There are many people searching for free dumps for H12-224-ENU exam, now we will share Huawei HCNP-R&S H12-224-ENU exam free questions and answers here for you to practice, you also can contact us to get more free questions. And if we update, we will share update version to you.
New feedback: Just passed H12-224-ENU IBM Storage Technical V1 on May.24.2018. number of test questions: 360 Q&As
1.Two Level-1 routers in different areas can establish a neighbor relationship.
A. TRUE
B. FALSE
Answer: B
2.Which of the following tasks need to be completed during the planning stage of a project? (Multiple Choice)
A. Work out the technical design
B. Know the project background
C. Determine the model of network devices in the project
D. Make clear the requirements of a project
E. Plan IP addresses
Answer: BD
3.RSTP provides different functions in different scenarios.
Which of the following statements are false?
A. If the edge port on the switch enabled with BPDU protection receives RST BPDU, the switch sets the edge port as a non-edge-port and triggers STP calculation.
B. The role of the designated port that is enabled with root protection cannot be changed.
C. When the designated port enabled with root protection receives optimal RST BPDUs, the port enters the Discarding state and does not forward packets. If the port does not receive optimal
D. RST BPDUs within a certain period of time, the port will automatically restore to the Forwarding state.
E. After TC protection is enabled, you can set the number of times the switch processes TC BPDUs within a certain period.
Answer: A
4.In the port mirroring, real and reliable data must be collected in real time.
A. TRUE
B. FALSE
Answer: A
5.Which of the following statements regarding the firewall zone security level is false?
A. The default security level of the new zone is 1.
B. Only the security level of the user-defined zone can be configured.
C. The configured security level cannot be changed.
D. Two zones cannot be configured with the same security level.
Answer: A
6.Which information of labels is used for simple traffic classification?
A. DSCP priority
B. IP precedence
C. MPLS EXP priority
D. 802.1p priority
Answer: C
7.In a route-policy, which of the following BGP attributes can be used in if-match clauses? (Multiple Choice)
A. Local-Preference
B. AS_Path
C. TAG
D. Community
Answer: BD
8.Which of the following statements regarding Huawei eSight network management software is false?
A. Multiple users can be created for network management.
B. Users may be asked to log in to eSight from specified IP addresses in specific time ranges.
C. The administrator can force unauthorized login users to log out.
D. The login time of the administrator role also can be limited.
Answer: D
9.On a carrier’s MPLS VPN network, PE1 and PE2 transmit data packets between VPNs. After PE1 receives VPN route 172.16.1.0/24 from a client, it converts the route into a VPNv4 route and distributes label 1027 to the packet. After the packet arrives at PE2, PE2 distributes label 1025 to the packet.
When a client on PE2 accesses this route, what are the outer and inner labels in the packet transmitted over the carrier network?
A. Outer label: 1027; inner label: 1025
B. Outer label: 1025; inner label: 1025
C. Outer label: 1027; inner label: 1027
D. Outer label: 1025; inner label: 1027
Answer: D
10.At which layer does a packet filtering firewall check data packets?
A. Application layer
B. Physical layer
C. Network layer
D. Link layer
Answer: C
11.What are differences between the DiffServ and IntServ models? (Multiple Choice)
A. The DiffServ model provides different services destined for different destinations.
B. The DiffServ model provides different services destined for different sources.
C. The DiffServ model does not need to maintain the status of each flow.
D. The DiffServ model applies to large-scale backbone networks.
Answer: CD
12.VXLAN users can access the Internet through VXLAN interfaces.
A. TRUE
B. FALSE
Answer: A
13.Which of the following statements regarding the any-source multicast (ASM) and source-specific multicast (SSM) models are true? (Multiple Choice)
A. In the SSM model, the receiver hosts have obtained the specific location of the multicast source in advance by other methods.
B. In the ASM model, receiver hosts cannot obtain locations of multicast sources in advance.
C. The SSM model and ASM model use the same multicast group address range.
D. In the SSM model, a multicast distribution tree is established directly between a multicast source and its receiver hosts.
Answer: ABD
14.In the Agile Controller’s access control scenario, Which of the following statements regarding the roles of the RADIUS server and client is true?
A. The Agile Controller integrates all functions of the RADIUS server and client.
B. The Agile Controller as the RADIUS server, while the user terminal as the RADIUS client.
C. The authentication device (such as a 802.1X switch as the RADIUS server, while the user terminal as the RADIUS client.
D. The Agile Controller as the RADIUS server, while the authentication device (such as a 802.1X switch) as the RADIUS client.
Answer: D
15.What happens when the topology of a network running RSTP changes?
A. Packets are flooded on the entire network.
B. The aging time of MAC address entries is changed.
C. Some MAC address entries are deleted.
D. The entire MAC address table is deleted.
Answer: C
16.MPLS performs different actions on labels.
What is the meaning of the pop action?
A. The top label is removed from the MPLS label stack.
B. The top label is added to the MPLS label stack.
C. The top label is replaced with another value.
D. The top label is replaced with the label of another group.
Answer: A
17.In most cases, an IP address that is dynamically assigned by a DHCP server has a lease.
Which of the following statements regarding the IP address lease is false?
A. The lease renewal timer is 50% of the total lease. When the lease renewal timer expires, the DHCP server must renew the IP address lease.
B. The rebinding timer is 87.5% of the total lease.
C. If the rebinding timer expires but the DHCP client does not receive any responses from the DHCP server, the DHCP client keeps sending DHCP Request packets to the DHCP server which assigned an IP address to it before, until the total lease expires.
D. If the DHCP client receives a DHCP NAK packet within the lease, the client stops using the current IP address immediately and returns to the initialization state. The DHCP client then applies for a new IP address.
Answer: C
18.In the multicast network environment, how do an IGMPv1 host and an IGMPv2 muter on the same LAN interact with each other? (Multiple Choice)
A. If any host on a LAN is running IGMPv1, all hosts on the LAN must also use IGMPv1.
B. Membership Report messages sent from the IGMPv1 host will be received by the IGMPv2 muter.
C. If the IGMPv1 is in a specific group, the IGMPv2 muter must ignore all Leave messages received from this group.
D. The version 2 muter must set a countdown timer associated with the group that takes into account the presence of the version 1 host.
Answer: BCD
19.Man-in-the-middle attacks or IP/MAC Spoofing attacks are common on intra nets and will cause information leakage.
Which configuration method can prevent these attacks?
A. Configure the trusted or untrusted interface.
B. Limit the maximum number of MAC addresses that can be learned on a switch interface.
C. Configure DHCP snooping to check the CHADDR field carried in a DHCP Request packet.
D. Configure association between DHCP snooping and IPSG or DAI on the switch.
Answer: D
20.Which of the following commands can leak routes of Level-2 areas into Level-1 areas?
A. import isis level-2 into level-1
B. import-route isis level-2 into level-1
C. advertise isis level-2 into level-1
D. export isis level-2 into level-1
Answer: B
21.Which of the following route selection tools can be used by other routing protocols in addition to BGP? (Multiple Choice)
A. route-policy
B. IP-prefix
C. as-path-filter
D. community-filter
Answer: AB
22.Which of the following BGP attributes can define a set of destination addresses with the public characteristics?
A. Origin
B. Community
C. AS_Path
D. MED
Answer: B
23.Which command is used to enable association between BFD and VRRP?
A. vrrp vrid 1 track bfd-session session-name 1 reduced 100
B. bfd-session vrrp vrid 1 track session-name 1 reduced 100
C. track vrrp vrid 1 bfd-session session-name 1 reduced 100
D. vrrp vrid 1 track bfd-session-name 1 reduced 100
Answer: A
24.What features must a risky operation solution have?(Multiple Choice)
A. Accuracy
B. Good operability
C. Verification
D. Rollback
Answer: ABCD
25.Which of the following items are used to remind customers of information security? (Multiple Choice)
A. Account soft-out reminder
B. Password update reminder
C. Log protection reminder
D. Data backup reminder
Answer: ABCD