Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Huawei H12-821_V1.0 - HCIP-Datacom-Core Technology V1.0

Page: 9 / 10
Total 329 questions

Which of the following statements regarding an IP prefix are true?

A.

An IP prefix filter is used to filter IP address prefixes and cannot match an IP prefix number and a prefix length at the same time.

B.

An IP prefix filter cannot be used to filter data packets.

C.

An IP prefix filter is used to filter IP address prefixes and can match an IP prefix number and a prefix length at the same time.

D.

An IP prefix filter can be used to filter data packets.

After which of the following parameters are modified does an IS-IS neighbor relationship need to re-established?

A.

The cost of an IS-IS interface is changed.

B.

The IP address of an ISIS interface is changed.

C.

The level of an ISIS interface is changed.

D.

The interval at which an IS-IS interface sends IIH packets is changed.

Which of the following statements is false, based on the following IGMP information on an interface of RTA?XC

A.

The interval for sending group-specific Query messages is 60s.

B.

The maximum time for response to Query messages is 10s.

C.

The IP address of the interface is 192.168.1.1.

D.

The IGMP version is IGMPV2.

In IPv6, interface IDs can be manually configured, automatically generated by the system, or generated based on the IEEE EUI-64 standard.

A.

TRUE

B.

FALSE

To inject IGP routes into BGP routes, you can only use the network command.

A.

TRUE

B.

FALSE

Which of the following attributes cannot be directly referenced in an apply clause of a route-policy?

A.

community

B.

IP-prefix

C.

tag

D.

origin

L2TP does not provide security encryption. Therefore, other security measures, such as IPsec, are required to ensure the security of the entire tunnel for data transmission.

A.

TRUE

B.

FALSE

A large shopping mall configures a VLAN pool to prevent network performance deterioration caused by potentially large broadcast domains. A network engineer runs the display vlan pool name STA command to check information about the VLAN pool. The following command output is displayed:

display vlan pool name STA Name : STA Total : 2 Assignment: hash Threshold Notify Count: 3 Threshold Notify time(min): 3 VLAN ID : 2 4

Which of the following statements are true?

A.

The VLANs with the IDs of 2 and 4 are added to the VLAN pool.

B.

The total number of VLAN pools is 2.

C.

The name of the VLAN pool is STA.

D.

The VLAN pool uses the even VLAN assignment algorithm.

As shown in the figure, SWA, SWB, SWC, and SWD run the Rapid Spanning Tree Protocol (RSTP). Which of the following statements are true?

A.

Once receiving OPOUs, the edge port re-partlci pates in the calculation of the spanning tree.

B.

After a port is Configured as an edge port, the port can quickly enter the Forwarding state.

C.

You can enable the edge port on SWD's GEO/0/2 connected to the terminal so that this port can quickly enter the Forwarding state.

D.

You can enable the edge port on SWC's GE0/0/2 connected to the terminal so that this port can quickly enter the forwarding state.

On a broadcast IS-IS network, a DIS needs to be elected to create and update pseudonodes. Which of the following values is the default DIS priority of an IS-IS interface?

A.

200

B.

64

C.

1

D.

100