ExamGecko
Home Home / Huawei / H12-891

Huawei H12-891 Practice Test - Questions Answers, Page 53

Question list
Search
Search

List of questions

Search

The following description of the Layer 6 functionality in the OSI reference model is correct?

A.
Synchronous communication
A.
Synchronous communication
Answers
B.
Establishing, maintaining, and terminating communication sessions
B.
Establishing, maintaining, and terminating communication sessions
Answers
C.
Provides a common data compression and encryption scheme
C.
Provides a common data compression and encryption scheme
Answers
D.
Determines the availability of resources
D.
Determines the availability of resources
Answers
Suggested answer: C

The Path Selection tool can define multiple entries, which of the following tools will automatically generate a rejection of any entries at the end of the slot

A.
Community -filter
A.
Community -filter
Answers
B.
IP-prefix
B.
IP-prefix
Answers
C.
Route policy
C.
Route policy
Answers
D.
AS-Path- filter
D.
AS-Path- filter
Answers
Suggested answer: A, B, C, D

CMPv6 uses the Type field to identify the message type, and according to the value of the type field, we can divide the ICMPv6 message into two categories, one is the error message and the other is the information message

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

The CPU was attacked by malicious traffic. Here are some of the following ways to prevent an attack:

Multi-select

A.
USE CPCAR to rate limit messages sent up to the CPU according to the protocol type
A.
USE CPCAR to rate limit messages sent up to the CPU according to the protocol type
Answers
B.
Speed limiting of messages sent to the CPu on the soil.
B.
Speed limiting of messages sent to the CPu on the soil.
Answers
C.
Filter packets with AcL on the compromised router port
C.
Filter packets with AcL on the compromised router port
Answers
D.
Turn off the remote login function of the router.
D.
Turn off the remote login function of the router.
Answers
E.
Analyze and count the packets sent to the CPU to find out the user of the attack source or the interface of the attack source.
E.
Analyze and count the packets sent to the CPU to find out the user of the attack source or the interface of the attack source.
Answers
Suggested answer: C, D

In an HWIP multicast network, where multiple sources exist and each source has several receivers, which protocol allows source-to-RP traffic and RP-to-receiver traffic to share the same tree 2?

A.
MOSPF
A.
MOSPF
Answers
B.
PIM SM
B.
PIM SM
Answers
C.
DVMRP
C.
DVMRP
Answers
D.
56768GZliuji
D.
56768GZliuji
Answers
E.
PIM-DM
E.
PIM-DM
Answers
Suggested answer: D

Which of the following DNS resource records are legitimate?

A.
FQDN
A.
FQDN
Answers
B.
NS
B.
NS
Answers
C.
PTR
C.
PTR
Answers
D.
MX
D.
MX
Answers
E.
A
E.
A
Answers
Suggested answer: B, C, D, E

A workstation is connected to an Ethernet switch in the work through a super-class 5 wire, the workstation can access the entire network (that is, full connection) through the switch, but the access rate is much lower than expected, when viewing the switch interface statistics, you can detect that there are many ultra-small frames, with software to read the statistics of the workstation network card, found that there are Many FCS and frame alignment errors, what causes the machine to cause these errors?

A.
The rate mismatch between the workstation and the switch
A.
The rate mismatch between the workstation and the switch
Answers
B.
Interface mismatched to an 8021Qtrunk interface
B.
Interface mismatched to an 8021Qtrunk interface
Answers
C.
The line between the workstation and the switch has been completely damaged
C.
The line between the workstation and the switch has been completely damaged
Answers
D.
The operating mode between the workstation and the switch does not match
D.
The operating mode between the workstation and the switch does not match
Answers
E.
The network interface card on the workstation is damaged
E.
The network interface card on the workstation is damaged
Answers
Suggested answer: D

The authentication types of ISIS include interface authentication, zone authentication, and routed domain authentication

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

If the topology of the entire network does not change, but the allocation of IP segments in the router changes, ISIS only uses PRC to calculate the changed routing information, and does not recalculate all SPT

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which of the following configurations for OSPFv3 route aggregation is correct?

A.
[Huawei]ospf3 1 [Huawei-ospv3-1]area 1 [Huawei-ospf3-1-area-0001] abr-summary fo0:0 0:48 cost 400
A.
[Huawei]ospf3 1 [Huawei-ospv3-1]area 1 [Huawei-ospf3-1-area-0001] abr-summary fo0:0 0:48 cost 400
Answers
B.
[Huaweijinterface gigabitethernet 1/0/0[Huawei-GigabilEthemnet1 / 0/0] asbr-summany fcOO:0048 cost 20
B.
[Huaweijinterface gigabitethernet 1/0/0[Huawei-GigabilEthemnet1 / 0/0] asbr-summany fcOO:0048 cost 20
Answers
C.
[Huawei] ospfs 1 [Huawei-ospf3-1] asbr-summary fcO0:O:0:.48 cost 20 tag 10o
C.
[Huawei] ospfs 1 [Huawei-ospf3-1] asbr-summary fcO0:O:0:.48 cost 20 tag 10o
Answers
D.
Huawei]ospv3 1 [Huawe-ospt/3-1]area 1 Huawei-osph3-1-area-0001]asbr-summary fc000:048 cost 20 tag 100E. [Huawei] ospfv3 1 [Huawei-ospfv3-1] abr-summary fc000:0;. 48 cost 400
D.
Huawei]ospv3 1 [Huawe-ospt/3-1]area 1 Huawei-osph3-1-area-0001]asbr-summary fc000:048 cost 20 tag 100E. [Huawei] ospfv3 1 [Huawei-ospfv3-1] abr-summary fc000:0;. 48 cost 400
Answers
Suggested answer: A
Total 610 questions
Go to page: of 61