ExamGecko
Home / Huawei / H12-891 / List of questions
Ask Question

Huawei H12-891 Practice Test - Questions Answers, Page 9

Add to Whishlist

List of questions

Question 81

Report Export Collapse

Regarding the certification of the ISIS protocol, there is a correct statement

Connection authentication can realize the authentication of the hello messages of Leve-1 and Leve-2
Connection authentication can realize the authentication of the hello messages of Leve-1 and Leve-2
After configuring the connection authentication, the IIH issued by the router must carry the authentication TLV
After configuring the connection authentication, the IIH issued by the router must carry the authentication TLV
After configuring zone authentication, the router issues an IIH, SNP, LSPΓ³strap-to-tape authentication TLV
After configuring zone authentication, the router issues an IIH, SNP, LSPΓ³strap-to-tape authentication TLV
The two routers are configured for area authentication and interface authentication, and the passwords are the same, so the two can establish an isocopied relationship
The two routers are configured for area authentication and interface authentication, and the passwords are the same, so the two can establish an isocopied relationship
Suggested answer: A, B
asked 18/09/2024
Mark Green
55 questions

Question 82

Report Export Collapse

If the Option field value in the 0SPFv3 Hello message issued by the router's GIgabit Ethermet0/0 interface is 0x000013, the following description is correct

The Gigabit/thernetO/0/0 interface of Router A adds IPv6 routing to compute
The Gigabit/thernetO/0/0 interface of Router A adds IPv6 routing to compute
Router A's Gigabit/thernetO/0/0 interface belongs to the NSSA zone
Router A's Gigabit/thernetO/0/0 interface belongs to the NSSA zone
Router A supports AS-An External-LSA flood
Router A supports AS-An External-LSA flood
Router A is an OSPFv3 device with forwarding capability
Router A is an OSPFv3 device with forwarding capability
Suggested answer: A, C, D
asked 18/09/2024
Liam Derwin
38 questions

Question 83

Report Export Collapse

Regarding the BGP ring protection mechanism, is the following description correct?

The AS_ PATH attribute is used between autonomous systems to prevent ring cats
The AS_ PATH attribute is used between autonomous systems to prevent ring cats
The Cluster List property is used for loop guard within the reflector cluster, and the router rejects the route when it finds that the Cluster List of the route entry contains its own Cluster ID.
The Cluster List property is used for loop guard within the reflector cluster, and the router rejects the route when it finds that the Cluster List of the route entry contains its own Cluster ID.
Routes learned from IBGP are not advertised to IBGP neighbors and are used to prevent routing loops inside the AS.
Routes learned from IBGP are not advertised to IBGP neighbors and are used to prevent routing loops inside the AS.
You can use the AS_ CONFED_SET attribute to prevent loops within a consortium.
You can use the AS_ CONFED_SET attribute to prevent loops within a consortium.
Suggested answer: A, C, D
asked 18/09/2024
Trung Phan
53 questions

Question 84

Report Export Collapse

Regarding Route Policy, is the following description correct?

Advanced ACLs can be applied in route-policy to filter routes
Advanced ACLs can be applied in route-policy to filter routes
The table entries pernit::0 Less an equal 128 indicate that all IPV6 routes are allowed through
The table entries pernit::0 Less an equal 128 indicate that all IPV6 routes are allowed through
If more than one node is defined in Route one policy, there should be at least one node in each node that matches permit
If more than one node is defined in Route one policy, there should be at least one node in each node that matches permit
Route one policy filters only the default route
Route one policy filters only the default route
Suggested answer: B, C, D
asked 18/09/2024
hamza reza
54 questions

Question 85

Report Export Collapse

Which of the following routing tools is unique to BGP?

Route-policy
Route-policy
ACL
ACL
IP-prefix
IP-prefix
AS-path-filter
AS-path-filter
Suggested answer: D
asked 18/09/2024
David Aghaegbuna
46 questions

Question 86

Report Export Collapse

The following is the correct description of the aggregation of BGP? (Single Choice Questions).

After you configure aggregate ipv4-address mask , only aggregate routes are published, not detail routes.
After you configure aggregate ipv4-address mask , only aggregate routes are published, not detail routes.
For IPv6 routing, BGP supports manual coalescing and automatic aggregation
For IPv6 routing, BGP supports manual coalescing and automatic aggregation
By default, BGP enables automatic aggregation
By default, BGP enables automatic aggregation
You can manually aggregate the routes in the BGP local routing table with a profile
You can manually aggregate the routes in the BGP local routing table with a profile
Suggested answer: D
asked 18/09/2024
Rosalba Scalera
57 questions

Question 87

Report Export Collapse

The following about BGP routing, what is the wrong description?

Non-aggregate routes take precedence over aggregate routes.
Non-aggregate routes take precedence over aggregate routes.
In the case of PrefVal, Local_Preference equality, if the BGP preference of the locally generated route, IBGP route, EBGP route is equal, the valid reference of this generation is preceded by priority.
In the case of PrefVal, Local_Preference equality, if the BGP preference of the locally generated route, IBGP route, EBGP route is equal, the valid reference of this generation is preceded by priority.
See the following entry in the BGP routing table: Γ― *172 16 1. 11/32 0 00010 0? Indicates that the route is available non-optimal.
See the following entry in the BGP routing table: Γ― *172 16 1. 11/32 0 00010 0? Indicates that the route is available non-optimal.
For next_hop unreachable routes are invalid cat by and do not participate in the preference.Flogging case
For next_hop unreachable routes are invalid cat by and do not participate in the preference.Flogging case
Suggested answer: A
asked 18/09/2024
EDUARDO LEE
43 questions

Question 88

Report Export Collapse

The following description of Filter-Policy is correct?( Radio neck).

With Filter-Policy, on ASBR in OSPF, you can filter the generation of type5 LSA and type7LSA.
With Filter-Policy, on ASBR in OSPF, you can filter the generation of type5 LSA and type7LSA.
Prefix lists can be used to filter both routes and packets.
Prefix lists can be used to filter both routes and packets.
Filter-policy filters the link state information received or published, and can modify the properties of route entries.
Filter-policy filters the link state information received or published, and can modify the properties of route entries.
When using a prefix list to filter routes, the table entry ip-prefix 1 deny 0000 0 less-equal 32 matches only the default route.
When using a prefix list to filter routes, the table entry ip-prefix 1 deny 0000 0 less-equal 32 matches only the default route.
Suggested answer: A
asked 18/09/2024
Arkadi Popov
43 questions

Question 89

Report Export Collapse

When deploying the ISIS protocol in an IPv6 environment , the following statement is correct (single choice).

By default, the DIS priority for broadcast network interfaces at Level-1 and Level-2 is 1
By default, the DIS priority for broadcast network interfaces at Level-1 and Level-2 is 1
In broadcast networks, IPv4 and The DIS priority for IPv6 can be set separately
In broadcast networks, IPv4 and The DIS priority for IPv6 can be set separately
In the same broadcast network. If each router supports both IPv4 and IPv6 The DIS for IPv4 and IPv6 must be the same device
In the same broadcast network. If each router supports both IPv4 and IPv6 The DIS for IPv4 and IPv6 must be the same device
IS-IS is configured under the finger port is ISIS silent, this interface will not send ISIS packets, but will receive ISIS packets
IS-IS is configured under the finger port is ISIS silent, this interface will not send ISIS packets, but will receive ISIS packets
Suggested answer: C
asked 18/09/2024
Guilherme Silva
35 questions

Question 90

Report Export Collapse

A lot of overwave techniques have emerged in the process of replacing the IPV4 addresses used in the network with lP6 addresses. These technologies are divided into two categories, one is IP4IPV6 coexistence technology, the other is PA/IP>6 interoperability technology, which of the following options sleep in IPv4/IPv6 coexistence technology?

NAT64
NAT64
IPv6 over IPv4
IPv6 over IPv4
Dual Stack
Dual Stack
ISATAP
ISATAP
Suggested answer: B, C, D
asked 18/09/2024
GIORGOS KELAIDIS
36 questions
Total 610 questions
Go to page: of 61