ExamGecko
Home Home / Huawei / H12-261

Huawei H12-261 Practice Test - Questions Answers, Page 9

Question list
Search
Search

Related questions











Which of the following statements regarding Filter-policy is true?

A.
An IP-prefix list can be used to filter routes or filter traffic.
A.
An IP-prefix list can be used to filter routes or filter traffic.
Answers
B.
Filter-policy can be used on an ASBR in OSPF to filter Type 5 and Type 7 LSAs.
B.
Filter-policy can be used on an ASBR in OSPF to filter Type 5 and Type 7 LSAs.
Answers
C.
Filter-policy can filter received or advertised link state information, and route attributes can be modified.
C.
Filter-policy can filter received or advertised link state information, and route attributes can be modified.
Answers
D.
Only the default routes match the IP prefix list configured using the ip- ip-prefix 1 deny 0.0.0.0 less-equal 32 command.
D.
Only the default routes match the IP prefix list configured using the ip- ip-prefix 1 deny 0.0.0.0 less-equal 32 command.
Answers
Suggested answer: C

Which of the following AS-_Path attribute values can be matched by the AS-Path filter configured using ip as-path filter 1 permit .*(100|400$command?

A.
100
A.
100
Answers
B.
3100
B.
3100
Answers
C.
300 4200
C.
300 4200
Answers
D.
1234 1400
D.
1234 1400
Answers
Suggested answer: A, B, D

Which of the following statements regarding the stub area and NSSA in OSPF is false?

A.
The Type 5 LSA cannot be flooded to a stub area, but can be flooded to an NSSA.
A.
The Type 5 LSA cannot be flooded to a stub area, but can be flooded to an NSSA.
Answers
B.
The Type 3 LSA can be flooded to a stub area and an NSSA.
B.
The Type 3 LSA can be flooded to a stub area and an NSSA.
Answers
C.
The Type 4 LSA cannot be flooded to a stub area and an NSSA.
C.
The Type 4 LSA cannot be flooded to a stub area and an NSSA.
Answers
D.
The Type 7 LSA cannot be flooded to a stub area, but can be flooded to an NSSA.
D.
The Type 7 LSA cannot be flooded to a stub area, but can be flooded to an NSSA.
Answers
Suggested answer: A

After the shutdown command is run on one of two directly connected devices that establish an IBGP peer relationship, the BGP connection will not be torn down immediately.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

Type 5 LSAs in OSPF are used to transmit external routes. Which of the following statements regarding Type 5 LSAs is false?

A.
Type 5 LSAs are advertised by ASBRs and flooded on OSPF networks except stub areas and NSSAs.
A.
Type 5 LSAs are advertised by ASBRs and flooded on OSPF networks except stub areas and NSSAs.
Answers
B.
Filtering policies can be configured on ABRs or ASBRs to filter Type 5 LSAs.
B.
Filtering policies can be configured on ABRs or ASBRs to filter Type 5 LSAs.
Answers
C.
A Type 5 LSA contains the FA address, which is 0.0.0.0. The FA address is reserved only and does not take effect.
C.
A Type 5 LSA contains the FA address, which is 0.0.0.0. The FA address is reserved only and does not take effect.
Answers
D.
Routers in the same area as the ASBR can calculate external routes through intra-area LSAs and Type 5 LSAs.
D.
Routers in the same area as the ASBR can calculate external routes through intra-area LSAs and Type 5 LSAs.
Answers
Suggested answer: C

Which of the following statements regarding the stub area in OSPF are true?

A.
A virtual link cannot pass through a stub area.
A.
A virtual link cannot pass through a stub area.
Answers
B.
A backbone area cannot be configured as a stub area.
B.
A backbone area cannot be configured as a stub area.
Answers
C.
Type 7 LSAs cannot be flooded to a stub area.
C.
Type 7 LSAs cannot be flooded to a stub area.
Answers
D.
A stub area contains no ASBR.
D.
A stub area contains no ASBR.
Answers
Suggested answer: A, B, D

Explanation:

Reference: https://support.huawei.com/enterprise/de/doc/EDOC1000141870/4c544c36/example-for-configuring-an-ospf-stub-area

Which of the following statements regarding BGP confederations is false?

A.
By default, sub-AS numbers of a confederation are advertised to BGP peers outside the confederation.
A.
By default, sub-AS numbers of a confederation are advertised to BGP peers outside the confederation.
Answers
B.
A BGP confederation divided an AS into several sub-Ass. Ass outside a confederation still consider the confederation as an AS.
B.
A BGP confederation divided an AS into several sub-Ass. Ass outside a confederation still consider the confederation as an AS.
Answers
C.
Confederations can easily detect routing loops inside an AS because EBGP is run between sub-AS's.
C.
Confederations can easily detect routing loops inside an AS because EBGP is run between sub-AS's.
Answers
D.
Sub-Ass within a BGP confederation can use private AS numbers. For Huawei NE and AR routers, a maximum of 32 sub-Ass can be configured in a BGP confederation.
D.
Sub-Ass within a BGP confederation can use private AS numbers. For Huawei NE and AR routers, a maximum of 32 sub-Ass can be configured in a BGP confederation.
Answers
Suggested answer: A

Which layers are shared in the OSI reference model and TCP/IP model?

A.
Presentation layer
A.
Presentation layer
Answers
B.
Application layer
B.
Application layer
Answers
C.
Transport layer
C.
Transport layer
Answers
D.
Session layer
D.
Session layer
Answers
E.
Data link layer
E.
Data link layer
Answers
Suggested answer: B, C, E

In an existing OSPF network, which types of LSAs cause the SPF calculation?

A.
Type 1 LSA
A.
Type 1 LSA
Answers
B.
Type 3 LSA
B.
Type 3 LSA
Answers
C.
Type 4 LSA
C.
Type 4 LSA
Answers
D.
Type 2 LSA
D.
Type 2 LSA
Answers
E.
Type 5 LSA
E.
Type 5 LSA
Answers
Suggested answer: A, D

Which of the following statements regarding IS-IS route leaking are true?

A.
IS-IS route leaking can be configured in IPv6 environments.
A.
IS-IS route leaking can be configured in IPv6 environments.
Answers
B.
In IS-IS route leaking, the routes to be leaked cannot be summary routes.
B.
In IS-IS route leaking, the routes to be leaked cannot be summary routes.
Answers
C.
IS-IS route leaking will not cause neighbor flapping.
C.
IS-IS route leaking will not cause neighbor flapping.
Answers
D.
IS-IS route is used to prevent route loops.
D.
IS-IS route is used to prevent route loops.
Answers
E.
IS-IS route leaking can be configured on Level-1 routers.
E.
IS-IS route leaking can be configured on Level-1 routers.
Answers
Suggested answer: A
Total 298 questions
Go to page: of 30