Labour Day Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

Note! The H12-261_V3.0 Exam is no longer available.

H12-261_V3.0 HCIE-Routing & Switching (Written) V3.0 Questions and Answers

Questions 4

If there is no default route in the local IP routing table, use default-route The import command will advertise the default route to the BGP peer (group).

Options:

A.

True

B.

false

Buy Now
Questions 5

BGP4+ carries the next-hop address of the IPv6 route through the next-Hop attribute in the Update packet.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 6

If a Huawei switch runs the RSTP protocol, when will the BPDUs on a port of the switch be aged out?

Options:

A.

On an interface, RSTP does not age out BPDUs

B.

after more than 6 seconds.

C.

existAfter MaxAge times out

D.

existHello after time out

E.

existForward After Delay times out

Buy Now
Questions 7

As shown in the figure, private network routing information is exchanged between PE1 and PE2 and their respective CEs through SPF, and the same Domain ID is declared on both PE1 and PE2. When importing routes from BGP to OSPF on PE2, which of the following types of LSAs may be delivered to CE2?

Options:

A.

Type5 LSA

B.

Type7 LSA

C.

Type3 LSA

D.

Type1 LSA

Buy Now
Questions 8

A medium-sized campus network manages the network through the SNMP protocol. The campus has high network security. Which version of SMMP is recommended for management?

Options:

A.

SNMPV1

B.

SNMPV2C

C.

SNMPV3

D.

All versions can be implemented

Buy Now
Questions 9

When there are multiple redundant links in the IS-IS network, there may be multiple equal-cost routes. Which of the following statements is false about equal-cost routing within an IS-IS network?

Options:

A.

If load balancing is configured, the traffic will be evenly distributed to each link

B.

When the number of equal-cost routes in the network is greater than the number configured by the command, and the priority of these routes is the same, the route with the larger System ID of the next hop device is preferred for load balancing

C.

For each route in the equal-cost route, a priority can be specified, the route with higher priority will be preferred, and the rest will be used as backup routes

D.

After the equal-cost route priority is configured, when the IS-IS device forwards the traffic reaching the destination network segment, it will not adopt the load balancing method, but forward the traffic to the next hop with the highest priority

Buy Now
Questions 10

Which of the following descriptions about the RD attribute filter of BGP is correct?

Options:

A.

If not configuredRD-filter. However, if this RD-filter is used for filtering, the matching result is deny.

B.

If configuredRD-filter, but the RD of the route does not match any of the RDs defined in the rule, the default matching result is permit.

C.

Multiple rules are matched according to the configuration order.

D.

RD-filter Between configured rules is always "or"Relationship.

Buy Now
Questions 11

Which of the following statements about MSTP is correct?

Options:

A.

Compared with RSTP, MSTP has more port roles.

B.

The BPDU format of MSTP is the same as that of RSTP.

C.

MSTP can realize load sharing of traffic between different VLANs

D.

MSTP supports compatible operation with RSTP

Buy Now
Questions 12

Which of the following is not the main function of NDP?

Options:

A.

Duplicate address detection

B.

Neighbor status tracking

C.

Path MTU discovery

D.

Address resolution

Buy Now
Questions 13

ICMPv6 has two types of error message (Error Messages) and information message (Information Messages).

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 14

If multiple candidate RPs are configured in a multicast group, which of the following parameters need to be compared to elect the RP of this group from the multiple candidate RPs?

Options:

A.

matches the address of the group the user joinedGroup-wide mask length for C-RP services

B.

C-RP priority

C.

IP address of the C-RP interface

D.

Number of the C-RP interface

Buy Now
Questions 15

How 802.1w and 802.1D handle BPDU's? ( confirmed)

Options:

A.

802.1D bridges only forward BPs received from the root bridgeDU message

B.

802.1D bridge will not forward BPDU message

C.

802.1The w bridge only forwards BPDUs received from the root bridge

D.

802.1w Bridges do not forward BPDUs

Buy Now
Questions 16

In the process of using the LACP protocol, which of the following descriptions is correct? (multiple choice)

Eth can be avoided by-Trunk interface frequently flaps interface due to physical link eth-trunk 1

lacp preempt enable

lacp preempt delay delay-time

You can configure the source IP address for load balancing in an enabled link aggregation group through the following commands: interface eth-trunk 1

load-balance src-dst-ip

Member interfaces can be removed from an enabled link aggregation group with the following command: interface GigabitEthermet0/0/1 shutdownwn

Options:

A.

interface GigabitEthernet0/0/1 undo eth-trunk 1

B.

interface GigabitEthernet0/0/1 undo shutdownwn

C.

Member interfaces can be added to a link aggregation group enabled by the following command: interface GigabitEthermet0/0/1 shutdownwn

D.

interface GigabitEthernet0/0/1 trunkport GigabitEthernet0/0/1 interface GigabitEthermet0/0/1 undo shutdownwn

Buy Now
Questions 17

NO: 236

As shown in the figure, redundant links are used to establish IPse between the branch and the headquartersc VPN, and enable traffic from branch 1 on Router_B at the same time URPF, which of the following statements is true?

H12-261_V3.0 Question 17

Options:

A.

When using IPsec master and backup link redundancy backup, enable it on the physical interfaceURPF function, it is recommended to use URPF loose mode.

B.

When using IPsec multi-link redundancy backup, it is possible toURPF function, you can use URPF strict mode

C.

When using IPsec multi-link redundancy backup, enable it on the tunnel interfaceURPF function, you can use URPF strict mode.

D.

When using IPsec master and backup link redundancy backup, enable it on the physical interfaceURPF function, you can use URPF strict mode.

Buy Now
Questions 18

Regarding the authentication of the ISIS protocol, the correct statement is:(multiple choice)

Options:

A.

Interface authentication can be used to authenticate Level-1 and Level-2 hello packets

B.

After interface authentication is configured, the IIH sent by the router must carry the authentication TL.V

C.

After configuring the area authentication, the IIH, S sent by the routerNP, LSP must be connected with certified TLV

D.

If the two routers are configured for area authentication and interface authentication respectively, and the passwords are the same, the two routers can establish a neighbor relationship.

Buy Now
Questions 19

Regarding the stub area in the OSPF protocol, the following statements are correct:

Options:

A.

ASBR cannot be stored in stub area.

B.

Virtual connections cannot pass through stubsarea.

C.

Type injection is not allowed in stub area7 LSA

D.

The backbone area cannot be configured as a stubarea.

Buy Now
Questions 20

As shown in the figure, a company has built an OSPF network. The links in the figure all form an OSPF adjacency relationship, and all OSPF devices announce their own loopback interface addresses. One day, the two links of S1-R2 and S2-R1 suddenly failed. In order to check whether the network is running normally, the engineer checked the equipment status. Which of the following descriptions is correct?

H12-261_V3.0 Question 20

H12-261_V3.0 Question 20

Options:

A.

R5 can learn the loopback route of R2 normally

B.

R3 cannot learn the loopback route of R2

C.

R1 can normally learn the loopback route of R2

D.

R3 can learn the loopback route of R2 normally

Buy Now
Questions 21

divide an interface of the firewall into Untrust After the security domain, the interface belongs to Untrust Area, no longer a Local area.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 22

As shown in the following topology diagram, all interfaces of the router in the figure enable the ISIS protocol. The following statements are correct (multiple choices))

H12-261_V3.0 Question 22

Options:

A.

if the Ethernet0/0/0 interface of R1 is down, then R2 will become the master device

B.

if the Ethernet0/0/1 interface of R1 is down, then R2 will become the master device

C.

if the GE0/0/0 interface of R3 is down, then R2 will become the master device

D.

if the Ethernet0/0/0 interface of R3 is down, then R2 will become the master device

Buy Now
Questions 23

In order to allow routers at both ends of an IPv6 over IPv4 manual tunnel to exchange routing information, OSPFv3 can be enabled on the tunnel, OSPFv3 will be able to form a neighbor relationship normally, and the tunnel interface will be regarded as a P2P link interface.

Options:

A.

TRUE

B.

False

Buy Now
Questions 24

OSI Reference Model and which layers in the TCP/IP model are common? (multiple choice)

H12-261_V3.0 Question 24

Options:

A.

session layer

B.

data link layer

C.

transport layer

D.

presentation layer

E.

physical layer

F.

application layer

Buy Now
Questions 25

The security protection actions that can be performed by a secure MAC address do not include which of the following?

Options:

A.

Shutdown

B.

Remark

C.

Restrict

D.

Protect

Buy Now
Questions 26

Which of the following descriptions about VRRP load sharing is correct?

Options:

A.

When configuring priorities, make sure that the same router is the master in the RRP backup group

B.

Multiple VRRP backup groups can be created on an interface of a router. The router can be used as both the master of a VRRP backup group and the backup of other VRRP backup groups

C.

When deploying load balancing, the hosts on the same local area network are required to be configured with the IP addresses of different virtual routers as the default gateway addresses.

D.

VRRPLoad balancing requires at least two virtual routers to provide forwarding services at the same time

Buy Now
Questions 27

OSPThe Option field in Fv3 appears in all LSAs

Options:

A.

True

B.

false

Buy Now
Questions 28

Which description is correct about BGP reflector?

Options:

A.

In the case of no route reflector, the IBGP neighbor relationship needs to be fully interconnected. The introduction of route reflectors can reduce the requirements for full interconnection

B.

A route reflector can-The route learned by the client is advertised to all clients

C.

A route reflector can advertise routes learned from a client to other clients and non--client

D.

Route reflectors can advertise routes learned from IBGP neighbors to all clients and non-client

Buy Now
Questions 29

Since BGP is an EGP routing protocol, BGP routing policies can only be deployed between EBGP neighbors, and it is invalid to deploy routing policies between IBGP neighbors

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 30

Router A has an IP routing entry with the destination network segment 10.0.0.1/32 and the outbound interface GigabitEthernet0/0/1. Now add the following configuration: acl numberr 2000

rule 10 permit source 10.0.1.1

traffic classifier test if-match acl 2000 traffic behavior test remark dscp cs3

traffic policyy test classifier test behavior test interface GigabitEthermet0/0/1

ip address 10.0.12.1 255.255.255.0

traffic-policy test outbound

Assuming that router A receives a packet with destination IP 10.0.0.1, which of the following statements are correct:

Options:

A.

If the source IP address of the packet is 10.0.1.2, it can be forwarded, and at the same timeDSCP field is marked as CS3

B.

If the packet source IP address is 10.0.1.1, it can be forwarded, and the DSCP field is marked as CS3

C.

If the source IP address of the packet is 10.0.1.2, it cannot be forwarded

D.

If the source IP address of the packet is 10.0.1.2, it can be forwarded, and at the same timeDSCP field remains unchanged

Buy Now
Questions 31

In order to configure AAA, we first need to defineRADIUS server. The definition of a RADIUS server is as follows: [Huawei]radius- server template EXAM

[Huawei-radius- EXAM]radius-server shared-key cipher HUAwei123 [Huawei-radius- EXAM]radius-server authenticationn 10.7 66.66 1812

[Huawei-radius- EXAM]radius-server authorization 10.7.66.66 1812

[Huawei-radius- EXAM]radius-server accounting 10.7.66.66 1813 [Huawei-radius- EXAM]radius-server retransmit 2

Options:

A.

True

B.

false

Buy Now
Questions 32

What is the most efficient way to pass view device alarms via CLI?

Options:

A.

display alarm

B.

display current- configuration

C.

display interface brief

D.

display clock

Buy Now
Questions 33

In an IPv6 network, two nodes A and B are neighbors to each other. If node A sends an NS message to node B, and if node B replies with an NA message after receiving the message, check on node A to see what the neighbor status will be. ? .

Options:

A.

Reachable

B.

Incomplete

C.

Stale

D.

Probe

Buy Now
Questions 34

What is the difference between traffic policing and traffic shaping?

Options:

A.

Use traffic shaping in the ingress direction and traffic policing in the egress direction

B.

For traffic shaping, routers buffer excess packets until bandwidth is available again

C.

Traffic policing uses the token bucket algorithm, and traffic shaping uses the SPD algorithm

D.

For traffic policing, it can be more thanCIR Traffic Adjustment Buffer Usage

E.

For traffic shaping, can be more thanCIR Traffic Adjustment Buffer Usage

Buy Now
Questions 35

When deploying BGP/MPLS IP VPN, the OSPF VPN Route Tag (VPN Route Tag) is not transmitted in the extended community attribute of MP-BGP, it is only a local concept, and only the PE that receives the MP-BGP route and generates OSPF LSA Makes sense on the router.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 36

Which of the following tools cannot beRoute if in policy-match clause directly quoted?

Options:

A.

Regular expression

B.

IP-prefix

C.

AS-path-filter

D.

Community-filt

Buy Now
Questions 37

Compared with IGMPv1, what improvements have the IGMPv2 protocol made?? (multiple choice)

Options:

A.

Added maximum response time field

B.

Added out-of-group packets

C.

Added specific group query message

D.

Added specific source group query packets

Buy Now
Questions 38

OSPIn Fv3, the Router-LSA is generated for each router, which describes the interface address and cost of each link of the router, and also includes the RouterID of the neighboring router.

Options:

A.

True

B.

false

Buy Now
Questions 39

As shown below, which routes will R2 learn? ( confirmed)

H12-261_V3.0 Question 39

Options:

A.

R2 can learn two routes, 10.1.2.0/24 and 10.1.3.0/24.

B.

R2 can learn the route 10.1.1.0/24.

C.

R2 can receive the LSP of R1, but cannot add it to the routing table.

D.

R2 can learn all routes of R1.

Buy Now
Questions 40

The MSTP switch regards the RSTP switch as an MSTP domain composed of a single switch, and the MSTP switch parses the RSTBPDU into MSTBPDU, where the IRPC is 0.

Options:

A.

True

B.

false

Buy Now
Questions 41

IPv6 Link-local addresses can be generated by stateless autoconfiguration

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 42

Which of the following statements about the format of OSPFv3 packets is correct?? (multiple choice)

Options:

A.

OSPF version number changed from 2 to 3

B.

There is no change in the option field of the He11o packet

C.

Hello packets no longer contain address information and carry Interface ID

D.

Removed Authentication, Auth Type field

Buy Now
Questions 43

N NO: 200

You want to set the DSCP value for VoIP traffic in the HW network device to EF. According to the Differentiated Services Model RFC, the traffic marking EF should be set to:

Options:

A.

DSCP set to decimal 36

B.

IP ToS is set to 0xEF

C.

IP Experimental EEN

D.

DSCP set to decimal 5

E.

bitstream 101110

Buy Now
Questions 44

Which of the following statements about the VRRP protocol is correct?

Options:

A.

Both VRRPv2 and VRRPv3 support authentication

B.

VRRPv3 does not support the authentication function, while VRRPv2 supports the authentication function.

C.

VRRPv2 is only applicable to IPv4 networks, and VRRPv3 is only applicable to IPv6 networks.

D.

Masterr The owner of the IP address VThe RP priority is 255, so the configurable priority range is 0-254

Buy Now
Questions 45

four routers running IS-IS And the adjacency relationship has been established, the area number and router level are marked in the figure, in R1 Configure routing penetration on the device, thenR4 arrive 10.0.2.2/32 ofCcost What is the value? (Singleselect)

H12-261_V3.0 Question 45

Options:

A.

30

B.

80

C.

50

D.

40

Buy Now
Questions 46

What is the multicast protocol that can generate a multicast distribution tree?

Options:

A.

IGMPv2

B.

BGP

C.

OSPF

D.

PIMv2

Buy Now
Questions 47

In addition to stateless address autoconfiguration, IPV6 devices can alsoDHCPv6 obtains information such as address, gateway, DNS, etc.

Options:

A.

True

B.

false

Buy Now
Questions 48

If there is a LAN running 802.1D Spanning Tree Protocol, which of the following parameters will not be received by a non-root switch from the root switch? ( confirmed)

Options:

A.

MaxAge

B.

root cost

C.

Forward delay

D.

Hold time

E.

Hello time

Buy Now
Questions 49

A router receives a message with a community attributeNo-Export BGP route, how will the router handle this BGP route?

Options:

A.

Discard the route directly.

B.

It is no longer advertised to other BGP routers.

C.

Advertise to IBGP onlyneighbour.

D.

The route is advertised normally, but the route is not used to forward data.

Buy Now
Questions 50

A company consists of a head office and two branch offices, and uses MPLS VPN technology to transmit private network routes. In the Hub&Spoke networking mode, the branch office can only send and receive routes with the head office, and the branch offices cannot directly send and receive routes to each other. In order to achieve the above requirements, which of the following schemes can the RT settings be?

Options:

A.

Head Office: Import Target: 1:1; Export Target: 3:3. Branch 1: Import Target:3:3: Export Target:1:1. Branch 2 Import Target: 3: 3; Export Target: 2: 2

B.

Head Office: Import Target: 2:2; Export Target: 3:3. Branch 1: Import Target:3:3; Export Target:1:1. Branch 2: Import Target: 3: 3; Export Target: 2: 2

C.

Head Office: Import Target: 12:3; Export Target: 3:12. Branch 1: Import Target: 3:12; Export Target: 12:3. Branch 2: Import Target: 3: 12; Export Target: 12: 3

D.

Head Office: Import Target:1:1,2:2; Export Target:3:3. Branch 1: Import Target:3:3;

Export Target: 1:1. Branch 2: Import Target: 3: 3; Export Target: 2: 2

Buy Now
Questions 51

OSPRouter in F Lin included in LSAk What are the types of Type? (Multiple Choice)

Options:

A.

StubNet

B.

P-2-P

C.

Vlink

D.

TransNet

Buy Now
Questions 52

You need to configure policy routing on the router to specify that specific traffic should be forwarded through an interface. When using policy-based routing, which two

The most typical information that can be used to forward traffic along a specific path?

Options:

A.

packetTTL and source IP address

B.

source IPaddress and Layer 2 source address

C.

Source IP address and specific protocol(such as FTP, HTTP Wait)

D.

Type of Service header and message length

Buy Now
Questions 53

Assuming that the neighbor relationship between BGP routers has been established successfully, the configuration on R1 is as shown in the figure. Which router is the route entry 10.10.10.0/24 advertised by R1 delivered to the farthest?

H12-261_V3.0 Question 53

Options:

A.

R1

B.

R2

C.

R3

D.

R4

Buy Now
Questions 54

Which scenarios can use AS-path-filter?

Options:

A.

A carried by routeSPATH attribute to filter routes received from BGP neighbors. For example the command peer xxxx as-path-fliter import

B.

Route apply clause in policy

C.

A carried by routeSPATH attribute to filter routes sent to BGP neighbors. For example the command peer xxxx as-path-ilter export

D.

if-match clause in Route-policy

Buy Now
Questions 55

IBGP was established on two Between directly connected devices of neighbors, if the shutdown command is executed to shut down the interface of one of the devices, the BGP connection will not be disconnected immediately.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 56

The HTTP protocol is based on TCP, so TCP can be used Flood attack defense method defends HTTP Flood attack.

Options:

A.

True

B.

false

Buy Now
Questions 57

BGP routing policy can control the publishing and receiving of routes

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 58

The following descriptions about routing policies and policy routing are correct:

Options:

A.

Policy routing mainly controls the forwarding of packets, that is, it can forward packets without following the routing table. B. Policy routing mainly controls the import, publication, and reception of routing information.

B.

The routing policy mainly controls the import, publication and reception of routing information

C.

The routing policy is mainly to control the forwarding of packets, that is, it is not necessary to forward packets according to the routing table

Buy Now
Questions 59

Bandwidth parameters need to be configured when deploying LLQ. What is the significance of the bandwidth parameters?

Options:

A.

Provides a built-in policer to limit the maximum available bandwidth for low-latency queues during times of congestion

B.

This parameter should be as small as possible. It means that the bandwidth is always reserved, even if LLQ is used, this parameter will reduce the available bandwidth of the interface

C.

It means reference CIR to calculate burst size of built-in policer token bucket

D.

This parameter is optional because LLQ always takes precedence over other queues

Buy Now
Questions 60

aboutMPLSBasic forwarding process, which of the following descriptions is wrong? (single choice)

Options:

A.

The transmission node device will replace the existing stack top label (outermost label) with the label allocated by the next hop device.

B.

When IP Packet enters MPLS domain, check the destination IP Tunne corresponding to the addressl ID Is the value 0x0 if Tunnel ID value is 0x0, then enter MPLS forwarding process.

C.

when IP Packet enters MPLS domain, MPLS The boundary device is in the packet layer 2 header and IP Insert a new label between the headers

sign.

D.

By default, PHP is supported Egress The label value assigned by the node to the penultimate hop node is 3.

Buy Now
Questions 61

A family user has opened a 10Mb/s bandwidth. In order to improve the user experience, the user can stabilize the speed at 12Mb/s.We use the token bucket technique to achieve this requirement, which of the following is optimal.

Options:

A.

cir 10000 pir 12000

B.

cir 10000 cbs 12000 pbd 12000

C.

cir 8000 pir 12000

D.

cir 10000 cbs 10000 pbs 12000

Buy Now
Questions 62

Which of the following descriptions is correct about the MPLS processing mode for TTL?

Options:

A.

in Pipe mode. When an IP packet passes through an MPLS network, at the ingress node, IP TTL minus 1 maps to MPLS TTL field.

B.

in the MPLS labelTTL, which has the same meaning as the TL field in the IP header. TTL can prevent routing loops in MPLS networks.

C.

In Unifor mode, when IP packets pass through the MPLS network, the TTL minus 1. MPLS The TTL field is a fixed value.

D.

in MPLS In VPI, if you want to hide the structure of the MPLS backbone network, you can use the IngUni on ress form mode.

Buy Now
Questions 63

What type of prefixes a router running BGP will advertise to its IBGP neighbors (assuming the router is not configured as a route reflector) ?

Options:

A.

The prefix is learned through other IBGP neighbors, or the prefix is learned from EBGP neighbors, or the prefix is learned through route importarrived

B.

Prefixes that exist in the routing table

C.

The prefix is learned through other BGP neighbors, or the prefix is locally through network or route introduction learned

D.

The prefix is learned via EBGP neighbors, or the prefix is locally via network or route introduction learned

E.

The prefix is learned from EBGP neighbors, or the prefix is learned from RR

Buy Now
Questions 64

There is a network consisting of router R1, router R2, router R3 and router R4. The 4 routers are interconnected through a LAN network. All 4 routers have basic oSPF deployed. When you execute the command "display ospf peer" on the router R2, find the router R2 and the route

Options:

A.

device the state between R3 is "2-way". So what can you conclude from this output?

Router R2 is not a DR

B.

Router R3 is not a DR, nor a BDR

C.

router there is no full adjacency between R2 and router R3

routerR4 is DR

D.

Router R2 is DR or BDR

Buy Now
Questions 65

Level-1-2 IS will transmit Level-1 to the Level-1 area2 LSP, if Level-2 The ATT bit in the LSP is 1, which means the Level in the area-1 IS can pass Level-1-2 IS to external area

Options:

A.

True

B.

false

Buy Now
Questions 66

BGPAfter importing routes from other protocols, the next hop in the BGP routing table is the same as the next hop of the imported routing protocol.

Options:

A.

True

B.

false

Buy Now
Questions 67

H12-261_V3.0 Question 67

Options:

A.

R2 is in the area 0 generated inType3 LSAcontains 10.0.2.2/32routing information

B.

R2 is in the area 0 generated inType2 LSAcontains 10.O.2.2/24routing information

C.

R2 is in the area 0 generated inType1 LSAcontains 10.0.2.2/32routing information

D.

R2 is in the area 0 generated inType5 LSAcontains 10.0.2.2/32routing information

Buy Now
Questions 68

Options:

A.

MPLS system has many kinds of label publishing protocols, such as LDP is a kind of label publishing protocol

B.

MPLS supports single-layer labels and multi-layer labels

C.

the label is a fixed-length identifier with only local significance, used to uniquely identify the FEC to which a packet belongs

D.

the label is carried by the header of the MPLS packet, and has global significance, that is, the label value of all routers cannot be repeated

Buy Now
Questions 69

SSH uses asymmetric encryption algorithms AES and DES to realize the security of data transmission, and uses HMAC to ensure the security of data transmission.

Integrity check for data integrity

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 70

Regarding Layer 2 VPN technology, which of the following statements is correct?

Options:

A.

VPLS is a technology widely used in the existing network, which can provide transparent transmission of Layer 3 packets and realize multi-point access.

B.

The VPLS configuration is complex, and the Layer 2 network transparently transmits BUM packets.

C.

BGP EVPN supports tenant isolation, Multi-homing and broadcast suppression and other functions.

D.

BGP EVPN solves the problems of MAC address flapping and multi-tenancy that VPLS cannot support.

Buy Now
Questions 71

The router connects two EBGP neighbors through two parallel serial cables, what method would you use to achieve this through the two parallel serial cablesBidirectional burden sharing between two connected EBGP neighbors?

BGP automatically implements load balancing of traffic among different autonomous systems on available links without using any method

Options:

A.

Use the loopback interface to establish an EBGP neighbor relationship and configure EBGP Multi-hop, configure the loopback interface as the update source, and then use IGP to achieve equal-cost path load sharing between loopback addresses)

B.

To configure the EBGP neighbor relationship with the loopback interface as the update source, the IGP in each AS needs to introduce two equal-cost paths to the EBGP neighbor loopback interface address; and you need to use the command "next-hop-local"

C.

Use the command "ebgp-load on both ends"-balance"

D.

To configure the EBGP neighbor relationship with the loopback interface as the update source, the IGP in each AS needs to introduce two equal-cost paths to the EBGP neighbor loopback interface address; and you need to use the command"ebgp-maxhop" and "next-hop-local"

Buy Now
Exam Code: H12-261_V3.0
Exam Name: HCIE-Routing & Switching (Written) V3.0
Last Update: Dec 11, 2023
Questions: 479