New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following H12-224 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H12-224 Exam Dumps - HCNP-Routing&Switching (Fast Track) (Huawei Certified Network Professional -Routing&Switching)

Go to page:
Question # 33

Main in the -middle attacks or IP spoofing attacks are common on intra nets and will cause information leakage, which configuration method can prevent these attacks?

A.

Configure the trusted or untrusted interface.

B.

Limit maximum number of MAC addresses that can be learned on a switch interface.

C.

Configure DHCP snooping to check the CHADDP field carried in a DHCP Request packet.

D.

Configure association between DHCP snooping and IPSG or DAI on the switch.

Full Access
Question # 34

Which of the following troubleshooting methods is not based on the TCP/IP reference model?

A.

Configuration comparison

B.

Top-down

C.

Bottom-up Replacement

Full Access
Question # 35

In an OSPF routing domain two routers must be specified as one DR and one BDR in a broadcast or NBMA network with at least two routers.

A.

TRUE

B.

FALSE

Full Access
Question # 36

In addition to P2P network, which of the following network types is supported in IS-IS else?

A.

P2MP

B.

NBMA

C.

SNAP

D.

LAN(broadcast network)

Full Access
Question # 37

SDN and NFV are essential the same concept and both define network function virtualization.

A.

TRUE

B.

FALSE

Full Access
Question # 38

Which of the following statements regarding ABR is false?

A.

An ABR has multiple LSDBs and maintains one LSDB for each area

B.

An ABR abstracts link state information within its connected non-backbone area as routing information and

C.

An ABR needs to abstract link state information within the backbone area as routing information and advert

D.

An ABR can generate Type 3 LSAs Type4 LSAs and Type 5 LSAs

Full Access
Question # 39

Which of the following methods is used to control internal employees and guests access networks in the agile controller wireless access control scenario?

A.

Access control by user name

B.

According to whether the wireless terminal MAC address registration control access

C.

Access control by SSID (different SSIDs for internal employees and guests)

D.

Access control by wireless terminal type

Full Access
Question # 40

When QoS is deployed on a network to improve the quality of some services, the quality of other services must deteriorate

A.

TRUE

B.

FALSE

Full Access
Go to page: