New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

H12-831_V1.0 Exam Dumps - HCIP-Datacom-Advanced Routing & Switching Technology V1.0

Go to page:
Question # 17

esigth uses different colors to distinguish different alarm levels, red represents emergency, orange represents important, and yellow represents

The table is secondary, and blue represents the prompt. Which of the following statements about different alarm levels is correct: (multiple choice)

A.

Prompt: A potential or imminent business-impacting failure has been detecteD. but currently has little business impact

B.

Minor: There is currently a certain impact on the business, but corrective actions are required to prevent serious failure alarms

C.

Urgent: Alerts that have affected the business and require immediate corrective action

D.

Important: An alarm that has affected the business and will have serious consequences if not handled in time

Full Access
Question # 18

In the VLAN aggregation technology, multiple Sub-VLANs are used to isolate wide-open domains, and these Sub-VLANs are aggregated.

Synthesizing a logical Super-VLAN, a company divides different departments into different Sub-VLANs, because

Sub-VL AN not only includes physical connection, but also can establish three-layer VLAN ANIF interface, which can directly carry out three-layer communication with external network.

A.

True

B.

False

Full Access
Question # 19

The link status information between different S.4S processes of the routers around the Taiwan and Taiwan is considered to be sound insulation.

A.

True

B.

False

Full Access
Question # 20

For the same MA, C address, manually configured MA, C entries have higher priority than automatically generated entries.

A.

True

B.

False

Full Access
Question # 21

Basic QinQ can choose the outer tag encapsulation method according to the business type.

A.

True

B.

False

Full Access
Question # 22

Regarding multi-instance CE (Mlulti-VPN-Instance CE, MCE), which of the following descriptions is wrong?

A.

existMCEdevice needs to be differentVPNCreate their own routing table and bind to the correct interface

B.

connected to the sameMCEbut not oneVPNInstance users cannot access each other

C.

haveMCEfunctional devices can be found inBGPIMPLS IP VPNAccess to multiple applicationsVPNExample, reduce the investment of user network equipment

D.

MCEandPEThere must be multiple physical links betweenVPINIsolation between instances

Full Access
Question # 23

The routing policy tools that can be used by BGP mainly include Filter-policy and Route-policy. Fiter-policy can only filter routes, and Route-policy can only modify routes.

A.

Yes

B.

wrong

Full Access
Question # 24

A network engineer enters dir on the device to obtain the following file names. Which is most likely to be the version file of the device?

A.

V300R022C00SPC100.cc

B.

startup_vl.rdb

C.

Ca.cer

D.

V300R022C00SPC100.cfg

Full Access
Go to page: