Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Huawei H12-891_V1.0 - HCIE-Datacom V1.0

Page: 10 / 10
Total 322 questions

Flavors are additional behaviors defined to enhance theEnd series instructionsinSRv6. Which of the followingEnd instructionscan thePSP flavorbe attached to?

A.

End.X

B.

End.BM

C.

End.T

D.

End

Which of the following inter-AS MPLS L3VPN solutions needsASBRs to transmit VPNv4 routes?

A.

Option C

B.

Option B

C.

Option A

D.

Option D

Refer to the figure.

Which of the following steps are mandatory to enable 802.1X authentication on GE0/0/2 and GE0/0/3 of SW3 and configure a RADIUS server to authenticate and deliver network access rights to users?

A.

Configure an AAA scheme.

B.

Configure an authentication profile.

C.

Configure an authentication domain.

D.

Configure an 802.1X access profile.

Man-in-the-middle attacks (MITM) or IP/MAC Spoofing attacksare common onintranetsand can causeinformation leakage.

Which configuration method can prevent these attacks?

A.

Configure the trusted or untrusted interface.

B.

Limit the maximum number of MAC addresses that can be learned on a switch interface.

C.

Configure DHCP snooping to check the CHADDR field carried in a DHCP Request packet.

D.

Configure association between DHCP snooping and IPSG or DAI on the switch.

Huawei CloudCampus Solution has multiple application scenarios, and iMaster NCE-Campus provides different APIs for each application scenario. Match the following application scenarios with the open APIs provided by iMaster NCE-Campus.

Which of the following items are included in static information collection and analysis?

A.

Device types

B.

Interface types

C.

License

D.

Packet loss rate