ExamGecko
Home Home / Huawei / H12-891

Huawei H12-891 Practice Test - Questions Answers, Page 9

Question list
Search
Search

Regarding the certification of the ISIS protocol, there is a correct statement

A.
Connection authentication can realize the authentication of the hello messages of Leve-1 and Leve-2
A.
Connection authentication can realize the authentication of the hello messages of Leve-1 and Leve-2
Answers
B.
After configuring the connection authentication, the IIH issued by the router must carry the authentication TLV
B.
After configuring the connection authentication, the IIH issued by the router must carry the authentication TLV
Answers
C.
After configuring zone authentication, the router issues an IIH, SNP, LSPóstrap-to-tape authentication TLV
C.
After configuring zone authentication, the router issues an IIH, SNP, LSPóstrap-to-tape authentication TLV
Answers
D.
The two routers are configured for area authentication and interface authentication, and the passwords are the same, so the two can establish an isocopied relationship
D.
The two routers are configured for area authentication and interface authentication, and the passwords are the same, so the two can establish an isocopied relationship
Answers
Suggested answer: A, B

If the Option field value in the 0SPFv3 Hello message issued by the router's GIgabit Ethermet0/0 interface is 0x000013, the following description is correct

A.
The Gigabit/thernetO/0/0 interface of Router A adds IPv6 routing to compute
A.
The Gigabit/thernetO/0/0 interface of Router A adds IPv6 routing to compute
Answers
B.
Router A's Gigabit/thernetO/0/0 interface belongs to the NSSA zone
B.
Router A's Gigabit/thernetO/0/0 interface belongs to the NSSA zone
Answers
C.
Router A supports AS-An External-LSA flood
C.
Router A supports AS-An External-LSA flood
Answers
D.
Router A is an OSPFv3 device with forwarding capability
D.
Router A is an OSPFv3 device with forwarding capability
Answers
Suggested answer: A, C, D

Regarding the BGP ring protection mechanism, is the following description correct?

A.
The AS_ PATH attribute is used between autonomous systems to prevent ring cats
A.
The AS_ PATH attribute is used between autonomous systems to prevent ring cats
Answers
B.
The Cluster List property is used for loop guard within the reflector cluster, and the router rejects the route when it finds that the Cluster List of the route entry contains its own Cluster ID.
B.
The Cluster List property is used for loop guard within the reflector cluster, and the router rejects the route when it finds that the Cluster List of the route entry contains its own Cluster ID.
Answers
C.
Routes learned from IBGP are not advertised to IBGP neighbors and are used to prevent routing loops inside the AS.
C.
Routes learned from IBGP are not advertised to IBGP neighbors and are used to prevent routing loops inside the AS.
Answers
D.
You can use the AS_ CONFED_SET attribute to prevent loops within a consortium.
D.
You can use the AS_ CONFED_SET attribute to prevent loops within a consortium.
Answers
Suggested answer: A, C, D

Regarding Route Policy, is the following description correct?

A.
Advanced ACLs can be applied in route-policy to filter routes
A.
Advanced ACLs can be applied in route-policy to filter routes
Answers
B.
The table entries pernit::0 Less an equal 128 indicate that all IPV6 routes are allowed through
B.
The table entries pernit::0 Less an equal 128 indicate that all IPV6 routes are allowed through
Answers
C.
If more than one node is defined in Route one policy, there should be at least one node in each node that matches permit
C.
If more than one node is defined in Route one policy, there should be at least one node in each node that matches permit
Answers
D.
Route one policy filters only the default route
D.
Route one policy filters only the default route
Answers
Suggested answer: B, C, D

Which of the following routing tools is unique to BGP?

A.
Route-policy
A.
Route-policy
Answers
B.
ACL
B.
ACL
Answers
C.
IP-prefix
C.
IP-prefix
Answers
D.
AS-path-filter
D.
AS-path-filter
Answers
Suggested answer: D

The following is the correct description of the aggregation of BGP? (Single Choice Questions).

A.
After you configure aggregate ipv4-address mask , only aggregate routes are published, not detail routes.
A.
After you configure aggregate ipv4-address mask , only aggregate routes are published, not detail routes.
Answers
B.
For IPv6 routing, BGP supports manual coalescing and automatic aggregation
B.
For IPv6 routing, BGP supports manual coalescing and automatic aggregation
Answers
C.
By default, BGP enables automatic aggregation
C.
By default, BGP enables automatic aggregation
Answers
D.
You can manually aggregate the routes in the BGP local routing table with a profile
D.
You can manually aggregate the routes in the BGP local routing table with a profile
Answers
Suggested answer: D

The following about BGP routing, what is the wrong description?

A.
Non-aggregate routes take precedence over aggregate routes.
A.
Non-aggregate routes take precedence over aggregate routes.
Answers
B.
In the case of PrefVal, Local_Preference equality, if the BGP preference of the locally generated route, IBGP route, EBGP route is equal, the valid reference of this generation is preceded by priority.
B.
In the case of PrefVal, Local_Preference equality, if the BGP preference of the locally generated route, IBGP route, EBGP route is equal, the valid reference of this generation is preceded by priority.
Answers
C.
See the following entry in the BGP routing table: ï *172 16 1. 11/32 0 00010 0? Indicates that the route is available non-optimal.
C.
See the following entry in the BGP routing table: ï *172 16 1. 11/32 0 00010 0? Indicates that the route is available non-optimal.
Answers
D.
For next_hop unreachable routes are invalid cat by and do not participate in the preference.Flogging case
D.
For next_hop unreachable routes are invalid cat by and do not participate in the preference.Flogging case
Answers
Suggested answer: A

The following description of Filter-Policy is correct?( Radio neck).

A.
With Filter-Policy, on ASBR in OSPF, you can filter the generation of type5 LSA and type7LSA.
A.
With Filter-Policy, on ASBR in OSPF, you can filter the generation of type5 LSA and type7LSA.
Answers
B.
Prefix lists can be used to filter both routes and packets.
B.
Prefix lists can be used to filter both routes and packets.
Answers
C.
Filter-policy filters the link state information received or published, and can modify the properties of route entries.
C.
Filter-policy filters the link state information received or published, and can modify the properties of route entries.
Answers
D.
When using a prefix list to filter routes, the table entry ip-prefix 1 deny 0000 0 less-equal 32 matches only the default route.
D.
When using a prefix list to filter routes, the table entry ip-prefix 1 deny 0000 0 less-equal 32 matches only the default route.
Answers
Suggested answer: A

When deploying the ISIS protocol in an IPv6 environment , the following statement is correct (single choice).

A.
By default, the DIS priority for broadcast network interfaces at Level-1 and Level-2 is 1
A.
By default, the DIS priority for broadcast network interfaces at Level-1 and Level-2 is 1
Answers
B.
In broadcast networks, IPv4 and The DIS priority for IPv6 can be set separately
B.
In broadcast networks, IPv4 and The DIS priority for IPv6 can be set separately
Answers
C.
In the same broadcast network. If each router supports both IPv4 and IPv6 The DIS for IPv4 and IPv6 must be the same device
C.
In the same broadcast network. If each router supports both IPv4 and IPv6 The DIS for IPv4 and IPv6 must be the same device
Answers
D.
IS-IS is configured under the finger port is ISIS silent, this interface will not send ISIS packets, but will receive ISIS packets
D.
IS-IS is configured under the finger port is ISIS silent, this interface will not send ISIS packets, but will receive ISIS packets
Answers
Suggested answer: C

A lot of overwave techniques have emerged in the process of replacing the IPV4 addresses used in the network with lP6 addresses. These technologies are divided into two categories, one is IP4IPV6 coexistence technology, the other is PA/IP>6 interoperability technology, which of the following options sleep in IPv4/IPv6 coexistence technology?

A.
NAT64
A.
NAT64
Answers
B.
IPv6 over IPv4
B.
IPv6 over IPv4
Answers
C.
Dual Stack
C.
Dual Stack
Answers
D.
ISATAP
D.
ISATAP
Answers
Suggested answer: B, C, D
Total 610 questions
Go to page: of 61