Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

H12-891_V1.0 Exam Dumps - HCIE-Datacom V1.0

Searching for workable clues to ace the Huawei H12-891_V1.0 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s H12-891_V1.0 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 73

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following BGP EVPN routes is used to advertise MAC addresses, ARP entries, and IRB routes?

A.

Type 3

B.

Type 4

C.

Type 2

D.

Type 1

Full Access
Question # 74

A network administrator needs to retrieve a token ID from iMaster NCE using the following Python code:

import requests

nbi_name = " demol3@north.com "

nbi_pwd = " qqcOVcVel@ "

host = " 139.9.213.72 "

port = " 18002 "

URI = " /controller/v2/tokens "

post_token_url = " https:// " + host + " : " + port + URI

headers_post = { ' Content-Type ' : ' application/json ' , ' Accept ' : ' application/json ' }

r = requests.post(post_token_url, headers=headers_post, json={ " userName " : nbi_name, " password " : nbi_pwd}, verify=incorrect)

Which of the following statements is incorrect?

A.

You can run print(r.json()) to display the response message sent from the server.

B.

Token resources are located at https://139.9.213.72:18002/controller/v2/tokens.

C.

The HTTP request uses the GET method to query the token value.

D.

The request body is in JSON format.

Full Access
Question # 75

New IS-IS TLVs are used to carry IPv6 addresses and reachability information to support IPv6 route processing and calculation.

A.

TRUE

B.

FALSE

Full Access
Question # 76

Huawei Open Programmability System (OPS) uses standard HTTP methods to access managed objects to manage network devices. Which of the following HTTP methods is used to configure the value of a network device ' s managed object?

A.

PUT

B.

POST

C.

PATCH

D.

GET

Full Access
Question # 77

Which of the following statements is incorrect about adding devices on a virtualized network deployed using iMaster NCE-Campus?

A.

iMaster NCE-Campus allows users to add devices in batches.

B.

iMaster NCE-Campus allows users to add devices by device role.

C.

iMaster NCE-Campus allows users to add devices by device ESN.

D.

iMaster NCE-Campus allows users to add devices by device model.

Full Access
Question # 78

On the campus network shown, IPv6 is deployed for service tests. Four routers are deployed on the network, and OSPFv3 is used for IPv6 network connectivity. An engineer checks the LSDB of R2 and obtains a Link-LSA. Which of the following statements about the LSA are correct?

A.

The link-local address of R2’s GE0/0/0 is FE80::2E0:FCFF:FECD:4F79.

B.

The IPv6 address prefix of R2’s GE0/0/0 is 2001:DB8:2345:23::/64.

C.

This LSA indicates that R2 does not support external routes but can participate in IPv6 route calculation.

D.

This LSA is generated by R2.

Full Access
Question # 79

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following fields is not carried in BGP EVPN Type 2 routes?

A.

IP Prefix

B.

IP Address

C.

L3VNI

D.

L2VNI

Full Access
Question # 80

NETCONF provides a set of mechanisms for managing network devices. NETCONF operations take place on a configuration datastore of network devices. Which of the following statements is incorrect about the configuration datastore?

A.

The configuration datastore of network devices can be classified into the candidate, running, and startup configuration datastores.

B.

The < delete-config > operation is oriented at the startup configuration datastore.

C.

The < validate > operation is oriented at the candidate configuration datastore.

D.

The < commit > operation submits the configuration in a startup configuration datastore to a running configuration datastore.

Full Access
Go to page: