New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following H12-261_V3.0 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H12-261_V3.0 Exam Dumps - HCIE-Routing & Switching (Written) V3.0

Go to page:
Question # 9

Which of the following functions will affect the establishment of BGP neighbors?

A.

ebgp max hop

B.

BGP certification

C.

BGP route filtering

D.

BGP GSTM

Full Access
Question # 10

Regarding the description of IGMP Snooping, is it correct?

A.

IGMP Snooping does not consume the CPU of the switch

B.

IGMP Snooping solves the problem of multicast multicast broadcast at Layer 3

C.

IGMP Snooping runs at the link layer and is a multicast constraint mechanism on a Layer 2 Ethernet switch to manage and control multicast groups.

D.

IGMP Snooping establishes a MAC multicast address table by monitoring the IGMP messages sent by the host.

Full Access
Question # 11

The two routers in a company are configured as follows. The following statements about the R1 routing table are correct:(single choice)

A.

only putR2 The ISIS protocol priority is adjusted to 5,Only the IP routing entry with the destination network segment 10.0.0.2/32 on R1 will be generated by OSPF

B.

if putR1 The ISIS protocol priority is adjusted to 5, thenThe IP routing entry with the destination network segment 10.0.22/32 on R1 is generated by OSPF

C.

if putR1 The ISIS protocol priority is adjusted to 5, thenThe IP routing entry with the destination network segment 10.0.2.2/32 on R1 is generated by ISIS

D.

if putR2 The ISIS protocol priority is adjusted to 5, thenThe IP routing entry with the destination network segment 10.0.2.2/32 on R1 is generated by ISIS

Full Access
Question # 12

R3 andR1 IS-IS The neighbor is not established. According to the information in this picture, what is the possible reason? (single choice)

A.

R3 andR1 Systemm ID Repeat

B.

R3 and R1 have different area numbers

C.

R3 andR1 IS-Leve1 Do not match

D.

R3 andR1 IIH Authentication failed

Full Access
Question # 13

man-in-the-middle attack or IP/MAC SpoofingAttacks can lead to information leakage and other hazards, and are more common in intranets. To prevent man-in-the-middle attacks or IP/MAC SpoofingAttack, the configuration methods that can be taken are:

A.

turn onDHCP Snooping checkDHCP Function of the CHADDR field in the REQUEST message

B.

configureTrusted/Untrusted interface

C.

Configuration on the master switchDHCP Snooping withDAL or IPSG for linkage

D.

Limit the maximum number of learning allowed on a switch interfaceMACnumber of addresses

Full Access
Question # 14

When the source IAT is allocated and there is a no-pat allocation parameter, which of the following statements is correct?

A.

Perform source IP address and source port conversion at the same time

B.

Only perform source IP address translation

C.

Only perform destination IP address translation

D.

Convert destination IP address and destination port

Full Access
Question # 15

As shown in the figure, private network routing information is exchanged between PE1 and PE2 and their respective CEs through SPF, and the same Domain ID is declared on both PE1 and PE2. When importing routes from BGP to OSPF on PE2, which of the following types of LSAs may be delivered to CE2?

A.

Type5 LSA

B.

Type7 LSA

C.

Type3 LSA

D.

Type1 LSA

Full Access
Question # 16

BGP EVPN Type2 Routing is used to pass IRB In the case of type routing, the information carried includes ?

A.

Layer 3 VNI

B.

Host MAC address

C.

Layer 2 VNI

D.

Host IP address

Full Access
Go to page: