New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following H12-261_V3.0 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H12-261_V3.0 Exam Dumps - HCIE-Routing & Switching (Written) V3.0

Go to page:
Question # 41

The association between LDP and IGP means that IGP suppresses the advertisement of reachable routes to ensure that LDP and IGP cooperate to complete network convergence, so that IGP and LDP maintain the same path, minimize traffic loss, and improve the reliability of the entire network.

A.

True

B.

false

Full Access
Question # 42

an engineer uses 2 router for IPv46 business test, by running BGP4+Simulate the interconnection between headquarters and branches. The network logical topology is shown in the figure, about the IPv6 between the two devices Route delivery, which of the following statements is false?

A.

When routing is passed, Next_ Hop Attribute must be IPv46 Global Unicast Address

B.

When routing, it will carry AS. _Path and other recognized mandatory attributes

C.

likeUpdate NP is carried in the packet. REACHL NLRI Attribute, indicating that reachable routes are advertised

D.

BGP4+ passUpdate Packets transmit routing information between peers

Full Access
Question # 43

Which of the following statements about stacked MAD detection is wrong?

A.

MAD direct connection detection can be done through an intermediate device or full-mgsh.

B.

MAD detection methods are divided into direct connection detection and proxy detection.

C.

MAD proxy detection requires that all stack members are connected to the proxy, and the connected links are added to an Eth-Trunk.

D.

When the stacking systems act as agents for each other to perform MAD detection, the two stacking systems can use the same Domain ID

Full Access
Question # 44

If the advertised route entry is deleted on the BGP router, the BGP router will be triggered to send an Update message for route revocation. Well-known mandatory attribute with revoked routing entries.

A.

True

B.

false

Full Access
Question # 45

What command can be used to prevent users from accessing multiple devices through the HUB on the access port of the switch? (Single Choice)

A.

[Huawei]interface GigabitEthernet 0/0/1 [Huawei-GigabitEthernet0/0/1]port link type trunk

[Huawei-GigabitEthernet0/0/1port trunk allow pass vlan 10

[Huaweijinterface GigabitEthernet 0/0/1

B.

[Huawei-GigabitEthernet0/0/1]port link type access [Huawei GigabitEthernet0/0/1]ipsg enable

. [Huawei]interface GigabitEthernet 0/0/1

C.

[Huawei-GigabitEthernet0/0l]port link-type access [Huawei-GigabitEthernet0/0/1 ]port-security enable

[Huawei]interface GigabitEthernet 0/0/1

D.

[Huawei-GigabitEthernet0/0/1 ]port link type access [Huawei-GigabitEthernet0/0/1]port isolate enable

Full Access
Question # 46

The two routers are connected together through serial ports, but they cannot ping each other. Now check the port status as follows:

Can you determine the cause from the above information?

A.

Insufficient link bandwidth

B.

Subnet mask mismatch

C.

Inconsistent link layer protocols at both ends

D.

The IP addresses of both ends are not on the same network segment

Full Access
Question # 47

The OSPFv3 protocol is a separately developed protocol. It is somewhat different from OSPFv2. Regarding OSPFv3 is based on links rather than network segments, which of the following statements is wrong?

A.

For two OSPs connected to the link F routers, even if their IPv6 address prefixes are different, can still establish neighbor relationships

B.

OSP the routing information obtained by Fv3 routers from neighbors will use the neighbor's Link-Local address as the next hop for forwarding packets.

C.

For two OSPs connected to the link F routers can establish neighbor relationships even without configuring a unicast IPv6 address

D.

All OSPs except virtual connections All Fv3 interfaces use the Link-Local address as the destination address of the packet

Full Access
Question # 48

IPSG can statically configure the binding table, orDHCP-Snooping is used together to form a binding table

A.

True

B.

false

Full Access
Go to page: