ExamGecko
Home Home / Huawei / H12-891

Huawei H12-891 Practice Test - Questions Answers, Page 45

Question list
Search
Search

List of questions

Search

IGMP SSMMapping is bound to multicast through a static multicast source, so that members of IGMPv1 and IGMP2 can also access the SSM multicast network. The following statement about IGMPSSMMapping is wrong?( Radio).

A.
The multicast address of the SSM is 232000~232255255255
A.
The multicast address of the SSM is 232000~232255255255
Answers
B.
IGMP SSM Mapping does not process reporting messages from IGMPv3 In order to ensure that the same network segment runs any version
B.
IGMP SSM Mapping does not process reporting messages from IGMPv3 In order to ensure that the same network segment runs any version
Answers
C.
IGMP hosts can make SSM services run IGMPv3 on the multicast router socket connected to the network segment where the member host is located
C.
IGMP hosts can make SSM services run IGMPv3 on the multicast router socket connected to the network segment where the member host is located
Answers
D.
If the IGMP SSM Mapping feature is not enabled, neither IGMPv1 nor IGMPv2 supports multicast for deploying SSM modules
D.
If the IGMP SSM Mapping feature is not enabled, neither IGMPv1 nor IGMPv2 supports multicast for deploying SSM modules
Answers
Suggested answer: B

SSH uses asymmetric encryption algorithms AES and DES to achieve security for data transmission, and uses HMAC to ensure the complete integrity of integer data

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

What is the security level for untrust zones in the USG Series firewalls? ( Radio).

A.
50
A.
50
Answers
B.
5
B.
5
Answers
C.
10
C.
10
Answers
D.
15
D.
15
Answers
Suggested answer: B

Firewall security policies have the condition for traffic matching to be ?( Multi-select)

A.
apply
A.
apply
Answers
B.
Source item security zone
B.
Source item security zone
Answers
C.
Source item IP address
C.
Source item IP address
Answers
D.
Message length
D.
Message length
Answers
Suggested answer: A, B, C

When an administrator configures VRRP, which of the following is not required?

A.
Preemption mode
A.
Preemption mode
Answers
B.
Priority of the virtual router
B.
Priority of the virtual router
Answers
C.
Preemption delay
C.
Preemption delay
Answers
D.
Virtual IP address
D.
Virtual IP address
Answers
Suggested answer: A, B, C

In different scenarios, RSTP provides different protection functions, and the wrong statement about this statement is

A.
The root protection feature is enabled for the specified port, and its port role can only remain as the specified port
A.
The root protection feature is enabled for the specified port, and its port role can only remain as the specified port
Answers
B.
When the anti-TC-BPDU packet attack feature is enabled, the number of times the switching device processes IC BPDU packets per unit time is configurable
B.
When the anti-TC-BPDU packet attack feature is enabled, the number of times the switching device processes IC BPDU packets per unit time is configurable
Answers
C.
after the BPDU protection function is enabled on the switching device, if the edge port receives RST BPDU, the edge port will be set to a non-remote port and the spanning tree calculation will be re-performed
C.
after the BPDU protection function is enabled on the switching device, if the edge port receives RST BPDU, the edge port will be set to a non-remote port and the spanning tree calculation will be re-performed
Answers
D.
Start the specified port of root protection, when the port receives a better RSTBPDU, the port will enter the Discarding state and is no longer forwarding packets. If the port does not receive a better RSTBPD for a period of time then automatically revert to the normal Forwarding state
D.
Start the specified port of root protection, when the port receives a better RSTBPDU, the port will enter the Discarding state and is no longer forwarding packets. If the port does not receive a better RSTBPD for a period of time then automatically revert to the normal Forwarding state
Answers
Suggested answer: C

An engineer used 2 routers to test IPv6 services and simulated the interconnection between headquarters and branches by running BGP4+. The network logic topology is shown in the figure, regarding the delivery of IPv6 routes between two devices, which of the following statements is wrong?

A.
When a route is passed, it carries a recognized mandatory attribute such as AS_Path
A.
When a route is passed, it carries a recognized mandatory attribute such as AS_Path
Answers
B.
BGP4+ passes routing information between peers via Update packet
B.
BGP4+ passes routing information between peers via Update packet
Answers
C.
When routing is passed, the Next_Hop attribute must be an IPv6 global unicast address
C.
When routing is passed, the Next_Hop attribute must be an IPv6 global unicast address
Answers
D.
If the Update message carries the MP_REACH_NLRI attribute, it means that the advertisement is reachable route
D.
If the Update message carries the MP_REACH_NLRI attribute, it means that the advertisement is reachable route
Answers
Suggested answer: C

When you deploy BGP/MPLSIPVPN, when two VPNs have a common site, the common site must not use overlapping address spaces with the other sites of the two VPNs. The series description for configuring static lSPs in MPLS networks is correct?

A.
When an LSR is Ingress LSR, only configure Out Label, which ranges from 16-1048575
A.
When an LSR is Ingress LSR, only configure Out Label, which ranges from 16-1048575
Answers
B.
When an LSR is a Transit LSR, you need to configure both In Label and Out label, both in the range of 16-1023
B.
When an LSR is a Transit LSR, you need to configure both In Label and Out label, both in the range of 16-1023
Answers
C.
When an LSR is TransitLSR, you need to configure both ln Label and Out Label, both of which are 161023 The Out Label ranges from 16 to 1048575
C.
When an LSR is TransitLSR, you need to configure both ln Label and Out Label, both of which are 161023 The Out Label ranges from 16 to 1048575
Answers
D.
When an LSR is An Egyptian LSR, only in Label needs to be configured, ranging from 16-1023
D.
When an LSR is An Egyptian LSR, only in Label needs to be configured, ranging from 16-1023
Answers
Suggested answer: B, D

S-4S supports multi-instance and multi-process, that is, on an IS-IS router, multiple VPN instances can be configured to associate with multiple IS-S processes, the following description of IS-IS multiinstance and multi-process, which are correct ?

A.
If an IS-IS router creates multiple IS-IS processes, each process is independent of each other
A.
If an IS-IS router creates multiple IS-IS processes, each process is independent of each other
Answers
B.
1 IS-IS processes can only be associated with 1 VPN instance
B.
1 IS-IS processes can only be associated with 1 VPN instance
Answers
C.
1 IS-IS processes can be associated with several different VPN instances
C.
1 IS-IS processes can be associated with several different VPN instances
Answers
D.
1 VPN instances can be associated with several different IS-IS processes
D.
1 VPN instances can be associated with several different IS-IS processes
Answers
Suggested answer: A, B, D

Which of the following descriptions of MPLS header TTL are correct?

A.
Copy IPTIL value is handled in such a way that the LSR of the MPLS domain is hidden, which plays a certain security role
A.
Copy IPTIL value is handled in such a way that the LSR of the MPLS domain is hidden, which plays a certain security role
Answers
B.
Can prevent wireless circular forwarding of messages
B.
Can prevent wireless circular forwarding of messages
Answers
C.
MPLS has two ways of handling TTL, one is that the IP packet copies the PTTL of the MPLS header hen it enters the MPLS network Value; Another is to set the TTL of the MPLS header to 255 at the entrance LER
C.
MPLS has two ways of handling TTL, one is that the IP packet copies the PTTL of the MPLS header hen it enters the MPLS network Value; Another is to set the TTL of the MPLS header to 255 at the entrance LER
Answers
D.
When copying TTL is disabled, tracert can see the LSR of the passing MPLS domain
D.
When copying TTL is disabled, tracert can see the LSR of the passing MPLS domain
Answers
Suggested answer: B, C
Total 610 questions
Go to page: of 61