Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Huawei HCIE-Datacom H12-891_V1.0 Questions and answers with CertsForce

Viewing page 4 out of 10 pages
Viewing questions 31-40 out of questions
Questions # 31:

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following statements about symmetric IRB forwarding are correct?

Options:

A.

Both the ingress VTEP and egress VTEP forward packets based on the Layer 3 forwarding table.


B.

The ingress VTEP forwards packets based only on the Layer 2 forwarding table.


C.

The egress VTEP forwards packets based only on the Layer 2 forwarding table.


D.

When VTEPs forward inter-subnet user communication packets, the VNI carried in the VXLAN header is the L3VNI.


Expert Solution
Questions # 32:

According to the following information displayed on a router, which of the following are the causes of the failure in establishing an OSPF adjacency relationship?

OSPF error statistics:

    1: Hello timer mismatch

    0: Netmask mismatch

    0: Bad checksum

    0: Bad authentication type

    0: Unknown neighbor

    0: Extern option mismatch

Options:

A.

Hello packets are sent at different intervals.


B.

The area IDs are inconsistent.


C.

The IP address masks of the interfaces are inconsistent.


D.

The area types are inconsistent.


Expert Solution
Questions # 33:

On a CloudCampus virtualized campus network, virtual networks are defined based on services. Each virtual network corresponds to a service, and isolation needs to be manually configured between virtual networks.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 34:

In Huawei SD-WAN Solution, which of the following tunneling technologies is used to establish data channels?

Options:

A.

IPsec


B.

GRE over IPsec


C.

VXLAN


D.

MPLS


Expert Solution
Questions # 35:

If an engineer wants to remotely log in to a Huawei device, the engineer uses the Paramiko library to compile the following code when compiling the SSH Python script:

cli = ssh.invoke_shell()

cli.send( " screen-length 0 temporary\n " )

What is the function of screen-length 0 temporary?

Options:

A.

Performing automatic word wrap


B.

Performing split-screen display


C.

Canceling split-screen display


D.

Canceling automatic word wrap


Expert Solution
Questions # 36:

IPsec uses an asymmetric encryption algorithm to encrypt the symmetric algorithm key, which it uses to encrypt/decrypt data, ensuring security and performance.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 37:

Exhibit:

Question # 37

A loop occurs because Spanning Tree Protocol (STP) is not enabled on the network. Which of the following symptoms may occur?

Options:

A.

A loop alarm is generated on the LAN switch.


B.

CPU usage is too high.


C.

MAC entries flap.


D.

Host receives a large number of broadcast packets.


Expert Solution
Questions # 38:

Free mobility is deployed on a campus network through iMaster NCE-Campus. During this deployment, which of the following steps are performed by administrators and which are automatically performed by iMaster NCE-Campus? Drag the administrators and iMaster NCE-Campus icons on the left to the corresponding steps on the right.

Question # 38


Expert Solution
Questions # 39:

On a small- or medium-sized campus network deployed based on the Huawei CloudCampus Solution, an AR functioning as the egress gateway supports web-based network management, registration center query, and DHCP Option 148-based deployment, but does not support CLI-based deployment.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 40:

O & M personnel for a large-scale event center receive feedback about Wi-Fi access failures. iMaster NCE-CampusInsight provides the function for personnel to view packet exchange processes and locate the root cause. It is found that IP addresses in the DHCP address pool are exhausted, preventing IP addresses from being assigned to mobile terminals. Which of the following functions is used by O & M personnel in this scenario?

Options:

A.

Simulation feedback


B.

Protocol trace


C.

Issue analysis


D.

Client journey


Expert Solution
Viewing page 4 out of 10 pages
Viewing questions 31-40 out of questions