option
Cuestiones
ayuda
daypo
buscar.php

H12-821 - 2

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
H12-821 - 2

Descripción:
H12-821 - 2

Fecha de Creación: 2025/05/13

Categoría: Otros

Número Preguntas: 65

Valoración:(0)
COMPARTE EL TEST
Nuevo ComentarioNuevo Comentario
Comentarios
NO HAY REGISTROS
Temario:

The BFD version number supported by the VRP version is: version 3. version 2. version 1. version 4.

If two devices are connected, and one of them supports BFD detection function, while the other device does not support it, which functional feature of EFPD can be used by the device supporting BED detection function to realize link connectivity detection?. Two-way detection. Interface state linkage. One-arm echo. Quick handshake.

Intranet users of a company use the No-pat method of NAT to access the Internet. If all public IP addresses are used, what will happen to intranet users who access the Internet later?. Squeeze out the previous user and force NAT conversion to access the Internet. Synchronize the message to other NAT conversion equipment for NAT conversion. Automatically switch NAT to PAT and go online. Subsequent intranet users will not be able to access the Internet.

Which layer of data packets does the packet filtering firewall inspect?. Link layer. Application layer. Network layer. Physical layer.

When the payload is an ICMPv6 message, if the extension header is not considered, what is the value of the Next Header field in the IPv6 header?. 68. 58. 55. 78.

The following is part of the configuration information of the router Huawei. Which of the description of the configuration information is wrong? HUAWEI] ip as-path-filter 2 permit_200_300 [HUAWEI]route-policy test permit node 10 [HUAWE]-route-policy] if-match as-path-filter 2. Define a Route-Policy named test, the node serial number is 10. Set the AS path filter with sequence number 2, allowing routing information to include AS200 and AS300. Node 10 of the Route-Policy references AS path filter 2 and defines an if-match clause. The Route-Policy can only be called in the OSPF process.

Which of the following scenarios is not suitable for deploying interface policy routing?. In the scenario where the enterprise network has multiple ISP egresses, different network segments of the intranet access the Internet through different ISP egresses. Modify the next-hop of traffic originating locally. On the core switch, the mutual access traffic between the internal network and the external network is drawn to the bypass AC device. On the core switch, the mutual access traffic between the internal network and the external network is drawn to the side-mounted security detection device.

Regarding the description of the Keepalive message of BGP, the error is: Keepalives are periodically sent between two BGP neighbors. Keepalive messages are mainly used to confirm the running status and link availability between peer routers. The Keepalive message contains only one BGP data header. By default, the Keepalive interval is 180s.

IGMP Snooping mainly solves the problem of: Legality of IGMP Report messages. There are many receiver hosts on the network segment, and the router will receive many IGMP Report messages. Solve the problem of broadcasting multicast data packets on Layer 2 devices, and use them to manage and control the forwarding of multicast data packets. The receiver host only supports the IGMPv2 protocol, but the SSM multicast model is used in the network.

Which of the following statements about stack splitting is wrong?. If the master switch is in two stack systems after the stack is split, the stack system where the original master switch is located updates the topology and re-designates the master switch. After the stack splits, the MAC addresses of the two stack systems will change immediately. After splitting, multiple stack systems will have the same IP address and MAC address. In order to avoid network failures, the stack will perform MAD detection. The party that fails the MAD detection competition will close all physical ports except reserved ports. If the master and backup switches are still in the same stack system after the stack splits, the slave switch separated from the original master and backup switches will re-elect the master and backup switches due to the timeout of the protocol message.

Using the IP prerequisite list shown in the figure for route matching, which of the following routes can be matched? ip ip-prefix List1 index 10 permit 192.168.1.0 24 greater-equal 24 less-equal 27. 192.168.2.0/24. 192.168.3.0/25. 192.168.1.0/27. 192.168.1.0/23.

Regarding the description of the characteristics of the routing strategy, the correct one is: Apply the command policy-based-route. Forwarding according to the routing table based on the destination address. Manual hop-by-hop configuration is required to ensure that packets are forwarded according to policies. Based on the forwarding plane, serving the forwarding strategy.

The BGP protocol uses the peer default-route-advertise command to advertise routes to neighbors. At the same time, the changes in the DGP routing table are correct. Generate a default route in the local BGP routing table, and send it to the IP routing table according to the routing selection result. No effect, no default route is generated in the local BGP routing table. Generate an active default route in the local BGF routing table and deliver the initial IP routing table. BGF generates an inactive default route from the table in the local area, but does not send it to the IP routing table.

Under the VRP platform, which of the description about the default priority of each protocol is correct?. The priority of the OSPF route is 15. The priority of the ISIS route is 10. The priority of the static route is 60. The priority of the BGP route is 20.

The following is the BGP error output information of a router. The wrong description of this information is: <HUAWEL>display bgp error Error Type: Peer Error Date/Time:2010-03-2211:40:39 Peer Address:10.1.1.2 Error lnfo Router-id conflict. Error Type shows the error caused by neighbor relationship error. The neighbor address of the router is 10.1.1.2. The cause of the error may be due to the wrong writing of the AS number of the peer. The error occurred at 11:40:39 on March 22, 2010.

Regarding the content contained in the UPDATE message, the wrong description is: UPDATE contains the local AS number. UPDATE contains path attribute. UPDATE contains revoked routing prefix information. UPDATE contains reachable route prefix information.

How long is the default lease period of the DHCP address pool?. 1 month. 1 hour. 1 week. 1 day.

BFD control packets are encapsulated in UDP packets for transmission, so the destination port number of the multi-hop BFD control packets is: 5784. 3784. 4784. 2784.

In the USG series firewalls, what is the security level of the DMZ area?. 85. 5. 50. 100.

Which of the following statements about different types of firewalls is wrong?. A stateful inspection firewall needs to be configured with security policies for the "go" and "return" directions of packets. Packet filtering firewall for each data packet passing through the firewall, an ACL matching check is performed. Proxy firewall acts as a proxy for business between internal network and external network users. The state inspection firewall only checks the security policy for the first packet that does not hit the session.

In the USG series firewalls, what is the security level of the Untrusts area?. 10. 50. 15. 5.

Which of the following statements about the concept of multicast is wrong?. Multicast router: A router or a Layer 3 switch that supports Layer 3 multicast function. Multicast group: A collection identified by an IP multicast address. The group refers to the source, the sender of the information, and needs to join the multicast group to provide the forwarding of the group refers to the group message. Multicast group members, multicast group members can be widely distributed anywhere in the network.

Which of the following attributes must exist in a BGP Update packet?. AS-PATH. LOCAL-PREF. WITH. PrefVal.

Which of the following BGP routing attributes is not a recognized attribute?. AS-PATH. Origin. MED. Local_Pref.

Regarding the OSPF multi-process description, the error is: Multiple different OSPF processes can run on the same router, and they do not affect each other and are independent of each other. An interface of a router can only belong to one OSPF process. The routing interaction between different OSPF processes is equivalent to the routing interaction between different routing protocols. Different OSPF routers establish neighbors, and the process numbers must be the same.

Which statement about RIB and FIB is wrong?. FIB directs the forwarding of packets. The next-hop in RIB is the IP address of the peer directly connected to the neighbor interface. FIB is generated by RIB. RIB does not directly guide the forwarding of packets.

A company purchased a new network device. As a network administrator, what method is usually used to configure the device for the first time?. FTP. Telnet. SNMP. Console port login.

In the state detection firewall, when the state detection mechanism is enabled, when the second message (SHN+ACK) of the three-way handshake reaches the firewall, if there is no corresponding session table on the firewall, then which of the following statement is correct?. If the firewall security policy allows the packet to pass through, create a session table. By default, after the status function is turned off, and the allow policy is configured, it can pass. The message must pass through the firewall and establish a session table. If the firewall security policy allows the packet to pass through, the packet can pass through the firewall.

Which of the following descriptions is wrong about the address function of NDP?. Two types of ICMPv6 packets, neighbor solicitation and neighbor advertisement, are used in the addressing process. The address realizes the function from IPv6 address to link layer address. When sending a Neighbor Solicitation message, the destination address is set as the multicast address of the requested node of the neighbor. When sending a Neighbor Solicitation message, the source address is set to be the link-local address of the local interface.

Which statement about multicast packet forwarding is correct?. The source address of the multicast packet is a unicast address. In the multicast transmission mode, the destination address of the message can clarify the location of the receiver. The failure of the RPF check indicates that the multicast data packet is received from the suboptimal interface, but the inbound interface will still receive the multicast traffic and forward it downstream. The IGMP Snooping function cannot control the range of multicast traffic flooding on the Ethernet.

In different scenarios, RSTP provides different protection functions. Which of the following statement is wrong?. After the BPDU protection function is enabled on the switching device, if the edge port receives RST BPDU, the edge port will be set as a non-edge port, and the spanning tree calculation will be performed again. After the anti-TC-BPDU message attack function is enabled, the number of times the switching device processes TC BPDU messages within a unit time is configurable. The designated port with the root protection function enabled, its port role can only remain as the designated port. The designated port with root protection enabled, when the port receives a better RSTBPDU, the port will enter the Discarding state and no longer forward packets. If the port does not receive a better RST BPDU for a period, it will automatically return to the normal Forwarding state.

In the RSTP protocol, when the network topology changes, the mechanism for responding to the topology change is: The MAC table remains unchanged. Delete the entire MAC address table. Modify the lifetime of the MAC address table. The MAC address table is partially deleted.

The command format of the prefix list (IP-Prefx) is ip ip-prefx ip-prefix-name [ index index-mnumber ] permit / deny] ipv4-address mask-length [ greater-equal greater-equal-value ] [ less -equal less-equalvalue ], if only greater-equal is specified but less-equal is specified, the prefix range is: [0. greater-equal-value]. Unlimited. [mask-length,greater-equal-value]. [greater-equal-value.32].

When a router running BGP receives a route whose next hop is unreachable, what should it do?. Refuse to join the BGP routing table, and silently discard. Receive the route, add it to the BGP routing table, participate in the BGP routing rules, may be selected as the best route, and add it to the IP routing table. Receive the route and add it to the BCP routing table. But this route will not be preferred by BCP and will not be added to the IP routing table. Send an error message to the router that issued the Update.

Which of the following description about the UPDATE message of BGP is wrong?. The UPDATE message is sent in the form of multicast. The UPDATE message can carry multiple reachable routing information. In general, the UPDATE message is sent after the Keepalive. UPDATE messages are used to transfer routing information between BGP peers.

Which TLV does IS-IS use to describe IP Interface Address?. 129. 128. 131. 132.

Which of the following descriptions about the OSPF protocol is wrong?. There are four connection types described by Router-LSA: P2P/TransNet/StubNetl virtual link. Routing information is only allowed to be published between backbone areas and non-backbone areas, and routing information is not allowed to be directly published between non-backbone areas. Each OSPF router uses only one Router-LSA to describe the local active connection status belonging to an area. The Link State ID described in the third type of LSA is the router- id of the ABR.

Which of the following statements about the OSPF protocol is wrong?. The OSPF protocol supports area division. OSPF supports load balancing for equal-cost routes. OSPF packets are encapsulated in IP packets and can be sent in the form of unicast or multicast. OSPF is a link state based exterior gateway protocol.

When two routers exchange database information through DD messages, a master-slave relationship is first formed, and the router with the larger ID must be the master. True. False.

In a large-scale WLAN network, if the VLAN Pool uses HASH to allocate VLANs, the number of users in each VLAN will be evenly divided. True. False.

The DHCP relay is responsible for forwarding the DHCP message between the DHCP server and the DHCP client, and assisting the DHCP server to dynamically allocate network parameters to the DHCP client. True. False.

When two devices with the same priority compete for the Master role at the same time, the device with the interface with the smaller IP address should be selected as the Master device. True. False.

The interface IP address and virtual IP address of VRRP can be the same. True. False.

When you ping the IP address of an interface on the firewall, these packets will be handed over to the internal module of the firewall for processing and will not be forwarded. True. False.

IGMP Snooping cannot solve the bandwidth waste of multicast traffic on Layer 2 switches, that is, whether IGMP Snooping is configured on Layer 2 switches has no effect on multicast traffic. True. False.

When IGMP query is configured with SSM Mapping rules, SSM services can only be provided to member hosts running IGMPv2. True. False.

After a switch is powered on, it joins a running stack system. This behavior is called stack joining. True. False.

If a modular switch only supports the cluster card on the main control board to establish a cluster connection, it means that the modular switch uses the CSS2 stacking technology. True. False.

MQC, like PBR, can only be called under the three-layer interface of the device. True. False.

Routes injected into BGP by redistribution command, whose Origin attribute is Incomplete. True. False.

A BGP neighbor is a neighbor relationship established through UDP. True. False.

The import-route limit command cannot limit the maximum number of external routes that can be imported in an OSPF process. True. False.

The ABR in the OSPF Stub area does not flood the fifth type LSA and the fourth type LSA in the Stub area, and draws a default LSA to the Stub area to guide how the data packet reaches the destination outside the AS. True. False.

In the OSPF routing protocol, the asbr-summary command can be followed by the not-advertise parameter, which means not to advertise the aggregated route. True. False.

Two routers running IS-IS can only establish an adjacency relationship if the time interval of lH transmission is the same. True. False.

The default value of the ospfdr-prioritye command is 1, and the value range is 0~255. True. False.

In the OSPF broadcast or NBMA network type, a device with a large DR Priority does not necessarily become a DR. True. False.

After a modular switch receives a service packet, it is first processed by the uplink interface board, then processed by the downlink interface board, and finally sent out from the interface. True. False.

iMaster NCE-Campus supports management of Huawei network devices through NETCONF, and supports management of third-party devices through SNMP. True. False.

Regarding the following dual-link hot standby configuration, when configuring the priority of the AC, the greater the value of the priority, the higher the actual priority of the AC. True. False.

In the Portal authentication scenario based on MAC priority, when the user successfully completes Portal authentication and disconnects from the network within a certain period and reconnects, he can directly access through MAC authentication without entering the username and password to perform Porta1 authentication again. True. False.

After dividing an interface of the firewall into the Untrust security zone, the interface belongs to the Untrust zone and no longer belongs to the Local zone. True. False.

After the IGMP proxy device receives the report message of a certain multicast group, if the corresponding multicast group is not found, the IGMP proxy device will send a report message counting the multicast group to the access device, and add the multicast group to the forwarding table. True. False.

The first 4 bits of the IP multicast address are fixed 1110, corresponding to the upper 25 bits of the multicast MAC address. Of the last 28 bits of the IP multicast address, only 23 bits are mapped to the MAC address, so 5 bits of address information are lost. The direct result is that 32 IP multicast addresses are mapped to the same MAC address. True. False.

IGMP3 not only supports the general group query of the IGMPv1 version and the specific group query of the IGMPv2 version, but also supports the specified source/group query of the IGMPv3 version. True. False.

Denunciar Test