Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

H12-821_V1.0 Exam Dumps - HCIP-Datacom-Core Technology V1.0

Go to page:
Question # 49

Security policy is the core feature of firewalls. Only valid traffic that complies with security policies can be forwarded by firewalls. Which of the following statements are true about security policy matching rules?

A.

Multiple values can be configured for a single matching condition, and the values are logically ANDed.

B.

If a security policy contains multiple matching conditions, the relationship between them is AND.

C.

The system has a default security policy named default, where all matching conditions are any and the default action is permit.

D.

When multiple security policy rules are configured, they are sorted in a list by configuration sequence by default. A security policy rule configured earlier is placed higher in the list and has a higher priority.

Full Access
Question # 50

If the interval for two consecutive packets of a TCP session reaching the firewall is longer than the aging time of the session, the firewall deletes the session information from the session table to ensure network security.

A.

TRUE

B.

FALSE

Full Access
Question # 51

Compress the 2001:0DB8:0000:C030:0000:0000:09A0 address.

Full Access
Question # 52

A local router runs IS-IS and its command output is shown in the following figure. Which of the following statements is true?

A.

The circuit level of S4/0/0 is Level-1.

B.

S4/0/0 supports IPv6.

C.

S4/0/0 sends IIH packets at the interval of 30s.

D.

The cost of S4/0/0 is 20.

Full Access
Question # 53

On an OSPF network, one router with P2P as the network type is directly connected to another router with P2MP as the network type. If the Hello intervals on the two routers are changed to be the same, neighbor relationship establishment and LSDB synchronization are not affected.

A.

TRUE

B.

FALSE

Full Access
Question # 54

As shown in the figure, SWA, SWB, SWC, and SWD run the Rapid Spanning Tree Protocol (RSTP). Which of the following statements are true?

A.

Once receiving OPOUs, the edge port re-partlci pates in the calculation of the spanning tree.

B.

After a port is Configured as an edge port, the port can quickly enter the Forwarding state.

C.

You can enable the edge port on SWD's GEO/0/2 connected to the terminal so that this port can quickly enter the Forwarding state.

D.

You can enable the edge port on SWC's GE0/0/2 connected to the terminal so that this port can quickly enter the forwarding state.

Full Access
Question # 55

After a BGP device establishes a peer relationship, it advertises routes. Which of the following statements are true about BGP route advertisement?

A.

Routes obtained from EBGP peers are advertised to all peers.

B.

When routes are updated, the BGP device sends all BGP routes.

C.

When there are multiple valid routes to the same destination, a BGP device advertises only the optimal route to its peers.

D.

Routes obtained from an IBGP peer are not sent to other IBGP peers.

Full Access
Question # 56

On a WLAN, engineers can use the VLAN pool mechanism to assign access users to different VLANs, which helps reduce the number of broadcast domains and improve network performance. VLAN pools support two VLAN assignment algorithms: even and hash. Drag the advantages and disadvantages to the two algorithms.(Token is reusable)

Full Access
Go to page: