Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Huawei H12-821_V1.0 - HCIP-Datacom-Core Technology V1.0

Page: 3 / 10
Total 329 questions

Match the following IPv4 multicast protocols with the corresponding functions.

See the following figure. All routers on the network run IS-IS and are in area 49.0001. By referring to the LSDB of R1, the Level-2 DIS is. (Enter the device name, for example, R1.)

A BGP device receives a route carrying an unknown attribute from a peer but does not know whether other devices need the attribute. In this case, the BGP device retains this attribute when advertising the route to other peers. Which of the following attributes is of this type?

A.

Community

B.

AS.Path

C.

MED

D.

OriginatorID

In addition to numerous normal service packets, the CPUs of devices on a network may also receive large numbers of attack packets. To ensure that the CPUs can properly respond to normal services, the devices provide the local attack defense function.

Which of the following statements are true about this function?(Select all that apply)

A.

The device can schedule the protocol packets to be sent to the CPU in the attack defense policy based on the protocol priorities so that the packets with higher priorities are processed preferentially.

B.

To ensure that session-based application-layer data runs properly during an attack, you can configure the dynamic link protection function.

C.

Regardless of the packet type, the same rate limit must be set to reduce the number of packets sent to the CPU.

D.

CPU attack defense can also take effect on the management interface of the device.

Which of the following statements regarding the firewall zone security level is false?

A.

The configured security level cannot be changed.

B.

Two zones cannot be configured with the same security level.

C.

The default security level of the new zone is 1.

D.

Only the security level of the user-defined zone can be configured.

In VRRP networking, if VRRP is not configured to track an uplink interface and the uplink interface or link of the master device in a VRRP group fails, no switchover will be triggered. As a result, a traffic blackhole occurs.

A.

TRUE

B.

FALSE

OSPF has several types of special areas, which are used to reduce the LSDB size and improve device performance.

Which of the following LSAs cannot be in a totally stub area?

A.

Type 3 specific LSA

B.

Type 1 LSA

C.

Type 3 LSA that describes a default route

D.

Type 2 LSA

What is the correct procedure for a VLAN pool to assign terminals to VLANs.

On a network, some switches are enabled with RSTP and some switches are enabled with STP. What will happen?

A.

A Huawei switch changes from RSTP to STP. After the STP-enabled switch is removed from the network, the RSTP-enabled switch can be moved back to the RSTP mode.

B.

A Huawei switch changes its mode from STP to RSTP. After the RSTP-enabled switch is removed from the network, the STP-enabled switch can be moved back to the RSTP mode.

C.

STP and RSTP are compatible with each other, but the rapid convergence of RSTP is unavailable.

D.

STP and RSTP calculation are performed independently.

To enable PC1 to access PC2 using the IP address of the firewall's GE0/0/2, you need to configure NAPT for source address translation. In the following figure, fill in the blank to complete the command.