Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

H12-821_V1.0 HCIP-Datacom-Core Technology V1.0 Questions and Answers

Questions 4

If the interval for two consecutive packets of a TCP session reaching the firewall is longer than the aging time of the session, the firewall deletes the session information from the session table to ensure network security.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 5

Which of the following statements regarding the firewall zone security level is false?

Options:

A.

The configured security level cannot be changed.

B.

Two zones cannot be configured with the same security level.

C.

The default security level of the new zone is 1.

D.

Only the security level of the user-defined zone can be configured.

Buy Now
Questions 6

An edge port is a new port role added to RSTP to overcome the disadvantages of STP. Which of the following statements is false about this port role?

Options:

A.

The port does not participate in RSTP calculation.

B.

The port can directly enter the Forwarding state from the Discarding state.

C.

After receiving a configuration BPDU, the port is still in the Forwarding state.

D.

The Up and Down states of the port do not cause network topology changes.

Buy Now
Questions 7

An IP prefix list is a common matching tool used in routing policies. Which of the following cannot be configured as matching conditions in an IP prefix list on a Huawei router?

Options:

A.

Port number

B.

Mask

C.

Action

D.

Index

Buy Now
Questions 8

In which of the following scenarios can a neighbor relationship not be established between two directly connected Huawei routers after IS-IS is configured?

Options:

A.

The two routers are Level-2 routers with the same area address, and the interfaces connecting them are on the same network segment.

B.

One router is a Level-1 router, and the other router is a Level-2 router.

C.

The two routers are Level-2 routers and have different area addresses.

D.

The two routers are Level-1 routers and have different area addresses.

Buy Now
Questions 9

Which of the following statements regarding routing policy and policy-based routing are true?

Options:

A.

A routing policy is used to control import, advertisement, and receiving of routing information.

B.

Policy-based routing is used to control import, advertisement, and receiving of routing information.

C.

Policy-based routing is used to control packet forwarding without following routes in the routing table.

D.

A routing policy is used to control packet forwarding without following routes in the routing table.

Buy Now
Questions 10

What parameters can a DHCP6 server assign to a DHCPv6 client?

Options:

A.

Gateway address

B.

DNS server address

C.

IPV6 address/prefix

D.

SNTP server address

Buy Now
Questions 11

On an RSTP network, you can set the STP priority of a switch to specify the switch as the root bridge.

Which of the following values is the default STP priority of a Huawei switch?

Options:

A.

4096

B.

128

C.

32768

D.

1

Buy Now
Questions 12

When IPv4 unicast packets are transmitted over Ethernet, their destination MAC address is also a multicast MAC address. If the IP address of a multicast group is 224.0.1.1, which of the following is the corresponding multicast MAC address?

Options:

A.

01-00-5e-00-01-00

B.

01-00-5e-00-01-01

C.

01-00-5e-01-01-01

D.

01-00-5e-01-01-00

Buy Now
Questions 13

The Origin attribute is used to define the origin of BGP path information. There are three types of Origin attributes. Which of the following lists the Origin attributes in descending order of priority?

Options:

A.

IGP > EGP > Incomplete

B.

Incomplete > IGP > EGP

C.

EGP > IGP > Incomplete

D.

Incomplete > EGP > IGP

Buy Now
Questions 14

By default, some security zones are created when Huawei firewalls are enabled. Which of the following security zones is created by users?

Options:

A.

DMZ

B.

ISP

C.

Trust

D.

Local

Buy Now
Questions 15

When receiving a packet, a router matches the packet against ACL rules . The ACL matching result is either Matched or Unmatched . If the matching result is Unmatched , which of the following are possible causes?

Options:

A.

All rules are traversed but no matching rule is found.

B.

The packet matches an ACL rule with the deny action.

C.

No ACL is configured on the device.

D.

An ACL is configured but it does not contain any rules.

Buy Now
Questions 16

A switch runs MSTP. The configuration is shown in the figure. What is the role of this switch in MSTI 1?

Options:

A.

Uncertain

B.

Root switch

C.

Non-root switch

D.

Secondary root switch

Buy Now
Questions 17

On an OSPF network, an algorithm is used to prevent loops within an area, but loops may occur between areas. Therefore, OSPF defines a loop prevention mechanism for inter-area routes. Which of the following statements are true about the loop prevention mechanism?

Options:

A.

Inter-area routes cannot be directly transmitted between non-backbone areas.

B.

All non-backbone areas must be directly connected to area 0.

C.

Inter-area routes need to be forwarded through area 0.

D.

An ABR cannot inject Type 3 LSAs that describe routes to a network segment in an area back to the same area.

Buy Now
Questions 18

Compress the 2001:0DB8:0000:C030:0000:0000:09A0 address.

Options:

Buy Now
Questions 19

Typically, a protocol that occupies two ports during communication is called a multi-channel protocol. For such protocols, the ASPF function must be enabled on the firewall to ensure smooth setup of the data channel and reduce the risk of attacks. Which of the following protocols is not a multi-channel protocol?

Options:

A.

FTP

B.

SIP

C.

SMTP

D.

H.323

Buy Now
Questions 20

When an SSH client accesses an SSH server for the first time and the SSH server ' s public key is not configured on the SSH client, you can enable first-time authentication on the SSH client. This allows the SSH client to access the SSH server and saves the SSH server ' s public key on the SSH client. In this way, the next time the SSH client accesses the SSH server, the SSH client can use the saved public key to authenticate the SSH server.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 21

On an OSPF network, if two indirectly connected routers with the same router ID run in the same area, Type 1 LSA calculation fails.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 22

In addition to a route reflector, the confederation is another method that reduces the number of IBGP connections in an AS.

Which of the following statements are true about the confederation technology? (Choose all that apply)

Options:

A.

This technology is applicable to large-scale networks.

B.

Special EBGP connections are established among sub-ASs in a confederation, and the sub-ASs need to be fully meshed.

C.

All member devices in a confederation need to be reconfigured.

D.

The logical topology does not need to be changed when a confederation is used.

Buy Now
Questions 23

Which of the following statements about WLAN roaming are false?

Options:

A.

APs with which a STA is associated before and after roaming can work on different channels.

B.

During roaming, the STA sends a Reassociation Request frame containing home AP information to the foreign AP.

C.

During roaming, the STA sends an Association Request frame containing home AP information to the foreign AP.

D.

APs with which a STA is associated before and after roaming must work on the same channel.

Buy Now
Questions 24

As shown in the figure, R1 imports the direct route 10.1.1.0/24 to OSPF. An engineer enables bidirectional route re-advertisement on R2 and R3, and configures the following commands on R3. After the network becomes stable, which of the following is the Pre value of the route 10.1.1.0/24 in the routing table of R4?

H12-821_V1.0 Question 24

[R3]acl 2000

[R3-acl-basic-2000] rule permit source 10.1.1.0 0

[R3-acl-basic-2000] quit

[R3]route-policy hcip permit node 10

[R3-route-policy-10] if-match acl 2000

[R3-route-policy-10] apply pr eference 14

[R3-route-policy-10] quit

[R3]ospf 1

[R3-ospf-1] preference ase route-policy hcip

Options:

A.

150

B.

14

C.

10

D.

15

Buy Now
Questions 25

A monitoring plane usually comprises the monitoring units of main control boards and interface boards. This plane can monitor the system environment independently. Which of the following environment monitoring functions can be provided by the monitoring plane?

Options:

A.

Voltage monitoring

B.

Temperature monitoring

C.

Fan control

D.

System power-on and power-off control

Buy Now
Questions 26

In inter-AC roaming scenarios, an AC can function as the mobility server of multiple mobility groups, but can be added only to one mobility group.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 27

A BGP device receives a route carrying an unknown attribute from a peer but does not know whether other devices need the attribute. In this case, the BGP device retains this attribute when advertising the route to other peers. Which of the following attributes is of this type?

Options:

A.

Community

B.

AS.Path

C.

MED

D.

OriginatorID

Buy Now
Questions 28

On an OSPF network, if the network type is NBMA , a router unicasts all protocol packets; if the network type is broadcast , a router multicasts all protocol packets.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 29

IGMP group entries play an important role in multicast forwarding. An administrator runs a command to view information about a multicast entry. The information is as follows:

sql

Copy

< HUAWEI > display igmp group

Interface group report information

Vlanif100(10.1.6.2):

Total 1 IGMP Group reported

Group Address Last Reporter Uptime Expires

225.1.1.2 10.1.6.10 00:02:04 00:01:17

Given this, which of the following statements are true?

Options:

A.

This entry can be used to construct the corresponding (S, G) entry.

B.

This entry is created when the device receives an IGMP Join message from a user.

C.

Expires indicates the aging time of the IGMP group.

D.

225.1.1.2 is the address of the group that the user joins.

Buy Now
Questions 30

On the OSPF network shown in the figure, an adjacency has been established between R1 and R2. An engineer configures the commands in the figure on R2. In this case, which of the following routing entries may exist in the routing table of R2?

Options:

A.

10.1.4.0/24

B.

10.1.3.0/24

C.

10.1.2.0/24

D.

10.1.1.0/24

Buy Now
Questions 31

On a WLAN, MAC address authentication controls network access rights of a user based on the user ' s access interface and terminal MAC address.

Which of the following statements is false about MAC address authentication?

Options:

A.

User passwords can be processed using PAP or CHAP.

B.

By default, the MAC address of a terminal is used as the user name and the last 6 hexadecimal digits of the terminal MAC address are used as the password for MAC address authentication.

C.

No client software needs to be installed on user terminals.

D.

A MAC address authentication system consists of three types of entities: terminal, access device, and authentication server.

Buy Now
Questions 32

On a network, some switches are enabled with RSTP and some switches are enabled with STP. What will happen?

Options:

A.

A Huawei switch changes from RSTP to STP. After the STP-enabled switch is removed from the network, the RSTP-enabled switch can be moved back to the RSTP mode.

B.

A Huawei switch changes its mode from STP to RSTP. After the RSTP-enabled switch is removed from the network, the STP-enabled switch can be moved back to the RSTP mode.

C.

STP and RSTP are compatible with each other, but the rapid convergence of RSTP is unavailable.

D.

STP and RSTP calculation are performed independently.

Buy Now
Questions 33

ACLs are a common matching tool in routing policies. An ACL can be configured on a router to match routes.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 34

OSPF has several types of special areas, which are used to reduce the LSDB size and improve device performance.

Which of the following LSAs cannot be in a totally stub area?

Options:

A.

Type 3 specific LSA

B.

Type 1 LSA

C.

Type 3 LSA that describes a default route

D.

Type 2 LSA

Buy Now
Questions 35

Which of the following parameters are compared during designated port election on an STP network?

Options:

A.

RPC

B.

Local BID and local PID

C.

Peer BID

D.

Peer PID and local PID

Buy Now
Questions 36

The figure shows the VRRP status switchover events . Match these events with their sequence numbers.

H12-821_V1.0 Question 36

H12-821_V1.0 Question 36

Options:

Buy Now
Questions 37

On an enterprise WLAN where Portal authentication is deployed, an AC functions as an access device and communicates with a Portal server using the Portal protocol. Which of the following statements are true about the Portal protocol?

Options:

A.

The HTTP or HTTPS protocol can be used as the Portal access or authentication protocol.

B.

By default, the access device processes Portal protocol packets through port 2000.

C.

By default, the device uses the destination port number 50100 to proactively send packets to the Portal server.

D.

Portal protocol packets are transmitted over TCP.

Buy Now
Questions 38

In VRRP networking, if VRRP is not configured to track an uplink interface and the uplink interface or link of the master device in a VRRP group fails, no switchover will be triggered. As a result, a traffic blackhole occurs.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 39

A filter named si is configured on a device using the as-path-filter command and is applied to a specified BGP peer. The detailed configurations are as follows:

csharp

Copy

[SW1] ip as-path-filter si permit _65500$

[SW1] bgp 65100

[SW1-bgp] ipv4-family unicast

[SW1-bgp-af-ipv4] peer 10.1.1.2 as-path-filter si import

After the configuration is complete, which of the following statements is true about the way the local device processes the routes received from the peer?

Options:

A.

It accepts only the routes whose AS_Path contains AS 65500.

B.

It accepts only the routes originated from AS 65500.

C.

It accepts only the routes that last pass through AS 65500.

D.

It accepts only the routes forwarded by AS 65500.

Buy Now
Questions 40

On an OSPF network, if a router functions as an ABR, the router must also be a BR.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 41

OSPF has five types of packets, which have the same header format. If the Auth Type field in the packet header is 1, which of the following authentication modes is used?

Options:

A.

Non-authentication

B.

MD5 authentication

C.

Plaintext authentication

D.

Hash authentication

Buy Now
Questions 42

Roaming technology is typically used on a large WLAN to ensure that STA (station) services are not interrupted when STAs move between coverage areas of different APs.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 43

Match the following IPv4 multicast protocols with the corresponding functions.

H12-821_V1.0 Question 43

Options:

Buy Now
Questions 44

On an IS-IS network, routers send LSPs to exchange link state information. LSPs are classified into Level-1 LSPs and Level-2 LSPs and have the same format. Which of the following parts constitute the LSP ID in an LSP?

Options:

A.

LSP Number

B.

Pseudonode ID

C.

System ID

D.

IS Type

Buy Now
Questions 45

Similar to the OSPF DR, the IS-IS DIS needs to be elected on a broadcast network. However, the OSPF DR is preemptive by default, whereas the IS-IS DIS is not preemptive by default.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 46

BGP is generally applied to complex networks where routes change frequently. Frequent route flapping consumes a large number of bandwidth and CPU resources, and even affects the normal operation of the network. This is an unavoidable problem that cannot be solved in BGP.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 47

As shown in the figure, VRRP is associated with a BFD session. When a backup device detects a fault through BFD, the backup device immediately assumes the master role after the Master_Down_Timer timer expires.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 48

When two routers exchange LSDB information using DD packets, a master/slave relationship is formed first, the router with a larger router ID is the master, and determine the MS bit.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 49

As shown in the figure, the stateful inspection firewall forwards the packet because the packet matches the session status of the firewall.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 50

On an enterprise network, the directly connected interfaces of two OSPF routers are on different network segments and have different masks. To establish an OSPF neighbor relationship between the two interfaces, you can change their network types to which of the following?

Options:

A.

Point-to-point

B.

NBMA

C.

P2MP

D.

Broadcast

Buy Now
Questions 51

Which of the following fields in DD packets is used for implicit acknowledgment to ensure the reliability and integrity of DD packet transmission on an OSPF network?

Options:

A.

MS

B.

I

C.

M

D.

sequence number

Buy Now
Questions 52

A route-policy consists of one or more nodes. What is the maximum number of nodes in a route-policy?

Options:

A.

4096

B.

65535

C.

256

D.

1024

Buy Now
Questions 53

Which of the following statements are true about IP multicast service models?

Options:

A.

In the SSM model, an (S, G) entry is generated for each source-group pair.

B.

In the SSM model, different multicast applications on the same source can use the same SSM group.

C.

Multicast service models differ for receiver hosts but do not affect multicast sources.

D.

In the ASM model, an ASM group can be used by only one multicast application.

Buy Now
Questions 54

In BGP, the origin attribute of the routes imported using the import-route command is incomplete.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 55

On an OSPF network, if a router receives an update of an LSA that exists in the local LSDB, the router updates the LSDB and floods the LSA.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 56

On an OSPF network, interfaces are classified into four types based on link layer protocols. Which of the following types can interfaces on an IS-IS network be classified into based on physical links?

Options:

A.

P2P

B.

Broadcast

C.

P2MP

D.

NBMA

Buy Now
Questions 57

BGP itself does not discover routes. Therefore, other routes need to be imported to the BGP routing table for route exchanges between ASs. In import mode, routes are imported to the BGP routing table by protocol. Which of the following routes can be imported to the BGP routing table using the import mode?

Options:

A.

Direct routes

B.

Static routes

C.

IS-IS routes

D.

OSPF routes

Buy Now
Questions 58

On a Huawei router, if no ACL is configured or an ACL is configured but no ACL rule is configured, the ACL matching result is Unmatched.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 59

An enterprise uses Huawei routers to deploy an IS-IS network for network-wide communication. An engineer wants to change the interface cost to control route selection. By default, which of the following values is the maximum cost that can be configured?

Options:

A.

67

B.

63

C.

64

D.

68

Buy Now
Questions 60

BFD can associate with multiple protocols to quickly detect faults.

Which of the following functions are supported? (Select all that apply)

Options:

A.

BFD for PIM

B.

BFD for static routes

C.

BFD for OSPF

D.

BFD for BGP

Buy Now
Questions 61

Which of the following statements is false?

Options:

A.

If the current DR fails, the current BDR automatically becomes a new DR, and a BDR will be elected again.

B.

A device with a higher router priority has a higher election priority.

C.

When a router with the highest router priority joins an OSPF network, this router will become the new DR.

D.

If two devices have the same router priority, the device with a larger router ID has a higher election priority.

Buy Now
Questions 62

To reduce the workload of configuring VPN instances, the administrator can import interface IP addresses and features to the device in batches using a script, and then manually bind the interfaces to VPN instances.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 63

PBR is a mechanism for selecting routes based on user-defined policies. There are two types of PBR: interface-based PBR and local PBR. Which of the following statements is false about these two types of PBR?

Options:

A.

Interface-based PBR takes effect only for forwarded packets.

B.

Local PBR takes effect only for locally originated packets.

C.

Interface-based PBR is configured on an interface and takes effect only for incoming packets on the interface.

D.

Local PBR is configured in the protocol view.

Buy Now
Questions 64

RSTP provides different functions in different scenarios. Which of the following statements Is false?

Options:

A.

After TC-BPDU attack defense function is enabled, you can set the number of times the switch processes TC BPDUs within a certain period

B.

The role of the designated port that is enabled with root protection cannot be changed

C.

If the edge port on the switch enabled with BPDU protection receives RST BPDU, the switch sets the edge port as a non-edge-port and triggers STP calculation

D.

When the designated port enabled with root protection receives optimal RST BPDUs, the port enters the Discarding state and does not forward packets. If the port does not receive optimal RST BPDUs within a certain period of time, the port will automatically restore to the Forwarding state

Buy Now
Questions 65

In the SNMP management model, which of the following elements defines the attributes of a managed device?

Options:

A.

MIB

B.

Agent

C.

Managed Object

D.

NMS

Buy Now
Questions 66

In the OSPF protocol, intra-area route calculation involves only Router LSA, Network LSA, and Summary LSA.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 67

After the administrator of an enterprise deploys a DHCP server, employees complain that their clients cannot obtain IP addresses from the DHCP server. Which of the following may cause this problem?

Options:

A.

Multiple DHCP servers are configured.

B.

STP is enabled on the DHCP server.

C.

The DHCP function is disabled by default, and the administrator forgets to enable the DHCP function.

D.

DHCP clients and the DHCP server are on different network segments, and no DHCP relay agent is configured on the network.

Buy Now
Questions 68

The following figure shows the OSPF network of an enterprise and the OSPF configurations of R1. Which of the following statements is false about the network?

H12-821_V1.0 Question 68

Options:

A.

R2 can access the server.

B.

GE 0/0/1 of R1 cannot send OSPF packets.

C.

The network segment to which GE 0/0/1 of R1 belongs cannot be advertised.

D.

GE 0/0/1 of R1 cannot accept OSPF packets.

Buy Now
Questions 69

iMaster NCE-Campus can be used as an authentication server on a WLAN to authenticate STAs.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 70

Which of the following routing protocols support the default route through command configuration?

Options:

A.

BGP

B.

IS-IS

C.

OSPF

D.

ICMP

Buy Now
Questions 71

In IP multicast, RPF routes can be elected only from among unicast routes and multicast static routes.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 72

VRRP defines three states. Only the device in which state can forward packets destined for a virtual IP address?

(Write in full and capitalize the first letter.)

Options:

Buy Now
Questions 73

Which of the following statements regarding the BGP error display of a router is false?

Options:

A.

The error occurred at 11:40:39 on March 22, 2010.

B.

The neighbor address of this router is 10.1.1.2.

C.

The error may be caused by the incorrect peer AS number.

D.

Error Type indicates that the BGP error is caused by the neighbor relationship error.

Buy Now
Questions 74

On an STP network, only the designated port processes inferior BPDUs. On an RSTP network, a port with any role processes inferior BPDUs.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 75

BFD for OSPF is deployed on a directly connected link. If the physical link is disconnected, drag the following BFD processes to the corresponding sequence numbers.

Options:

Buy Now
Questions 76

This configuration is part of RTA configuration. Which of the following statements regarding the configuration are true?

[RTA] ospf 100

[RTA-ospf-100]silent-interface GigabitEthernet 1/0/0

Options:

A.

RTA cannot establish a neighbor relationship with the neighbor that this interface is directly connected to.

B.

GigabitEthernet 1/0/0 is prohibited from sending OSPF packets.

C.

Direct routes of GigabitEthernet 1/0/0 can still be advertised.

D.

This interface cannot send Hello packets.

Buy Now
Questions 77

Which of the following community attributes enables a device to send a received route with this attribute to any BGP peer ?

Options:

A.

No_Advertise

B.

Internet

C.

No_Export

D.

No_Export_Subconfed

Buy Now
Questions 78

When a BGP device sends an Open message to establish a peer connection, which of the following information is carried?

Options:

A.

Local AS number

B.

Router ID

C.

NLRI

D.

Hold time

Buy Now
Questions 79

In BGP, the Origin attribute is used to identify the origin of a route. Which of the following statements are true about the Origin attribute?

Options:

A.

If a route is imported to BGP by the originator using the network command, the Origin attribute of the BGP route is displayed as i in the BGP routing table.

B.

If a route is learned through EGP, the Origin attribute of this BGP route is displayed as ? in the BGP routing table.

C.

If multiple routes carry the same destination address but different Origin attributes and all other route selection conditions are the same, BGP selects the optimal route according to the Origin attribute in the following order: IGP > EGP > Incomplete.

D.

This attribute is a well-known mandatory attribute.

Buy Now
Questions 80

Security policy is the core feature of firewalls. Only valid traffic that complies with security policies can be forwarded by firewalls. Which of the following statements are true about security policy matching rules?

Options:

A.

Multiple values can be configured for a single matching condition, and the values are logically ANDed.

B.

If a security policy contains multiple matching conditions, the relationship between them is AND.

C.

The system has a default security policy named default , where all matching conditions are any and the default action is permit .

D.

When multiple security policy rules are configured, they are sorted in a list by configuration sequence by default. A security policy rule configured earlier is placed higher in the list and has a higher priority.

Buy Now
Questions 81

An ACL can be used to match routes or data, but cannot be used to match both the IP address prefix length and mask length.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 82

Multicast applies to any point-to-multipoint data transmission. Which of the following types of application data can be forwarded in multicast mode?

Options:

A.

Real-time audio conferencing

B.

Livestreaming

C.

Network TV

D.

Data warehouse

Buy Now
Questions 83

What is the correct procedure for a VLAN pool to assign terminals to VLANs.

H12-821_V1.0 Question 83

Options:

Buy Now
Questions 84

Which of the following statements regarding IGMPv1 and IGMPv2 are true?

Options:

A.

1GMPv2 supports only general query.

B.

1GMPv2 defines the Leave message type.

C.

IGMPv1 does not define the IGMP Leave message type.

D.

IGMPv1 supports general query.

Buy Now
Questions 85

On the network shown in the following figure, the management VLAN is VLAN 10, and the AP is configured to obtain an IP address on the network segment 10.1.1.0/24 through DHCP. The AP, AC, and AR function as the DHCP client, DHCP relay agent, and DHCP server, respectively. Which of the following configurations for the DHCP relay agent and DHCP server are correct?

Options:

A.

[AC] dhcp server group AP

[AC-dhcp-server-group-AP] dhcp-server 172.21.1.2

[AC-dhcp-server-group-AP] quit

[AC] interface Vlanif 10

[AC-Vlanif 10] dhcp select relay

[AC-Vlanif 10] dhcp relay server-select AP

[AC-Vlanif 10] quit

B.

[AR] ip pool AP

[AR-ip-pool-AP] network 10.1.1.0 mask 24

[AR-ip-pool-AP] gateway-list 10.1.1.2

[AR-ip-pool-AP] excluded-ip-address 10.1.1.1

[AR-ip-pool-AP] quit

[AR] interface GigabitEthernet 0/0/1

[AR-GigabitEthernetO/O/1] dhcp select global

[AR-GigabitEthernet0/0/l] quit

[AR] ip route-static 10.1.1.0 255.255.255.0 172.21.1.1

C.

[AR] ip pool AP

[AR-ip-pool-AP] network 172.21.1.0 mask 24

[AR-ip-pool-AP] gateway-list 172.21.1.2

[AR-ip-pool-AP] excluded-ip-address 172.21.1.1

[AR-ip-pool-AP] quit

[AR] interface GigabitEthernet 0/0/1

[AR-GigabitEthernetO/0/1] dhcp select global

[AR-GigabitEthernetO/0/1] quit

[AR] ip route-static 10.1.1.0 255.255.255.0 172.21.1.1

D.

[AC] dhcp server group AP

[AC-dhcp-server-group-AP] dhcp-server 10.1.1.2

[AC-dhcp-server-group-AP] quit

[AC] interface Vlanif 10

[AC-Vlanif 10] dhcp select relay

[AC-Vlanif 10] dhcp relay server-select AP

[AC-VlaniflO] quit

Buy Now
Questions 86

Which of the following statements about the forwarding plane of a switch is false?

Options:

A.

Provides high-speed and non-blocking data channels.

B.

Can encapsulate and decapsulate packets.

C.

Can collect packet statistics.

D.

Consists of main control boards and interface boards.

Buy Now
Questions 87

When creating a single-hop BFD session for the first time, bind the single-hop BFD session to the peer IP address and the local address. To modify a configured BFD session, delete it and create a new one.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 88

Preferences of routing protocols determine the sequence In which a router selects a route among routes to the same destination /earned through different routing protocols.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 89

In BGP, Notification messages are used to request peers to resend routing information after routing policies are changed.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 90

A session is an entry used to record the connection status of a protocol and is fundamental for the firewall to forward packets. Which of the following protocol packets will the firewall create sessions for?

Options:

A.

Subsequent fragment

B.

ICMP error packet

C.

GRE

D.

TCP

Buy Now
Questions 91

An enterprise network runs OSPF to implement network communication. Which of the following types of LSAs may be generated by an ABR?

Options:

A.

NSSA LSA

B.

AS External LSA

C.

Network Summary LSA

D.

ASBR Summary LSA

Buy Now
Questions 92

See the command output of a router below. Which of the following statements is true?

< R2 > display ospf interface GigabitEthernet 0/0/0 verbose

OSPF Process 1 with Router ID 10.0.2.2

Interface: 10.0.12.2 (GigabitEthernet 0/0/0)

Cost: 1 State: BDR Type: Broadcast MTU: 1500

Priority: 1

Designated Router: 10.0.12.1

Backup Designated Router: 10.0.12.2

Timers: Hello 10 , Dead 40 , Poll 120 , Retransmit 5 , Transmit Delay 1

Options:

A.

The router ID is 10.0.12.2.

B.

The interface cost is 1500.

C.

This router is a BDR.

D.

The interface IP address is 10.1.12.1.

Buy Now
Questions 93

In VRRP networking, devices assume the Master and Backup roles after election. Match the two roles with their working mechanisms.(Token is reusable)

Options:

Buy Now
Questions 94

An enterprise office network runs OSPF and is divided into multiple OSPF areas. Enterprise network engineers can configure route summarization on ASBRs to reduce the number of inter-area Type 3 LSAs, which in turn reduces the routing table size and improves device resource utilization.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 95

In BGP, Keepalive messages are used to maintain BGP peer relationships. When a BGP router receives a Keepalive message from a peer, the BGP router sets the state of the peer to Established and periodically sends Keepalive messages to maintain the connection. By default, the device sends Keepalive messages every seconds.

Options:

Buy Now
Questions 96

When deploying a VRRP network, an enterprise administrator sets the virtual IP address to 192.168.1.254 and VRID to 1. Which of the following is the virtual MAC address after the network becomes stable?

Options:

A.

0000-5e01-0101

B.

0000-5e01-0254

C.

0000-5e00-0101

D.

0000-5e00-0254

Buy Now
Questions 97

The VRID of the VRRP virtual router is 3 and the virtual IP address is 100.1.1.10. What is the virtual MAC address?

Options:

A.

01-00-5E-00-01-64

B.

01-00-5E-00-01-03

C.

00-00-5E-00-01-64

D.

00-00-5E-00-01-03

Buy Now
Questions 98

A large shopping mall configures a VLAN pool to prevent network performance deterioration caused by potentially large broadcast domains. A network engineer runs the display vlan pool name STA command to check information about the VLAN pool. The following command output is displayed:

< AC > display vlan pool name STA Name : STA Total : 2 Assignment: hash Threshold Notify Count: 3 Threshold Notify time(min): 3 VLAN ID : 2 4

Which of the following statements are true?

Options:

A.

The VLANs with the IDs of 2 and 4 are added to the VLAN pool.

B.

The total number of VLAN pools is 2.

C.

The name of the VLAN pool is STA.

D.

The VLAN pool uses the even VLAN assignment algorithm.

Buy Now
Questions 99

Which of the following statements regarding an IP prefix are true?

Options:

A.

An IP prefix filter is used to filter IP address prefixes and cannot match an IP prefix number and a prefix length at the same time.

B.

An IP prefix filter cannot be used to filter data packets.

C.

An IP prefix filter is used to filter IP address prefixes and can match an IP prefix number and a prefix length at the same time.

D.

An IP prefix filter can be used to filter data packets.

Buy Now
Questions 100

The BFD Echo function checks the connectivity of the forwarding link by looping back packets. Which of the following statements are true about this function?

Options:

A.

If URPF is enabled on the peer end, BFD packets may be incorrectly discarded on the peer end.

B.

In the BFD Echo function, the device uses the IP address of the outbound interface as the source IP address by default.

C.

The BFD Echo function applies only to single-hop BFD sessions.

D.

When configuring a BFD session supporting the BFD echo function, you need to configure both the local and remote discriminators.

Buy Now
Questions 101

In addition to numerous normal service packets, the CPUs of devices on a network may also receive large numbers of attack packets. To ensure that the CPUs can properly respond to normal services, the devices provide the local attack defense function.

Which of the following statements are true about this function? (Select all that apply)

Options:

A.

The device can schedule the protocol packets to be sent to the CPU in the attack defense policy based on the protocol priorities so that the packets with higher priorities are processed preferentially.

B.

To ensure that session-based application-layer data runs properly during an attack, you can configure the dynamic link protection function.

C.

Regardless of the packet type, the same rate limit must be set to reduce the number of packets sent to the CPU.

D.

CPU attack defense can also take effect on the management interface of the device.

Buy Now
Questions 102

Which of the following statements regarding multicast MAC addresses are false?

Options:

A.

One multicast MAC address maps to 32 multicast IP addresses.

B.

One multicast MAC address maps to only one multicast IP address.

C.

The high 24 bits of the multicast MAC address are 0x01005E, the 25th bit is fixed to 1, and the lower 23 bits of the MAC address map to the lower 23 bits of the multicast IP address.

D.

A multicast MAC address identifies receivers of a multicast group on the data link layer.

Buy Now
Questions 103

In IP multicast transmission , packets are transmitted from a source to a group of receivers . Which of the following statements are true about IP multicast technologies?

Options:

A.

Compared with broadcast, IP multicast prevents information flooding.

B.

Compared with broadcast, IP multicast effectively conserves network bandwidth.

C.

Compared with unicast, IP multicast improves information transmission security.

D.

Compared with unicast, IP multicast increases the load of information sources.

Buy Now
Exam Code: H12-821_V1.0
Exam Name: HCIP-Datacom-Core Technology V1.0
Last Update: May 6, 2026
Questions: 346

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now H12-821_V1.0 testing engine

PDF (Q&A)

$43.57  $124.49
buy now H12-821_V1.0 pdf