Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

H12-891_V1.0 Exam Dumps - HCIE-Datacom V1.0

Go to page:
Question # 25

AH is an IP-based transport-layer protocol. The protocol number is _____. (Enter only digits.)

Full Access
Question # 26

A client sends an HTTP request to a server, and the server sends back an HTTP response. Which of the following parameters isnotcarried in the HTTP response?

A.

Reason phrase

B.

Status code

C.

Protocol version

D.

URI

Full Access
Question # 27

As shown in the following figure, an engineer tests network interconnection between two branches. To implement network interconnection,OSPFis deployed onR1, R2, and R3of branch 1, andIS-ISis deployed onR2, R3, and R4of branch 2. Which of the following operations needs to be performed to allowR1 to access R4's loopback interface address?

A.

Run the default-route-advertise command in both the OSPF and IS-IS views on R2.

B.

No configuration is required.

C.

Run the default-route-advertise commandonly in the OSPF viewon R2.

D.

Run the default-route-advertise commandonly in the IS-IS viewon R2.

Full Access
Question # 28

In the following figure, OSPF is enabled on all router interfaces. The IP addresses marked in the figure belong to Loopback0 of the routers.

The Loopback0 addresses of R1 and R2 are advertised in Area 1, the Loopback0 address of R4 is advertised in Area 0, and the Loopback0 addresses of R3 and R5 are advertised in Area 2. Given this, which of the following IP addresses can ping each other?

A.

10.0.3.3 and 10.0.5.5

B.

10.0.2.2 and 10.0.5.5

C.

10.0.2.2 and 10.0.3.3

D.

10.0.4.4 and 10.0.2.2

Full Access
Question # 29

As shown in the following figure, OSPF is deployed on a campus network to implement network interconnection, and Area 1 is deployed as an NSSA. To enable R1 to access R4’s loopback interface address, an engineer imports a direct route to R4’s OSPF process. Which of the following statements about this scenario are correct?

[R4-ospf-1] import-route direct

Loopback0: 10.1.4.4/32

A.

R2 is an ABR and translates Type 7 LSAs carrying the default route information into Type 5 LSAs.

B.

R2 is an ABR and translates Type 7 LSAs that describe external routes into Type 5 LSAs.

C.

R4 is an ASBR in the NSSA and generates Type 7 LSAs carrying the default route information.

D.

R4 is an ASBR in the NSSA and generates Type 7 LSAs to describe external routes.

Full Access
Question # 30

Which of the following statements are correct about authentication points and policy enforcement points in Huawei's free mobility solution?

A.

The policy enforcement point executes inter-group policies based on security groups.

B.

The authentication point and policy enforcement point must be deployed on the same device.

C.

When receiving user traffic, the authentication point enforces a policy to process the traffic based on the source or destination security group corresponding to the source or destination IP address of the traffic.

D.

The authentication point and policy enforcement point can be deployed on different devices.

Full Access
Question # 31

At the NETCONF content layer, the operation may contain an operation attribute, which is used to specify an operation type for configuration data. Which of the following operation attributes are supported?

A.

create: The configuration data identified by the element that contains this attribute is added to the configuration datastore only if the configuration data does not already exist in the configuration datastore. If it already exists in the configuration datastore, with the value being data-exists is returned.

B.

delete: The configuration data identified by the element that contains this attribute is deleted from the configuration datastore. If the configuration data does not exist in the configuration datastore, a deletion success message is returned.

C.

merge: The configuration data identified by the element that contains this attribute is modified if the configuration data already exists in the configuration datastore. If not, the configuration data is created in the datastore.

D.

remove: The configuration data identified by the element that contains this attribute is deleted from the configuration datastore. If the configuration data does not exist in the configuration datastore, a deletion success message is returned.

Full Access
Question # 32

In the admission design for large- and medium-sized campus networks, which of the following authentication modes can be used for PCs connected to IP phones?

A.

MAC address authentication

B.

802.1X authentication

C.

Multi-mode authentication

D.

Portal authentication

Full Access
Go to page: