New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

H12-821_V1.0 Exam Dumps - HCIP-Datacom-Core Technology V1.0

Go to page:
Question # 25

In the SNMP management model, which of the following elements defines the attributes of a managed device?

A.

MIB

B.

Agent

C.

Managed Object

D.

NMS

Full Access
Question # 26

On a network, some switches are enabled with RSTP and some switches are enabled with STP. What will happen?

A.

A Huawei switch changes from RSTP to STP. After the STP-enabled switch is removed from the network, the RSTP-enabled switch can be moved back to the RSTP mode.

B.

A Huawei switch changes its mode from STP to RSTP. After the RSTP-enabled switch is removed from the network, the STP-enabled switch can be moved back to the RSTP mode.

C.

STP and RSTP are compatible with each other, but the rapid convergence of RSTP is unavailable.

D.

STP and RSTP calculation are performed independently.

Full Access
Question # 27

A switch runs MSTP. The configuration is shown in the figure. What is the role of this switch in MSTI 1?

A.

Uncertain

B.

Root switch

C.

Non-root switch

D.

Secondary root switch

Full Access
Question # 28

Which of the following statement regarding the display ospf peer command output is true?

A.

Address: 10.1,1.1 Indicates that the local interface address is 10.1.1.1.

B.

Through negotiation during DD packet exchange, the local end becomes the slave.

C.

Router ID indicates that the local router ID Is 10.1.1.1.

D.

The DR address is 10.1.1.1

Full Access
Question # 29

OSPF supports area authentication and interface authentication. If both authentication modes are configured, Interface authentication takes preference over area authentication.

A.

TRUE

B.

FALSE

Full Access
Question # 30

OSPF has five types of packets, which have the same header format. If the Auth Type field in the packet header is 1, which of the following authentication modes is used?

A.

Non-authentication

B.

MD5 authentication

C.

Plaintext authentication

D.

Hash authentication

Full Access
Question # 31

In PIM-DM, which of the following processes are involved in SPT establishment?

A.

Prune

B.

Graft

C.

Flooding

D.

State-refresh

Full Access
Question # 32

Which of the following scenarios is not suitable for deploying interface PBR?

A.

A core switch needs to forward traffic between the intranet and extranet to an AC device that connects to the core switch in off-path mode.

B.

A core switch needs to forward the traffic between the intranet and extranet to a security detection device that connects to the core switch in off-path mode.

C.

A device needs to modify the next-hop IP address for locally originated traffic.

D.

On an enterprise network with multiple ISP outbound interfaces, each internal network segment accesses the Internet through a particular ISP outbound interface.

Full Access
Go to page: