Leads4pass > Huawei > Huawei Certifications > H12-261 > H12-261 Online Practice Questions and Answers

H12-261 Online Practice Questions and Answers

Questions 4

The following is about the correct change of the MUX VLAN in Huawei.

A. Under the same one, you can mix and use VLAN MUX VLAN Super VLAN

B. MUX VLAN Principal VLAN Subor is divided into and divided into dinate VLANs, Subordinate VLAN S is separate VLAN and Isolate VLAN

C. Each can be bound to multiple Separate VLAN Principal VLANs

D. Principal Port MUX VLAN can communicate with all interfaces inside

Buy Now
Questions 5

Which of the following may affect the establishment of the option IBGP ( ) neighbor? Multiple selection

A. Authentication is unsuccessful

B. The BGP protocol version is inconsistent

C. IBGP ?Multi-hop not configured

D. IGP routing is unreachable

Buy Now
Questions 6

About FTP Protocol Which of the following descriptions is correct

A. In the mode, the client completes the control and data FTP Passive, the TCP user's initialization

B. In the mode, the server is connected to the command FTP Active, "PORT is used to tell the client which port it wants to send data to.

C. FTP TCP always uses a remote control information and data information

D. FTP TCP 20, ICP 21 Always use the far port to establish a data session. Use the port to establish control.

E. Session E.FTP TCP 21, TCP 20 Always use the far port to establish a data session Use the port to establish a control session

Buy Now
Questions 7

Which of the following attacks belong to the DoS (Denial of Service) attack?

A. Single attack package attack

B. Source address bullying IP scam

C. Chinese attack

D. Flood attack

Buy Now
Questions 8

About the MPLS, network device in the network model, the way to report the message, the following describes the error.

A. The label forwarding path LSP is a forwarding report protocol that is determined and established in the document.

B. LER LSR and the Metro Line are assigned to the label.

C. LSR must not strip labels.

D. If the MPLS IP, domain information device is lost, it will be discarded.

Buy Now
Questions 9

What are the differences between traffic policing and traffic shaping?

A. For traffic shaping, you can adjust the usage of the buffer for the traffic that exceeds the CIR.

B. For traffic policing, you can adjust the usage of the buffer for the traffic that exceeds the CIR.

C. For traffic shaping, the router buffers excess packets until the bandwidth is available again.

D. Traffic policing uses the token bucket algorithm and traffic shaping uses the SPD algorithm.

E. Traffic shaping is applied in the inbound direction and traffic policing is applied in the outbound direction.

Buy Now
Questions 10

Huawei switches SWA and SWB are connected through seven physical Ethernet links and are configured with static link aggregation. On SWA, the interface and are configured in the following sequence: Ethernet 1/0/1, Ethernet 1/0/2, Ethernet 1/0/3, Ethernet 1/0/4, Ethernet 1/0/5, Ethernet 1/0/6, Ethernet 1/0/7. If only six ports are supported in a LAG on SWA and SWB, which of the following statements is true?

A. If the configurations of different ports are consistent, SWA selects one of the seven ports at random to be the Unselected port of the LAG.

B. If the configurations of different ports are consistent, Ethernet 1/0/6 is the Unselected port of the LAG.

C. If the configurations of different ports are consistent, Ethernet 1/0/7 is the Unselected port of the LAG.

D. If the configurations of different ports are consistent, Ethernet 1/0/1 is the Unselected port of the LAG.

Buy Now
Questions 11

Typically, users within a VPN only communicate with other users in the same VPN. They cannot communicate with users on the Internet or access the Internet. Many VPN sites, however, may need to access the Internet. Which of the following statements regarding interconnection between the VPN and the Internet are true?

A. The interconnection between the VPN and the Internet can be implemented on the PE. However, the implementation is complex and may bring security risks. The PE is vulnerable to DoS attacks from the Internet.

B. Directly connect the CE to the Internet on the user side. Each user site can independently access the Internet. That is, a default route destined for the Internet is configured on the CE of each site.

C. Configure the PE to send a default route destined for the Internet to the CE, and add a default route destined for the Internet gateway to the VPN instance routing table.

D. Isolating public network routes and VPN routes on the user side is simple, secure, and reliable.

Buy Now
Questions 12

In traffic policing, dual buckets at dual rates are used. The number of tokens in bucket C is TC, and the number of tokens in bucket P is TP. When a packet with a length of B is received, which of the following statements are true?

A. If (TP-B) and (TC-B) are larger than 0, the packet is marked green

B. If (TP-B) is larger than 0 and (TC-B) is smaller than 0, the packet is marked yellow

C. If (TP-B) is larger than 0 and (TC-B) is smaller than 0, the packet is marked green

D. If (TP-B) and (TC-B) are smaller than 0, the packet is marked red

Buy Now
Questions 13

When an advertised route is deleted from a BGP router, the BGP router sends an Update packet to withdraw the route. This Update packet carries the well-known mandatory attributes of the route to be withdrawn.

A. True

B. False

Buy Now
Exam Code: H12-261
Exam Name: HCIE-Routing & Switching (Written) V3.0
Last Update: Jan 17, 2024
Questions: 60
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99