Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

H12-891_V1.0 Exam Dumps - HCIE-Datacom V1.0

Go to page:
Question # 17

To prevent hackers from attacking user devices or networks using MAC addresses, you can configure MAC addresses of untrusted users as blackhole MAC addresses to filter out such invalid MAC addresses. When receiving a packet whose source or destination MAC address is a blackhole MAC address on a device, the device discards the packet.

A.

TRUE

B.

FALSE

Full Access
Question # 18

Network Quality Analysis (NQA) is a real-time network performance detection and measurement technology. It monitors the performance of multiple protocols running on a network. Which of the following protocols can be monitored by NQA?

A.

SNMP

B.

OSPF

C.

ICMP

D.

DHCP

Full Access
Question # 19

To obtain the token ID of iMaster NCE, you need to send an HTTP request message that includes the following Python code to invoke an iMaster NCE RESTful API.

Which of the following statements is incorrect?

import requests

nbi_name = "demo13@north.com"

nbi_pwd = "CgocVcVe1@"

host = "139.9.213.72"

port = "18002"

URI = "/controller/v2/tokens"

post_token_url = "https:// " + host + ":" + port + URI

headers_post = {"Content-Type": "application/json", "Accept": "application/json"}

r = requests.post(post_token_url, headers=headers_post, json={"userName": nbi_name, "password": nbi_pwd}, verify=False)

A.

You can run the print(r.json()) command to display the response message sent from the server.

B.

Token resources are located at https://139.9.213.72:18002/controller/v2/tokens.

C.

The request body is in JSON format.

D.

The HTTP request uses the GET method to query the token value.

Full Access
Question # 20

OSPF is a mature protocol and is unlikely to have route computation errors in a regular networking environment under correct configurations. Which of the following statements are correct about the possible causes preventing an OSPF neighbor relationship from entering Full state?

A.

A link works abnormally.

B.

The OSPF network types on both ends of the link are inconsistent.

C.

The router IDs of neighbors are the same.

D.

The OSPF MTU values of interfaces on both ends of the link are different.

Full Access
Question # 21

Which of the following statements about the multicast address used by OSPFv3 are correct?

A.

All OSPF routers use FF08::5.

B.

The DR uses FF08::6.

C.

All OSPF routers use FF02::5.

D.

The DR uses FF02::6.

Full Access
Question # 22

Which of the following statements aboutSR-MPLS Policy candidate pathsare correct?

A.

A candidate path can contain multiple segment lists, with each segment list carrying the weight attribute.

B.

Load balancing can be implemented among candidate paths and among segment lists.

C.

An SR-MPLS policy can contain multiple candidate paths with the preference attribute.

D.

The valid candidate path with the highest preference functions as the primary path of the SR-MPLS Policy.

Full Access
Question # 23

Which of the following commands are mandatory for configuring an OSPF-based SR-MPLS TE tunnel? (Select All that Apply)

A.

Configure the LSR ID for routers.

B.

Enable segment routing in the OSPF process view.

C.

Enable the opaque capability of OSPF.

D.

Enable MPLS TE in the OSPF process view.

Full Access
Question # 24

Flavors can be used to enhance SRv6 instructions to meet more diversified service requirements. Which of the following are flavors? (Select all that apply)

A.

Penultimate Segment Pop of the SRH (PSP)

B.

Ultimate Segment Decapsulation (USD)

C.

Ultimate Segment Pop of the SRH (USP)

D.

Penultimate Segment Decapsulation (PSD)

Full Access
Go to page: