ExamGecko
Home / Huawei / H12-891 / List of questions
Ask Question

Huawei H12-891 Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

What are the following advanced features supported by BGP EVPN?

ARP broadcast suppression
ARP broadcast suppression
VRRP overVXLAN
VRRP overVXLAN
Multi-active gateway
Multi-active gateway
WI-AN Qos
WI-AN Qos
Suggested answer: A, B, C, D
asked 18/09/2024
Karthika Aravinth
33 questions

Question 2

Report Export Collapse

Is the following correct statement for the VXLAN message?

The outer destination IP address is the IP address of the VTEP at the far end of the VXLAN tunnel
The outer destination IP address is the IP address of the VTEP at the far end of the VXLAN tunnel
The source UDP port number is 4789
The source UDP port number is 4789
The destination UDP port number is 4789
The destination UDP port number is 4789
VNI has 24 T bits to distinguish the VIAN segment
VNI has 24 T bits to distinguish the VIAN segment
Suggested answer: A, C, D
asked 18/09/2024
aakriti grover
51 questions

Question 3

Report Export Collapse

To achieve an on-machine migration in the BGP EVPN distributed gateway scenario, which of the following messages is required?

Type5
Type5
Type4
Type4
Typel
Typel
Type2
Type2
Type3
Type3
Suggested answer: D
asked 18/09/2024
Radoslaw Gajewski
36 questions

Question 4

Report Export Collapse

The means of the LAND attack is that the attacker sends an SVN packet message with the same source and destination addresses to the target host, the source port and the destination port are the same, and the receiver waits for the final ACK packet to be sent , the connection is always in a semiconnected state, resulting in a full limited TCP reception Waste of resources

True
True
False
False
Suggested answer: A
asked 18/09/2024
leconte maxime
36 questions

Question 5

Report Export Collapse

The following statement about the Security Alliance SA in IPSec is wrong with ?

SA is uniquely identified by a triple that includes the Security Parameter Inder ,Security Parameter Inder), the source IP address, and the Security Protocol Number (ASESP) used
SA is uniquely identified by a triple that includes the Security Parameter Inder ,Security Parameter Inder), the source IP address, and the Security Protocol Number (ASESP) used
Use the display ipsec command to view information such as the encryption method used with another IPSEC peer, the traffic of interest, and so on.
Use the display ipsec command to view information such as the encryption method used with another IPSEC peer, the traffic of interest, and so on.
IPSec only supports encrypting data using the pair encryption algorithm.
IPSec only supports encrypting data using the pair encryption algorithm.
IpSec peers must be at a two-way SA to establish an IPSec VPN connection to close
IpSec peers must be at a two-way SA to establish an IPSec VPN connection to close
Suggested answer: A
asked 18/09/2024
Zarate, Wilfredo
41 questions

Question 6

Report Export Collapse

If there are multiple recipients in a multicast group, the administrator enables the IGMP-Snooping function on the switch connecting the recipient, and when the receiver receives the universal group query packet of the queryer from the switch, how should multiple recipients respond?

The first recipient whose response time time expires sends the Report message, the other receivers do not.
The first recipient whose response time time expires sends the Report message, the other receivers do not.
All recipients will respond to Report messages only if ICMPV2 is running.
All recipients will respond to Report messages only if ICMPV2 is running.
All recipients will respond to the Report message only if IGMPvl is running.
All recipients will respond to the Report message only if IGMPvl is running.
All recipients will respond to the Report message
All recipients will respond to the Report message
Suggested answer: D
asked 18/09/2024
Oscar Ballabriga
31 questions

Question 7

Report Export Collapse

If you run PIM-SM in a multicast network, you need to build a multicast forwarding tree between the multicast source and the receiver to enable the receiver to receive the multicast effect, so what are the following options for the correct tree sketch for the build?

What is built between the multicast source and the RP is the SPT tree
What is built between the multicast source and the RP is the SPT tree
RP and the receiver is built between the RPT tree
RP and the receiver is built between the RPT tree
Built between the RPT tree
Built between the RPT tree
RP and the swap is the SPT tree
RP and the swap is the SPT tree
Suggested answer: A, B
asked 18/09/2024
Piroon Dechates
35 questions

Question 8

Report Export Collapse

Is the following description of the BSR/RP mechanism correct?

PIM-SM domain can have more than one C-BSR, but only one BSR can be elected by the C-BSR that receives the C-RP Packets are collected C-one RP information
PIM-SM domain can have more than one C-BSR, but only one BSR can be elected by the C-BSR that receives the C-RP Packets are collected C-one RP information
BSR advertises BSR and C-RP information to all routers in the PIM-SM domain by flooding Bootstrap packets
BSR advertises BSR and C-RP information to all routers in the PIM-SM domain by flooding Bootstrap packets
A C-BSR can also collect C-RP information by receiving C-RP packets
A C-BSR can also collect C-RP information by receiving C-RP packets
Suggested answer: A, B, C
asked 18/09/2024
Karoy Bandi
33 questions

Question 9

Report Export Collapse

What is the following description of LDP reliability?

LGP GR (Graceful Restart) takes advantage of the high difference between the LS forwarding plane and the control plane to realize that the device forwards without interruption when the protocol is restarted or the master-standby is reversed
LGP GR (Graceful Restart) takes advantage of the high difference between the LS forwarding plane and the control plane to realize that the device forwards without interruption when the protocol is restarted or the master-standby is reversed
Manually configured LDP FRR policy defaults to a 32-bit backup route that triggers LDP to establish a backup ISP
Manually configured LDP FRR policy defaults to a 32-bit backup route that triggers LDP to establish a backup ISP
The LDP ERR can also generate an ISP for a tag map from a non-optimal next hop, and create a forwarding table entry as a backup of the primary LSP
The LDP ERR can also generate an ISP for a tag map from a non-optimal next hop, and create a forwarding table entry as a backup of the primary LSP
LDP and LGP linkage, the need for IGP to suppress the release of routes, to ensure that LDP and LGP paths are consistent
LDP and LGP linkage, the need for IGP to suppress the release of routes, to ensure that LDP and LGP paths are consistent
Suggested answer: B
asked 18/09/2024
Joice Lira
30 questions

Question 10

Report Export Collapse

RD is used to distinguish the same IP address in different VPNs, how many bits does RD contain ?

(Single choice)

64
64
32
32
16
16
128
128
Suggested answer: A
asked 18/09/2024
Velli Mutham
28 questions
Total 610 questions
Go to page: of 61