ExamGecko
Home Home / Huawei / H12-261

Huawei H12-261 Practice Test - Questions Answers, Page 14

Question list
Search
Search

Related questions











Which of the following statements regarding OSPF route filtering is false?

A.
The filtering of Type 3 LSAs needs to be configured on ABRs in OSPF.
A.
The filtering of Type 3 LSAs needs to be configured on ABRs in OSPF.
Answers
B.
In a NSSA, when external routes are imported to the OSPF router and LSAs are advertised to its neighbors, LSA filtering can be performed on the ASBR orABR.
B.
In a NSSA, when external routes are imported to the OSPF router and LSAs are advertised to its neighbors, LSA filtering can be performed on the ASBR orABR.
Answers
C.
All LSAs, except Grace LSAs, can be filtered based on interfaces in the inbound and outbound directions.
C.
All LSAs, except Grace LSAs, can be filtered based on interfaces in the inbound and outbound directions.
Answers
D.
When routes are calculated based on the LSDB, the filter-policy import command can be executed to filter routes. This filtering mode affects only the addition of routes in the routing table, and has no impact on the OSPF LSDB.
D.
When routes are calculated based on the LSDB, the filter-policy import command can be executed to filter routes. This filtering mode affects only the addition of routes in the routing table, and has no impact on the OSPF LSDB.
Answers
Suggested answer: C

Which messages are sent to the agent by the network management station (NMS) running SNMPv1?

A.
Trap, Get, and Set messages
A.
Trap, Get, and Set messages
Answers
B.
Only Trap messages
B.
Only Trap messages
Answers
C.
Get, Set, and GetNext messages
C.
Get, Set, and GetNext messages
Answers
D.
Get, Set, and GetBulk messages
D.
Get, Set, and GetBulk messages
Answers
E.
Get, Set, and GetNext, and GetBulk messages
E.
Get, Set, and GetNext, and GetBulk messages
Answers
Suggested answer: C

What are the differences between traffic policing and traffic shaping?

A.
For traffic shaping, you can adjust the usage of the buffer for the traffic that exceeds the CIR.
A.
For traffic shaping, you can adjust the usage of the buffer for the traffic that exceeds the CIR.
Answers
B.
For traffic policing, you can adjust the usage of the buffer for the traffic that exceeds the CIR.
B.
For traffic policing, you can adjust the usage of the buffer for the traffic that exceeds the CIR.
Answers
C.
For traffic shaping, the router buffers excess packets until the bandwidth is available again.
C.
For traffic shaping, the router buffers excess packets until the bandwidth is available again.
Answers
D.
Traffic policing uses the token bucket algorithm and traffic shaping uses the SPD algorithm.
D.
Traffic policing uses the token bucket algorithm and traffic shaping uses the SPD algorithm.
Answers
E.
Traffic shaping is applied in the inbound direction and traffic policing is applied in the outbound direction.
E.
Traffic shaping is applied in the inbound direction and traffic policing is applied in the outbound direction.
Answers
Suggested answer: C

Which of the following statements regarding URPF, IPSG, and DAI are false?

A.
IPSG checks the source IP addresses and source MAC addresses of IP packets, and DAI checks only the mapping between IP addresses and MAC addresses.
A.
IPSG checks the source IP addresses and source MAC addresses of IP packets, and DAI checks only the mapping between IP addresses and MAC addresses.
Answers
B.
DAI binding entries cannot be manually configured.
B.
DAI binding entries cannot be manually configured.
Answers
C.
URPF can be used to defend against DDoS attacks from forged sources.
C.
URPF can be used to defend against DDoS attacks from forged sources.
Answers
D.
IPSG checks IP packets to defend against attacks using spoofed source IP addresses, and DAI checks ARP packets to filter out attack sources.
D.
IPSG checks IP packets to defend against attacks using spoofed source IP addresses, and DAI checks ARP packets to filter out attack sources.
Answers
Suggested answer: C

By default, WRED is configured on a newly deployed Huawei router. Which of following statements regarding WRED are true?

A.
When traffic exceeds the minimum threshold, WRED starts to discard all inbound traffic (tail drop).
A.
When traffic exceeds the minimum threshold, WRED starts to discard all inbound traffic (tail drop).
Answers
B.
Traffic with low bandwidth is more likely to be discarded than traffic with high bandwidth.
B.
Traffic with low bandwidth is more likely to be discarded than traffic with high bandwidth.
Answers
C.
WRED selectively discards multiple TCP flows to avoid global synchronization.
C.
WRED selectively discards multiple TCP flows to avoid global synchronization.
Answers
D.
WRED can be used to set different drop thresholds and packet loss rations for data packets with different priorities.
D.
WRED can be used to set different drop thresholds and packet loss rations for data packets with different priorities.
Answers
Suggested answer: D

Which of the following statements regarding RADIUS are true?

A.
Authentication, authorization, and accounting are separated in RADIUS protocol.
A.
Authentication, authorization, and accounting are separated in RADIUS protocol.
Answers
B.
RADIUS authentication, and Portal authentication cannot be used together because users can be authenticated using the Portal server when Portal authentication is enabled.
B.
RADIUS authentication, and Portal authentication cannot be used together because users can be authenticated using the Portal server when Portal authentication is enabled.
Answers
C.
MAC address authentication does not require a user name and password. Therefore, users cannot be authenticated through RADIUS when using MAC address authentication.
C.
MAC address authentication does not require a user name and password. Therefore, users cannot be authenticated through RADIUS when using MAC address authentication.
Answers
D.
RADIUS supports user access in wired and wireless modes.
D.
RADIUS supports user access in wired and wireless modes.
Answers
Suggested answer: D

Router HW1 and Router HW2 are connected to Network A and Network B respectively. Referring to the figure, if you want to set up an IPsec VPN tunnel between HW1 and HW2, which of the following ACL rules needs to be configured on HW1 to transmit the traffic across networks A and B pass through the encrypted VPN tunnel?

A.
rule permit ip source 10.1.2.0.0.0.0.255 destination 10.1.1.0.0.0.0.255
A.
rule permit ip source 10.1.2.0.0.0.0.255 destination 10.1.1.0.0.0.0.255
Answers
B.
rule permit ip source 10.1.1.0.0.0.0.255 destination 10.1.2.0.0.0.0.255
B.
rule permit ip source 10.1.1.0.0.0.0.255 destination 10.1.2.0.0.0.0.255
Answers
C.
rule permit ip source 10.1.1.0.0.0.0.255 destination 192.168.1.2.0
C.
rule permit ip source 10.1.1.0.0.0.0.255 destination 192.168.1.2.0
Answers
D.
rule permit ip source 192.168.1.1.0 destination 10.1.2.0.0.0.0.255
D.
rule permit ip source 192.168.1.1.0 destination 10.1.2.0.0.0.0.255
Answers
E.
rule permit ip source 192.168.1.1.0 destination 192.168.1.2.0
E.
rule permit ip source 192.168.1.1.0 destination 192.168.1.2.0
Answers
Suggested answer: B

The HTTP protocol is based on TCP. Therefore, TCP flood attacks and HTTP flood attacks are defended against in the same way.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

A DR needs to be elected from a set of candidate PIM-SM routers for multicast data forwarding on the source side or the receiver side. Which of the following statements regarding DR election is true?

A.
The PIM-SM router with the lowest DR priority is elected as the DR.
A.
The PIM-SM router with the lowest DR priority is elected as the DR.
Answers
B.
The PIM-SM router with the smallest IP address is elected as the DR.
B.
The PIM-SM router with the smallest IP address is elected as the DR.
Answers
C.
The PIM-SM router with the longest interface mask is elected as the DR.
C.
The PIM-SM router with the longest interface mask is elected as the DR.
Answers
D.
DR priorities of the PIM-SM routers are compared first. If their DR priorities are the same, their interface IP addresses are then compared.
D.
DR priorities of the PIM-SM routers are compared first. If their DR priorities are the same, their interface IP addresses are then compared.
Answers
Suggested answer: D

If PIM-SM is enabled on a multicast network, an RP needs to be configured. The RP can be configured as a dynamic or static RP. Which of the following statements regarding RP configuration is true?

A.
No BSR needs to be configured when a dynamic RP is configured.
A.
No BSR needs to be configured when a dynamic RP is configured.
Answers
B.
When a static RP is configured, you need to configure a BSR that advertises RP information.
B.
When a static RP is configured, you need to configure a BSR that advertises RP information.
Answers
C.
The BSR needs to be configured as the RP backup when a dynamic RP is configured.
C.
The BSR needs to be configured as the RP backup when a dynamic RP is configured.
Answers
D.
RP information needs to be specified on all PIM routers when a static RP is configured.
D.
RP information needs to be specified on all PIM routers when a static RP is configured.
Answers
Suggested answer: D
Total 298 questions
Go to page: of 30