This page was exported from Exam for engine [ http://blog.test4engine.com ] Export date:Mon Nov 18 2:40:44 2024 / +0000 GMT ___________________________________________________ Title: Latest Huawei H12-821_V1.0-ENU Exam questions and answers [Q280-Q301] --------------------------------------------------- Latest Huawei H12-821_V1.0-ENU Exam questions and answers Test4Engine H12-821_V1.0-ENU Exam Practice Test Questions (Updated 966 Questions) To prepare for the Huawei H12-821_V1.0-ENU exam, candidates can take advantage of the Huawei Learning Services, which offers a wide range of training courses and resources. These resources include classroom training, e-learning courses, and self-study materials, including books, practice exams, and online forums.   NEW QUESTION 280Which of the following statements about OSPF and IS-IS is wrong?  Both OSPF and IS-IS are the link state protocols.  Both DR and BDR need to be elected in the broadcast network  Both OSPF and IS-IS use Hello packets to establish and maintain neighbor relationships  Both OSPF and IS-IS support area division NEW QUESTION 281Which of the following descriptions about IGMP Proxy is wrong?  In order to alleviate the pressure on the IGMP querier, the IGMP Proxy device aggregates the membership report / leave messages and sends them to the IGMP querier  The IGMP Proxy device can proxy the IGMP querier to send query messages to member hosts  The host interface refers to the interface configured with the IGMP function on the IGMP Proxy device, which is generally for group members  You can enable the IGMP proxy function through the igmp-snooping proxy command NEW QUESTION 282Which of the following reasons may cause the failure to establish a BGP neighbor relationship?(Multiple choice)  Neighbor configuration information is wrong  IP route unreachable  Fiber optic cable break  Disable TCP179 port number NEW QUESTION 283The existing R1 and R2 form a VRRP backup group with a VRID of 2. If the user wants to set R1 as the gateway for forwarding data in the backup group, which of the following configurations can be used to achieve this? (Multiple choice)  Set the VRRP priority of R1 to 200, and keep the default value of R2  Set the VRRP priority of R2 to 50, and keep R1 at the default value  Set the VRRP priority of R1 to 255, and keep the default value of R2  Set the VRRP priority of R2 to 0, and keep R1 at the default value NEW QUESTION 284In a multi-level RR scenario, the first-level RR will be connected to a large number of second-level RRs, which may cause the BGP routing table of the first-level RR to overflow. What method can be used to reduce the risk of overflowing the BGP routing table of the first-level RR?  ORF  Routing Control  Route aggregation  Set the same Cluster–ID NEW QUESTION 285The RSTP protocol provides a variety of protection functions. For example, when the edge port is configured in the protected state, after the edge port receives the BPDU message, what is the processing method?  Forward BPDU packets as required  Get relevant information after BPDU message  Close the port  Directly discard BPDU packets NEW QUESTION 286In the RSTP network shown in the figure, according to the configuration of SWC in the figure, it can be judged that the type of E0/1 port of SWC is : (Multiple choice)  Edge port  Preliminary port  Designated port  Root port NEW QUESTION 287In IS-IS, DIS is used to create and update pseudo nodes, and is responsible for generating link state protocol data unit LSP of pseudo nodes.What is the priority of DIS by default?  10  64  0  127 NEW QUESTION 288The MQC traffic behavior supports multiple actions on messages. Please match the actions of the following MQC traffic behaviors with their functions. NEW QUESTION 289In the process of IS-IS, configured filter-policy 2000 export, which of the following statement on the role of the command is wrong?  It needs to be used in conjunction with route import, which is used to advertise only part of the imported external routes to neighbors  This command will filter the link state information released to the outside world  If this command is not configured, the device will advertise all the routes imported by the external routing protocol to the S-IS by default  It will restrict the external release of routing entries generated by the device itself NEW QUESTION 290When configuring the BGP, if such a warning is generated: ” BGPI6ESTABLISHED:OID[oid] The BGP FSM enters the Establishedstate”, which of the following description is true?  Indicates that the BGP neighbor has been established  The warning message is abnormal and must be dealt with  Explain that this type of alarm is generated due to TCP problems  Explain that there is a problem due to OPEN message negotiation between BGP neighbors NEW QUESTION 291The BGP protocol is an inter-domain routing protocol. Which of the following description of the protocol is correct? (Multiple choice)  Neighbor authentication is not supported  Support automatic discovery of neighbors  Support rich routing strategies  The BGP protocol uses a reliable transport protocol NEW QUESTION 292In inter-domain packet filtering, which of the following is used to enter the outbound direction?  trust-untrust  untrust-dmz  trust-local  untrust-trust NEW QUESTION 293When two routers exchange database information through DD messages, a master-slave relationship is first formed, and the router with the larger ID must be the master.  True  False NEW QUESTION 294When configuring dual-link hot backup, the engineer configured the CAPWAP heartbeat detection interval to be 20 seconds, and the dual-link backup function is enabled, then what is the time for the AP detecting that the active link times out to perform the active/standby switchover?  75 seconds  20 seconds  60 seconds  90 seconds NEW QUESTION 295Among the following encryption algorithms, which one requires the use of two different secret keys, the public key and the private key?  AES  RSA  DES  3DES NEW QUESTION 296As shown below, the firewall received from PC1 to PC2 packets, which of the following statement is correct? (Multiple choice)  The message cannot match any security policy  The message matches the security policy rule 1, and the firewall will forward the message  There is no configuration source in the security policy rule2, and the security domain shows that it matches any security domain  The packet matches the security policy rule 2 and will be discarded by the firewall NEW QUESTION 297In RSTP, many optional protection functions are set to prevent the Layer 2 network from being invaded by malicious users.So which of the following descriptions about TC-BPDU functions are correct? (Multiple choice)  By default, the time required for the device to process the maximum number of topology change packets is Hello Time  After this function is enabled, for other TC BPDU packets that exceed the threshold, the device only processes them once after the timer expires  The anti-TC-BPDU attack function can be configured and enabled on all interfaces  By default, the maximum number of topology change packets processed by the device within a specified time is 2 NEW QUESTION 298Which of the following regarding the stacked MAD detection is false?  When stacking systems act as agents for each other to perform MAD detection, the two stacking systems can use the same Domain ID  MAD detection methods are divided into direct connection detection and proxy detection  MAD proxy detection requires all stack members connected to the proxy device, and added the linked link to a Eth-Tunk  MAD direct connection detection can pass through the intermediate device, also can adopt the full-mesh method NEW QUESTION 299Unlike STP, RSTP has only one BPDU type, its value is 2, and there is no TCN BPDU.  True  False NEW QUESTION 300About the OSPF calculating the shortest path tree phase, which of the following description is true?  Stub network segment is calculated in the first stage, router node and transit network segment are calculated in the second stage  The routing node and Transiti network segment are calculated in the first stage, Stub network segment is calculated in the second stage  The Stub segment is calculated in the first stage, the routing node is calculated in the second stage  The routing node is calculated in the first stage, the stub network segment is calculated in the second stage NEW QUESTION 301After a switch is powered on, it joins a running stack system. This behavior is called stack joining.  True  False  Loading … Pass Your Huawei Exam with H12-821_V1.0-ENU Exam Dumps: https://www.test4engine.com/H12-821_V1.0-ENU_exam-latest-braindumps.html --------------------------------------------------- Images: https://blog.test4engine.com/wp-content/plugins/watu/loading.gif https://blog.test4engine.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2024-03-20 10:45:21 Post date GMT: 2024-03-20 10:45:21 Post modified date: 2024-03-20 10:45:21 Post modified date GMT: 2024-03-20 10:45:21