ExamGecko
Home Home / Huawei / H12-891

Huawei H12-891 Practice Test - Questions Answers, Page 37

Question list
Search
Search

List of questions

Search

The firewall has created some security zones by default, which of the following security zones does not exist by default on the firewall?( Radio).

A.
Internet
A.
Internet
Answers
B.
Local
B.
Local
Answers
C.
Trust
C.
Trust
Answers
D.
DMZ
D.
DMZ
Answers
Suggested answer: A

Which is the correct description of optimal routing election for each protocol in the following options?( Radio).

A.
Route entries in BGP that are unreachable for the next hop are also placed in the IP routing table.In the
A.
Route entries in BGP that are unreachable for the next hop are also placed in the IP routing table.In the
Answers
B.
BGP protocol, the best route to reach the same destination circumference is selected by comparing the cost values of the route entries.
B.
BGP protocol, the best route to reach the same destination circumference is selected by comparing the cost values of the route entries.
Answers
C.
The OSPF protocol puts all the routing information in the LSDB into the IP routing table.
C.
The OSPF protocol puts all the routing information in the LSDB into the IP routing table.
Answers
D.
From BGP and OSPF, different route entries to reach the same destination segment are learned, and the optimal route is selected to join the IP route table by comparing the protocol's preference value .
D.
From BGP and OSPF, different route entries to reach the same destination segment are learned, and the optimal route is selected to join the IP route table by comparing the protocol's preference value .
Answers
Suggested answer: D

In VXLAN scenarios, what features can be turned on to reduce flooding of ARP messages between VTEPs?( Multiple select).

A.
Host Information Collection
A.
Host Information Collection
Answers
B.
Local ARP agent
B.
Local ARP agent
Answers
C.
port isolation
C.
port isolation
Answers
D.
ARP broadcast suppression
D.
ARP broadcast suppression
Answers
Suggested answer: B, D

The following description of ISIS's routed infiltration is correct?( Multi-select)

A.
ISIS routing penetrates | Can be used in Pv6 environments.
A.
ISIS routing penetrates | Can be used in Pv6 environments.
Answers
B.
Route penetration for ISIS can be deployed on Level-1 routers.
B.
Route penetration for ISIS can be deployed on Level-1 routers.
Answers
C.
Route penetration for ISIS does not include aggregated routes.
C.
Route penetration for ISIS does not include aggregated routes.
Answers
D.
Route penetration of ISIS does not cause neighbor concussions.
D.
Route penetration of ISIS does not cause neighbor concussions.
Answers
E.
Route infiltration of ISIS is used to prevent routing loops.
E.
Route infiltration of ISIS is used to prevent routing loops.
Answers
Suggested answer: A, D

The following statement about the BFD one-arm echo function is correct (multiple choice).

A.
The BFD one-arm echo function must be configured with local identifiers and carrier identifiers
A.
The BFD one-arm echo function must be configured with local identifiers and carrier identifiers
Answers
B.
The default destination IP address for the protocol message for BFD one-arm echo is 22400184
B.
The default destination IP address for the protocol message for BFD one-arm echo is 22400184
Answers
C.
After the BFD one-arm echo function is turned on, the destination IP and source IP of the BFD message are inducted
C.
After the BFD one-arm echo function is turned on, the destination IP and source IP of the BFD message are inducted
Answers
D.
BFD One-Arm Echo function is suitable for scenarios where one device supports BDD and the other device does not support
D.
BFD One-Arm Echo function is suitable for scenarios where one device supports BDD and the other device does not support
Answers
Suggested answer: C, D

The following statements about the VRRP protocol are correct (multiple choice).

A.
Both VRRPv2 and VRRPv3 support authentication
A.
Both VRRPv2 and VRRPv3 support authentication
Answers
B.
VRRPv3 does not support authentication, while VRRPV2 does
B.
VRRPv3 does not support authentication, while VRRPV2 does
Answers
C.
VRRPv2 only applies to IPv4 networks, and VRRPv3 only applies to IPv6 networks
C.
VRRPv2 only applies to IPv4 networks, and VRRPv3 only applies to IPv6 networks
Answers
D.
The owner of the Master IP address has a VRP priority of 255, and all configurable priorities range from 0 to 254
D.
The owner of the Master IP address has a VRP priority of 255, and all configurable priorities range from 0 to 254
Answers
Suggested answer: B

HW users are transferring a very large number of files via TFTP. What protocol does TFTP rely on for transmission?

A.
ICMP and UDP
A.
ICMP and UDP
Answers
B.
IP ?TCP
B.
IP ?TCP
Answers
C.
UDP
C.
UDP
Answers
D.
NFS E. FTP
D.
NFS E. FTP
Answers
Suggested answer: C

When you deploy LLQ, you need to configure bandwidth parameters, what is the significance of bandwidth parameters?( Single choice questions).

A.
Provides a built-in policer to limit the maximum available bandwidth of a low-latency queue during congestion
A.
Provides a built-in policer to limit the maximum available bandwidth of a low-latency queue during congestion
Answers
B.
The parameter should be as small as possible. It means that the bandwidth is always preserved, and even if the LLQ is set, changing the parameters will reduce the available bandwidth of the interface
B.
The parameter should be as small as possible. It means that the bandwidth is always preserved, and even if the LLQ is set, changing the parameters will reduce the available bandwidth of the interface
Answers
C.
It represents a reference CIR to calculate the burst size D of the built-in tactician token bucket Changing parameters is an option because LLQ always takes precedence over other queues
C.
It represents a reference CIR to calculate the burst size D of the built-in tactician token bucket Changing parameters is an option because LLQ always takes precedence over other queues
Answers
Suggested answer: A

Assuming that the shaping rate of a port is 10OMbps, the input loans and RIP of P configurations of each service of the interface are as follows: Then after the first round of scheduling, EF How many loans are allocated by the queue?

( Single choice questions).

A.
A. 30M
A.
A. 30M
Answers
B.
15M
B.
15M
Answers
C.
90M
C.
90M
Answers
D.
25M
D.
25M
Answers
Suggested answer: D

As shown in the figure, there are two IP6 networks that can access the IPv4 network, and the IPsec tunnel needs to be established between the two IPv6 networks to communicate, which of the following requirements?(). Single choice questions).

A.
ESP + tunnel mode
A.
ESP + tunnel mode
Answers
B.
AH + transmission mode
B.
AH + transmission mode
Answers
C.
AH + tunnel mode
C.
AH + tunnel mode
Answers
D.
None of the above options are correct
D.
None of the above options are correct
Answers
Suggested answer: A
Total 610 questions
Go to page: of 61