DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Free Huawei h12-891 Test Practice Online? | SPOTO

SPOTO's latest exam dumps on the homepage, with a 100% pass rate! SPOTO delivers authentic Cisco CCNA, CCNP study materials, CCIE Lab solutions, PMP, CISA, CISM, AWS, and Palo Alto exam dumps. Our comprehensive study materials are meticulously aligned with the latest exam objectives. With a proven track record, we have enabled thousands of candidates worldwide to pass their IT certifications on their first attempt. Over the past 20+ years, SPOTO has successfully placed numerous IT professionals in Fortune 500 companies.
Take other online exams

Question #1
Is the following description of ospf virtual links correct?
A. A virtual connection can be established in any area, after which it itself belongs to the region
B. The virtual connection ip is used as the link address
C. Virtual links can be used to solve the problem of zone 0 being segmentedcorrect
D. The cost of a virtual connection is zero and is the optimal link
View answer
Correct Answer: C
Question #2
When an SSH client logs in to the SSH server that is con?gured only with user name and password authentication in SSH mode, the key exchange phase is not involved (no key is generated).
A. True
B. Falsecorrect
View answer
Correct Answer: B
Question #3
YANG, deriving from NETCONF, is not only applicable to NETCONF. Currently, both the YANG modeling language and YANG ?le have been uni?ed.
A. Truecorrect
B. False
View answer
Correct Answer: A
Question #4
The switch can suppress traffic by suppressing traffic and extremely other failures can affect operations, which of the following traffic suppression configurations is the wrong configuration
A. [Quidway] wan 10 [Quidway-wan10] multicast-suppression 1000 [Quidway-van10] quitcorrect
B. [Qudway ineface gigabtethemnet /0'1 [Quidway-GigabitEfthemetO0/O/1] multicast-suppression 80TQuidway-GigabitEthernet0/0/1]quit
C. Quidway inteface gigabiethenet ou0/1 [Quidway-GigabtEthernet/0/1], broadcast-suppression 80 IQuidway-GigabitEthernet//1]Jqut
D. [Quidway] icmp rate-limit enable [Quidway] icmp rate-limit total threshold 20
E. [Quidway ] wan 10 [Quidway-wani0] broadcast-suppression 1000 [Quidway-van10] quit
View answer
Correct Answer: A
Question #5
Which of the following is the drop probability of packets exceeding the upper threshold in WRED?
A. 0
B. 0
C. 0
D. 1correct
View answer
Correct Answer: D
Question #6
When deploying virtual networks on iMaster NCE-Campus, you need to configure authentication and authorization after creating user accounts. Which of the following does not need to be configured?
A. uthentication rule
B. uthentication result
C. uthorization result
D. uthorization rule
View answer
Correct Answer: D
Question #7
The OSPF-based SR-MPLS function is enabled on all routers in a network. The SREB of each router is shown in the figure. By default, when R3 forwards a packet whose destination address is 10.0.4.4, which of the following MFLS labels is carried item?
A. 3
B. 100
C. 40100
D. 50100correct
View answer
Correct Answer: D
Question #8
If a DR needs to be elected between multicast routers running PIM-SM to be responsible for the sending and receiving of source or member multicast data, which one is described correctly below for the DR election rule?
A. PIM routers with long interface masks are elected dr
B. Compare the DR priority first; With the same priority, you need to compare the interface IP addresses of the PIM routers to elect drcorrect
C. PIM routers with small IP addresses are elected D
D. PIM routers with low
E. DR priority values are elected D
View answer
Correct Answer: B
Question #9
The following is a part of the NETCONF protocol message, Where is it located in the NETCONF architecture layer?
A. Transport layer
B. Message layercorrect
C. Content Layer
D. Operation layer
View answer
Correct Answer: B
Question #10
To prevent hackers from attacking user devices or networks using MAC addresses, you can con?gure MAC addresses of untrusted users as blackhole MAC addresses to ?lter out such invalid MAC addresses. When receiving a packet whose source or destination MAC address is a blackhole MAC address on a device, the device discards the packet.
A. Truecorrect
B. False
View answer
Correct Answer: A
Question #11
To implement the traffic filtering function, you can use trapp-filter or MQC, which can be called in more views than traffic-filter
A. FALSE
B. TRUEcorrect
View answer
Correct Answer: B
Question #12
SR-MPLS Policy can use BGP extension to transmit tunnel information, as shown in the figure. Among them, SR-MPLS Policy is optimized by which of the following parameters?
A. Priority
B. Preference
C. Weightcorrect
D. Binding SID
View answer
Correct Answer: C
Question #13
Which of the following BGP routing attributes cannot control BGP route selection?
A. Originator ID
B. MED
C. AS_Path
D. Communitycorrect
View answer
Correct Answer: D
Question #14
Which of the following are key technologies used to implement SRv6 Policies based on Huawei’s CloudWAN solution architecture?
A. GP-LS
B. GP IPv6 SR Policy
C. CEP
D. ETCONF
View answer
Correct Answer: B
Question #15
In the dual-system hot backup scenario of the firewall, the heartbeat interface can be directly connected physically, or it can be connected through an intermediate device such as a switch or router.
A. TRUEcorrect
B. FALSE
View answer
Correct Answer: A
Question #16
NCE-Campus. The figure shows the configured policy control matrix. Which of the following statements about the policy control matrix is incorrect?
A. The guest group can access the guest group
B. If the server group is a resource group, the server group can be specified as the source group of a policy
C. The sales group and guest group cannot communicate with each other
D. If the policy enforcement point does not find the security group corresponding to an IP address, traffic from the IP address can be forwarded to the server group
View answer
Correct Answer: D
Question #17
What of the following actions can enable fast failure detection on multicast networks?
A. Shorten the Holdtime of Join/Prune messages
B. Reduce the interval at which the interface sends Hello messagescorrect
C. A PIM BFD session is established between neighbors
D. Reduce the interval between sending Join/Prune messages
View answer
Correct Answer: B
Question #18
When the switch is deployed with DHCP option 148, which of the following information will not be provided by the DHCP server to the switch to be deployed?
A. The IP address of the cloud management platform
B. The port number of the cloud management platform
C. The port number of the device to be deployed
D. The IP address of the device to be deployedcorrect
View answer
Correct Answer: D
Question #19
Part of the configuration of device H is as shown in the figure. Which item is wrong in the following description of this configuration?
A. Configure GigabitEthernet0/0/1 interface as a trusted interface
B. Enable DHCP Snooping configuration to prevent ARP spoofing attackscorrect
C. If the DHCP request message received by the GigabitEthernet0/0/1 interface does not contain the SubOption information of Option82, the device will generate Option82 and insert it into the message
D. Enabling DHCP Snooping configuration can be used to prevent DHCP Server bogus attacks
View answer
Correct Answer: B
Question #20
When there is a relay device between the DHCP client and the server, if the IP address in the global address pool of the DHCP server is not in the same network segment as the IP address of the VLANIF interface connected to the client on the relay device, it will cause a DHCP failure.
A. TRUEcorrect
B. FALSE
View answer
Correct Answer: A
Question #21
Which of the following descriptions of BGP/MPLS IP VPN network architecture is wrong?
A. The P device only needs to have basic MPLS forwarding capabilities and does not maintain VPN related information
B. Under normal circumstances, CE devices are not aware of the existence of VPN, and CE devices do not need to support MPLS, MP-BGP, etc
C. The BGP/MPLS IP VPN network architecture consists of three parts: CE (Customer Edge), PE (Provider Edge) and P (Provider)
D. Sites can access each other through VPN, and a site can only belong to one VPcorrect
View answer
Correct Answer: D
Question #22
SSH must be con?gured before you can enable NETCONF on Huawei network devices.
A. Truecorrect
B. False
View answer
Correct Answer: A
Question #23
For telemetry data push, data can be transferred between devices and collectors using the TLS protocol. TLS must be con?gured for data encryption if data is pushed based on gRPC.
A. Truecorrect
B. False
View answer
Correct Answer: A
Question #24
Which of the following regular expressions can match only the BGP route entries that pass through AS300 and then AS200?
A. ^200|^300
B. 200$|300$
C. _200 (200 300) _correct
D. _200[200 300]_
View answer
Correct Answer: C
Question #25
Network slicing technology can divide exclusive network resources in the network to carry high-value service traffic. Which of the following descriptions about network slicing is wrong?
A. The channelized sub-interface technology adopts single-layer scheduling to realize flexible and refined management of interface resources and provide bandwidth guaranteecorrect
B. Generally, network slicing can be realized based on the channelized sub-interface FlexE technology
C. The layer used by the network slicing technology is different from that of the SR tunnel, and can be used at the same time as the SR tunnel
D. FlexE technology divides resources according to TDM time slots, satisfies the requirements of exclusive resource sharing and isolation, and realizes flexible and refined management of interface resources
View answer
Correct Answer: A
Question #26
In a VXLAN network, traffic is connected to the VXLAN network, and it can also be used to communicate with the same subnet within the same XLAN network
A. NVE interface
B. VXVAN L2 Gatewaycorrect
C. VXLAN L3 Gateway
D. VLANIF interface
View answer
Correct Answer: B
Question #27
In the virtualized campus network deployed through ilMaster NCE-Campus, some key parameters need to be configured in the authorization rules for access authentication. Which of the following is not included?
A. Binding authentication rules
B. Access methodcorrect
C. Bind the authorization result
D. Authorization Rule Name
View answer
Correct Answer: B
Question #28
As shown in the figure, which of the following descriptions is wrong? The packet information of VLAN configuration delivered by NETCONF protocol is as follows:
A. The purpose of this NETCONF message is to create VLAN 10 on the device
B. The tag indicates the configuration library used by the NETCONF message
C. indicates that the function of the message is to modify, create or delete configuration data
D. means modify the existing or non-existing target data in the configuration database, create if the target data does not exist, and modify if the target data exists
View answer
Correct Answer: B
Question #29
As shown in the figure, if you want to allow only legal users (users who obtain IP addresses through a legal DHCP server or specific static IP users) to access the network in the network, which of the following solutions can be used?
A. DAI+IPSG
B. DHCP Snooping+DAI
C. DAI+Port Security
D. DHCP Snooping+IPSGcorrect
View answer
Correct Answer: D
Question #30
In the use of the CP protocol, the following description is correct?
A. The Eth-Trunk interface can be avoided by frequent oscillation interfaceeth-trunkllacppreemptenablelacppreemptdelaydelay-time by following commandcorrect
B. Source A address can be configured for load sharing in an enabled link aggregation group with the following command: interface eth-trunk 110ad-balance src-dst-ip
C. A member interface can be removed from an enabled link aggregation group with the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 undo eth-trunk 1 interfaceGigabitEthernet0/0/1undoshutdown
D. The member interface can be joined in the link aggregation group by enabling the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 trunkport
View answer
Correct Answer: A

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: