ExamGecko
Home Home / Huawei / H12-891

Huawei H12-891 Practice Test - Questions Answers, Page 5

Question list
Search
Search

What is the following correct for the process of registering the source-side DR with RP in PIM-SM?

A.
Encapsulated in the registered message is multicast service data
A.
Encapsulated in the registered message is multicast service data
Answers
B.
RP sends a registration stop message as soon as it receives the registration message.
B.
RP sends a registration stop message as soon as it receives the registration message.
Answers
C.
Registered messages are used to build the RPT tree between source DR and RP
C.
Registered messages are used to build the RPT tree between source DR and RP
Answers
D.
Registered packets are multicast packets.
D.
Registered packets are multicast packets.
Answers
Suggested answer: A

In a multicast network, what causes multicast traffic to not forward properly?

A.
The router does not have an RPF route
A.
The router does not have an RPF route
Answers
B.
PIM is not enabled on the RPF interface
B.
PIM is not enabled on the RPF interface
Answers
C.
The upstream router will receive the PIM Join message dropped
C.
The upstream router will receive the PIM Join message dropped
Answers
D.
Multi-router egress network, this router is not DR
D.
Multi-router egress network, this router is not DR
Answers
Suggested answer: A, B, C

IPSGs can statically configure binding tables or form binding tables by using them with DHCPSnooping

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which of the following are single-packet attacks?

A.
Special control message attacks
A.
Special control message attacks
Answers
B.
Scan Probe Attack
B.
Scan Probe Attack
Answers
C.
DDos Attack
C.
DDos Attack
Answers
D.
Malformed Message Attack
D.
Malformed Message Attack
Answers
Suggested answer: A, B, D

What is wrong with the following statement about digital certificates?

A.
Digital signatures guarantee the integrity of digital certificates.
A.
Digital signatures guarantee the integrity of digital certificates.
Answers
B.
Digital certificates contain public key information.
B.
Digital certificates contain public key information.
Answers
C.
Authentication fails when the peer certificate is received within the validity period, but the device itself is in the wrong time if it is not within the validity period of the certificate.
C.
Authentication fails when the peer certificate is received within the validity period, but the device itself is in the wrong time if it is not within the validity period of the certificate.
Answers
D.
Even if two PRI entities are not in the same CA system, authentication can be completed as long as both parties can recognize each other's CA.
D.
Even if two PRI entities are not in the same CA system, authentication can be completed as long as both parties can recognize each other's CA.
Answers
Suggested answer: D

What is the relationship between CIR, BC and TC? (single select)

A.
CIR=TC/BC
A.
CIR=TC/BC
Answers
B.
CIR=BE/TC
B.
CIR=BE/TC
Answers
C.
TC=CIR/BC
C.
TC=CIR/BC
Answers
D.
TC=BC/CIR
D.
TC=BC/CIR
Answers
Suggested answer: D

WRED is configured on the newly deployed router HW. What is the correct description of the WRED features below? (Multiple choice questions).

A.
WRED can set different drop thresholds and packet loss rates for packets of different priority
A.
WRED can set different drop thresholds and packet loss rates for packets of different priority
Answers
B.
When the flow exceeds the minimum threshold, WRED begins to discard all inlet flow (tail drop)
B.
When the flow exceeds the minimum threshold, WRED begins to discard all inlet flow (tail drop)
Answers
C.
Avoid global synchronization by selectively dropping multiple TCP streams
C.
Avoid global synchronization by selectively dropping multiple TCP streams
Answers
D.
Low-bandwidth traffic is easier to drop than high-bandwidth traffic
D.
Low-bandwidth traffic is easier to drop than high-bandwidth traffic
Answers
Suggested answer: A, C

Regarding the FTP protocol, is it correct in the description below?

A.
In ftP-style, the client completes the initialization of the TCP session for control and data
A.
In ftP-style, the client completes the initialization of the TCP session for control and data
Answers
B.
In ftP Activee, the server side tells the client which port it expects to send data on by commanding "PORT"
B.
In ftP Activee, the server side tells the client which port it expects to send data on by commanding "PORT"
Answers
C.
FTP always uses a TCP session to transmit control information and data information
C.
FTP always uses a TCP session to transmit control information and data information
Answers
D.
FTP always uses the TCP port to establish a data session and ICP port 21 to establish a control session
D.
FTP always uses the TCP port to establish a data session and ICP port 21 to establish a control session
Answers
E.
FTP always uses TCP port 21 to establish a data session and TCP port 20 to establish a control session
E.
FTP always uses TCP port 21 to establish a data session and TCP port 20 to establish a control session
Answers
Suggested answer: A

If a Huawei switch runs the RSTP protocol, when will the BPDUs on a port on the switch be aged?

A.
On the interface, RSTP does not age BPDU
A.
On the interface, RSTP does not age BPDU
Answers
B.
After more than 6 seconds
B.
After more than 6 seconds
Answers
C.
After Ma ge times out
C.
After Ma ge times out
Answers
D.
After Hello time times out
D.
After Hello time times out
Answers
E.
after the Forward Delay timeout
E.
after the Forward Delay timeout
Answers
Suggested answer: C

In the use of the CP protocol, the following description is correct?

A.
The Eth-Trunk interface can be avoided by frequent oscillation interfaceethtrunkllacppreemptenablelacppreemptdelaydelay- time by following command
A.
The Eth-Trunk interface can be avoided by frequent oscillation interfaceethtrunkllacppreemptenablelacppreemptdelaydelay- time by following command
Answers
B.
Source A address can be configured for load sharing in an enabled link aggregation group with the following command: interface eth-trunk 110ad-balance src-dst-ip
B.
Source A address can be configured for load sharing in an enabled link aggregation group with the following command: interface eth-trunk 110ad-balance src-dst-ip
Answers
C.
A member interface can be removed from an enabled link aggregation group with the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 undo eth-trunk 1 interfaceGigabitEthernet0/0/1undoshutdown
C.
A member interface can be removed from an enabled link aggregation group with the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 undo eth-trunk 1 interfaceGigabitEthernet0/0/1undoshutdown
Answers
D.
The member interface can be joined in the link aggregation group by enabling the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 trunkport
D.
The member interface can be joined in the link aggregation group by enabling the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 trunkport
Answers
Suggested answer: A
Total 610 questions
Go to page: of 61