Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

H12-891_V1.0 Exam Dumps - HCIE-Datacom V1.0

Go to page:
Question # 73

An SRLB is a set of user-specified local labels reserved for SR-MPLS. These labels are locally configured and have only local significance. Therefore, they are not advertised through the IGP.

A.

TRUE

B.

FALSE

Full Access
Question # 74

The ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is _____ IRB forwarding. (Capitalize the first letter.)

Full Access
Question # 75

Which of the following statements about configuring user access authentication is incorrect?

A.

To implement network access control on users, you need to determine the domains to which they belong and the AAA schemes that they use.

B.

You can configure an 802.1X access profile, a MAC access profile, a Portal access profile, or a multi-mode authentication profile based on the actual authentication requirements on the network.

C.

If the RADIUS or HWTACACS server is used for authentication, you need to configure parameters for interconnection with the authentication server in the AAA scheme.

D.

You need to bind an access profile to an authentication profile to specify the user authentication mode. Then, apply the authentication profile to an interface to enable network access control.

Full Access
Question # 76

Which of the following technologies can be used to isolate users in the same VLAN?

A.

Super VLAN

B.

Port isolation

C.

IPSG

D.

Ethernet port security

Full Access
Question # 77

Which of the following statements are correct about the authentication protocols used inPortal authentication?

A.

When Portal is used as the authentication protocol, the Portal server needs to exchange authentication information with the access device, which then sends the information to the authentication server for identity authentication.

B.

When Portal is used as the authentication protocol, the Portal server and access device only need to support the Portal protocol, but not the HTTP and HTTPS protocols.

C.

When HTTP or HTTPS is used as the authentication protocol, none of the devices involved in the authentication process need to support the Portal protocol.

D.

When HTTP or HTTPS is used as the authentication protocol, the client needs to send authentication information to the access device, which then sends the information to the authentication server for identity authentication.

Full Access
Question # 78

Man-in-the-middle attacks (MITM) or IP/MAC Spoofing attacksare common onintranetsand can causeinformation leakage.

Which configuration method can prevent these attacks?

A.

Configure the trusted or untrusted interface.

B.

Limit the maximum number of MAC addresses that can be learned on a switch interface.

C.

Configure DHCP snooping to check the CHADDR field carried in a DHCP Request packet.

D.

Configure association between DHCP snooping and IPSG or DAI on the switch.

Full Access
Question # 79

Drag theIPsec functionson the left to the corresponding function description on the right.

Full Access
Question # 80

Telemetry data must be encoded in GPB binary format. This format reduces the number of bytes in telemetry messages and improves the transmission efficiency compared with messages encoded in JSON format.

A.

TRUE

B.

FALSE

Full Access
Go to page: