New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following H12-261 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H12-261 Exam Dumps - HCIE-Routing & Switching (Written)

Go to page:
Question # 25

During troubleshooting for a LAN where Huawei devices are deployed, you find that there are a large number of unicast frames with unknown source MAC addresses. What is the most severe impact these unicast frames have on the switch?

A.

TCAM entries are occupied

B.

The power consumption is increased

C.

The available MAC address entries are consumed

D.

The available bandwidth is consumed

E.

The memory for buffering frames is occupied

Full Access
Question # 26

In the process of using the network P4 Pv6 and PV4/IPv6 addresses in the network to change addresses, many techniques have been used. These skills are divided into two

The first one is the v4/P6, Pv4/IP6? ( ) interoperability technology. Which of the following technologies are coexisting technologies?

A.

NAT64

B.

IPv6 over IPv4

C.

Dual-Stack

D.

ISATAP

Full Access
Question # 27

The description of the configuration is correct: (multiple BGP4+ selected)

A.

Ruter-ID BGP4 Router-ID is the same as .

B.

BGP4+ peer Link-Local specified when required

C.

The next hop of the BGP4+ Link-Local route does not use an address.

D.

BGP4+ BGP4 When the reflector is configured, the role of the reflector and the client needs to be the same as the configuration of the user.

E.

BGP4+ does not support route reflectors.

Full Access
Question # 28

Regarding the logical mode of the MPLS TTL pair, is the following description correct?

A.

Pipe IP MPLS IP TTL 1 In MPLS TTL mode, when the message passes through the network, it is mapped to the field at the ingress point.

B.

MPLS TTL IP TTL MPLS A label, which has the same function as the header, can prevent the network from routing the loop (as it is)

C.

Uniform IP MPLS IP TTL 1 MPLS TTL mode is simulated. When the message passes through the network, the entry point is reduced and the field is fixed to the value.

D.

In the case of the MPLS VPN MPLS Ingress uniform, the private network text can be used in the reporting mode.

Full Access
Question # 29

The following is a single attack?

A.

Special control

B.

Scanning and testing

C.

DDoS attack

D.

Malformation

Full Access
Question # 30

The following description of the aggregation is correct for BGP, ?( ) radio

A.

After the configuration, only Aggregate ipv4-address mask is sent, and the route is not specified.

B.

For IPv6, BGP routing supports manual aggregation and self-aggregation.

C.

By default, self-aggregation BGP is enabled.

D.

You can manually aggregate the routes in the BGP local routing table.

Full Access
Question # 31

The topology and configuration are as shown in the figure below, R1 10.0.3.3/32, now I hope that the routing entries that do not exist in the routing table are fine. The following methods can be implemented.

A.

Configure routing R3 above, 10.0.0.0/16 summary.

B.

Configure route R2 above, 10.0.0.0/16 summary.

C.

Configure the above R2 filter-policy, ACL 10.0.3.3/32, expot over match when used in the same direction

D.

Configure the above R1 filter-policy, ACL 10.0.3.3/32, import over match, use the same direction

Full Access
Question # 32

As shown in the figure, the R1 R2 ISIS R1 R2 ? neighbor relationship is established, and the data synchronization process with it is correct.

A.

The message sent by the R1 R2 PSNP is a message.

B.

The message sent by R1 R2 CSNP is a message.

C.

The message sent by the R1 R2 LSP is a packet.

D.

The message sent by R1 R2 Hello is the message.

Full Access
Go to page: