DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Latest Huawei h12-891 Free Exam Questions | SPOTO

SPOTO's latest exam dumps on the homepage, with a 100% pass rate! SPOTO delivers authentic Cisco CCNA, CCNP study materials, CCIE Lab solutions, PMP, CISA, CISM, AWS, and Palo Alto exam dumps. Our comprehensive study materials are meticulously aligned with the latest exam objectives. With a proven track record, we have enabled thousands of candidates worldwide to pass their IT certifications on their first attempt. Over the past 20+ years, SPOTO has successfully placed numerous IT professionals in Fortune 500 companies.
Take other online exams

Question #1
An interface has the following configuration: isitimerhello5level-2. Which of the following descriptions is correct?
A. The CSNP packet sending interval for Level-2 on this interface is 5s
B. The hello packet sending interval for Level- on this interface is 5s
C. The hello packet sending interval for Level -2 of this interface is 5s
D. The hello packet sending interval for Level-1 and Level-2 of this interface is both 5s
View answer
Correct Answer: C
Question #2
When an NVE encapsulates a data frame into a VXLAN packet, information of which of the following protocols is encapsulated between the outer IP header and the VXLAN header?
A. CP
B. DP
C. P
D. thernet
View answer
Correct Answer: B
Question #3
Which of the following descriptions of Underlay in VXLAN virtualized campus applications is wrong?
A. When using IMaster NCE-Camspus to implement automatic orchestration of Underlay network routing domains, only OSPF routing protocol is supported
B. The virtualized campus solution uses VXLAN technology and adopts MAC IN UDP encapsulation method to virtualize a layer of logical network on the traditional IP network
C. The underlay network implements IP reachability so that VXLAN-encapsulated service packets can be communicated between VTEP nodes
D. When using IMaster NCE-Campus to implement automatic orchestration of Underlay network routing domains, only single-area deployment of routing protocols is supported
View answer
Correct Answer: D
Question #4
Regarding the description of the permanent multicast address, the error is ?
A. AAll routers running the PIM protocol listen on 22400100
B. BAll routers listen on 224002
C. CAll hosts and routers in the network segment listen on 224001
D. DAll routers running the OSPF protocol listen to 224005
View answer
Correct Answer: A
Question #5
In the use of the CP protocol, the following description is correct?
A. The Eth-Trunk interface can be avoided by frequent oscillation interface eth-trunkllacppreemptenablelacppreemptdelaydelay-time by following commandcorrect
B. Source A address can be configured for load sharing in an enabled link aggregation group with the following command: interface eth-trunk 110ad-balance src-dst-ip
C. A member interface can be removed from an enabled link aggregation group with the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 undo eth-trunk 1 interfaceGigabitEthernet0/0/1undoshutdown
D. The member interface can be joined in the link aggregation group by enabling the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 trunkport
View answer
Correct Answer: A
Question #6
For scenarios where advanced security functions such as UR filtering, IPS, security defense, and AV anti-virus need to be supported, and multi-link uplink needs to be supported, which of the following can be selected for the egress device?
A. FWcorrect
B. AC
C. AP
D. AR
View answer
Correct Answer: A
Question #7
IS-IS is a link-state routing protocol that uses the SPF algorithm for route calculation. As shown in the figure, a campus deploys both IPv4 and IPv6 and runs IS-IS to achieve network interconnection. R2 only supports IPv4.
A. If you want IPv4 and IPv6 network computation to form the same shortest path tree, you need to run the ipv6 enable topology ipv6 command to enable the IPv6 capability in the IS-IS process
B. By default, since R2 does not support IPv6, in the shortest path tree formed by IPv6 network calculation, the path from R1 to R4 is: R1-R3-R4
C. By default, IPv4 and IFv6 networks will be calculated separately to form different shortest path trees
D. By default, in the shortest path tree formed by IFv6 network calculation, the path from R1 to R4 is R1-R2-R4
View answer
Correct Answer: D
Question #8
In different scenarios, RSTP provides different protection functions. Which of the following is wrong?
A. For a designated port with root protection enabled, its port role can only remain as a designated port
B. After enabling the anti-TC-BPDU packet attack function, the number of times the switching device processes IC BPDU packets within a unit time can be configured
C. After the BPDU protection function is enabled on the switching device, if the edge port receives RST BPDU, the edge port will be set as a non-edge port and the spanning tree calculation will be re-calculated
D. Enable root protection on the designated port
View answer
Correct Answer: C
Question #9
There is an As-path-filter.ip as-path-filter 1 permit*(100l400) $, which As-path-filter can match which of the following AS_PATH Attribute? (Confirmed).
A. 300 4200correct
B. 1234 1400correct
C. 3100correct
D. 100correct
View answer
Correct Answer: ABCD
Question #10
Which of the following IEEE standards is specific to Gigabit Ethernet?
A. 8023zcorrect
B. 8023abcorrect
C. 8023ad
D. 8023af
View answer
Correct Answer: AB
Question #11
In the scenario of dynamically establishing a VXLAN tunnel through BGP EVPN, which of the following descriptions about the role of BGP EVPN Type3 routing is wrong?
A. Type3 routing transmits Layer 2 VNI and VTEP IP address information
B. When the Type3 routing VTEP IP address is reachable at Layer 3, if the peer VNI is the same as the local end, create a head-end replication table for subsequent BUM packet forwarding
C. Type3 routing will carry L3 VNIcorrect
D. If the VTEP IP address carried by the received Type3 route is reachable by Layer 3 routes, a VXLAN tunnel will be established to the opposite end
View answer
Correct Answer: C
Question #12
After configuring the VLAN-based MAC address drift detection function, if the MAC address drifts, you can configure the actions of the interface according to your needs . Which of the following is not a configurable action?
A. Send an alert
B. The MAC address blocks
C. Interface blocking
D. Traffic filteringcorrect
View answer
Correct Answer: D
Question #13
VXLAN identi?es tenants using VNIs, which are 24 bits long. A tenant can have one or more VNIs, and VXLAN supports a maximum of 12 million tenants.
A. True
B. Falsecorrect
View answer
Correct Answer: B
Question #14
In the Huawei SD-WAN solution, which of the following routing protocols are used to transmit VPN routes between CPEs?
A. BGPcorrect
B. RIP
C. SPF
D. IS-IS
View answer
Correct Answer: A
Question #15
Which of the following does not belong to the scope of dynamic data collection on the live network before cutover?
A. Routing Protocol Status
B. ARP entry
C. Port Statuscorrect
D. SNMP version
View answer
Correct Answer: C
Question #16
OSPF fast convergence is an extended feature designed to speed up route convergence. When the network topology changes, partial route calculation (PRC) recalculates routes only for a?ected nodes, speeding up route calculation.
A. Truecorrect
B. False
View answer
Correct Answer: A
Question #17
Which of the following descriptions about "security group" and "resource group" is wrong in Business Travel?
A. The resource group supports static binding of IP addresses or address segments
B. On iMaster NCE-Campus, the UCL group is the security group
C. The any group can be used as both a source group and a destination groupcorrect
D. The security group supports static binding of IP addresses or address segments
View answer
Correct Answer: C
Question #18
There are multiple protocols that can change or obtain network device data. Which of the following protocols cannot be used to change network device data?
A. SNMP
B. NETCONF
C. RESTC NF
D. IPseccorrect
View answer
Correct Answer: D
Question #19
SSH uses asymmetric encryption algorithms AES and DES to achieve security for data transmission, and uses HMAC to ensure the complete integrity of integer data
A. TRUEcorrect
B. FALSE
View answer
Correct Answer: A
Question #20
result :(moloteric question).
A. When sending a packet with a destination address of 4444, it is sent without labeling
B. When the router receives a packet with the label 1024, it replaces the label with 1027 and sends it
C. When a packet with a destination address of 2222 is sent , it is sent without labeling
D. When sending a packet with a destination address of 3333, label 1026 and send it
View answer
Correct Answer: C
Question #21
To allow only authorized users (users who obtain IP addresses through authorized DHCP servers or use specified static IP addresses) to access the network shown in the figure, which of the following solutions can be used?
A. DAI + Port Security
B. DHCP Snooping + IPSG
C. DHCP Snooping + DAI
D. DAI + IPSG
View answer
Correct Answer: B
Question #22
Which of the following is used to implement inter-subnet communication on a VXLAN network and allow access from a VXLAN network to an external non-VXLAN network?
A. LAN IF interface
B. VE interface
C. ayer 2 VXLAN gateway
D. ayer 3 VXLAN gateway
View answer
Correct Answer: D
Question #23
As shown in the figure is the output information of a network engineer when troubleshooting OSPF faults.
A. Hello message sending intervals are inconsistent
B. Authentication passwords are inconsistent
C. The IP address masks of the interfaces are inconsistentcorrect
D. Inconsistent area types
View answer
Correct Answer: C
Question #24
The RF function of the BGP protocol can control the routing entries sent by the neighbors. Which of the following tools does a BGP router need to use for this purpose?
A. Filter-Policy
B. IP Prefix Listcorrect
C. ACL
D. Route-Policy
View answer
Correct Answer: B
Question #25
In different scenarios, RSTP provides different protection functions, and the wrong statement about this statement is
A. The root protection feature is enabled for the specified port, and its port role can only remain as the specified port
B. When the anti-TC-BPDU packet attack feature is enabled, the number of times the switching device processes IC BPDU packets per unit time is configurable
C. after the BPDU protection function is enabled on the switching device, if the edge port receives RST BPDU, the edge port will be set to a non-remote port and the spanning tree calculation will be re-performedcorrect
D. Start the specified port of root protection, when the port receives a better RSTBPDU, the port will enter the Discarding state and is no longer forwarding packets
View answer
Correct Answer: C
Question #26
If you need to configure routing policies on one router. Which of the following parameters does an administrator use to route when deploying a routing policy?( Multiple select).
A. AProtocol
B. BApplication
C. CSize of the packet
D. DThroughput
E. EIdentification of a specific terminal system
View answer
Correct Answer: ABCE
Question #27
Portal authentication is also called Web authentication. Users can authenticate user identities through the Web authentication page. Which of the following descriptions of Porta1 authentication is wrong?
A. Generally, Portal authentication does not require the installation of specialized client software, so it is mainly used in terminal access scenarios that do not require client software
B. Porta1 authentication can authenticate users based on the combination of user name, VLAN, IP address, and MAC address
C. When Porta1 authentication is deployed on the network, the authenticated client needs to support the Porta1 protocol
D. Before performing Porta1 authentication, the client must obtain an IP address and the IP address must be reachable with the Porta1 server
View answer
Correct Answer: C
Question #28
As shown in the figure, in the HUB & Spoke networking mode of MPLS BGPVPN, in order to achieve the division can only communicate with the headquarters, the division can not communicate with each other When setting up RT, which of the following scenarios is this?( Radio).
A. A???:import Target:12:3EpodTarget:12:3
B. BHeadquarters: importTarget:1:1EpodTarget:3:3
C. CHeadquarters: Impot Target:2:2; Expor Target:3:3
D. DHeadquarters: importTarget: 12:3EpodTarget: 3:12
View answer
Correct Answer: D
Question #29
As shown below, what routes will R2 learn?( Single choice questions).
A. R2 can learn the 101
B. R2 can learn the 101
C. R2 can receive an LSP for R1, but cannot join to the routing table
D. R2 can learn all routes to R1
View answer
Correct Answer: D
Question #30
SR-MPLS Policy needs to introduce business traffic into the tunnel for forwarding. If there are different business traffic going to the same destination address, in order to better ensure the quality of different services, which of the following traffic diversion methods is best to use?
A. Drainage based on quintuple
B. Driving traffic based on End Point
C. Traffic diversion based on DSCPcorrect
D. Driving traffic based on Color
View answer
Correct Answer: C

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: