ExamGecko
Home / Huawei / H12-261 / List of questions
Ask Question

Huawei H12-261 Practice Test - Questions Answers, Page 9

Add to Whishlist

List of questions

Question 81

Report Export Collapse

Which of the following statements regarding Filter-policy is true?

An IP-prefix list can be used to filter routes or filter traffic.
An IP-prefix list can be used to filter routes or filter traffic.
Filter-policy can be used on an ASBR in OSPF to filter Type 5 and Type 7 LSAs.
Filter-policy can be used on an ASBR in OSPF to filter Type 5 and Type 7 LSAs.
Filter-policy can filter received or advertised link state information, and route attributes can be modified.
Filter-policy can filter received or advertised link state information, and route attributes can be modified.
Only the default routes match the IP prefix list configured using the ip- ip-prefix 1 deny 0.0.0.0 less-equal 32 command.
Only the default routes match the IP prefix list configured using the ip- ip-prefix 1 deny 0.0.0.0 less-equal 32 command.
Suggested answer: C
asked 18/09/2024
Sai C H
38 questions

Question 82

Report Export Collapse

Which of the following AS-_Path attribute values can be matched by the AS-Path filter configured using ip as-path filter 1 permit .*(100|400$command?

100
100
3100
3100
300 4200
300 4200
1234 1400
1234 1400
Suggested answer: A, B, D
asked 18/09/2024
Adrian Chirtoc
46 questions

Question 83

Report Export Collapse

Which of the following statements regarding the stub area and NSSA in OSPF is false?

The Type 5 LSA cannot be flooded to a stub area, but can be flooded to an NSSA.
The Type 5 LSA cannot be flooded to a stub area, but can be flooded to an NSSA.
The Type 3 LSA can be flooded to a stub area and an NSSA.
The Type 3 LSA can be flooded to a stub area and an NSSA.
The Type 4 LSA cannot be flooded to a stub area and an NSSA.
The Type 4 LSA cannot be flooded to a stub area and an NSSA.
The Type 7 LSA cannot be flooded to a stub area, but can be flooded to an NSSA.
The Type 7 LSA cannot be flooded to a stub area, but can be flooded to an NSSA.
Suggested answer: A
asked 18/09/2024
Abbas Jabbari
48 questions

Question 84

Report Export Collapse

After the shutdown command is run on one of two directly connected devices that establish an IBGP peer relationship, the BGP connection will not be torn down immediately.

TRUE
TRUE
FALSE
FALSE
Suggested answer: B
asked 18/09/2024
R. M.
45 questions

Question 85

Report Export Collapse

Type 5 LSAs in OSPF are used to transmit external routes. Which of the following statements regarding Type 5 LSAs is false?

Type 5 LSAs are advertised by ASBRs and flooded on OSPF networks except stub areas and NSSAs.
Type 5 LSAs are advertised by ASBRs and flooded on OSPF networks except stub areas and NSSAs.
Filtering policies can be configured on ABRs or ASBRs to filter Type 5 LSAs.
Filtering policies can be configured on ABRs or ASBRs to filter Type 5 LSAs.
A Type 5 LSA contains the FA address, which is 0.0.0.0. The FA address is reserved only and does not take effect.
A Type 5 LSA contains the FA address, which is 0.0.0.0. The FA address is reserved only and does not take effect.
Routers in the same area as the ASBR can calculate external routes through intra-area LSAs and Type 5 LSAs.
Routers in the same area as the ASBR can calculate external routes through intra-area LSAs and Type 5 LSAs.
Suggested answer: C
asked 18/09/2024
Rajeev Parameswaran
44 questions

Question 86

Report Export Collapse

Which of the following statements regarding the stub area in OSPF are true?

A virtual link cannot pass through a stub area.
A virtual link cannot pass through a stub area.
A backbone area cannot be configured as a stub area.
A backbone area cannot be configured as a stub area.
Type 7 LSAs cannot be flooded to a stub area.
Type 7 LSAs cannot be flooded to a stub area.
A stub area contains no ASBR.
A stub area contains no ASBR.
Suggested answer: A, B, D
Explanation:

Reference: https://support.huawei.com/enterprise/de/doc/EDOC1000141870/4c544c36/example-for-configuring-an-ospf-stub-area

asked 18/09/2024
Zaccheri Brown
37 questions

Question 87

Report Export Collapse

Which of the following statements regarding BGP confederations is false?

By default, sub-AS numbers of a confederation are advertised to BGP peers outside the confederation.
By default, sub-AS numbers of a confederation are advertised to BGP peers outside the confederation.
A BGP confederation divided an AS into several sub-Ass. Ass outside a confederation still consider the confederation as an AS.
A BGP confederation divided an AS into several sub-Ass. Ass outside a confederation still consider the confederation as an AS.
Confederations can easily detect routing loops inside an AS because EBGP is run between sub-AS's.
Confederations can easily detect routing loops inside an AS because EBGP is run between sub-AS's.
Sub-Ass within a BGP confederation can use private AS numbers. For Huawei NE and AR routers, a maximum of 32 sub-Ass can be configured in a BGP confederation.
Sub-Ass within a BGP confederation can use private AS numbers. For Huawei NE and AR routers, a maximum of 32 sub-Ass can be configured in a BGP confederation.
Suggested answer: A
asked 18/09/2024
Souf Maatoug
45 questions

Question 88

Report Export Collapse

Which layers are shared in the OSI reference model and TCP/IP model?

Presentation layer
Presentation layer
Application layer
Application layer
Transport layer
Transport layer
Session layer
Session layer
Data link layer
Data link layer
Suggested answer: B, C, E
asked 18/09/2024
deborah lockett
38 questions

Question 89

Report Export Collapse

In an existing OSPF network, which types of LSAs cause the SPF calculation?

Type 1 LSA
Type 1 LSA
Type 3 LSA
Type 3 LSA
Type 4 LSA
Type 4 LSA
Type 2 LSA
Type 2 LSA
Type 5 LSA
Type 5 LSA
Suggested answer: A, D
asked 18/09/2024
Peter Avino
39 questions

Question 90

Report Export Collapse

Which of the following statements regarding IS-IS route leaking are true?

IS-IS route leaking can be configured in IPv6 environments.
IS-IS route leaking can be configured in IPv6 environments.
In IS-IS route leaking, the routes to be leaked cannot be summary routes.
In IS-IS route leaking, the routes to be leaked cannot be summary routes.
IS-IS route leaking will not cause neighbor flapping.
IS-IS route leaking will not cause neighbor flapping.
IS-IS route is used to prevent route loops.
IS-IS route is used to prevent route loops.
IS-IS route leaking can be configured on Level-1 routers.
IS-IS route leaking can be configured on Level-1 routers.
Suggested answer: A
asked 18/09/2024
Fakhruddin Abbas
37 questions
Total 298 questions
Go to page: of 30