Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Huawei H12-891_V1.0 - HCIE-Datacom V1.0

Page: 9 / 10
Total 322 questions

Which of the following statements is incorrect about intranet security design for a large or medium-sized virtualized campus network?

A.

Traffic suppression can be configured on the wired network to block broadcast traffic by shutting down interfaces.

B.

Intranet security refers to both wired and wireless network security.

C.

To secure data transmission, the CAPWAP tunnel between the AC and AP supports DTLS encryption.

D.

In addition to terminal access security, air interface security must be considered during wireless network security design.

In the firewall hot standby scenario, when VGMP works in load balancing mode, which of the following functions must be enabled on the firewalls to prevent the return traffic from being discarded because it does not match any session entry in the case of inconsistent forward and return paths?

A.

Automatic backup

B.

Manual batch backup

C.

Quick session backup

D.

BFD

When MPLS/BGP IP VPN is deployed, which of the following statements is incorrect about BGP route exchange between PEs and CEs?

A.

When PEs and CEs use BGP to exchange routing information, you do not need to import private network routes to BGP on PEs.

B.

In a Hub & Spoke scenario, when Hub-CE and Hub-PE run an IGP for communication, EBGP cannot be configured on Spoke-PE or Spoke-CE.

C.

In a scenario where PEs and CEs use BGP to exchange routing information, if two VPN sites have the same private AS number, the AS number replacement function can be used to replace the AS number in a received private network route with any specified AS number. This prevents routes from being discarded because of repeated AS numbers.

D.

In a CE multi-homing scenario, the BGP AS number replacement function may cause routing loops. BGP SoO can be used to prevent routing loops at a VPN site.

Which of the following are potential risks in HTTP communication?

A.

Eavesdropping: Third parties can obtain communication data.

B.

Pretending: Third parties can impersonate another user.

C.

Tampering: Third parties can tamper with communication data.

D.

Lost: There is a low probability that data is lost during transmission.

IPsec uses an asymmetric encryption algorithm to encrypt the symmetric algorithm key, which it uses to encrypt/decrypt data, ensuring security and performance.

A.

TRUE

B.

FALSE

In the Huawei SD-WAN Solution, which of the following routing protocols is used to advertise VPN routes between CPEs?

A.

RIP

B.

OSPF

C.

IS-IS

D.

BGP

Which of the following protocols is used in the Huawei SD-WAN Solution to report device performance data?

A.

NetFlow

B.

SNMP

C.

BGP

D.

HTTP/2

Which of the following are advantages of GRE tunnels? (Select All that Apply)

A.

GRE tunnels enlarge the scope of a hop-limited network

B.

GRE tunnels can be used to construct VPN networks

C.

ARP packets can be encapsulated through GRE tunnels

D.

Multicast data can be encapsulated through GRE tunnels

MPLS is located between the data link layer and network layer in the TCP/IP protocol stack and can provide services for all network layer protocols.

A.

TRUE

B.

FALSE

Which of the following statements about SR-MPLS Policy path planning are correct?

A.

When planning paths based on bandwidth, you need to set the available bandwidth of each interface in advance.

B.

When planning paths based on delay, you must deploy TWAMP or iFIT in advance to measure real-time network delay.

C.

If you use the controller to plan SR-MPLS Policy paths, only primary and backup paths can be deployed, and load balancing cannot be implemented for the primary path.

D.

When statically planning SR-MPLS Policy paths, you can plan load balancing for the primary path.