ExamGecko
Home / Huawei / H12-821_V1.0 / List of questions
Ask Question

Huawei H12-821_V1.0 Practice Test - Questions Answers, Page 4

List of questions

Question 31

Report Export Collapse

An IP prefix list is a common matching tool used in routing policies. Which of the following cannot be configured as matching conditions in an IP prefix list on a Huawei router?

Port number

Port number

Mask

Mask

Action

Action

Index

Index

Suggested answer: A
Explanation:

IP Prefix List Matching Conditions

An IP prefix list matches based on:

Mask: Specifies the subnet mask length.

Action: Specifies whether to permit or deny.

Index: Orders the rules within the prefix list.

Port numbers are not applicable as matching conditions in an IP prefix list.

HCIP-Datacom-Core Reference

IP prefix list configurations are detailed in the routing policy and route filtering chapters.

asked 02/12/2024
Jordan Pfingsten
47 questions

Question 32

Report Export Collapse

Fill in the blanks

When receiving a packet, a Huawei router matches the packet against ACL rules. The default ACL matching order used by the Huawei router is.

Sequential

Sequential

Suggested answer: A
Explanation:

ACL Matching in Huawei Routers:

Access Control Lists (ACLs) are used to filter packets based on specific criteria, such as source/destination IP, ports, or protocols.

When a packet arrives, the Huawei router processes it against the configured ACL rules to decide whether to permit or deny the packet.

Sequential Matching Order:

By default, Huawei routers match packets against ACL rules sequentially. This means:

The router checks the packet against rules in the order they are listed, starting from the top of the ACL.

The first rule that matches the packet's attributes is applied, and no further rules are checked. This is known as the first-match principle.

If no rules match, the packet is denied by default (implicit deny).

Example of Sequential Matching:

Consider the following ACL rules:

Rule 10: Permit IP 192.168.1.0/24

Rule 20: Deny IP 192.168.1.1

If a packet with source IP 192.168.1.1 arrives:

The router matches it against Rule 10 (Permit 192.168.1.0/24) and allows the packet.

Rule 20 is not evaluated because the first match (Rule 10) already applies.

Alternative Matching Orders:

Some routers or configurations allow batch matching (evaluating all rules) for specific scenarios, but this is not the default behavior in Huawei routers.

Conclusion:

The default ACL matching order on Huawei routers is sequential, and the first matching rule determines the action applied to the packet.

asked 02/12/2024
Rostyslav Skrypnyk
53 questions

Question 33

Report Export Collapse

DRAG DROP

On an STP network, the root bridge, root port, and designated port are elected in sequence. The election rules of these ports are different. List the steps for electing the root port in sequence.


Huawei H12-821_V1.0 image Question 33 131302 12022024115651000
Correct answer: Huawei H12-821_V1.0 image answer Question 33 131302 12022024115651000
Explanation:

RPC (Root Path Cost) Comparison:

Once the root bridge is selected, the network needs to determine the best path to the root. Each port on a non-root bridge will calculate the Root Path Cost (RPC), which is the cumulative cost of reaching the root bridge from that port. The root port is the one that has the lowest RPC, meaning it provides the best path to the root bridge.

Peer BID Comparison:

If multiple paths have the same Root Path Cost, the next step is to compare the Peer Bridge IDs. The bridge with the lowest Peer BID is chosen as the root port. This ensures a tie-breaking mechanism based on the neighbor's identifier.

Local BID Comparison:

If there is still a tie after comparing the Peer Bridge IDs, the Local Bridge ID is compared. A smaller Local BID indicates a higher priority, and the port with the lower Local BID will be selected as the root port.

asked 02/12/2024
Jose Gonzalez
47 questions

Question 34

Report Export Collapse

Compared with RSTP, which of the following port roles are added to MSTP?

Backup port

Backup port

Master port

Master port

Edge port

Edge port

Regional edge port

Regional edge port

Suggested answer: B, D
Explanation:

Additional Port Roles in MSTP

Master Port: Indicates the port on the shortest path to the root bridge in a region.

Regional Edge Port: Identifies a port at the boundary of the MST region.

Backup and edge ports exist in RSTP and are not newly introduced by MSTP.

HCIP-Datacom-Core Reference

MSTP port roles are elaborated in the MSTP configuration sections.

asked 02/12/2024
Daniel Skow
37 questions

Question 35

Report Export Collapse

On an RSTP network, if a port receives an RST BPDU and finds that its buffered RST BPDU is superior to the received RST BPDU, the port discards the received RST BPDU without responding.

TRUE

TRUE

FALSE

FALSE

Suggested answer: A
Explanation:

RST BPDU Handling

On an RSTP network, if a port receives an RST BPDU and determines its own buffered BPDU is superior, it discards the received BPDU without responding. This ensures stability and proper convergence in the network.

HCIP-Datacom-Core Reference

BPDU handling is described in the RSTP operation chapters.

asked 02/12/2024
Shivanth Jha
40 questions

Question 36

Report Export Collapse

An edge port is a new port role added to RSTP to overcome the disadvantages of STP. Which of the following statements is false about this port role?

The port does not participate in RSTP calculation.

The port does not participate in RSTP calculation.

The port can directly enter the Forwarding state from the Discarding state.

The port can directly enter the Forwarding state from the Discarding state.

After receiving a configuration BPDU, the port is still in the Forwarding state.

After receiving a configuration BPDU, the port is still in the Forwarding state.

The Up and Down states of the port do not cause network topology changes.

The Up and Down states of the port do not cause network topology changes.

Suggested answer: C
Explanation:

Edge Port Behavior

An edge port transitions directly to the Forwarding state but reverts to participating in RSTP calculations if it receives a valid configuration BPDU. Thus, statement C is false.

HCIP-Datacom-Core Reference

The behavior of edge ports and their transitions are discussed in the RSTP enhancement sections.

asked 02/12/2024
Angelica Caldeo
46 questions

Question 37

Report Export Collapse

In an IPv4 address space, Class D addresses are used for multicast. Among Class D addresses, which of the following is the permanent group address range reserved for routing protocols?

232.0.0.0 to 232.255.255.255

232.0.0.0 to 232.255.255.255

239.0.0.0 to 239.255.255.255

239.0.0.0 to 239.255.255.255

224.0.0.0 to 224.0.0.255

224.0.0.0 to 224.0.0.255

224.0.1.0 to 231.255.255.255

224.0.1.0 to 231.255.255.255

Suggested answer: C
Explanation:

Permanent Group Addresses for Routing Protocols

The range 224.0.0.0 to 224.0.0.255 is reserved for local network protocols, including routing protocols. Examples include OSPF (224.0.0.5/6) and RIP (224.0.0.9).

HCIP-Datacom-Core Reference

Reserved multicast address ranges are detailed in the multicast configuration sections.

asked 02/12/2024
Georgescu Andrei
49 questions

Question 38

Report Export Collapse

Based on IGMP snooping, IGMP snooping proxy enables a switch to act as a substitute for an upstream Layer 3 device to send IGMP Query messages to downstream hosts, and also to act as a substitute for downstream hosts to send IGMP Report/Leave messages to an upstream device. As such, this function conserves bandwidth between the upstream device and the local device.

TRUE

TRUE

FALSE

FALSE

Suggested answer: A
Explanation:

GMP Snooping Proxy

IGMP snooping proxy allows the switch to substitute for upstream Layer 3 devices and downstream hosts, reducing unnecessary bandwidth consumption by consolidating IGMP messages.

HCIP-Datacom-Core Reference

The IGMP snooping proxy functionality is described in multicast optimization and IGMP configuration chapters

asked 02/12/2024
Paul Devlin
39 questions

Question 39

Report Export Collapse

There are two types of routing entries on a PIM network. (S, G) routing entries are used to set up on a PIM network and are applicable to both PIM-DM and PIM-SM networks.

SPT

SPT

Suggested answer: A
Explanation:

Routing Entries in PIM

(S, G) entries: Represent the shortest path tree (SPT) from a specific source (S) to a specific multicast group (G). These entries are created after data packets are transmitted directly from the source to the receivers.

(S, G) entries are used in both PIM-DM and PIM-SM modes.

PIM-DM and PIM-SM Modes

In PIM-DM, multicast traffic is initially flooded throughout the network and pruned where no receivers exist. (S, G) entries represent source-specific paths created after the flooding stage.

In PIM-SM, multicast traffic initially flows through a shared tree, but (S, G) entries are created when the network switches to the SPT for more efficient forwarding.

HCIP-Datacom-Core Reference

The functionality and application of (S, G) routing entries are detailed in multicast and PIM configuration chapters.

asked 02/12/2024
Kai van Dijk
28 questions

Question 40

Report Export Collapse

DRAG DROP

Match the following IPv4 multicast protocols with the corresponding functions.


Huawei H12-821_V1.0 image Question 40 131309 12022024115651000
Correct answer: Huawei H12-821_V1.0 image answer Question 40 131309 12022024115651000
Explanation:

PIM (Protocol Independent Multicast):

PIM is a routing protocol designed for efficient routing of IP multicast traffic. It determines the paths over which multicast packets should be forwarded.

PIM is 'protocol-independent' because it uses the underlying unicast routing table for RPF (Reverse Path Forwarding) checks.

It is responsible for distributing multicast data throughout the network.

IGMP Snooping:

IGMP Snooping operates at Layer 2 and monitors IGMP traffic between hosts and routers.

It prevents multicast flooding by allowing a switch to forward multicast packets only to the ports that have joined specific multicast groups.

This significantly enhances efficiency in Layer 2 networks with multicast traffic.

asked 02/12/2024
Wellington Rodrigues da Costa
41 questions
Total 219 questions
Go to page: of 22
Search

Related questions