immediately enters the Forwarding state through theProposal/Agreement mechanism.
Answers
D.
In RSTP, when a port receives RST BPDUs from the upstream designated bridge, the port will compare the own stored RST BPDU will the received RSTBPDU.
D.
In RSTP, when a port receives RST BPDUs from the upstream designated bridge, the port will compare the own stored RST BPDU will the received RSTBPDU.
Answers
E.
When the designated port fails, the optimal alternate port will become the root port and enter the Forwarding state.
E.
When the designated port fails, the optimal alternate port will become the root port and enter the Forwarding state.
Answers
Suggested answer: A, B, C, D

Which problems of the single spanning tree network can be solved by MSTP? (Choose three.)

A.
Some VLAN paths are unreachable
A.
Some VLAN paths are unreachable
Answers
B.
Traffic cannot be load balanced.
B.
Traffic cannot be load balanced.
Answers
C.
The secondary optimal path is selected.
C.
The secondary optimal path is selected.
Answers
D.
Improve the network reliability
D.
Improve the network reliability
Answers
Suggested answer: A, B, C

Which of the following LSPs are established in Downstream Unsolicited (DU) label advertisement mode and ordered label distribution control mode? (Choose three.)

A.
When the edge node finds a new destination address in its routing table that does not belong to any existing FEC, the edge node does not create a new FEC for the destination address.
A.
When the edge node finds a new destination address in its routing table that does not belong to any existing FEC, the edge node does not create a new FEC for the destination address.
Answers
B.
An LSP is established by binding an FEC to a label and advertising the binding relationship to the neighboring LSR.
B.
An LSP is established by binding an FEC to a label and advertising the binding relationship to the neighboring LSR.
Answers
C.
If the egress node has available labels for distribution, it allocates labels for the FEC and sends a label mapping message to the upstream node.
C.
If the egress node has available labels for distribution, it allocates labels for the FEC and sends a label mapping message to the upstream node.
Answers
D.
After receiving a label mapping message, the LSR adds the corresponding entry to the label forwarding table.
D.
After receiving a label mapping message, the LSR adds the corresponding entry to the label forwarding table.
Answers
Suggested answer: B, C, D

If some devices on a network run MPLS (MPLS domain is encapsulated in the IP domain), labels are generated only for direct routes of devices running MPLS.

Labels are not generated for the routes originated from other devices in the IP domain.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

Which of the following is not overlay VPN technology?

A.
GRE
A.
GRE
Answers
B.
IPSec VPN
B.
IPSec VPN
Answers
C.
SSL VPN
C.
SSL VPN
Answers
D.
L2TP VPN
D.
L2TP VPN
Answers
Suggested answer: D

In a MPLS VPN network, two-layer MPLS labels are added to data packets before they are transmitted over the public network. Which of the following statements regarding two-layer labels are false? (Choose two.)

A.
The outer label is the private network label and the inner label is the public network label.
A.
The outer label is the private network label and the inner label is the public network label.
Answers
B.
The MPLS VPN outer label is distributed manually by the LDP protocol. The inner label is distributed by the peer MP-BGP neighbor.
B.
The MPLS VPN outer label is distributed manually by the LDP protocol. The inner label is distributed by the peer MP-BGP neighbor.
Answers
C.
By default, the outer label in data packets is popped out before being forwarded to the last hop.
C.
By default, the outer label in data packets is popped out before being forwarded to the last hop.
Answers
D.
The outer label is used to instruct the PE to send data packets to the correct VPN.
D.
The outer label is used to instruct the PE to send data packets to the correct VPN.
Answers
Suggested answer: A, D
Total 803 questions
Go to page: of 81