New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

H12-831_V1.0 Exam Dumps - HCIP-Datacom-Advanced Routing & Switching Technology V1.0

Go to page:
Question # 81

Which of the following information can the DHCP binding table contain?

A.

port andUDPport

B.

MA, Caddress

C.

IPaddress

D.

lease time

Full Access
Question # 82

The security protection actions that a secure MA, C address can perform does not include which of the following?

A.

Protect

B.

Restrict

C.

Shutdown

D.

Remark

Full Access
Question # 83

The routing policy tools that can be used by BGP mainly include Filterpolicy and oRoute-policy.

Fiterpolicy can only filter routes, Rote - policy can only modify routes

A.

True

B.

False

Full Access
Question # 84

The Discovery message of LDP is used for neighbor discovery, and LDP has different discovery mechanisms when discovering neighbors. The following statement about the Discovery message in the basic discovery mechanism is correct

A.

TCPAfter the connection is establisheD. LSRdo not continue sendingHello Message

B.

Purpose of the messageIPaddress is multicastIPaddress224.0.0.2

C.

This message is encapsulated inUDPIn the message, the destination port number is646

D.

The message is sent to the specifiedLDP Peer

Full Access
Question # 85

On the OSPFv3 network shown in the figure, area 1 is a common area. Which of the following statements are true?

A.

The LSDBs of R1, R2, and R3 are the same.

B.

If R5 imports an external route, R4 does not need to rely on the Inter-Area-Router-LSA to calculate the external route.

C.

R1, R2, and R3 generate Inter-Area-Prefix-LSAs.

D.

The LSDBs of R4 and R5 are the same.

Full Access
Question # 86

As shown in the figure, in a medium-sized network, BGP generally deploys dual RRs to improve R reliability. When deploying dual RRs, the ClusterIDs of the two RRs are generally set to be the same. What is the reason for this?

A.

Prevent RR from receiving too many routes and causing insufficient memory

B.

prevent suboptimal

C.

prevent loops

D.

Prevent the client from receiving too many routes and causing it to run out of memory

Full Access
Question # 87

From this picture, we can judge

A.

R1Zone authentication is configured

B.

R1The device type isLevel-1

C.

R1The device type isLevel-2

D.

R1Routing domain authentication is set

Full Access
Question # 88

Senior engineers with rich experience can quickly solve faults only by experience, with high efficiency.

A.

True

B.

False

Full Access
Go to page: