ExamGecko
Home Home / Huawei / H12-891

Huawei H12-891 Practice Test - Questions Answers, Page 22

Question list
Search
Search

The following statement about IPv6 Over VXLAN is wrong as ?( Single choice questions).

A.
The tunnel between VXLAN Layer 2 and Layer 3 gateways is an IPv4 network.
A.
The tunnel between VXLAN Layer 2 and Layer 3 gateways is an IPv4 network.
Answers
B.
IPv6 over VXLAN solves the problem of insufficient IP address resources for end tenants.
B.
IPv6 over VXLAN solves the problem of insufficient IP address resources for end tenants.
Answers
C.
IPv6 Over VLANs do not generate ND table entries.
C.
IPv6 Over VLANs do not generate ND table entries.
Answers
D.
IPv6 over VXLAN means that the Overlay network of the VXLAN is an IPv6 network.
D.
IPv6 over VXLAN means that the Overlay network of the VXLAN is an IPv6 network.
Answers
Suggested answer: C

What are the following correct statements about MUX VLANs?( Multiple select).

A.
The Principal VLAN can communicate with all VLANs within the MUX VLAN
A.
The Principal VLAN can communicate with all VLANs within the MUX VLAN
Answers
B.
Each Separate VLAN must be bound to a Principal VLAN
B.
Each Separate VLAN must be bound to a Principal VLAN
Answers
C.
Separate VLANs can communicate with all VLANs within a MUX VLAN
C.
Separate VLANs can communicate with all VLANs within a MUX VLAN
Answers
D.
Each Group VLAN must be bound to a Principal VLAN
D.
Each Group VLAN must be bound to a Principal VLAN
Answers
Suggested answer: A, B, D

There is an existing switch running the RSTP protocol. If the network topology changes, what happens to the Layer 2 forwarding table that is automatically learned by the switch?

A.
All table entries are dropped
A.
All table entries are dropped
Answers
B.
Except for the table entry related to the edge port that is not deleted, all other table entries are deleted
B.
Except for the table entry related to the edge port that is not deleted, all other table entries are deleted
Answers
C.
Only table entries related to the port that received the TC message are dropped
C.
Only table entries related to the port that received the TC message are dropped
Answers
D.
If the aging time is set to 15 seconds, entries that exceed the aging time are deleted
D.
If the aging time is set to 15 seconds, entries that exceed the aging time are deleted
Answers
E.
Table entries are dropped except for table entries related to edge ports and table entries related to ports that receive TC messages
E.
Table entries are dropped except for table entries related to edge ports and table entries related to ports that receive TC messages
Answers
Suggested answer: E

The advantages of building a campus network using stacking, clustering technology include which of the following?( Multi-select)

A.
Improved network equipment and link utilization
A.
Improved network equipment and link utilization
Answers
B.
It can effectively reduce network power consumption
B.
It can effectively reduce network power consumption
Answers
C.
Business disruption time is greatly reduced
C.
Business disruption time is greatly reduced
Answers
D.
Simplifies network management and reduces the complexity of network deployment planning
D.
Simplifies network management and reduces the complexity of network deployment planning
Answers
Suggested answer: A, C, D

Which of the following messages does the BGP protocol support?

A.
Update
A.
Update
Answers
B.
Open
B.
Open
Answers
C.
Hello
C.
Hello
Answers
D.
Keepalive
D.
Keepalive
Answers
Suggested answer: A, B, D

The correct description of the extended features of ISIS is ?

A.
When the amount of information in the Link State Protocol data packet PDU to be released by ISIS is too large, the ISIS router will generate multiple LSP shards to carry more ISIS information.
A.
When the amount of information in the Link State Protocol data packet PDU to be released by ISIS is too large, the ISIS router will generate multiple LSP shards to carry more ISIS information.
Answers
B.
ISIS can choose whether to authenticate incoming SNP and LSP packets
B.
ISIS can choose whether to authenticate incoming SNP and LSP packets
Answers
C.
If there are other vendors' devices on the network and do not support the LSP sharding function, the sharding expansion mode must be configured as Model-1, otherwise the message will not be recognized by other vendors' devices.
C.
If there are other vendors' devices on the network and do not support the LSP sharding function, the sharding expansion mode must be configured as Model-1, otherwise the message will not be recognized by other vendors' devices.
Answers
D.
After you enable the LSP shard extension feature of your router, you can use it without restarting the ISIS process.
D.
After you enable the LSP shard extension feature of your router, you can use it without restarting the ISIS process.
Answers
Suggested answer: A, B, C

Regarding the difference between NSR and NSF, the correct one is?

A.
The NSR must rely on a neighbor router to complete
A.
The NSR must rely on a neighbor router to complete
Answers
B.
Both NSR and NSF require a neighbor router to complete
B.
Both NSR and NSF require a neighbor router to complete
Answers
C.
NSF must rely on neighbor routers to complete
C.
NSF must rely on neighbor routers to complete
Answers
D.
NSF does not require a neighbor router to complete
D.
NSF does not require a neighbor router to complete
Answers
Suggested answer: C

Which of the following default routing delivery methods does OSPF support?( Multi-select)

A.
It can be issued without force
A.
It can be issued without force
Answers
B.
Can be issued on ABR
B.
Can be issued on ABR
Answers
C.
Issuance can only be enforced
C.
Issuance can only be enforced
Answers
D.
Answer can be issued on ASBR
D.
Answer can be issued on ASBR
Answers
Suggested answer: A, B, D

Configuration under a certain interface: isis timer hello 5 level-2, the following statement is correct?

A.
The hello packets sent at level-1 and Leve1-2 are both 5s
A.
The hello packets sent at level-1 and Leve1-2 are both 5s
Answers
B.
The hello packets sent at level-1 are sent at 5s interval
B.
The hello packets sent at level-1 are sent at 5s interval
Answers
C.
The level-2 hello packet send interval is 5s
C.
The level-2 hello packet send interval is 5s
Answers
D.
The CSNP packet sending interval for this interface Level-2 is 5S
D.
The CSNP packet sending interval for this interface Level-2 is 5S
Answers
Suggested answer: C

The flood range in OSPFv3 is the LSA within the entire autonomous system?

A.
Intra-Area-prefix-LSA
A.
Intra-Area-prefix-LSA
Answers
B.
AS-external-LSA
B.
AS-external-LSA
Answers
C.
Link-LSA
C.
Link-LSA
Answers
D.
Inter-Area-Prefix-LSA
D.
Inter-Area-Prefix-LSA
Answers
Suggested answer: B
Total 610 questions
Go to page: of 61