ExamGecko
Home Home / Huawei / H12-224

Huawei H12-224 Practice Test - Questions Answers, Page 74

Question list
Search
Search

List of questions

Search

In a MPLS VPN network, two-layer MPLS labels are added into data packets before they are transmitted over the public network. Which of the following statements regarding data packet processing are true? (Choose two.)

A.
The penultimate hop removes the outer label before forwarding the data packet to a peer PE.
A.
The penultimate hop removes the outer label before forwarding the data packet to a peer PE.
Answers
B.
The IP data packet received by the peer PE does not carry labels.
B.
The IP data packet received by the peer PE does not carry labels.
Answers
C.
The penultimate hop removes the outer label if the outer label in the data packet is explicit null label 3.
C.
The penultimate hop removes the outer label if the outer label in the data packet is explicit null label 3.
Answers
D.
The peer PE sends the data packet to the correct VPN based on the inner label.
D.
The peer PE sends the data packet to the correct VPN based on the inner label.
Answers
Suggested answer: A, D

A DHCP server allocates IP addresses to clients. Which of the following steps are required when configuring a DHCP server? (Choose three.)

A.
Enable DHCP globally.
A.
Enable DHCP globally.
Answers
B.
Configure the DHCP Option 82 field.
B.
Configure the DHCP Option 82 field.
Answers
C.
Configure the global address pool if the DHCP server based on the global address pool is used.
C.
Configure the global address pool if the DHCP server based on the global address pool is used.
Answers
D.
Configure the interface address pool if the DHCP server based on the interface address pool is used.
D.
Configure the interface address pool if the DHCP server based on the interface address pool is used.
Answers
Suggested answer: A, C, D

A DHCP client needs to obtain an IP address from the DHCP server when accessing a network for the first time. When the client accesses the network again, which of the following statements are true? (Choose two.)

A.
The DHCP client broadcasts a DHCP Discover packet. The DHCP server replies to the packet.
A.
The DHCP client broadcasts a DHCP Discover packet. The DHCP server replies to the packet.
Answers
B.
The DHCP client only needs to broadcast a DHCP Request packet containing the IP address obtained last time, but does not need to send a DHCP Discover packet again.
B.
The DHCP client only needs to broadcast a DHCP Request packet containing the IP address obtained last time, but does not need to send a DHCP Discover packet again.
Answers
C.
After receiving the DHCP Discover packet, the DHCP server sends a DHCP Offer packet containing the leased IP address and other settings to the DHCP client.
C.
After receiving the DHCP Discover packet, the DHCP server sends a DHCP Offer packet containing the leased IP address and other settings to the DHCP client.
Answers
D.
After receiving the DHCP Request packet, the DHCP server returns a DHCP ACK packet if the requested IP address is not allocated to another client.
D.
After receiving the DHCP Request packet, the DHCP server returns a DHCP ACK packet if the requested IP address is not allocated to another client.
Answers
Suggested answer: B, D

Which of the following are included in the full lifecycle guest management of the Agile Controller? (Choose all that apply.)

A.
Account registration
A.
Account registration
Answers
B.
Account approval and distribution
B.
Account approval and distribution
Answers
C.
Account authentication
C.
Account authentication
Answers
D.
Account audit and deregistration
D.
Account audit and deregistration
Answers
Suggested answer: A, B, C, D

Which of the following are roles in port mirroring? (Choose three.)

A.
Mirrored port
A.
Mirrored port
Answers
B.
Local observing port
B.
Local observing port
Answers
C.
Remote mirroring port
C.
Remote mirroring port
Answers
D.
Trunk port
D.
Trunk port
Answers
Suggested answer: A, B, C

Which of the following statements regarding the physical topology monitoring function of eSight are true? (Choose all that apply.)

A.
eSight displays the layout and status of NEs, subnets, and links on the GUI.
A.
eSight displays the layout and status of NEs, subnets, and links on the GUI.
Answers
B.
eSight supports visualized monitoring of the network-wide running status.
B.
eSight supports visualized monitoring of the network-wide running status.
Answers
C.
eSight displays the architecture of the entire network and relationship between network entities.
C.
eSight displays the architecture of the entire network and relationship between network entities.
Answers
D.
The physical topology monitoring provides an entry for unified network monitoring, improving O&M efficiency.
D.
The physical topology monitoring provides an entry for unified network monitoring, improving O&M efficiency.
Answers
Suggested answer: A, B, C, D

Congestion means that the service rate is reduced because of insufficient network resources. Congestion avoidance technologies include RED and WRED.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

Which packet information can be used for complex traffic classification? (Choose three.)

A.
Packet length
A.
Packet length
Answers
B.
Source and destination addresses
B.
Source and destination addresses
Answers
C.
Protocol type
C.
Protocol type
Answers
D.
Source and destination MAC addresses
D.
Source and destination MAC addresses
Answers
Suggested answer: B, C, D

Single-packet attacks indicate that an attacker controls botnet hosts to send a large number of attack packets, causing link congestion on the attacked network and system resource exhaustion.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

Which of the following attacks is not the network layer attack?

A.
IP spoofing attack
A.
IP spoofing attack
Answers
B.
Smurf attack
B.
Smurf attack
Answers
C.
ARP spoofing attack
C.
ARP spoofing attack
Answers
D.
ICMP attack
D.
ICMP attack
Answers
Suggested answer: C
Total 803 questions
Go to page: of 81