Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

H12-821_V1.0 Exam Dumps - HCIP-Datacom-Core Technology V1.0

Go to page:
Question # 41

When deploying BFD, you need to adjust some parameters so that it can better detect the network status. Which of the following statements isfalseabout BFD optimization?

A.

After a high priority is configured for BFD packets, BFD packets are preferentially forwarded.

B.

To quickly learn about the network status and performance requirements, you can set the interval for sending BFD packets to the minimum value.

C.

On a live network, some devices switch traffic only when a BFD session changes to the Up state. If a routing protocol goes Up later than an interface, no route is available for switching traffic back, leading to traffic loss. To resolve this issue, configure a delay to compensate for the time difference caused when the routing protocol goes Up later than the interface.

D.

If a BFD session flaps, master/backup switchovers are frequently performed on the application associated with the BFD session. To prevent this, set the WTR time of the BFD session.

Full Access
Question # 42

An IP prefix list is configured on a router using the following command:

ip ip-prefix huawei index 10 permit 10.1.1.0 24 greater-equal 26

In this case, the value ofgreater-equal-valueis ____, and the value ofless-equal-valueis ____.

Full Access
Question # 43

On an OSPF network, if two indirectly connected routers with the same router ID run in the same area, Type 1 LSA calculation fails.

A.

TRUE

B.

FALSE

Full Access
Question # 44

On an RSTP network, port priorities may be compared during root port or designated port election. Which of the following values is the default priority of a port on a Huawei switch?

A.

1

B.

128

C.

4096

D.

32768

Full Access
Question # 45

In addition to numerous normal service packets, the CPUs of devices on a network may also receive large numbers of attack packets. To ensure that the CPUs can properly respond to normal services, the devices provide the local attack defense function.

Which of the following statements are true about this function?(Select all that apply)

A.

The device can schedule the protocol packets to be sent to the CPU in the attack defense policy based on the protocol priorities so that the packets with higher priorities are processed preferentially.

B.

To ensure that session-based application-layer data runs properly during an attack, you can configure the dynamic link protection function.

C.

Regardless of the packet type, the same rate limit must be set to reduce the number of packets sent to the CPU.

D.

CPU attack defense can also take effect on the management interface of the device.

Full Access
Question # 46

Which of the following values is theReserved/Circuit Typefield in theIIH packetssent by aLevel-1-2 routeron an IS-IS network?

A.

00

B.

11

C.

01

D.

10

Full Access
Question # 47

Which of the following statements about multicast packet forwarding is true?

A.

If a multicast data packet fails the RPF check, the packet must have been received through a sub-optimal interface. However, this interface still receives and forwards the multicast traffic downstream.

B.

IGMP snooping cannot control the scope of multicast traffic flooding on a Layer 2 network.

C.

The source address of a multicast packet is a unicast address.

D.

In multicast transmission, the destination address of a packet can be the unicast address of a host.

Full Access
Question # 48

The Neighbor Discovery Protocol (NDP) is an important basic protocol in the IPv6 protocol suite and plays an important role. Which of the following functions and features does it support?

A.

Address resolution

B.

Neighbor state tracing

C.

Duplicate address detection

D.

Redirection

Full Access
Go to page: