ExamGecko
Home / Huawei / H12-891 / List of questions
Ask Question

Huawei H12-891 Practice Test - Questions Answers, Page 5

Add to Whishlist

List of questions

Question 41

Report Export Collapse

What is the following correct for the process of registering the source-side DR with RP in PIM-SM?

Encapsulated in the registered message is multicast service data
Encapsulated in the registered message is multicast service data
RP sends a registration stop message as soon as it receives the registration message.
RP sends a registration stop message as soon as it receives the registration message.
Registered messages are used to build the RPT tree between source DR and RP
Registered messages are used to build the RPT tree between source DR and RP
Registered packets are multicast packets.
Registered packets are multicast packets.
Suggested answer: A
asked 18/09/2024
waleed Haridi
39 questions

Question 42

Report Export Collapse

In a multicast network, what causes multicast traffic to not forward properly?

The router does not have an RPF route
The router does not have an RPF route
PIM is not enabled on the RPF interface
PIM is not enabled on the RPF interface
The upstream router will receive the PIM Join message dropped
The upstream router will receive the PIM Join message dropped
Multi-router egress network, this router is not DR
Multi-router egress network, this router is not DR
Suggested answer: A, B, C
asked 18/09/2024
Daniel Hernandez Villar
38 questions

Question 43

Report Export Collapse

IPSGs can statically configure binding tables or form binding tables by using them with DHCPSnooping

True
True
False
False
Suggested answer: A
asked 18/09/2024
Sivakumar Duraimanickam
41 questions

Question 44

Report Export Collapse

Which of the following are single-packet attacks?

Special control message attacks
Special control message attacks
Scan Probe Attack
Scan Probe Attack
DDos Attack
DDos Attack
Malformed Message Attack
Malformed Message Attack
Suggested answer: A, B, D
asked 18/09/2024
shikeba barakzei
37 questions

Question 45

Report Export Collapse

What is wrong with the following statement about digital certificates?

Digital signatures guarantee the integrity of digital certificates.
Digital signatures guarantee the integrity of digital certificates.
Digital certificates contain public key information.
Digital certificates contain public key information.
Authentication fails when the peer certificate is received within the validity period, but the device itself is in the wrong time if it is not within the validity period of the certificate.
Authentication fails when the peer certificate is received within the validity period, but the device itself is in the wrong time if it is not within the validity period of the certificate.
Even if two PRI entities are not in the same CA system, authentication can be completed as long as both parties can recognize each other's CA.
Even if two PRI entities are not in the same CA system, authentication can be completed as long as both parties can recognize each other's CA.
Suggested answer: D
asked 18/09/2024
Arkadius Thoma
57 questions

Question 46

Report Export Collapse

What is the relationship between CIR, BC and TC? (single select)

CIR=TC/BC
CIR=TC/BC
CIR=BE/TC
CIR=BE/TC
TC=CIR/BC
TC=CIR/BC
TC=BC/CIR
TC=BC/CIR
Suggested answer: D
asked 18/09/2024
Abraham Ermann
47 questions

Question 47

Report Export Collapse

WRED is configured on the newly deployed router HW. What is the correct description of the WRED features below? (Multiple choice questions).

WRED can set different drop thresholds and packet loss rates for packets of different priority
WRED can set different drop thresholds and packet loss rates for packets of different priority
When the flow exceeds the minimum threshold, WRED begins to discard all inlet flow (tail drop)
When the flow exceeds the minimum threshold, WRED begins to discard all inlet flow (tail drop)
Avoid global synchronization by selectively dropping multiple TCP streams
Avoid global synchronization by selectively dropping multiple TCP streams
Low-bandwidth traffic is easier to drop than high-bandwidth traffic
Low-bandwidth traffic is easier to drop than high-bandwidth traffic
Suggested answer: A, C
asked 18/09/2024
Andrey Scherbakov
43 questions

Question 48

Report Export Collapse

Regarding the FTP protocol, is it correct in the description below?

In ftP-style, the client completes the initialization of the TCP session for control and data
In ftP-style, the client completes the initialization of the TCP session for control and data
In ftP Activee, the server side tells the client which port it expects to send data on by commanding "PORT"
In ftP Activee, the server side tells the client which port it expects to send data on by commanding "PORT"
FTP always uses a TCP session to transmit control information and data information
FTP always uses a TCP session to transmit control information and data information
FTP always uses the TCP port to establish a data session and ICP port 21 to establish a control session
FTP always uses the TCP port to establish a data session and ICP port 21 to establish a control session
FTP always uses TCP port 21 to establish a data session and TCP port 20 to establish a control session
FTP always uses TCP port 21 to establish a data session and TCP port 20 to establish a control session
Suggested answer: A
asked 18/09/2024
Kefash White
44 questions

Question 49

Report Export Collapse

If a Huawei switch runs the RSTP protocol, when will the BPDUs on a port on the switch be aged?

On the interface, RSTP does not age BPDU
On the interface, RSTP does not age BPDU
After more than 6 seconds
After more than 6 seconds
After Ma ge times out
After Ma ge times out
After Hello time times out
After Hello time times out
after the Forward Delay timeout
after the Forward Delay timeout
Suggested answer: C
asked 18/09/2024
Anthony Wilson
44 questions

Question 50

Report Export Collapse

In the use of the CP protocol, the following description is correct?

The Eth-Trunk interface can be avoided by frequent oscillation interfaceethtrunkllacppreemptenablelacppreemptdelaydelay- time by following command
The Eth-Trunk interface can be avoided by frequent oscillation interfaceethtrunkllacppreemptenablelacppreemptdelaydelay- time by following command
Source A address can be configured for load sharing in an enabled link aggregation group with the following command: interface eth-trunk 110ad-balance src-dst-ip
Source A address can be configured for load sharing in an enabled link aggregation group with the following command: interface eth-trunk 110ad-balance src-dst-ip
A member interface can be removed from an enabled link aggregation group with the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 undo eth-trunk 1 interfaceGigabitEthernet0/0/1undoshutdown
A member interface can be removed from an enabled link aggregation group with the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 undo eth-trunk 1 interfaceGigabitEthernet0/0/1undoshutdown
The member interface can be joined in the link aggregation group by enabling the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 trunkport
The member interface can be joined in the link aggregation group by enabling the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 trunkport
Suggested answer: A
asked 18/09/2024
Manuela Kays
39 questions
Total 610 questions
Go to page: of 61