Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Huawei H12-921_V1.0 - HCIE-Data Center Network (Written) V1.0

Page: 4 / 8
Total 239 questions

Which of the following features can be used in the Cloudfabric centralized storage NoF+ solution to manage the connected hosts and storage nodes?

A.

BFD

B.

LLDP

C.

PFC

D.

Zone

IN THE CLOUDFABRIC SOLUTION, WHEN USING MDC TO ROW AWS HAS A CLOUD NETWORK, IGWS IN THE AWS TYPE WILL BE PROJECTED AS WHICH OF THE FOLLOWING OPTIONS? ?

A.

Logic Router

B.

IGW routing table

C.

TransitRouter

D.

External Gateways

What is correct about the following description of Docker?

A.

Image in Docker can be regarded as a special file system, which only provides the programs required by the container runtime, and the libraries, resources, configurations, and other files required by the container runtime are hosted by the host Machine OS provides

B.

The Docker engine obtains the image from the repository and runs the container on the corresponding host

C.

Image files are stored centrally in a repository and can be public or private

D.

Docker containers are created based on images, and a running container is a process running on a Docker host

In the Huawei CloudFabric solution, the network controller uses the NETCONF device to deliver configurations. Which of the following encodings does NETCONF information use?

A.

XML

B.

HTML

C.

JSON

D.

PROTOBUF

When service packets are connected to a VXLAN network through a Layer 2 sub-interface, different flow encapsulation types need to be configured on different Layer 2 sub-interfaces

The same physical interface can access different data packets. Which of the following is NOT a stream encapsulation type that is supported by a Layer 2 sub-interface?

A.

QinQ

B.

Untag

C.

Dotlq

D.

Trunk

Which of the following Linux namespaces implements process IDs that can be duplicated but do not affect each other?

A.

IPC

B.

PID

C.

UIS

D.

UID

Which of the following components of the CloudFabric Intelligent Lossless Network Solution for Multi-Computing Scenarios needs to support lossless features such as AI ECN to improve network performance?

A.

iMaster NCE-FabricInsight

B.

Router

C.

Data center switches

D.

SmartNICs

Which of the following descriptions of CloudFabric component deployments is correct?

A.

IMaster NCE-FabricInsight is an optional component, and its collector and analyzer must be co-deployed

B.

When a large data center requires multiple sets of iMaster NCE-Fabric, MDAs can be deployed to work with multiple sets of controllers to implement cross-data center VPC service orchestration

C.

IMaster NCE-Fabric is a required component and can only be deployed in clusters

D.

SecoManager is an optional component that can be deployed in conjunction with iMaster NCE-Fabric

Which of the following descriptions of VNI in a VXLAN network is correct?

A.

L3 VNI is associated with a VPN instance to forward VXLAN packets across subnets, and VPIN instances associated with different L3 VNIs only need to be RT Values can be matched to achieve interoperability

B.

A tenant can have one or more VNIs with a VNI length of 16 bits, supporting millions of tenants

C.

L2 VNI is used to forward VXLAN packets on the same subnet, and different BDs can also use the same L2 VNI to achieve Layer 2 communication on VXLAN networks. All VXLAN packets carry both L2 VNI and L3 VNI

What are the correct items in the following description of lossless network architecture design in multivariate computing scenarios?

A.

In the case of a two-level network, the Spine switch does not have an uplink interface, and all ports are used to connect to the Leaf switch

B.

When designing a network architecture, a bottom-up approach is generally used to determine how many layers of architecture to use based on the size of the network

C.

In two-tier networking, the number of Spine switches is equal to the total number of upstream interfaces of all leaf switches divided by the number of interfaces per Spine switch and rounded up by D

D.

First, the total number of network access interfaces is determined according to the number of computing nodes in the cluster and the number of service interfaces of each node