1 / 7

New H12-261 Huawei Study Guide V13.02 | Killtest

There are a large number of customers who believe in Killtest New H12-261 Huawei Study Guide V13.02, but there are still some candidates are doubting. Killtest new H12-261 study guide have been prepared and verified by the Huawei experts and professionals. Furthermore, these H12-261 exam questions and answers will help you to manage your preparation time. After preparing for H12-261 exam with Killtest online questions and answers, you can easily pass Huawei H12-261 exam at the very first attempt. Here Killtest would like to share H12-261 free pdf questions to help you check the high quality and remove your doubts.

Emma2017
Télécharger la présentation

New H12-261 Huawei Study Guide V13.02 | Killtest

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The safer , easier way to help you pass any IT exams. 1.Cross-device link aggregation enables data stream transmission and mutual backup of stack member switches. However, because of the limited bandwidth of stack cables between stack devices, which of the following methods can be used to improve forwarding efficiency? A. Connect stack devices through stack cards B. Enable stack multiple master check function C. Configure stack system MAC address switching D. Enable traffic local priority forwarding Answer: D 2.About the description of CHAP authentication function in the PPP protocol, which of the following are correct? (Multiple Choice) A. If the authenticator does not have a username, the password cannot be configured on the authenticated interface. B. Calculate a hash value using the authentication sequence ID, random number, and key by the MD5 algorithm C. Three-message interactive authentication is required, and the username is transmitted only on the network without transmitting the password. D. The user name must be configured under the authenticated interface of CHAP authentication. Answer: BCD 3. A switch is running the Rapid Spanning Tree Protocol (RSTP). Upon a topology change, what happens to dynamic entries in the L2 forwarding table? A. Only entries behind the port where TC was received are removed. B. All entries are removed except for those behind edge ports and the port where TC was received. C. All entries are removed (purged). D. All entries are removed except for entries behind edge ports. E. The aging timer is set to 15 seconds, so idle entries age out. Answer: B 4. Which of the following statements is true about the MUX VLAN feature of Huawei switches? A. The MUX VLAN and the Super VLAN features can be used together on the same VLAN. B. The Principal Port can communicate with all ports in the MUX VLAN. C. The Mux VLAN is classified into Principal VLAN and Subordinate VLAN. The Subordinate VLAN is classified into Separate VLAN and Isolate VLAN. D. Each Separate VLAN can be bound to multiple Principal VLANs. Answer: B 5. When you perform troubleshooting on a LAN deployed with Huawei devices, you find that there is a large number of unicast frames with unknown MAC addresses. What is the biggest risk for the switches? A. Available MAC address table entries in the system will be consumed. B. Increased power consumption. C. Exhausts memory for buffered frames. D. Exhausts available TCAM entries. 1 / 5

  2. The safer , easier way to help you pass any IT exams. E. Exhausts available bandwidth. Answer: A 6.About the description of the process of sending and receiving data frames in the Access mode of the switch interface, which is correct? A. Directly discards when receiving a tagged data frame in Access mode B. Only receive unlabeled data frames in Access mode C. When the data frame enters the switch interface, the switch learns the destination MAC address in the data frame. D. In the Access mode, the VLAN tag of the data frame will be stripped off when sent. Answer: D 7. In Rapid Spanning Tree Protocol (RSTP), which port provides a backup path to the root bridge and which state should this port be in? A. Root port/listening B. Alternate port/forwarding C. Alternate port/learning D. Designated port/learning E. Alternate port/discarding Answer: E 8.Which of the following options may affect the establishment of IBGP neighbors? (Multiple Choice) A. Authentication is unsuccessful B. The BGP protocol version is inconsistent C. IBGP-Multi-hop is not configured D. IGP routing is unreachable Answer: ABD 9.The following is about the RD attribute filter of BGP, what is the correct description? (Multiple Choice) A. If RD-filter is configured, but the RD of the route does not match any of the RDs defined in the rule, the default match result is Permit. B. The relationship between the rules configured by RD-filter is "or" C. If RD-filter is not configured, but this RD-filter is used for filtering, the matching result is deny. D. Matching multiple rules in the order of configuration Answer: BD 10.ISIS will elect DIS in the broadcast multi-access network. Which of the following statement about DIS is correct? (Multiple Choice) A. ISIS elects the DIS by comparing the priorities and compares the MAC addresses if the priorities are the same. B. DIS guarantees database synchronization by periodically sending CSNP messages C. In a broadcast multi-access network, the DIS sends Hello PDUs three times as often. D. DIS supports the preemption function. After the new DIS preemption is successful, you do not need to flood any LSP packets. 2 / 5

  3. The safer , easier way to help you pass any IT exams. Answer: ABC 11.About Filter-policy, which of the following description is correct? A. Filtering the generation of type 5 LSAs and type 7 LSAs on the ASBR in OSPF using Filter-Policy B. The prefix list can filter routes as well as filter packets. C. Filter-Policy can filter the received or advertised link state information and can modify the attributes of the route entry. D. When filtering routes using the prefix list, the entry ip ip-prefix 1 deny 0.0.0.0 0 less-equal 32 means that only the default route is matched. Answer: A 12.The OSPFv3 protocol is a separately developed protocol. It differs from OSPFv2 in that OSPFv3 is based on links rather than network segments. Which of the following statement is wrong? A. The two routers connected to the link can establish neighbor relationships even if their IPv6 address prefixes are different. B. The two routers connected to the link can establish neighbor relationships even if no unicast IPv6 address is configured. C. The routing information obtained by the OSPFv3 router from the neighbor uses the link-local address of the neighbor as the next hop of the forwarded packet. D. All OSPFv3 interfaces use the Link-local address as the destination address of the packet except the virtual link. Answer: D 13.Which of the following statements are NOT true regarding the TCP sliding window? (Multiple Choice) A. If the retransmission timer expires but the sender has not received the acknowledgement, it will retransmit the unacknowledged data. B. The sender need not transmit a full window's worth of data. C. TCP sliding window allows the transmission of multiple frames before waiting for an acknowledgement. D. The size of the sliding window can only increase or stay the same. E. The size of initial window is advertised by the sender. Answer: DE 14.As shown in the following figure, in IPv4 and IPv6 environments the SEL value in an IS-IS NET address is always 00. A. Ture B. False Answer: A 15.As shown in the following figure, a part of the LSP of the LSDB of a router is shown in the first line of 3 / 5

  4. The safer , easier way to help you pass any IT exams. the figure. First received a new LSP, the second hop in the following picture, which of the following statement is wrong? A. The router will put the newly received LSP into the LSDB. B. This router will ignore the LSP received from the neighbor. C. If it is a point-to-point network, this router will send PSNP D. If it is a broadcast network, the DIS will include the summary information of the LSP in the next CSNP packet. Answer: A 16.Regarding the Stub area and the NSSA area of OSPF, the wrong statement of the following is _____. A. Type 5 LSA is not allowed in the Stub area, but Type 5 LSA is allowed in the NSSA area. B. Both the Stub area and the NSSA area are allowed to inject Type 3 LSA. C. Stub area and NSSA area are not allowed to inject Type 4 LSA. D. Type 7 LSA is not allowed in the Stub area, but Type 7 LSA is allowed in the NSSA area. Answer: A 17.Regarding BGP route filtering, which of the following description is wrong? A. For a locally advertised route, configure a routing policy. The policy takes effect before the route is added to the BGP routing table. B. The filtering relationship between the nodes of the Route-Policy is "OR", that is, the Route-Policy can be passed with a node filter only. C. When receiving a route from a BGP peer, perform a routing policy to filter unwanted BGP routes. These routes are not added to the local BGP routing table. D. In the same node of Route-Policy, the relationship of multiple if-match clauses for different attributes is "OR". Answer: AD 18.If the value of the Option field in the OSPFv3 Hello packet sent by GigabitEthernet 0/0/0 on Router A is 0x000013, the correct description of the following is: (Multiple Choice). A. GigabitEthernet0/0/0 of Router A belongs to the NSSA area. B. GigabitEthernet0/0/0 of Router A will participate in IPv6 route calculation. C. Router A is an OSPFv3 device with forwarding capability D. Router A supports AS-External-LSA flooding Answer: BCD 4 / 5

  5. The safer , easier way to help you pass any IT exams. 19.The ISIS protocol is deployed in an IPv6 environment. The correct statement in the following is: A. In broadcast networks, the DIS priorities of IPv4 and IPv6 can be set separately. B. By default, the DIS priority of the broadcast network interface on Level-1 and Level-2 is 1. C. In the same broadcast network, if each router supports both IPv4 and IPv6, the DIS of IPv4 and IPv6 must be the same device. D. Configure ISIS silent on the ISIS interface, then this interface will not send ISIS packets, but will receive ISIS packets. Answer: A 20.After BGP imports routes of other protocols, the next hop in the BGP routing table is the same as the next hop of the introduced routing protocol. A. True B. False Answer: B 5 / 5

More Related