Huawei H12-831_V1.0 Practice Test - Questions Answers, Page 17

List of questions
Question 161

What is the purpose of configuring LSP fragmentation on an IS-IS device?
make the device unbuildableIS-ISNeighbor
enable the device to support moreIS-ISrouting entry
make the device unable to learnIS-ISrouting information
no real purpose
Question 162

The Router LSA of a router is shown in the figure. Which of the following statements is wrong?
of this routerRouter IDfor10.0.12.1
This router isDR
This router has established an adjacency relationship
This router supports external route import
Question 163

Which of the following statements about IPSG is false?
IPSGcan preventIPaddress spoofing attack
IPSGis a source based on a three-layer interfaceIPaddress filtering technology
IPSGcan be turned onIPPacket inspection alarm function, linked with the network management to alarm
able to passIPSGPrevent the host from changing privatelyIPaddress
Question 164

Match the alarm severity to the severity of the fault and countermeasures
Cricital-1, Major-3 Minor-2. Warning-4
Critical-4, Major-2. Minor-1, Warning-3
Critical', Major-2, Minor-3, Warning-4 A
Critical-3, Major-2, Minor-1, Warning-4
Question 165

If display current-configuration can reach the setting of !JIS-IS, and display saved-
There is no IS-IS setting in the configuration, so that means?
FlashRunningIS-ISconfiguration, not saved to memory
memory is runningIS-ISConfiguration saved toFlash
nothing enteredIS-ISThe command
memory is runningIS-ISconfiguration, not saved toFlash
Question 166

What is the meaning of ipv6 enable topology ipv6 in IS-IS protocol view?
SPFCalculated atIPv4,IPv6in the topology of the
has no meaning
not supportIPv6ofSPFcalculate
IPv4,IPv6use the same topologySPFcalculate
Question 167

The following six tools cannot be used to match BGP routing entries?
Community Filter
advancedA, CL
basicA, CL
IP Prefix List
Question 168

Please pair the following DHCP attack types with corresponding explanations.
DHCPstarvation attack-3 DHCPPhishing attack man-in-the-middle attack-2 DHCPPacket flood attack-4
DHCPstarvation attack-2 DHCPPhishing attack-3man-in-the-middle attack-1 DHCPPacket flood attack-4
DHCPstarvation attack-1 DHCPPhishing attack-3man-in-the-middle attack-2 DHCPPacket flood attack-4
DHCPstarvation attack-4 DHCPPhishing attack-3man-in-the-middle attack-2 DHCPPacket flood attack-1
Question 169

What check items can be set by IPSG?
MA, Caddress
Outgoing interface
VLANID
IPaddress
Question 170

According to this picture, Xinmen can be judged?
R1access172.16.1.4.need to go through2hop router
R1access172.16.1.4,need to go through4hop router
R1access172.16.1.4have2an equivalent path
R1access172.16.1.4have4an equivalent path
Question