Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following H12-222 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H12-222 Exam Dumps - Huawei Certified Network Professional-R&S-IENP

Question # 4

Which of the following statements regarding the DiffServ service model is false?

A.

You can set QoS parameters in the IP packet header to notify a network node of QoS requirements.

B.

Each device along the transmission path obtains the service requirements type of packets by analyzing the IP packet header.

C.

During DiffServ implementation, the downstream router must classify packets.

D.

The DiffServ service model is based on packet flows.

Full Access
Question # 5

A label forwarding table exists on a device that runs MPLS. Which of the following statements regarding all incoming labels in the label forwarding table is true?

A.

They must be different.

B.

They must be the same.

C.

They may be the same.

Full Access
Question # 6

BFD is a universal fast detection technology that can implement fast switchover, so BFD does not need to be used with other fast switching technologies.

A.

TRUE

B.

FALSE

Full Access
Question # 7

How is OPEX defined?

A.

Maintenance cost

B.

Total cost of ownership (TCO)

C.

Operating cost

D.

O&M costs

Full Access
Question # 8

Which of the following is not included in the three elements of Servermap table on the USG series firewall?

A.

Destination IP address

B.

Destination port number

C.

Protocol number

D.

Source IP address

Full Access
Question # 9

Which of the following statements regarding the physical topobgy monitoring function of eSight are true? (Multiple Choice)

A.

eSight displays the layout and status of NEs, subnets, and links on the GUI.

B.

eSight supports visualized monitoring of the network-wide running status.

C.

eSight displays the architecture of the entire network and relationship between network entities.

D.

The physical topology monitoring provides an entry for unified network monitoring, improving O&M efficiency.

Full Access
Question # 10

Which of the following are label distribution control modes in the MPLS system? (Multiple Choice)

A.

Liberal

B.

Independent

C.

Conservative

D.

Ordered

Full Access
Question # 11

What are the advantages of NFV? (Multiple Choice)

A.

Reduce device and energy cost.

B.

Shorten the network service innovation period.

C.

Uses the unified software versions for devices and uniformly manage access tenants.

D.

Provide services for different applications and tenants through the single platform.

Full Access
Question # 12

On the DiffServ network, what is the main purpose of defining the service type of the EF classification?

A.

Preferentially guarantee the services that require short delay, low packet loss, low jitter, and assured bandwidth.

B.

Provide channels for packet forwarding.

C.

Ensure bandwidth for specific traffic.

D.

Ensure that packets are forwarded with the minimum delay.

Full Access
Question # 13

The following describes the VPN configuration on a device. Which of the following statements is true?

A.

This command is configured on the CE of the customer network.

B.

route-distinguisher 1:1 indicates that the RD value is 1:1, which is not globally unique.

C.

vpn-target 1:1 export-extcommunity indicates that the Export Target of the VPN is 1:1.

D.

vpn-target 2:2 import-extcommunity indicates that the Import Target of the VPN is 2:2. Only one value can be set for the Import Target.

Full Access
Question # 14

Which information cannot be used for classifying IP packets at the network layer?

A.

Packet length

B.

VLAN ID

C.

Source and destination IP addresses

D.

ToS field

Full Access
Question # 15

Which of the following steps are required when configuring a DHCP relay agent? (Multiple Choice)

A.

Configure the DHCP server group name.

B.

Configure IP addresses of DHCP servers in the DHCP server group.

C.

Configure the number and IP address of the interface enabled with the DHCP relay function.

D.

Configure the Option 82 field.

Full Access
Question # 16

Which of the following are included in the full lifecycle guest management of the Agile Controller? (Multiple Choice)

A.

Account registration

B.

Account approval and distribution

C.

Account authentication

D.

Account audit and deregistration

Full Access
Question # 17

Which of the following statements regarding Free Mobility of the Agile Controller are true? (Multiple Choice)

A.

When administrators configure Free Mobility, they need to select proper authentication points and policy execution points.

B.

In the Free Mobility, Administrators can add static network segments or server resources to security groups, and manually bind their IP addresses to the security groups.

C.

Free Mobility uses a configuration matrix to define access permissions between two security groups such as users and servers.

D.

Free Mobility defines higher forwarding priorities for the VIP user group to ensure their network experience.

Full Access
Question # 18

On the MPLS network shown in the following figure, which of the following statements are true? (Multiple Choice)

A.

The switch uses the directly-connected interface to set up a TCP connection.

B.

The switch's peer LDP ID is an interface IP address of the peer device.

C.

The switch's peer LDP ID is the MPLS LSR ID of the peer device.

D.

The switch uses the LSR ID to set up a TCP connection.

Full Access
Question # 19

Which remote alarm notification modes are supported by eSight? (Multiple Choice)

A.

Email

B.

Voice

C.

SMS message

D.

WeChat

Full Access
Question # 20

Which of the following statements regarding the free mobility application scenario of the Agile Controller is false?

A.

The Agile Controller uniformly deploys permission policies for controlling server access from personnel in each department. The administrator needs to focus on access permissions between departments. A key device in the campus can function as the policy execution point. After the deployment is complete, users can obtain access permissions no matter where they are and what access mode is used.

B.

Policies are deployed automatically to control access between outsourcing personnel and

employees by policies and IP addresses, while ensuring correct the network access permissions of each user. It can also control data sharing among team members to guarantee enterprise data security.

C.

When gateway resources are limited, automatic gateway selection and preferential forwarding of packets from VIP users guarantee fine network experience of VIP users.

D.

The Agile Controller can automatically identify office requirements of working staff, without the need for manual configurations. Users can obtain network access permissions anytime, anywhere.

Full Access
Question # 21

Which of the following statements is false?

A.

LSPs are classified into static and dynamic LSPs. A static LSP is manually configured by an administrator. Adynamic LSP is dynamically established using routing and label distribution protocols.

B.

When labels are allocated manually, ensure that the outgoing label of an upstream node is the same as the incoming label of the downstream node.

C.

LSPs created by static Distribution labels can be dynamically adjusted according to network topology changes, without the need for administrator intervention.

D.

Dynamic LSPs are established using label distribution protocols, such as MP-BGP, RSVP-TE, and LDP.

Full Access
Question # 22

DHCP snooping is a security feature. Which of the following statements regarding DHCP snooping is false?

A.

The DHCP snooping binding table contains dynamic binding entries and static binding entries.

B.

DHCP snooping distinguishes the trusted interface and untrusted interfaces. Untrusted interfaces do not process DHCP Reply packets.

C.

The static binding table is manually set on the inbound interface and the aging time is also manually set.

D.

When DHCP snooping is used at Layer 2, the interface information also can be obtained for the binding table if the Option 82 function is not configured.

Full Access
Question # 23

Application Specific Packet Filter (ASPF) is packet filtering based on the application layer. ASPF checks application layer protocol information, monitors the application layer protocol status of connections, and uses the Servermap table to achieve a special security mechanism. Which of the following statements regarding ASPF and Servermap is false?

A.

ASPF monitors packets during communication.

B.

ASPF dynamically creates and deletes filtering rules.

C.

ASPF uses the Servermap table to dynamically allow data of multi-channel protocols through.

D.

The five-tuple Server-map entry implements a similar function to the session table.

Full Access
Question # 24

What is the default sending interval of BFD packets?

A.

5s

B.

100ms

C.

1000ms

D.

10s

Full Access
Question # 25

Single-packet attacks indicate that an attacker controls botnet hosts to send a large number of attack packets, causing link congestion on the attacked network and system resource exhaustion.

A.

TRUE

B.

FALSE

Full Access
Question # 26

Which of the following command is used to configure the listening address of the SDN controller?

A.

openflow listening-ip 1.1.1.1

B.

sdn controller souce-address 1.1.1.1

C.

controller-ip 1.1.1.1

D.

sdn listening-ip 1.1.1.1

Full Access
Question # 27

Different VMs can communicate through VTEP tunnels established by vSwitches. So what is the VXLAN communication process?

A.

1-3-2-4-6-5

B.

3-5-2-4-1-3

C.

1-2-3-4-5-6

D.

1-5-6-4-3-2

Full Access
Question # 28

At which layer does a packet filtering firewall check data packets?

A.

Application layer

B.

Physical layer

C.

Network layer

D.

Link layer

Full Access
Question # 29

Which of the following statements regarding the ingress node in MPLS forwarding process are correct?

(Multiple Choice)

A.

After receiving a data packet, the ingress node searches for tunnel ID in the ILM table first.

B.

The ingress node finds the NHLFE entry matching the tunnel ID in the ILM table to associate LFIB and NHLFE entries.

C.

The ingress node checks the NHLFE entry to obtain the outbound interface, next hop, outgoing label, and label operation type. D. The label operation type is Push.

D.

The ingress node adds the obtained label to the IP packet, processes EXP by QoS policy, processes the TTL, and forwards the encapsulated MPLS packet to the next hop.

Full Access
Question # 30

There are multiple types of LDP messages. Which functions can be implemented by LDP session messages?

(Multiple Choice)

A.

Monitor the TCP connection integrity of LDP sessions.

B.

Terminate incomplete label request messages.

C.

Release labels.

D.

Negotiate parameters for setting up an LDP session.

Full Access
Question # 31

Separation technology of the control plane and forwarding plane is SDN.

A.

TRUE

B.

FALSE

Full Access
Question # 32

What about all outgoing labels in the label forwarding table of a MPLS-capable device for the same route with the same next hop?

A.

They must be different.

B.

They must be the same.

C.

They may be the same.

Full Access
Question # 33

Which of the following statements regarding Huawei eSight network management software is false?

A.

eSight is a lightweight system and a wizard is available for eSight installation.

B.

eSight adopts the C/S architecture, so users can access eSight using a browser anytime, anywhere.

C.

eSight provides corresponding solutions for different customers.

D.

eSight can uniformly manage devices from multiple vendors.

Full Access
Question # 34

VXLAN technology is only used to build an inter-DC Layer 2 network.

A.

TRUE

B.

FALSE

Full Access
Question # 35

Complex traffic classification means that packets are classified based on the quintuple including the source and destination addresses, source and destination port numbers, and protocol type. It is usually deployed on the network core.

A.

TRUE

B.

FALSE

Full Access
Question # 36

LDP uses different neighbor discovery mechanisms. Which of the following statements regarding the LDP neighbor discovery is false?

A.

LDP discovery mechanisms include the basic discovery mechanism and extended discovery mechanism.

B.

The LDP basic discovery mechanism discovers directly-connected LDP peers on a link.

C.

The LDP extended discovery mechanism discovers indirectly-connected LDP peers.

D.

LDP discovery mechanisms need to specify LDP Peer.

Full Access
Question # 37

Which of the following statements regarding VRRP load balancing are true? (Multiple Choice)

A.

Multiple virtual routers can be configured on an interface of a router so that the router functions as the master of the virtual router and the backup of another virtual router.

B.

In load balancing mode, multiple routers transmit service at the same time, so at least two or more virtual routers are required.

C.

In load balancing mode, two or more VRRP groups are created, and multiple routers transmit services.

D.

During priority configuration, the VRRP master of the three virtual routers can be on different routers.

Full Access
Question # 38

Which of the following statements regarding the differences between GTS, LR, and CAR is false?

A.

During traffic control, CAR enables the device to discard the packets of which the rate is exceeded.

B.

During traffic control, GTS enables the device to buffer packets of which the rate is exceeded into queues.

C.

During traffic control, LR enables the device to discard the packets of which the rate is exceeded.

D.

During traffic control, LR enables the device to buffer the packets of which the rate is exceeded and to send packets to QoS queues.

Full Access
Question # 39

Which of the following statements regarding traffic policing is true? (Multiple Choice)

A.

Packets cannot be colored.

B.

Packets can be colored.

C.

The packets of which the rate is exceeded can be buffered.

D.

The packets of which the rate is exceeded cannot be buffered.

Full Access
Question # 40

Which of the following is not the advantage of NAT?

A.

NAT allows network users with private IP addresses to easily access the Internet.

B.

NAT allows many hosts of the LAN to share one IP address for Internet access.

C.

NAT can process IP packet encryption.

D.

NAT can shield internal network address translation and improves the security of the internal network.

Full Access
Question # 41

Which packet information can be marked or re-marked?

A.

DSCP priority, IP precedence, 802.1p priority, and EXP priority

B.

Source and destination addresses, and EXP priority

C.

MAC address

D.

Any packet information

Full Access
Question # 42

VXLAN users can access the Internet through VXLAN interfaces.

A.

TRUE

B.

FALSE

Full Access
Question # 43

Which of the following statements regarding forwarding equivalence class (FEC) in MPLS are false?

(Multiple Choice)

A.

Packets with the same FEC are processed differently on a MPLS network.

B.

FECs can be divided flexibly by source IP address, destination IP address, source port, destination port, protocol type, VPN, or any combinations of them.

C.

MPLS classifies packets with the same forwarding processing mode into one FEC.

D.

One FEC has only one unique label marker.

Full Access