Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

H12-821_V1.0 Exam Dumps - HCIP-Datacom-Core Technology V1.0

Go to page:
Question # 81

In the OSPF protocol, inter-area route calculation involves only Router LSA, Network LSA, and Summary LSA.

A.

TRUE

B.

FLASE

Full Access
Question # 82

SSHis a secure protocol that establishes tunnels for users on insecure networks.Which of the following statements is false about SSH login?

A.

The SSH server supports authentication. Only users who have passed authentication can log in to the device.

B.

When the SSH server function is enabled on a device, the socket obtaining service is also enabled on the device. This makes the device prone to scanning by attackers. As such, the SSH server function and the corresponding port can be disabled when the SSH server function is not required.

C.

An ACL rule can be configured for each VTY channel to control the IP addresses of clients that are allowed to log in to the device.

D.

By default, the port number of the SSH server is 23. You can change the port number of the SSH server to a non-well-known port number to reduce the probability of being scanned and attacked.

Full Access
Question # 83

Link aggregation is a common network technology. Which of the following are advantages of link aggregation?

A.

Load balancing

B.

Improved reliability

C.

Increased link bandwidth

D.

Route backup

Full Access
Question # 84

When deploying a VRRP network, an enterprise administrator sets the virtual IP address to 192.168.1.254 and VRID to 1. Which of the following is the virtual MAC address after the network becomes stable?

A.

0000-5e01-0101

B.

0000-5e01-0254

C.

0000-5e00-0101

D.

0000-5e00-0254

Full Access
Question # 85

Which of the following statements about BFD operating modes are true?

A.

In demand mode, once a BFD session is set up, the system no longer periodically sends BFD Control packets.

B.

Asynchronous mode does not support the Echo function.

C.

In asynchronous mode, two systems periodically exchange BFD Control packets at the negotiated interval. If one system does not receive any BFD Control packets from the other within the detectiontime, the BFD session is declared down.

D.

Asynchronous mode is the primary BFD operating mode.

Full Access
Question # 86

STAs stay on different subnets before and after Layer 3 roaming. To enable the STAs to access the original network after roaming, network engineers need to configure user traffic to be forwarded to the original subnet over a CAPWAP tunnel.

A.

TRUE

B.

FALSE

Full Access
Question # 87

On an OSPF network, the I bit, M bit, and MS bit in the first DD packet sent by a router are all set to 1.

A.

TRUE

B.

FALSE

Full Access
Question # 88

GRE is a Layer 2 VPN encapsulation technology that encapsulates packets of certain data link layer protocols so that the encapsulated packets can be transmitted over an IP network.

A.

TRUE

B.

FALSE

Full Access
Go to page: