DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Huawei H12-821 Exam Sample Questions | SPOTO

SPOTO's latest exam dumps on the homepage, with a 100% pass rate! SPOTO delivers authentic Cisco CCNA, CCNP study materials, CCIE Lab solutions, PMP, CISA, CISM, AWS, and Palo Alto exam dumps. Our comprehensive study materials are meticulously aligned with the latest exam objectives. With a proven track record, we have enabled thousands of candidates worldwide to pass their IT certifications on their first attempt. Over the past 20+ years, SPOTO has successfully placed numerous IT professionals in Fortune 500 companies.
Take other online exams

Question #1
Regarding the ABR in OSPF, which is the wrong description?
A. ABR cannot generate Type 3, Type 4, and Type 5 LSAscorrect
B. Convert the Type 1 and Type 2 LSAs in the connected non-bone thousand areas into Type 3 LSAs and publish them to the backbone area
C. The Type 1, Type 2, and Type 3 LSAs in the backbone area of ??the ABR grid are converted into Type 3 LSAs and advertised to the connected non-bone thousand areas
D. There are multiple LSDBs on the ABR, and the ABR maintains an LSDB for each area
View answer
Correct Answer: A
Question #2
By default, on a router running IS-IS in a broadcast network, how many seconds does DIS send CSNP messages?
A. 10correct
B. 3
C. 30
D. 40
View answer
Correct Answer: A
Question #3
BFD control packets are encapsulated in UDP packets for transmission . What is the destination port number of multi-hop BFD control packets?
A. 4784correct
B. 3784
C. 5784
D. 2784
View answer
Correct Answer: A
Question #4
Which of the following descriptions about OSPF default routing is wrong?
A. The OSPF default route can be issued by the Area Border Router (ABR) to issue Type 3 default LSAs to guide routers in the area to forward packets between areas
B. When the router has no exact matching route, it can forward the message through the default route
C. Due to the hierarchical management of OSPF routes, the priority of class 5 and class 7 default routes is higher than that of class 3 default routes
D. Autonomous System Boundary Router (ASBR) publishes default LSA of type 5 or default LSA of type 7, which is used to guide routes in the autonomous system (AS) to access the outside of the autonomous systemcorrect
View answer
Correct Answer: D
Question #5
BFD control packets are encapsulated in UDP packets for transmission. What is the destination port number of multi-hop BFD control packets?
A. 784
B. 784
C. 784
D. 784
View answer
Correct Answer: A
Question #6
Which of the following is the command to configure the VRRP preemption delay?
A. vrrp vrid 1 preempt-mode timer delay 20correct
B. vrrp vrid 1 timer delay 20
C. vrrp vrid 1 preempt-timer 20
D. vrrp vrid 1 preempt-delay 20
View answer
Correct Answer: A
Question #7
Which of the following description of how to establish aBFDsession is wrong?
A. BFD sessions can only be established dynamicallycorrect
B. Static configuration of the BFD session refers to configuring the BFD session parameters through the command line, including local identifiers and remote identifiers, etc
C. When dynamically establishing a BFD session, dynamically assign a local identifier
D. The system distinguishes between static BFD sessions and dynamic BFD sessions by dividing the identifier area
View answer
Correct Answer: A
Question #8
Which of the following statements regarding DR/BDR are false?
A. In a broadcast network, DR and BDR must be elected
B. DR others listen on the multicast address 224
C. All DR others establish neighbor relationships with DR and BDR only
D. DR others listen on the network address 224
View answer
Correct Answer: C
Question #9
The following is a partial configuration of a router. The correct description of this configuration is:
A. The data packet whose source address is 1
B. The data packet whose source address is 1
C. The data packet whose source address is 1
D. The data packet whose source address is 1
View answer
Correct Answer: A
Question #10
Regarding the description of configuring the security level of the security zone of the firewall, which of the following is wrong?
A. In the same system, two security zones are not allowed to configure the same security level
B. Security levels can only be set for custom security areas
C. Once the security level is set, it is not allowed to change
D. The newly created security area, the system defaults its security level to 1correct
View answer
Correct Answer: D
Question #11
Which of the following statements about the AC's mobility group are false? (Choose all that apply.)
A. TAs can roam only between ACs in the same mobility group
B. he mobility server must be an AC in the local mobility group
C. mobility server needs to be specified for member ACs in a mobility group
D. Cs in the same mobility group encapsulate and transmit roaming information over the DTLS extended tunnel
View answer
Correct Answer: AB
Question #12
Which of the following does not belong to IGP?
A. RIP
B. IS-IS
C. BGPcorrect
D. OSPF
View answer
Correct Answer: C
Question #13
GRE is a VPN encapsulation technology that is widely used to transmit packets across heterogeneous networks. Which of the following statements is false about GRE?
A. GRE supports encryption and authentication
B. GRE supports multicast transmission
C. GRE is a Layer 3 VPN encapsulation technology
D. GRE can work with other VPN protocols to better ensure data security
View answer
Correct Answer: A
Question #14
IGMP Snooping runs at the data link layer and is used to manage and control multicast groups, and solves the problem of multicast packets being broadcast on Layer 3.
A. TRUE
B. FALSE
View answer
Correct Answer: B
Question #15
As shown in the figure below, the firewall receives a message from PC1 to PC2 , which of the following statements is correct ?
A. The packet cannot match the security policies rule1 and rule2, it will match the default policy of the firewall, and the firewall will forward the packet
B. The default security policy of the firewall is match all, and the action is Deny
C. The message will match the new security policy rule2, and the firewall will forward the messagecorrect
D. The message will match the security policy rule 1
View answer
Correct Answer: C
Question #16
Which of the following characteristics does the IS-IS protocol have? (Multiple choice)
A. Suitable for large-capacity routing delivery
B. Better scalability
C. The bottom layer is the data link layer
D. Does not support network element hierarchical division
View answer
Correct Answer: ABC
Question #17
Compared with routers and switching machines, what is the unique forwarding module of the firewall?
A. Switch fabric board
B. MPU
C. LPU
D. SPUcorrect
View answer
Correct Answer: D
Question #18
The filter-policy 2000 export is configured in the IS-IS process server-group-AP , which statement about the function of this command is wrong?
A. It needs to be used in combination with route import, so that only part of the imported external routes can be advertised to neighbors
B. This command will filter the link state information published externally
C. If this command is not configured, the device will advertise all the routes imported to S-IS by the external routing protocol by default
D. It will restrict the publishing of routing entries generated by the device itselfcorrect
View answer
Correct Answer: D
Question #19
There is a message in the BGP protocol that is periodically sent between BGP neighbors to maintain the neighbor relationship. This message is:
A. Update
B. Hello
C. open
D. Keepalivecorrect
View answer
Correct Answer: D
Question #20
Which function does the switch control plane not include?
A. Business processing
B. Routing operation
C. System loadingcorrect
D. Traffic Statistics
View answer
Correct Answer: C
Question #21
Which of the following description about verifying whether a received Hello message is legal is wrong?
A. If the network type of the receiving port is point-to-point or virtual link, the Network Mask field is not checked
B. The RouterDeadIntera1 field in the received Hello message must be consistent with the configuration of the receiving port
C. If the network type of the receiving port is broadcast, point-to-multipoint or NBMA, the Network Mask field in the received Hello message may be inconsistent with that of the interfacecorrect
D. The E-bit in the Options field in the received Hello message must be consistent with the configuration of the relevant area
View answer
Correct Answer: C
Question #22
By default, on a router running IS-IS in a broadcast network, how many seconds does DIS send CSNP messages?
A. 10correct
B. 3
C. 30
D. 40
View answer
Correct Answer: A
Question #23
In the IS-IS broadcast network, which multicast MAC address does the Level-1 router use as the destination address for sending IIH?
A. 0180-c200-0000
B. 0180-c200-0015
C. 0100-5E00-0001
D. 0180-c200-0014correct
View answer
Correct Answer: D
Question #24
A router performs a lookup in its FIB table for a packet. If the tunnel ID in the matching entry is 0, the packet needs to be forwarded through a tunnel, such as an MPLS tunnel.
A. TRUE
B. FALSE
View answer
Correct Answer: B
Question #25
There are the following states in the BGP neighbor establishment process, then the state machine sequence that a successful connection goes through is: 1. Active 2. OpenConfirm 3. Idle 4. Establish 5. OpenSent
A. 3-1-2-5-4
B. 1-3-5-2-4
C. 3-5-1-2-4
D. 3-1-5-2-4correct
View answer
Correct Answer: D
Question #26
As shown in the figure, in the network running the RSTP protocol, the original root port of SWC fails and the port is in the Down state.
A. The standby port on the SWC becomes the new root port and enters the Forwarding state after going through the Learning state
B. SWC re-elects the root port and directly enters the Forwarding state
C. The standby port on the SWC becomes the new root port and directly enters the Forwarding statecorrect
D. SWC re-elects the root port and enters the Forwarding state after Learning
View answer
Correct Answer: C
Question #27
The following is part of the configuration information of the router Huawei. Which of the description of the configuration information is wrong? [HUAWEI] ip as-path-filter 2 permit 200_300 [HUAWEI]route-policy test permit node 10 [HUAWE]-route-policy] if-match as-path-filter 2
A. The Route-Policy can only be called in the OSPF process
B. Set the AS path filter with sequence number 2, allowing routing information to include AS200 and AS300
C. Define a Route-Policy named test, the node serial number is 10
D. Node 10 of the Route-Policy references AS path filter 2 and defines an if-match clause
View answer
Correct Answer: A
Question #28
Compared with routers and switching machines, what is the unique forwarding module of the firewall?
A. Switch fabric board
B. MPU
C. LPU
D. SPUcorrect
View answer
Correct Answer: D
Question #29
The four routers run lS-IS and have established adjacency. The area code and the level of the router are marked in the figure. Which of the following statements is correct?
A. The LSP of R4 does not exist in the LSDB of router R1correct
B. The LSP of R3 does not exist in the LSDB of the R2 router
C. The LSP of R4 does not exist in the LSDB of R3 router
D. The LSP of R4 does not exist in the LSDB of the R2 router
View answer
Correct Answer: A
Question #30
Regarding the description of configuring the security level of the security zone of the firewall, the error is:
A. In the same system, two security zones are not allowed to configure the same security level
B. Security levels can only be set for custom security areas
C. Once the security level is set, it is not allowed to change
D. The newly created security area, the system defaults its security level to 1correct
View answer
Correct Answer: D

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: