Month End Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

H12-821_V1.0 Exam Dumps - HCIP-Datacom-Core Technology V1.0

Go to page:
Question # 25

Based on IGMP snooping, IGMP snooping proxy enables a switch to act as a substitute for an upstream Layer 3 device to send IGMP Query messages to downstream hosts, and also to act as a substitute for downstream hosts to send IGMP Report/Leave messages to an upstream device. As such, this function conserves bandwidth between the upstream device and the local device.

A.

TRUE

B.

FALSE

Full Access
Question # 26

As shown in the figure, data traffic is forwarded in tunnel mode along the path of STA -> HAP -> HAC -> upper-layer network before roaming. What is the flow direction of data traffic after Layer 3 roaming?

A.

STA -> FAP -> FAC -> HAC -> HAP -> HAC -> Upper-layer network

B.

STA -> FAP -> FAC -> HAC -> Upper-layer network

C.

STA -> FAP -> FAC -> Upper-layer network

D.

STA -> FAP -> FAC -> HAC -> HAP -> Upper-layer network

Full Access
Question # 27

On a network, each router has a local core routing table and protocol routing tables. A routing entry in the local core routing table has multiple key fields. Which of the following are included?

A.

Destination address of a route

B.

Routing protocol preference of a route

C.

Inbound interface that learns a route

D.

Routing protocol that learns a route

Full Access
Question # 28

Which of the following statements regarding the BGP error display of a router false?

A.

The error may be caused by the incorrect neighbor address.

B.

The neighbor address of this router is 10.1.1.5.

C.

Error Type indicates that the BGP error is caused by the neighbor relationship error.

D.

The error occurred at 12:40:39 on March 22, 2010.

Full Access
Question # 29

The Neighbor Discovery Protocol (NDP) is an important basic protocol in the IPv6 protocol suite and plays an important role. Which of the following functions and features does it support?

A.

Address resolution

B.

Neighbor state tracing

C.

Duplicate address detection

D.

Redirection

Full Access
Question # 30

By default, some security zones are created when Huawei firewalls are enabled. Which of the following security zones is created by users?

A.

DMZ

B.

ISP

C.

Trust

D.

Local

Full Access
Question # 31

An enterprise network runs OSPF to implement network communication. Which of the following types of LSAs may be generated by an ABR?

A.

NSSA LSA

B.

AS External LSA

C.

Network Summary LSA

D.

ASBR Summary LSA

Full Access
Question # 32

In the SNMP management model, which of the following elements defines the attributes of a managed device?

A.

MIB

B.

Agent

C.

Managed Object

D.

NMS

Full Access
Go to page: