Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following H12-223 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H12-223 Exam Dumps - Huawei Certified Network Professional-R&S-IEEP

Question # 4

Which of the following statements regarding the device software upgrade necessity are true? (Multiple Choice)

A.

The new software version continuously increases new functions.

B.

The new software version continuously improves usability.

C.

The new software version continuously improves stability.

D.

You are advised to immediately upgrade the system software to the latest version.

Full Access
Question # 5

Customer network information and service composition are business secrets of customers and cannot be leaked, obtained without authorization, or sold for operation.

A.

TRUE

B.

FALSE

Full Access
Question # 6

In the structured network troubleshooting process, troubleshooting results are predictable and the troubleshooting impact is controllable, without generating new risks.

A.

TRUE

B.

FALSE

Full Access
Question # 7

Which of the following statements regarding the basic device information check is true?

A.

You can run the display patch-information command to check patch information.

B.

The device time should be consistent with the actual time (time difference < 24 hours) so that a fault can be accurately located based on the occurrence time.

C.

The debugging functions can be enabled when the device is running properly.

D.

You can run the display current-configuration command to check the PCB version and the software version of a card.

Full Access
Question # 8

Which of the following statements regarding the STP configuration is true?

A.

STP automatically runs by default and therefore does not require configuration.

B.

The STP convergence speed is slow, which may cause network interruption. Therefore, disabling STP is a preferred solution.

C.

Similar to the implementation of routing protocols, data flows between switches can be adjusted by modifying link costs.

D.

For routine STP configuration, the position of the STP blocked port is controlled to ensure that the blocked port is not located on a backbone link or device.

E.

The RSTP algorithm is simple and reliable and supports fast convergence. Therefore, all switches on the network are configured to work in RSTP mode.

Full Access
Question # 9

If you can ping the peer host successfully, which of the following methods is the most appropriate for subsequent troubleshooting?

A.

Configuration comparison

B.

Bottom-up

C.

Service traffic path check

D.

Top-down

Full Access
Question # 10

Which of the following tasks need to be completed during the planning stage of a project? (Multiple Choice)

A.

Work out the technical design

B.

Know the project background

C.

Determine the model of network devices in the project

D.

Make clear the requirements of a project

E.

Plan IP addresses

Full Access
Question # 11

Which of the following statements regarding the software and configuration backup is true?

A.

The software version needs to be backed up for multiple times for the same product and the same version.

B.

Licenses do not need to be backed up.

C.

After the device configuration changes, the configuration file does not need to be backed up.

D.

Backup is used to restore network functions in extreme cases.

Full Access
Question # 12

A DHCP relay agent exists between a DHCP server and DHCP clients. If IP addresses in the global address pool of the DHCP server and IP addresses of VLANIF interfaces connecting the DHCP relay agent to clients are on different network segments, a DHCP fault will occur.

A.

TRUE

B.

FALSE

Full Access
Question # 13

Switches run the MSTP protocol by default. Which of the following statements regarding the default status is true?

A.

All switches run in the same region by default.

B.

The STP calculation speed is faster than that when multiple instances are configured.

C.

Due to lack of configuration, all switches switch the running mode to RSTP.

D.

Each switch runs in an independent region.

Full Access
Question # 14

Which of the following scenarios is a loop test applicable to?

A.

To test whether applications are properly connected

B.

To test whether a routing protocol can prevent loops

C.

To test whether a switch can prevent loops and broadcast

D.

To test whether a physical link is disconnected

Full Access
Question # 15

Which of the following steps or measures are taken in the one-by-one check phase of the structured network troubleshooting process? (Multiple Choice)

A.

Contingency plan

B.

Rollback preparation

C.

Temporary environment setup

D.

Information filter

Full Access
Question # 16

Which of the following statements regarding network maintenance functions are true? (Multiple Choice)

A.

Routine maintenance is a preventive measure.

B.

Through routine maintenance, administrators can obtain the network baseline, laying a good foundation for troubleshooting.

C.

Routine maintenance has high technical requirements for operators but no high requirements for operation standardization.

D.

Network maintenance is not just a technical issue but also a management issue.

Full Access
Question # 17

A local key pair must be configured for a device working as an SSH server.

A.

TRUE

B.

FALSE

Full Access
Question # 18

Which of the following statements regarding NMS usage are true? (Multiple Choice)

A.

The NMS supports alarm management. For example, the Up/Down change of a port can be immediately reported to the NMS through trap, so that the network administrator can discover and rectify network faults in a timely manner.

B.

The NMS supports performance management. It automatically collects statistics about the CPU usage and memory usage of devices, helping the network administrator analyze network performance bottlenecks.

C.

The NMS supports configuration file management, including automatically backing up, comparing, and restoring the configuration file, allowing the network administrator to configure automatic batch configuration file backup.

D.

Based on user requirements, the NMS can generate reports periodically, providing reference for subsequent network optimization.

Full Access
Question # 19

Which of the following is the purpose of access security optimization?

A.

To ensure that sensitive management information will not be intercepted.

B.

To prevent or reduce external network attacks and harm.

C.

To ensure secure access to key services.

D.

To achieve secure user access control.

Full Access
Question # 20

A network administrator fails to access devices on the internal network through Telnet. Which of the following causes is the most impossible?

A.

The route is unreachable, and the client fails to establish a TCP connection with the server.

B.

The number of login users reaches the upper limit.

C.

An ACL is bound in the VTY user interface view.

D.

The protocol inbound all command is configured in the VTY user interface view.

Full Access
Question # 21

The migration rollback time can be determined based on the actual migration situation without the need to plan in advance.

A.

TRUE

B.

FALSE

Full Access
Question # 22

Which of the following statements regarding border security optimization are true? (Multiple Choice)

A.

Border security optimization aims to prevent or reduce external network attacks and harm.

B.

The optimization position is usually located at the network edge.

C.

Optimization measures include attack defense technologies, packet filtering, and hardware firewalls.

D.

Border security optimization aims to achieve secure user access control.

Full Access
Question # 23

During follow-up operations of the structured network troubleshooting process, which of the following parties does not require advertisement of information?

A.

Parties affected by the fault

B.

Authorization parties in each phase of troubleshooting

C.

Other vendors and service providers

D.

Users who are interested in the root cause for the fault

Full Access
Question # 24

Software upgrade operations are similar for Huawei datacom products. Therefore, before a software upgrade, you only need to briefly read the upgrade guide.

A.

TRUE

B.

FALSE

Full Access