H12-821_V1.0-ENU試験無料問題集「Huawei HCIP-Datacom-Core Technology V1.0 認定」

When creating a security zone in the USG firewall, which of the following is the default security priority?

IGMP SSM Mapping statically binds the multicast source to the multicast group, so that group members of IGMPv1 and IGMPv2 can also access the SSM multicast network. Which of the following descriptions about IGMP SSM Mapping is wrong?

Which of the following is not the main function of NDP?

Which of the following descriptions about the reset ip ip-prefix command is correct?

Which of the following reasons may prevent OSPF neighbor relationships from being established?
(Multiple choice)

When the Hold Time supported by two devices running BGP is inconsistent, the neighbors will negotiate to use the smaller time as the Hold Time interval.

Which of the following descriptions of MAC address spoofing attacks is incorrect?

SSH negotiates a variety of algorithms during its implementation. So which of the following are included in the algorithm categories used by SSH? (Multiple choice)

正解:A,C,D,E 解答を投票する
Server-Map is generated based on which of the following sets of parameters?

Which of the following descriptions about the recognized attributes in BGP are correct? (Multiple choice)

正解:B,C,D 解答を投票する
By default, the sending interval of BFD packets is ______ milliseconds, the receiving interval is
______ milliseconds, and the local detection is ______ times.
正解:
1000|1000|3
IPv6 address 2001:FC1A:8BAD:0112:0000:1200:0000:0001/64 is abbreviated to
2001:FC1A:8BAD:112:0:1200::1/64

As shown in the figure, four Huawei switches have been running and configured with the MSTP protocol. Now SW3 needs to be set as the root bridge of Instance 10. Which of the following commands can be used to achieve this?

The network administrator of a company checks the FIB of the router. What fields does the FIB contain? (Multiple choice)

Please pair the following IGMP versions with the corresponding working mechanisms.
正解:
Which of the following does not include the switch role in the stack system?

IS-IS overload flag refers to the OL field in the LSP message. After setting the overload flag on a device, other devices will not use this device for forwarding when calculating SPF, and will only calculate the direct route of the device.

As shown in the figure, network administrator A can control the path of traffic entering AS100 after modifying the MED value of the routing entries sent to R2 on the R1 router through the routing policy.

Regarding the description of the routing tool, which of the following statement is wrong?