DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Huawei HCIE-Datacom (Written) (Huawei h12-891) Sample Questions and Answers? | SPOTO

SPOTO's latest exam dumps on the homepage, with a 100% pass rate! SPOTO delivers authentic Cisco CCNA, CCNP study materials, CCIE Lab solutions, PMP, CISA, CISM, AWS, and Palo Alto exam dumps. Our comprehensive study materials are meticulously aligned with the latest exam objectives. With a proven track record, we have enabled thousands of candidates worldwide to pass their IT certifications on their first attempt. Over the past 20+ years, SPOTO has successfully placed numerous IT professionals in Fortune 500 companies.
Take other online exams

Question #1
Assume that a company's headquarters network and branch networks are connected through the Internet. Which of the following VPN technologies is most capable of ensuring secure and reliable data transmission between the headquarters and branches?
A. SL VPN
B. Psec VPN
C. 2TP VPN
D. PLS VPN
View answer
Correct Answer: B
Question #2
The GRE tunnel supports the MPLS LDP function.
A. TRUEcorrect
B. FALSE
View answer
Correct Answer: A
Question #3
In the campus VXLAN network, which of the following equipment is used to connect the Fabric and the external network of the Fabric?
A. Extended
B. Brdercorrect
C. Transparent
D. Edge
View answer
Correct Answer: B
Question #4
BGP routing policies can control the publication and acceptance of routes
A. TRUEcorrect
B. FLASE
View answer
Correct Answer: A
Question #5
Which of the following parameters is not included in an IPsec security association (SA)?
A. Security parameter index (SPI)
B. Destination IP address
C. Source IP addresscorrect
D. Security protocol ID (AH or ESP)
View answer
Correct Answer: C
Question #6
In a virtualized campus network scenario deployed through iMaster NCE-Campus, some key parameters need to be configured when configuring the authorization results for access authentication. Which of the following does not include?
A. Authorized security groups
B. Authorization result name
C. Binding site
D. Bind authentication rulescorrect
View answer
Correct Answer: D
Question #7
Which of the following descriptions about Prefix Segmente is incorrect?
A. On Huawei devices, Prefix Segment ID supports manual configuration and automatic protocol configuration
B. Prefix Segment is identified by Prefix Segment ID (SID)
C. Prefix Segment is used to identify a destination address prefix in the network
D. Prefix Segment spreads to other network elements through IGP protocol, globally uniquecorrect
View answer
Correct Answer: D
Question #8
In BGP/MPLS IP VPN deployment, the address space of a site that is shared by two VPNs must not overlap with the address spaces used by other sites of the two VPNs, there is no any risk in this scenario.
A. True
B. Falsecorrect
View answer
Correct Answer: B
Question #9
The following statement about the NSSA area is correct (multiple choice).
A. In the NSSA area where the OSPF neighbor sends hello packets, the N position 0, E within the option field Position 1
B. The NSSA zone must automatically generate a default LSA to access the external network
C. The NSSA zone generates a Category VII LSA to advertise external routing, and the FA address in the Category VII LSA acts to prevent loops
D. In the OSPF neighbor in the NSSA region sends hello packets, position 1 within the option field, position Ecorrect
View answer
Correct Answer: D
Question #10
In order to reduce the number of OSPF routes in certain areas, the OSPf protocol has developed special area functions, and the following description of the characteristics of OSPF special areas is correct
A. ASBR-Sunmary-LSA is allowed to be published to the NSSA region
B. AS-External-LSA is allowed to be published to the Stub region
C. Any OSPF zone can be configured as a special zone
D. Zone can be equipped with zhiyicorrect
View answer
Correct Answer: D
Question #11
For the same MAC address, a manually con?gured MAC entry has a higher priority than an automatically generated MAC entry.
A. Truecorrect
B. False
View answer
Correct Answer: A
Question #12
In the campus network, in order to facilitate the management of servers, printers, video surveillance and other equipment, which of the following methods is recommended for address allocation?
A. DHCP dynamically obtains a non-fixed IP address
B. Use BOOT protocol to dynamically obtain an IP address
C. Use PPPoE authentication and perform address binding during authorization
D. DHCP static address allocation based on MAC addresscorrect
View answer
Correct Answer: D
Question #13
There are three different roles in strategic linkage. Which of the following is not a role defined in strategic linkage?
A. Authentication execution point
B. Authentication Control Point
C. Policy execution pointcorrect
D. Terminal
View answer
Correct Answer: C
Question #14
As shown in the figure, PE1 and PE2 exchange private network route information with their respective CEs through OSPF, and the same domain ID is configured on PE1 and PE2. Which of the following LSA types may be transmitted to CE2 when PE2 imports BGP routes to the OSPF process?
A. ype 1 LSA
B. ype 3 LSA
C. ype 5 LSA
D. ype 7 LSA
View answer
Correct Answer: C
Question #15
Segment Routing (SR) is a technical architecture designed to forward data packets on a network based on the source routing paradigm. SR-MPLS, as its name suggests, is SR based on MPLS label forwarding.
A. True
B. False
View answer
Correct Answer: A
Question #16
Which of the following descriptions about the purpose of configuring LSP fragmentation on IS-IS equipment is correct?
A. Prevent the device from learning IS-IS routing information
B. Without any practical purpose
C. Prevent the device from establishing IS-IS neighbors
D. Allow the device to support more IS-IS routing entriescorrect
View answer
Correct Answer: D
Question #17
By default, the domain ID of an OSPF process is the same as the process ID. You can run the domain-id command in the OSPF process view to change a domain ID.
A. Truecorrect
B. False
View answer
Correct Answer: A
Question #18
As a network administrator, which of the following protocols can I use for network device configuration?
A. SSHcorrect
B. NETCONFcorrect
C. LLDP
D. SNMPcorrect
View answer
Correct Answer: ABD
Question #19
According to different network conditions, Layer 2 Portal authentication or Layer 3 Portal1 authentication can be deployed in the network. Which of the following descriptions is wrong?
A. When there is a Layer 2 network between the client and the access device, that is, the client and the access device are directly connected (or only Layer 2 devices exist between them), then Layer 2 Portal authentication can be configured
B. When using Layer 2 authentication, the access device can learn the MAC address of the client, and the access device can only use the MAC address to identify the usercorrect
C. When there is a Layer 3 network between the client and the access device, that is, there is a Layer 3 forwarding device between the client and the access device, you need to configure Layer 3 Portal authentication
D. When using Layer 3 authentication, the access device can learn the IP address of the client and use the IP address to identify the user
View answer
Correct Answer: B
Question #20
Network admission control can be deployed at di?erent network layers based on actual network requirements. Deploying it at the access layer can achieve more granular permission management and higher network security than doing so at the aggregation or core layer.
A. Truecorrect
B. False
View answer
Correct Answer: A
Question #21
Is the following description of ospf virtual links correct?
A. A virtual connection can be established in any area, after which it itself belongs to the region
B. The virtual connection ip is used as the link address
C. Virtual links can be used to solve the problem of zone 0 being segmentedcorrect
D. The cost of a virtual connection is zero and is the optimal link
View answer
Correct Answer: C
Question #22
When there are multiple redundant links in the IS-IS network, there may be multiple equal-cost routes. Which of the following descriptions about equal-cost routing in an IS-IS network is wrong?
A. When the number of equal-cost routes in the network is greater than the number configured by the command, and these routes have the same priority, the route with the larger system ID of the next hop device is preferred for load balancing
B. If load balancing is configured, the traffic will be evenly distributed to each link
C. After the equal-cost route priority is configured, when the IS-IS device forwards the traffic reaching the destination network segment, it will not adopt the load balancing method, but forward the traffic to the next hop with the highest prioritycorrect
D. For each route in the equal-cost route, a priority can be specified, the route with the highest priority will be preferred, and the rest will be used as backup routes
View answer
Correct Answer: C
Question #23
In a scenario where BGP EVPN is used to dynamically establish a VXLAN tunnel, which of the following statements is incorrect when EVPN Type 2 is used to advertise host ARP entries and IP routes?
A. Both host ARP entries and IP routes carry MAC addresses
B. Both host ARP entries and IP routes carry host IP addresses
C. Both host ARP entries and IP routes carry L2VNIs
D. Both host ARP entries and IP routes carry L3VNIs
View answer
Correct Answer: D
Question #24
Based on the information given in the figure, which of the following descriptions is correct?
A. R4 and ee8c
B. R4 does not have any IS-IS neighbors
C. R4 and ee8c
D. R4 and ee8c a0c2
View answer
Correct Answer: A
Question #25
There is an As-path-filter.ip as-path-filter 1 permit*(100l400) $, which As-path-filter can match which of the following AS_PATH Attribute? (Confirmed).
A. 300 4200correct
B. 1234 1400correct
C. 3100correct
D. 100correct
View answer
Correct Answer: ABCD
Question #26
In Huawei SD-WAN Solution, atter a CPE goes online, it automatically selects an RR without the help of iMaster NCE-WAN.
A. True
B. Falsecorrect
View answer
Correct Answer: B
Question #27
After configuring the VLAN-based MAC address drift detection function, if the MAC address drifts, you can configure the actions of the interface according to your needs. Which of the following is not a configurable action?
A. Send an alert
B. The MAC address blocks
C. Interface blocking
D. Traffic filteringcorrect
View answer
Correct Answer: D
Question #28
In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following BGP EVPN routes is used to advertise MAC addresses, ARP entries, and IRB routes?
A. ype 1
B. ype 2
C. ype 3
D. ype 4
View answer
Correct Answer: B
Question #29
In the topology shown in the following figure, OSPFv3 runs on the entire network. If no external routes are imported, which of the following types of LSAs will not be generated on R1?
A. Inter-Area-Router LSA
B. Link- LSA
C. Intra-Area-Prefix- LSA
D. Inter-Area-Prefix- LSAcorrect
View answer
Correct Answer: D
Question #30
The default priority of VRRP devices in the backup group is?
A. 0
B. 100correct
C. 150
D. 200
View answer
Correct Answer: B

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: