Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following H12-224 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H12-224 Exam Dumps - HCNP-Routing&Switching (Fast Track) (Huawei Certified Network Professional -Routing&Switching)

Question # 4

Which of the following statements regarding OSPF neighbor relationship and adjacency is true?

A.

OSPF routers must establish an adjacency before exchanging information.

B.

Not all neighbors can establish adjacencies.

C.

Adjacencies are maintained using OSPF Hello Protocol

D.

Neighbor relationships are selected from adjacencies to exchange routing information

Full Access
Question # 5

Which of following tasks need to be completed during the planning stage of a project?

(Multiple choice)

A.

Work out the technical design

B.

Know the project background

C.

Determine the model of network devices in the project

D.

Make clear the requirements of network devices in the project E, Plan IP address

Full Access
Question # 6

Which of the following items are used to remind customers of information security?

A.

Account soft-out reminder

B.

Password updated reminder

C.

Log protection reminder

D.

Data backup reminder

Full Access
Question # 7

on the USC series firewall, which zone can be deleted by the administrator

A.

Security zone

B.

Trusted zone

C.

Untrusted zone

D.

DMZ

Full Access
Question # 8

Which of the following statements regarding border security optimization are true?

A.

Border security optimization aims to prevent or reduce external network attacks and harm

B.

The optimization position is usually located at the network edge

C.

Optimization measures include attack defense technologies packet filtering and hardware firewalls

D.

Border security optimization aims to achieve secure user access control

Full Access
Question # 9

VPN models are classified into two types overlay vpn and peer-to-peer vpn iliw —

A.

TRUE

B.

FALSE

Full Access
Question # 10

Huawei enterprise network NMS eSight has three editions: standard, and professional. Unlike the standard edition, which of the following features is provided by the professional edition?

A.

Provide a database backup tool

B.

Support multi-user management

C.

Support management of the VLAN and MPLS VPN

D.

Support hierarchical management model

Full Access
Question # 11

Which of the following statements regarding VRRP is false?

A.

The Virtual Router Redundancy Protocol (VRRP)is designed for networks with multicast and broadcast capabilities, such another router if it fails so that uninterrupted and reliable communication is guaranteed

B.

When VRRP is used the virtual router ID. and virtual IP address need to be configured on the router, the MAC address of

C.

Hosts on the network communicate with the virtual router. There is no need to learn all information of physical routers on1

D.

A virtual router consists of one master router and several backup routers. he master router provides forwarding function takes over its work

Full Access
Question # 12

Which of the following statements regarding isolation is false?

A.

Port isolation controls access between interfaces of switches

B.

Port isolation prevents the computers connects to differ faces from accessing each other

C.

Port isolation can be configured based on VLANs

D.

Port isolation is an isolation mechanism at the physical layer

Full Access
Question # 13

Which of the following traffic can be mirrored through port mirroring?

A.

Packets received by a port

B.

Packets sent by a port

C.

Packets received and sent by a port

D.

Packets discarded on a port

Full Access
Question # 14

Preferences of routing protocols determine the sequence in which a router selects a

route among route to the same destination learned through different routing protocols

A.

TRUE

B.

FALSE

Full Access
Question # 15

Which of the following causes will lead a failure to establish BGP peer relationships?

A.

An ACL is configured to prohibit all TCP connections between two BGP neighbor

B.

Two IBGP peers are not physically directly connected

C.

BGP synchronization is enabled on fully-meshed IBGP peers

D.

Two BGP peers are configured with different routing Update intervals

Full Access
Question # 16

When two bgp peers establish a TCP connection normal but their AS number and

BGP versions are inconsistent, Which message will be identified as incorrect during negotiation in the error code of the notification message?

A.

Route-refresh

B.

Open

C.

Keepalive

D.

Update

Full Access
Question # 17

Which of the following is the purpose of access security optimization?

A.

To ensure that sensitive management information will not be intercepted

B.

To prevent or reduce external network attacks and harm

C.

To ensure secure access to key services

D.

To achieve secure user access control

Full Access
Question # 18

When two routers establish a logical BGP peer relationship over multiple physical links the peer connect-interface command must be used.

A.

TRUE

B.

FALSE

Full Access
Question # 19

The SDN architecture mainly includes NBIs and SBIs.

A.

True

B.

False

Full Access
Question # 20

Which of the following statements regarding the firewall zone security level is false?

A.

The default security level of the new zone is 1.

B.

Only the security level of the user-defined zone can be configured.

C.

The configured security level cannot be changed.

D.

Two zones cannot be configured with the same security level.

Full Access
Question # 21

In the port mirroring, real and reliable data must be collected in real time.

A.

TRUE

B.

FALSE

Full Access
Question # 22

What features must a risky operation solution have?

A.

Accuracy

B.

Good portability

C.

Verification

D.

Rollback

Full Access
Question # 23

Software upgrade operations are similar for Huawei data com products, therefore, before a software upgrade, you only need to briefly read the upgrade guide.

A.

TRUE

B.

FALSE

Full Access
Question # 24

Which of the following statements regarding QoS packet are false?

A.

When a router receives data packets packet loos may occur because the CPU is busy

and cannot process data packets

B.

When data packets are scheduled to queues packet loss may occur because the

queue is full

C.

When data packets are transmitted on a link, packet loss may occur because of link faults

D.

Packet loss is generally caused by the delay the tail drop packets loss may occur because of the queue is full

Full Access
Question # 25

The traditional tail drop method is used for packet loss which causes global TCP synchronization

A.

TRUE

B.

FALSE

Full Access
Question # 26

Which of the following contents are included in a project implementation solution?

A.

Time plan

B.

Personnel arrangement

C.

Migration process

D.

Risk control measures

Full Access
Question # 27

Which of the following statements regarding MUX VLAN is false?

A.

Each group VLAN must be bound to a principal VLAN

B.

lf the VLAN ID has been used by the principal VLAN this VLAN cannot be used for the

VLANIF interface super-VLAN or sub-VLAN

C.

After MUX VLAN is enabled on an interface VLAN mapping and VLAN stacking can be configured on the interface

D.

An enterprise can use the principal port to connect to the enterprise servers separate port to connect to enterprise customers and groups to employees can both access enterprise servers enterprise employees can communicate with each other enterprise customers cannot communicate with each other

Full Access
Question # 28

When OSPF runs in a broadcast network DR and BDR need to be elected in which state will DR and BDR be elected?

A.

Init state

B.

Attempt state

C.

2-waystste

D.

Exchange state

Full Access
Question # 29

ACL have two types of matching order configuration order and automatic order

A.

TRUE

B.

FALSE

Full Access
Question # 30

Which of the following are included in the full lifecycle guest management of the agile Controller.

A.

Account registration

B.

Account approval and distribution

C.

Account authentication

D.

Account audit and deregistration

Full Access
Question # 31

AT which layer does a packet filtering firewall check data packets?

A.

Application layer

B.

Physical layer

C.

Network layer

D.

Link Layer

Full Access
Question # 32

DHCP uses different types of packets to implement different functions. Which of the following is the function of the DHCP Offer packet?

A.

The DHCP offer packets are broadcast by the DHCP client to detect available servers

B.

The DHCP server sends DHCP Offer packets to respond to the DHCP Discover packets send by the DHCP by the DHCP client, providing

C.

The DHCP client sends a DHCP Offer packet to the DHCP server to request configuration parameters, configuration acknowledge

D.

The DHCP server sends a DHCP Offer packet to the client to the client carrying configuration parameters, such as the IP address

Full Access
Question # 33

Main in the -middle attacks or IP spoofing attacks are common on intra nets and will cause information leakage, which configuration method can prevent these attacks?

A.

Configure the trusted or untrusted interface.

B.

Limit maximum number of MAC addresses that can be learned on a switch interface.

C.

Configure DHCP snooping to check the CHADDP field carried in a DHCP Request packet.

D.

Configure association between DHCP snooping and IPSG or DAI on the switch.

Full Access
Question # 34

Which of the following troubleshooting methods is not based on the TCP/IP reference model?

A.

Configuration comparison

B.

Top-down

C.

Bottom-up Replacement

Full Access
Question # 35

In an OSPF routing domain two routers must be specified as one DR and one BDR in a broadcast or NBMA network with at least two routers.

A.

TRUE

B.

FALSE

Full Access
Question # 36

In addition to P2P network, which of the following network types is supported in IS-IS else?

A.

P2MP

B.

NBMA

C.

SNAP

D.

LAN(broadcast network)

Full Access
Question # 37

SDN and NFV are essential the same concept and both define network function virtualization.

A.

TRUE

B.

FALSE

Full Access
Question # 38

Which of the following statements regarding ABR is false?

A.

An ABR has multiple LSDBs and maintains one LSDB for each area

B.

An ABR abstracts link state information within its connected non-backbone area as routing information and

C.

An ABR needs to abstract link state information within the backbone area as routing information and advert

D.

An ABR can generate Type 3 LSAs Type4 LSAs and Type 5 LSAs

Full Access
Question # 39

Which of the following methods is used to control internal employees and guests access networks in the agile controller wireless access control scenario?

A.

Access control by user name

B.

According to whether the wireless terminal MAC address registration control access

C.

Access control by SSID (different SSIDs for internal employees and guests)

D.

Access control by wireless terminal type

Full Access
Question # 40

When QoS is deployed on a network to improve the quality of some services, the quality of other services must deteriorate

A.

TRUE

B.

FALSE

Full Access
Question # 41

LDP uses Discovery messages to discover neighbors through different neighbor discovery mechanisms. Which of the following statements regarding basic discovery mechanisms are true? (Multiple Choice)

A.

The destination IP address of the LDP Discovery message is the multicast IP address

224.0.0.2

B.

The LDP Discovery message is sent to the specified LDP peer

C.

The LSR does not does not send Hello messages any longer after TCP connections

are established

D.

The LDP Discovery message is encapsulated into a UDP packet and its destination port number is 646

Full Access
Question # 42

The difference between an OSPF NSSA area and a stub area is that external routes can be imported into a NSSA area.

A.

TRUE

B.

FALSE

Full Access
Question # 43

Which of the following statements regarding virtual link in OSPF is false?

A.

Virtual link can solve the problem that backbone areas are logically non-contiguous.

B.

A virtual link can be established between any two ABRs, but the two routers must have interface that are connected to the same non backbone area. routers must have interfaces that are connected to the same

C.

A virtual link unnecessarily belongs to the backbone area, Instead, which area It belongs to depends on the actual topology.

D.

A virtual link belongs to Area 0.

Full Access
Question # 44

AN ABR IN AN OSPF TOTALLY STUB AREA DOES NOT FLOOD. TYPE 3 LSAS.TYPE 4 LSAS.OR TYPE 5 LSAS WITHIN THIS AREA. WITHIN THIS AREA TO INSTRUCT HOW TO TRANSMIT PACKETS TO A DESTINATION OUTSIDE AN AS.

A.

TRUE

B.

FALSE

Full Access
Question # 45

Which of the following statements regarding OSPF stub area is true?

A.

AS-external-LSAs can be advertised within a stub area

B.

AS external route can only be based on a default route that is manually configured on an

ABR.

C.

A virtual link cannot pass through a stub area

D.

Any area can be a stub area

Full Access
Question # 46

RSTP provides faster convergence than STP, what are causes?

A.

RSTP defines the edge port role. The edge port does not receive and process configuration BPDUs, and not participate in RSTP calculation

B.

When the root port fails, the optimal alternate port will become the root port and the forwarding state.

C.

In RSTP, when a port is elected as the designated port, it enters the discarding state.

Then the port immediately enters the forwarding state

D.

In RSTP, when a port receives is bpdus form the upstream designated bridge , the port will compare the own stored is bpdu with the E. When the designated port fails, the optimal alternate port will become the root port and enter the forwarding state.

Full Access
Question # 47

In vAR application scenarios, which functions of the AR Router can be virtualized on

a server?

A.

Firewall

B.

VoIP

C.

NAT

D.

VPN

Full Access
Question # 48

Which of the following statements regarding the BGP protocol is false?

A.

BGP uses TCP as the transport protocol.

B.

BGP uses the same algorithm as RIP, namely, distant

C.

BGP uses the TCP port 179.

D.

BGP Is an interdomain rout

Full Access
Question # 49

Which of the following statements regarding multicast MAC addresses are false?

A.

The high 24 bits of the multicast MAC address are 0x01005f the is fixed to 1and the

lower 23 bits of the MAC

B.

One multicast MAC address maps to 32 multicast IP addresses

C.

A multicast MAC address identifies receivers of a multicast group on the data link layer

D.

One multicast MAC address maps to only one multicast IP address

Full Access
Question # 50

When BFD detection intervals at both ends are 30ms and

40ms.Which of the following statement is true?

A.

A BFD, session can be set up. After the negotiation, the detection interval of 90ms is used.

B.

A BFD, session can be set up. After the negotiation, the detection interval of 30ms is used.

C.

A BFD, session can be set up. And packets are sent at respective interval at both ends.

D.

A BFD, session cannot be established.

Full Access
Question # 51

What is the function of the detail-suppressed keyword in the aggregate command?

A.

lt suppresses the delivery of generated summarized routes to the IP routing table

B.

lt suppresses the delivery of specific routes to the IP routing table

C.

lt only advertises the summarized routes to other BGP peers

D.

lt advertises both the summarized routes and specific routes to other BGP peers

Full Access
Question # 52

A route-policy can have multiple nodes, and each node can have multiple if-match and apply clauses. Which of the following statements are false?

(Multiple Choice)

A.

The operator between nodes Is OR,

B.

The operator between nodes is AND.

C.

The operator between if-match clauses under a node is AND

D.

The operator between if-match clauses under a node is OR

Full Access
Question # 53

Fast detection technology can rapidly detect communication faults between neighboring devices as soon as possible so that the interrupted

A.

TRUE

B.

FALSE

Full Access
Question # 54

Which of the following statements regarding IGMP snooping are true? (Multiple Choice)

A.

IGMP snooping prevents multicast packets from being broadcast at Layer 3.

B.

IGMP snooping is a multicast restraint mechanism that runs on layer 2 Ethernet switches to manage and control multicast groups.

C.

IGMP snooping creates a multicast MAC address table by listening to IGMP packets sent from hosts.

D.

IGMP snooping does not consume CPU resources of switch.

Full Access
Question # 55

An access control list (acl) can be used to match routing information or addresses of data packets.it can only identify a specific of packets and cannot filter packets.

A.

TRUE

B.

FALSE

Full Access
Question # 56

In the act configuration command ad (number) ad-number (match-order{auto|config}], the ad-number parameter specifies an

A.

1000-3999

B.

2000-2999

C.

3000-3999 0-1000

Full Access
Question # 57

The agile controller is an automated control system for network resources it provides a unified policy engine to realize unified access control policies within the.

A.

TRUE

B.

FALSE

Full Access
Question # 58

Link aggregation bundles a group of physical interfaces to from a logical interface the bandwidth. Link aggregation work in can

A.

TRUE m ill

B.

FALSE

Full Access