Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

H12-821_V1.0 Exam Dumps - HCIP-Datacom-Core Technology V1.0

Go to page:
Question # 65

A session is an entry used to record the connection status of a protocol and is fundamental for the firewall to forward packets. Which of the following protocol packets will the firewall create sessions for?

A.

Subsequent fragment

B.

ICMP error packet

C.

GRE

D.

TCP

Full Access
Question # 66

When an SSH client accesses an SSH server for the first time and the SSH server's public key is not configured on the SSH client, you can enable first-time authentication on the SSH client. This allows the SSH client to access the SSH server and saves the SSH server's public key on the SSH client. In this way, the next time the SSH client accesses the SSH server, the SSH client can use the saved public key to authenticate the SSH server.

A.

TRUE

B.

FALSE

Full Access
Question # 67

In addition to a route reflector, the confederation is another method that reduces the number of IBGP connections in an AS.

Which of the following statements are true about the confederation technology? (Choose all that apply)

A.

This technology is applicable to large-scale networks.

B.

Special EBGP connections are established among sub-ASs in a confederation, and the sub-ASs need to be fully meshed.

C.

All member devices in a confederation need to be reconfigured.

D.

The logical topology does not need to be changed when a confederation is used.

Full Access
Question # 68

On the OSPF network shown in the figure, an adjacency has been established between R1 and R2. An engineer configures the commands in the figure on R2. In this case, which of the following routing entries may exist in the routing table of R2?

A.

10.1.4.0/24

B.

10.1.3.0/24

C.

10.1.2.0/24

D.

10.1.1.0/24

Full Access
Question # 69

What is the correct procedure for a VLAN pool to assign terminals to VLANs.

Full Access
Question # 70

BGP is a distance-vector protocol that implements route reachability between ASs and selects optimal routes. Which of the following statements are true about this protocol?

A.

BGP does not support authentication. Therefore, it cannot ensure network security.

B.

BGP uses TCP as the transport layer protocol.

C.

BGP provides various routing policies.

D.

BGP supports automatic peer discovery.

Full Access
Question # 71

Which of the following methods is usually used by a network administrator to configure a newly purchased device for the first time?

A.

Telnet

B.

SNMP

C.

Login through the Console port

D.

FTP

Full Access
Question # 72

In an IPv4 address space, Class D addresses are used for multicast. Among Class D addresses, which of the following is the permanent group address range reserved for routing protocols?

A.

232.0.0.0 to 232.255.255.255

B.

239.0.0.0 to 239.255.255.255

C.

224.0.0.0 to 224.0.0.255

D.

224.0.1.0 to 231.255.255.255

Full Access
Go to page: