ExamGecko
Home Home / Huawei / H12-261

Huawei H12-261 Practice Test - Questions Answers, Page 23

Question list
Search
Search

List of questions

Search

Related questions











A network administrator plans to migrate IGMPv2 to IGMPv3 on the multicast network. What advantages does IGMPv3 have over IGMPv2?

A.
IGMPv3 deletes suppression of IGMPv3 Membership Report messages
A.
IGMPv3 deletes suppression of IGMPv3 Membership Report messages
Answers
B.
IGMPv3 deletes the function of matching all sources through wildcard belong to specific multicast group
B.
IGMPv3 deletes the function of matching all sources through wildcard belong to specific multicast group
Answers
C.
IGMPv3 enables a host to join a specified multicast group that excludes a specified multicast source
C.
IGMPv3 enables a host to join a specified multicast group that excludes a specified multicast source
Answers
D.
IGMPv3 adds Request-to-Send and Clear-to-Send messages between source and local IGMP queries
D.
IGMPv3 adds Request-to-Send and Clear-to-Send messages between source and local IGMP queries
Answers
E.
IGMPv3 enables a host to join a specified multicast group that includes a specified multicast source
E.
IGMPv3 enables a host to join a specified multicast group that includes a specified multicast source
Answers
Suggested answer: E

To deploy multicast video applications on your private internal network, you need to use private multicast IP addresses on the network.

Which range of IP addresses can be used?

A.
226.0.0.0 - 226.255.255.255
A.
226.0.0.0 - 226.255.255.255
Answers
B.
241.0.0.0 - 241.255.255.255
B.
241.0.0.0 - 241.255.255.255
Answers
C.
224.0.0.0 - 224.255.255.255
C.
224.0.0.0 - 224.255.255.255
Answers
D.
239.0.0.0 - 239.255.255.255
D.
239.0.0.0 - 239.255.255.255
Answers
E.
240.0.0.0 - 254.255.255.255
E.
240.0.0.0 - 254.255.255.255
Answers
Suggested answer: D

Which of the following statements regarding Security Association (SA) in IPsec is false?

A.
An IPsec VPN connection can be established only when the bidirectional SA exists between IPsec peers
A.
An IPsec VPN connection can be established only when the bidirectional SA exists between IPsec peers
Answers
B.
An SA is identified by three parameters: security parameter index (SPI), destination IP address, and security protocol ID (AH or ESP)
B.
An SA is identified by three parameters: security parameter index (SPI), destination IP address, and security protocol ID (AH or ESP)
Answers
C.
You can run the display ipsec sa command to view the encryption algorithm used and traffic of interest between IPsec peers
C.
You can run the display ipsec sa command to view the encryption algorithm used and traffic of interest between IPsec peers
Answers
D.
IPsec can only use symmetric encryption algorithms to encrypt and decrypt data
D.
IPsec can only use symmetric encryption algorithms to encrypt and decrypt data
Answers
Suggested answer: D

As shown in the figure, the routers load balances the traffic between Branch network 1 and Branch network 2. In this case, URPF in loose mode must be configured on a physical interface to defend against attacks using spoofed source IP addresses.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

As shown in the figure, two IPv6 networks need to access the IPv4 network. An IPsec tunnel needs to be established between the two IPv6 networks to enable communication. Which of the following encapsulation modes can meet the preceding requirements?

A.
AH+ transmission mode
A.
AH+ transmission mode
Answers
B.
AH+ tunnel mode
B.
AH+ tunnel mode
Answers
C.
ESP+ tunnel mode
C.
ESP+ tunnel mode
Answers
D.
All the preceding options are incorrect
D.
All the preceding options are incorrect
Answers
Suggested answer: D

Which of the following statements regarding 802.1X authentication, RADIUS authentication, and HWTACACS authentication are true?

A.
A user cannot be authenticated by both RADIUS authentication and 802.1X authentication.
A.
A user cannot be authenticated by both RADIUS authentication and 802.1X authentication.
Answers
B.
A user cannot be authenticated by both RADIUS authentication and HWTACACS authentication.
B.
A user cannot be authenticated by both RADIUS authentication and HWTACACS authentication.
Answers
C.
A user can be authenticated by both RADIUS authentication and HWTACACS authentication. This is more secure than using just one authentication method.
C.
A user can be authenticated by both RADIUS authentication and HWTACACS authentication. This is more secure than using just one authentication method.
Answers
D.
Users can access a network through 802.1X authentication, and can be authenticated through RADIUS authentication.
D.
Users can access a network through 802.1X authentication, and can be authenticated through RADIUS authentication.
Answers
Suggested answer: B

A family user has subscribed to a bandwidth of 10 Mbit/s. To improve user experience, the carrier ensures a rate of 12 Mbit/s during tests. If token bucket technology is used to cope with this requirement, which of the following methods is optimal?

A.
cir 10000 cbs 12000 pbs 12000
A.
cir 10000 cbs 12000 pbs 12000
Answers
B.
cir 8000 pir 12000
B.
cir 8000 pir 12000
Answers
C.
cir 10000 pir 12000
C.
cir 10000 pir 12000
Answers
D.
cir 10000 cbs 10000 pbs 12000
D.
cir 10000 cbs 10000 pbs 12000
Answers
Suggested answer: D

A new office needs to use a router as the DHCP server. Which of the following items need to be configured when the DHCP server is configured to provide the

DHCP service for the office?

A.
Manually binding a specified IP address to a specified terminal
A.
Manually binding a specified IP address to a specified terminal
Answers
B.
Timeout period of a ping packet
B.
Timeout period of a ping packet
Answers
C.
Excluding idle IP addresses from the DHCP server
C.
Excluding idle IP addresses from the DHCP server
Answers
D.
Startup file of the DHCP server
D.
Startup file of the DHCP server
Answers
E.
DHCP address pool
E.
DHCP address pool
Answers
Suggested answer: E

Which of the following statements regarding VRRP is true?

A.
Both VRRPv2 and VRRPv3 support authentication
A.
Both VRRPv2 and VRRPv3 support authentication
Answers
B.
VRRPv3 does not support authentication, whereas VRRPv2 supports authentication
B.
VRRPv3 does not support authentication, whereas VRRPv2 supports authentication
Answers
C.
The VRRP priority of the master IP address owner is 255. Therefore, the priority can be a value in the range from 0 to 254.
C.
The VRRP priority of the master IP address owner is 255. Therefore, the priority can be a value in the range from 0 to 254.
Answers
D.
VRRPv2 only applies to an IPv4 network, and VRRPv3 applies only to an IPv6 network
D.
VRRPv2 only applies to an IPv4 network, and VRRPv3 applies only to an IPv6 network
Answers
Suggested answer: B, C, D

Explanation:

Reference: https://support.huawei.com/enterprise/en/doc/EDOC1000178318/6e22bde4/vrrpv2-and-vrrpv3-advertisement-packets

In a BGP EVPN distributed gateway scenario, which of the following packet types is required to implement VM migration?

A.
Type 1
A.
Type 1
Answers
B.
Type 2
B.
Type 2
Answers
C.
Type 3
C.
Type 3
Answers
D.
Type 5
D.
Type 5
Answers
E.
Type 4
E.
Type 4
Answers
Suggested answer: B

Explanation:

Reference: https://support.huawei.com/enterprise/my/doc/EDOC1000180270/5d103d4d/configuring-vxlan-in-distributed-gateway-mode-using-bgp-evpn

Total 298 questions
Go to page: of 30