DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Huawei h12-891 Exam Questions and Answers PDF | SPOTO

SPOTO's latest exam dumps on the homepage, with a 100% pass rate! SPOTO delivers authentic Cisco CCNA, CCNP study materials, CCIE Lab solutions, PMP, CISA, CISM, AWS, and Palo Alto exam dumps. Our comprehensive study materials are meticulously aligned with the latest exam objectives. With a proven track record, we have enabled thousands of candidates worldwide to pass their IT certifications on their first attempt. Over the past 20+ years, SPOTO has successfully placed numerous IT professionals in Fortune 500 companies.
Take other online exams

Question #1
In the process of client SSH login to a server configured with username and password authentication only, it will not go through the key exchange stage (no key will be generated).
A. TRUE
B. FALSEcorrect
View answer
Correct Answer: B
Question #2
On an SR-MPLS network, manually configured prefix SIDs on different devices may conflict with each other. Assume that there are four routes (prefix/mask SID) as follows. Which of the following routes will be selected according to the conflict handling principle?
A. 1
B. 1
C. 2
D. 3
View answer
Correct Answer: D
Question #3
Which of the following descriptions about DHCP Snooping is wrong?
A. If the DHCP Snooping function is enabled in the interface view, all DHCP message command functions under the interface will take effect
B. DHCP Snooping can prevent illegal attacks by setting trusted ports
C. Enable DHCP Snooping globally
D. If the DHCP Snooping function is enabled in the VLAN view, the command function will take effect on the DHCP messages belonging to the VLAN received by all interfaces of the device
View answer
Correct Answer: C
Question #4
Huawei Open Programmability System (OPS) uses HTTP methods to access managed objects to manage network devices. To facilitate script compilation, Huawei OPS provides the Python script template. Which of the following methods of the OPSConnection class in the OPS script template are incorrect?
A.
B.
C.
D.
View answer
Correct Answer: A
Question #5
The network administrator enters display telemetry subscription on the device to view the Telemetry subscription information, and the output is as follows. Which of the following descriptions is wrong?
A. The subscription name is Sub1
B. The device sends sampling data every second
C. The IP address of the device is 192
D. The subscription method is static subscription
View answer
Correct Answer: C
Question #6
In the firewall hot standby scenario, when VGMP works in load balancing mode, which of the following functions must be enabled on the firewalls to prevent the return traffic from being discarded because it does not match any session entry in the case of inconsistent forward and return paths?
A. Automatic backup
B. Manual batch backup
C. Quick session backupcorrect
D. BFD
View answer
Correct Answer: C
Question #7
In a distributed gateway scenario, VNIs are classi?ed into L2VNIs and L3VNIs. An L2VNI is mapped to a BD in 1:1 mode for forwarding of VXLAN packets within a subnet. An L3VNI is associated with a VPN instance for forwarding of VXLAN packets across subnets.
A. Truecorrect
B. False
View answer
Correct Answer: A
Question #8
The IS-IS Level-1 neighbor relationship between R3 and R4 is not established. [R3] display isis error Hell packet errors : ... ... Repeated System ID : 0 Bad Circuit Type : 0 Bad TLV Length : 0 Zer Holding Time : 0 Unusable IP Addr : 0 Repeated IPV4 Addr : 0 Mismatched Area Addr ( L1 ): 13 Mismatched Prot : 0 SNPA Conflicted ( LAN ): 0 Mismatched Level : 0 Mismatched Max Area Addr : 0 Bad Authentication : 0 ... ... [R3] Based on the information in this graph, which of the following is the likely cause?
A. The IIH authentication of R3 and R1 failed
B. The circuit-type of the interconnection interface of R3 and R4 does not match
C. The IS-Level of R3 and R4 do not match
D. The area numbers of R3 and R4 are differentcorrect
View answer
Correct Answer: D
Question #9
In scenarios with dense rooms such as dormitories, hotels, and wards, deploying an AP in each room will cause a large number of packets to be sent to the AC, which can easily cause performance bottlenecks on the AC. In order to cope with this challenge, which networking architecture can be adopted?
A. FAT AP
B. Leader AP
C. Agile distributed APcorrect
D. AC+FIT AP
View answer
Correct Answer: C
Question #10
When troubleshooting MSTP, the network administrator executed the display current-configuration command to obtain the configuration file of the device. Which of the following description of troubleshooting ideas is wrong?
A. Whether the MSTP port connected to the user terminal device is disabled or configured as an edge port
B. Check whether the device port is added to the correct VLAN
C. Regardless of whether BPDU Tunnel is configured on the device, it will not affect STcorrect
D. Check the port configuration and confirm whether the protocol packet sending command is enabled on the STP-enabled port, such as bpdu enable
View answer
Correct Answer: C
Question #11
Which of the following descriptions of BGP/MPLSIPVPN routing interactions is wrong?
A. PE and CE exchange IPv4 routing information
B. The egress PE can send IPv4 routes to the remote CE through BGP, IGP or static routing
C. The ingress PE changes the IPv4 routes received from the CE into VPNv4 routes and saves them according to different VPN instances
D. After receiving the VPNv4 routes advertised by the ingress PE, the egress PE filters the VPNv4 routes based on the RT attributes carried by the routes
View answer
Correct Answer: C
Question #12
IPV6 multicast introduces the concept of multicast scope, which of the following ways is the multicast scope concept implemented? Multi-select
A. When the group shake source sends IP6 multicast data, the TTL value of the packet is set to limit the transmission range of the group shakecorrect
B. There is a special field in the IPv6 multicast address that specifies the propagation range of multicast
C. Multicast scope is just a concept of spreading scope, and there is no specific technical implementation
D. During network configuration, the administrator uses the configuration command at the edge of the network to limit the multicast scope
View answer
Correct Answer: ABD
Question #13
After the interface Sticky MAC function is enabled on the device, what is the number of MAC addresses learned by the interface by default?
A. 10
B. 15
C. 5
D. 1correct
View answer
Correct Answer: D
Question #14
In the firewall dual-machine hot standby scenario, when VGMP is working in load sharing mode, in order to avoid the return traffic being discarded because it does not match the session table entry in the scenario where the round-trip paths are inconsistent, what functions do the firewall need to enable?
A. Session quick backupcorrect
B. Manual batch backup
C. Automatic backup
D. Turn on BFD detection
View answer
Correct Answer: A
Question #15
Is the following figure correct about NDP's process of resolving link-layer addresses?
A. Right
B. Wrong
View answer
Correct Answer: A
Question #16
As shown in the figure, the use of redundant links between the branch and the headquarters to establish IPsecVPN, while turning on URLPF on the Router_B for traffic from branch l, which of the following options is correct?
A. When using IPsec active-standby link redundant backups to enable the URPF function under the physical interface , it is recommended to use URPF loose mode
B. When using IPsec multilink redundant backup, the URPF function can be used under the physical interface, and URPF strict mode can be used
C. When using IPsec multilink redundant backups, urPF can be enabled under the tunnel interface, and URPF strict mode can be used
D. When using lPsec active-standby link redundancy backup, the URPF function is enabled under the physical interface, and URPF strict mode can be used
View answer
Correct Answer: AC
Question #17
XLAN uses BGP EVPN to establish a tunnel, what type of message is used? (Single choice questions).
A. Typel
B. Type2
C. Type3correct
D. Type4
E. Type5
View answer
Correct Answer: C
Question #18
In the scenario of dynamically establishing a VXLAN tunnel through BGP EVPN, when EVPN Type2 is used to advertise host ARP and host IP routes respectively, which option is wrong in the following description?
A. Both carry L2 VNI
B. Both carry host IP information
C. Both carry L3 VNIcorrect
D. Both carry MAC information
View answer
Correct Answer: C
Question #19
When the client calls iMaster NCE Campus RESTful When using the API, if the server returns status code 401, which of the following descriptions is correct?
A. The requested resource does not exist
B. Unauthorizedcorrect
C. No access allowed
D. Service is unavailable
View answer
Correct Answer: B
Question #20
After BGP introduces routes for other protocols, the next hop in the BGP routing table is consistent with the next hop of the introduced routing protocol
A. True
B. Falsecorrect
View answer
Correct Answer: B
Question #21
NVE is a network entity that realizes the function of network virtualization, and can only be a hardware switch.
A. TRUE
B. FALSEcorrect
View answer
Correct Answer: B
Question #22
In the ?rewall hot standby scenario, heartbeat interfaces can be connected directly or through an intermediate device such as a switch or router.
A. Truecorrect
B. False
View answer
Correct Answer: A
Question #23
When MPLS is deployed in the network and the network layer protocol is IP, the route corresponding to the FEC must exist in the IP routing table of the LSR, otherwise the label forwarding entry of the FEC will not take effect.
A. TRUEcorrect
B. FALSE
View answer
Correct Answer: A
Question #24
ISIS elects DIS in broadcast multiplexed access networks, and the following statement about DIS is correct? (Multiple choice)
A. ISIS elects dis by comparing priorities, and mac addresses if the priorities are consistentcorrect
B. In a broadcast multiple access network, DIS sends Hello PDUs at three times the frequencycorrect
C. DIS guarantees database synchronization by periodically sending CSNP messagescorrect
D. DIS supports preemption function, after the new DIS preemption is successful, there is no need to flood any LSP packet
View answer
Correct Answer: ABC
Question #25
A company's headquarters network and branch network are interconnected through the Internet. If you want to use VPN technology to ensure safe and reliable data transmission between headquarters users and branch users, which of the following VPN technologies is the most suitable?
A. IPsec VPNcorrect
B. SSL VPN
C. L2TP VPN
D. MPLS VPN
View answer
Correct Answer: A
Question #26
Switch stacking and cross-device link aggregation can be deployed to achieve link reliability in small and medium-sized campus scenarios.
A. TRUEcorrect
B. FALSE
View answer
Correct Answer: A
Question #27
In the following MPLSL3VPN cross-domain solution, which one of the VPNv4 routes needs to be transmitted between ASBRs?
A. Option Bcorrect
B. Option D
C. Option A
D. Option C
View answer
Correct Answer: A
Question #28
Assume that free mobility is deployed on the virtualized campus network shown in the figure and PC1, PC2 and PC3 belong to the Sales, R&D and Market security groups, respectively. Which of the following statements is incorrect?
A. Both AGG1 and AGG2 have the inter-group policy delivered by iMaster NCE- Campus
B. AGG1 enforces the inter-group policy on traffic from PC1 to PC3
C. AGG2 enforces the inter-group policy on traffic from PC2 to PC3
D. There are multiple authentication points and policy enforcement points on the network
View answer
Correct Answer: D
Question #29
In a VXLAN network, traffic is connected to the VXLAN network, and it can also be used to communicate with the same subnet within the same XLAN network
A. NVE interface
B. VXVAN L2 Gatewaycorrect
C. VXLAN L3 Gateway
D. VLANIF interface
View answer
Correct Answer: B
Question #30
For Layer 2 VPN technology, the following statement is correct? Multi-select
A. VPLS is a widely used technology in the live network, which can provide transparent transmission of three-layer messages and achieve multi-point access
B. The VPLS configuration is complex and the Layer 2 network transmits BUM packets
C. BGPEVPN supports features such as tenant isolation, Multi-homing, and broadcast suppression
D. BGPEVPN addresses mac address drift and multi-tenancy that VPLS cannot support
View answer
Correct Answer: ABC

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: