Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

H12-841_V1.5 HCIP-Datacom-Campus Network Planning and Deployment V1.5 Questions and Answers

Questions 4

(The following figure shows a policy control matrix on a virtualized network deployed using iMaster NCE-Campus. Which of the following statements about the policy control matrix are true? Choose all that apply. )

H12-841_V1.5 Question 4

Options:

A.

Users in Guest_Group cannot communicate with those in Research_Group.

B.

Users within Sales_Group can communicate with each other.

C.

If a user is not within Guest Group, Research Group, or Sales Group, that user cannot access any network resources.

D.

Users in Research_Group cannot communicate with those in Guest_Group.

Buy Now
Questions 5

(DHCP snooping is a security feature of DHCP that prevents DHCP servers and clients from being attacked. Which of the following statements about DHCP snooping are true? Choose all that apply. )

Options:

A.

A DHCP snooping-enabled device listens to DHCP messages and records client information obtained from DHCP Offer messages.

B.

After DHCP snooping is enabled on a switch, you need to configure the interface that receives DHCP messages from a DHCP server as a trusted interface.

C.

The device discards messages, such as DHCP ACK and DHCP Offer messages, received on untrusted interfaces from a DHCP server.

D.

When the interface directly connected to a DHCP client goes Down, the corresponding DHCP snooping entry does not disappear until the IP address lease of the DHCP client expires.

Buy Now
Questions 6

(In the admission design for large- and medium-sized campus networks, which of the following authentication modes can be used for PCs connected to IP phones?)

Options:

A.

Multi-mode authentication

B.

Portal authentication

C.

802.1X authentication

D.

MAC address authentication

Buy Now
Questions 7

Complete the following static VXLAN tunnel configurations by dragging the configurations to the corresponding areas.

H12-841_V1.5 Question 7

Options:

Buy Now
Questions 8

(On a VXLAN-based virtualized campus network, terminals communicate with each other through VXLAN tunnels. When the campus network needs to communicate with external networks, the data must pass through border nodes.)

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 9

(Huawei iMaster NCE-Campus provides the financial SD-WAN SRv6 solution to help the financial industry implement end-to-end scheduling. To use this function, you need to obtain the SRv6 function package license.)

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 10

(Fabric nodes need to be planned during fabric design on a CloudCampus virtualized campus network. Which of the following statements about node planning on a fabric is false?)

Options:

A.

It is recommended that core devices be deployed as border nodes, and access or aggregation devices be deployed as edge nodes.

B.

It is recommended that access devices be deployed as edge nodes to implement end-to-end automatic VXLAN deployment.

C.

When the fabric needs to connect to two external networks located in different physical locations, two border nodes need to be deployed.

D.

If a BGP EVPN RR is required on a VXLAN network, BGP peer relationships need to be established between edge nodes and border nodes and between edge nodes.

Buy Now
Questions 11

(When access authentication is deployed on a network, which of the following servers typically reside in the pre-authentication domain?)

Options:

A.

FTP server

B.

Antivirus server

C.

DHCP server

D.

DNS server

Buy Now
Questions 12

(The following figure shows the MAC address table of a Layer 2 VXLAN gateway. Which of the following statements are true? Choose all that apply. )

H12-841_V1.5 Question 12

Options:

A.

Both 0000-0000-0010 and 5489-9893-48a3 belong to BD 10 and are in the same Layer 2 broadcast domain.

B.

The outbound interface corresponding to 5489-982d-77e2 is GE1/0/1.20. Because this interface belongs to BD 20, the host with 5489-982d-77e2 can directly communicate with the host with 5489-9893-48a3 at Layer 2.

C.

The MAC address entry with the outbound interface 10.3.3.3 is learned from the remote VTEP through the VXLAN tunnel.

D.

The outbound interface corresponding to 5489-9893-48a3 is GE1/0/1.10, which belongs to BD 10.

Buy Now
Questions 13

(Refer to the following routing entries queried using a command on the VTEP. Which of the following statements about these routes are true?)

Network(EthTagId/IpAddrLen/OriginalIp) NextHop

* > i 0:32:1.1.1.0 1.1.1.0

Route Distinguisher: 2:5

Network(EthTagId/IpAddrLen/OriginalIp) NextHop

* > i 0:32:1.1.1.0 1.1.1.0

Route Distinguisher: 2:7

Network(EthTagId/IpAddrLen/OriginalIp) NextHop

* > i 0:32:1.1.1.0 1.1.1.0

Options:

A.

These routes are Type 3 routes. If the VTEP IP address carried in these routes is reachable at Layer 3, a VXLAN tunnel to the peer end is established.

B.

These routes are Type 2 routes used to advertise MAC/IP (host) information.

C.

These routes are Type 5 routes used to advertise IP prefixes (network segments).

D.

These routes are Type 1 routes used for Ethernet Auto-Discovery (ESI multihoming).

Buy Now
Questions 14

(The egress zone is the boundary between a campus network and external networks, including the Internet and WAN. It bridges the intranet and extranet and protects the security of the campus network. Which of the following are requirements for egress zone design?)

Options:

A.

Service control capability

B.

Various and flexible access modes

C.

Network connectivity

D.

Network secure ensurance

Buy Now
Questions 15

(Free mobility implements policy management and permission control based on users' VLAN IDs and IP addresses.)

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 16

(Which of the following can be used to classify campus networks?)

Options:

A.

Network scale

B.

Served objects

C.

Access mode

D.

Service complexity

Buy Now
Questions 17

(Which of the following statements about BGP EVPN are true?)

Options:

A.

Several BGP EVPN routes are defined through BGP extension.

B.

MP_REACH_NLRI is used to carry the RD.

C.

MP_REACH_NLRI is used to carry routing information.

D.

MP_REACH_NLRI is used to carry the RT.

Buy Now
Questions 18

(On a virtualized campus network deployed using iMaster NCE-Campus, implementing mutual access between users in different virtual networks only requires the administrator to deploy a policy control matrix on iMaster NCE-Campus.)

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 19

(When a network device sends a registration request to iMaster NCE-Campus, which of the following is the destination port number?)

Options:

A.

53

B.

179

C.

10020

D.

18008

Buy Now
Questions 20

(When a BGP EVPN route is transmitted between VTEPs, the BGP EVPN route is discarded only when the RT carried in the route is different from both the EVPN IRT and IP VPN IRT.)

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 21

(In Huawei's free mobility solution, if one device functions as both an authentication point and a policy enforcement point, the administrator needs to subscribe to IP-security group entries to view user information.)

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 22

(Refer to the following routing entries queried using a command on the VTEP. Which of the following statements about these routes are true?)

Network(EthTagId/IpAddrLen/OriginalIp) NextHop

* > i 0:32:1.1.1.0 1.1.1.0

Route Distinguisher: 2:5

Network(EthTagId/IpAddrLen/OriginalIp) NextHop

* > i 0:32:1.1.1.0 1.1.1.0

Route Distinguisher: 2:7

Network(EthTagId/IpAddrLen/OriginalIp) NextHop

* > i 0:32:1.1.1.0 1.1.1.0

Options:

A.

These routes are Type 3 routes. If the VTEP IP address carried in these routes is reachable at Layer 3, a VXLAN tunnel to the peer end is established.

B.

These routes are Type 3 routes. After receiving these routes, the local end creates an ingress replication list.

C.

These routes are Type 2 routes and carry host IP addresses.

D.

These routes are Type 3 routes and carry the VTEP IP address.

Buy Now
Questions 23

(Network Quality Analysis (NQA) is a real-time network performance detection and measurement technology. It monitors the performance of multiple protocols running on a network. Which of the following can be monitored by NQA?)

Options:

A.

OSPF

B.

DHCP

C.

SNMP

D.

ICMP

Buy Now
Questions 24

(Which of the following fields is not carried in a BGP EVPN Type 2 route?)

Options:

A.

L3VNI

B.

IP Address

C.

IP Prefix

D.

L2VNI

Buy Now
Questions 25

(The Huawei CloudCampus Solution supports various rate limiting modes for wireless users in small- and medium-sized campus scenarios. Which of the following modes is suitable for refined traffic control of each user?)

Options:

A.

User-based rate limiting

B.

SSID-based rate limiting

C.

ACL-based rate limiting

D.

Radio-based rate limiting

Buy Now
Questions 26

(On a small- or medium-sized campus network, multi-carrier links can be deployed at the egress for backup to ensure egress reliability.)

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 27

(Both SNMP and NETCONF can be used to manage network devices. Which of the following statements about the two protocols is true?)

Options:

A.

Both SNMP and NETCONF use the client/server architecture. The network management station (NMS) functions as the server, and the managed network devices function as clients.

B.

Both SNMP and NETCONF manage objects through management information bases (MIBs) on network devices.

C.

NETCONF provides a locking mechanism to prevent multiple user operations from conflicting.

D.

SNMP provides multiple configuration databases, which can back up each other.

Buy Now
Questions 28

(If the number of MAC addresses learned on an interface enabled with port security reaches the upper limit, which of the following actions may the switch take?)

Options:

A.

Sets the interface state to error-down and generates an alarm.

B.

Sets the interface state to error-down without generating any alarm.

C.

Discards packets with unknown source MAC addresses without generating any alarm.

D.

Discards packets with unknown source MAC addresses and generates an alarm.

Buy Now
Questions 29

(Which of the following commands needs to be run in the BGP view to enable a VPN instance to advertise IP routes to the BGP-EVPN address family?)

Options:

A.

advertise vpnv4

B.

advertise irbv6

C.

advertise irb

D.

advertise l2vpn evpn

Buy Now
Questions 30

(On a virtualized network deployed using iMaster NCE-Campus, which of the following methods can be used by a network administrator during VN creation to create user network segments?)

Options:

A.

Manually create them one by one.

B.

Import them in a batch using a template.

C.

Directly invoke the user network segments in the global resource pool of the fabric.

D.

Create them in a batch through automatic allocation.

Buy Now
Questions 31

(Which of the following statements about the underlay network of a VXLAN-based virtualized campus network is false ?)

Options:

A.

When iMaster NCE-Campus is used to implement automatic orchestration of routing domains on the underlay network, only OSPF is supported.

B.

When iMaster NCE-Campus is used to implement automatic orchestration of the routing domain on the underlay network, only OSPF single-area deployment is supported.

C.

The virtualized campus network solution introduces VXLAN technology, which uses MAC-in-UDP encapsulation to build a logical network over a traditional IP network.

D.

The underlay network provides IP reachability so that VXLAN-encapsulated service packets can be transmitted between VTEPs.

Buy Now
Exam Code: H12-841_V1.5
Exam Name: HCIP-Datacom-Campus Network Planning and Deployment V1.5
Last Update: May 19, 2026
Questions: 104

PDF + Testing Engine

$64.99  $185.69

Testing Engine

$49.99  $142.83
buy now H12-841_V1.5 testing engine

PDF (Q&A)

$54.99  $157.11
buy now H12-841_V1.5 pdf