ExamGecko
Home Home / Huawei / H12-891

Huawei H12-891 Practice Test - Questions Answers, Page 47

Question list
Search
Search

List of questions

Search

If four routers run ISIS and have established an adjacency relationship, and the area code and router rank are marked as shown in the figure, what is the cost value of R4 reaching 10022/32?

A.
10
A.
10
Answers
B.
20
B.
20
Answers
C.
30
C.
30
Answers
D.
40
D.
40
Answers
Suggested answer: C

OSPFv2 is an IGP running on an IPV4 network; OSPFV3 is an IGP running in an IPV6 network IGP, OSPFv3 in the network has a similar LSA type compared to OSPFV2, but the functionality is slightly different, osPFv3LSA type does not include which of the following?

A.
Router-LSA
A.
Router-LSA
Answers
B.
Network-LSA
B.
Network-LSA
Answers
C.
Asbr-summary-LSA
C.
Asbr-summary-LSA
Answers
D.
AS-external-LSA
D.
AS-external-LSA
Answers
Suggested answer: C

In order to study the working mechanism of the OSPFv3 protocol, a project to build a network topology is as follows, the configuration of R1 and R2 is as follows, please ask the LSA switched between R1 and R2 What are the types?

A.
network-LSA
A.
network-LSA
Answers
B.
Router-LSA
B.
Router-LSA
Answers
C.
Link-LSA
C.
Link-LSA
Answers
D.
Inter-area-prefix-LSA
D.
Inter-area-prefix-LSA
Answers
Suggested answer: A, B, C

0SPFV2 is running on the IPV4 network IGP: OSPF3 is running in the IPV6 network, OSPF35 OSPFV2 has the same message type. Includes hello messages, DOD messages, LSR messages, LAU messages, and SAX messages about

OSPP The following statement is correct?

A.
The hello packet of OSPFv3 carries the IPV6 address prefix of the router interface
A.
The hello packet of OSPFv3 carries the IPV6 address prefix of the router interface
Answers
B.
OSPFv3 uses the authentication field of the packet header to complete the packet authentication
B.
OSPFv3 uses the authentication field of the packet header to complete the packet authentication
Answers
C.
OSPFv3 uses the link-local address as the source address for sending packets, which can be forwarded outside the range of the originating link
C.
OSPFv3 uses the link-local address as the source address for sending packets, which can be forwarded outside the range of the originating link
Answers
D.
OSPFv3 sends OSPFv3 packet using the IPV6 multicast addresses FF02::5 and FF02
D.
OSPFv3 sends OSPFv3 packet using the IPV6 multicast addresses FF02::5 and FF02
Answers
Suggested answer: D

Among the routing policy tools commonly used by BGP, which ones can be used to filter routes?

A.
filter-policy
A.
filter-policy
Answers
B.
Route-policy
B.
Route-policy
Answers
C.
lp extecommunity-filter
C.
lp extecommunity-filter
Answers
D.
Traffic-policy
D.
Traffic-policy
Answers
Suggested answer: A, B, C

With an existing network running OSPF, what types of LSAs cause ISPF operations?

A.
2 ?LSA
A.
2 ?LSA
Answers
B.
3 ?LSA
B.
3 ?LSA
Answers
C.
1 ?LSA
C.
1 ?LSA
Answers
D.
5 ?LSA
D.
5 ?LSA
Answers
E.
4 ?LSA
E.
4 ?LSA
Answers
Suggested answer: A, C

The multicast protocol that can generate multicast distribution trees is ?

A.
IGMPv2
A.
IGMPv2
Answers
B.
BGP
B.
BGP
Answers
C.
OSPF
C.
OSPF
Answers
D.
PIMV2
D.
PIMV2
Answers
Suggested answer: D

What is correct about the multicast message forwarding?

A.
RPF check failure indicates that the multicast data packets are received from a suboptimal interface, but the interface still receives multicast traffic and forwards it downstream
A.
RPF check failure indicates that the multicast data packets are received from a suboptimal interface, but the interface still receives multicast traffic and forwards it downstream
Answers
B.
IGMP snooping function can not control the range of multicast traffic in the Ethernet flood
B.
IGMP snooping function can not control the range of multicast traffic in the Ethernet flood
Answers
C.
In the multicast transmission mode, the destination address of the message can specify the location of the receiver
C.
In the multicast transmission mode, the destination address of the message can specify the location of the receiver
Answers
D.
The source address of the multicast message is the unicast address
D.
The source address of the multicast message is the unicast address
Answers
Suggested answer: D

When two devices with the same priority compete for the master role at the same time, the device on which the interface with the smaller IP address resides should be selected as the master device

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

Man-in-the-middle attacks or IP/MAC spoofing attacks can lead to information leakage and other hazards, and are more common in the intranet, in order to prevent man-in-the-middle attacks or IP/MAC spoofing attacks, you can take the configuration method

A.
Enable DHCP snooping to check the chaddr field in a DHCP request message
A.
Enable DHCP snooping to check the chaddr field in a DHCP request message
Answers
B.
Configure the trusted/untrusted interface
B.
Configure the trusted/untrusted interface
Answers
C.
Configure DHCP snooping on the switch to interbolde with DAI or IPSG
C.
Configure DHCP snooping on the switch to interbolde with DAI or IPSG
Answers
D.
Limit the maximum number of MAC addresses allowed to be learned on the switch interface
D.
Limit the maximum number of MAC addresses allowed to be learned on the switch interface
Answers
Suggested answer: C
Total 610 questions
Go to page: of 61