Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

H12-821_V1.0 Huawei HCIP-Datacom-Core Technology V1.0 Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Huawei H12-821_V1.0 HCIP-Datacom-Core Technology V1.0 certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 5
Total 346 questions

Which of the following attacks is not the network layer attack?

A.

IP spoofing attack

B.

ICMP attack

C.

Smurf attack

D.

ARP spoofing attack

Which of the following statements regarding the OSPF protocol is false?

A.

Each OSPF router uses only one Router-LSA to describe the local active connection status of an area.

B.

Routing information can be advertised only between backbone and non-backbone areas and cannot be advertised directly between non-backbone areas.

C.

Router-LSA describes four connection types: P2P, TransNet, SubNet, and virtual link.

D.

Link State ID in a Type 3 LSA indicates the router ID of an ABR.

Which of the following routing protocols support the default route through command configuration?

A.

BGP

B.

IS-IS

C.

OSPF

D.

ICMP

On an IS-IS network, each router can generate LSPs. Which of the following events trigger the generation of a new LSP?

A.

Related IS-IS interfaces go up or down.

B.

Periodic updates occur.

C.

Inter-area IP routes change.

D.

The IS-IS interface cost is increased.

In an MST region, MSTP independently calculates an MSTI for each VLAN based on mappings between VLANs and MSTIs.

Which of the following statements is false about the characteristics of MSTIs?

A.

A port must have the same spanning tree parameter settings for different MSTIs.

B.

The spanning tree calculation method of each MSTI is similar to that in STP.

C.

Spanning trees of MSTIs can have different roots and topologies.

D.

Each MSTI sends BPDUs only on its own spanning tree.

An ACL can be used to match routes or data, but cannot be used to match both the IP address prefix length and mask length.

A.

TRUE

B.

FALSE

According to BGP route selection rules, the route with the higher Local_Pref is preferred.

A.

TRUE

B.

FALSE

On an office network of an enterprise, OSPF is enabled on two directly connected routers. During adjacency establishment, the state machine stays in the 2-way state. Which of the following statements are not possible causes?

A.

Hello time values are different.

B.

Area IDs are different.

C.

Router IDs conflict.

D.

The N-bit and E-bit of Hello packets are the same.

On the campus OSPF network shown in the following figure, the interfaces connecting the five routers are GE interfaces, and their costs are not changed. The import-route command is run on R1. After the network converges, the route to the server at 192.168.1.0/24 is queried on R2. Which of the following is the cost of this route?

A.

2

B.

4

C.

3

D.

1

The traffic limiting policy feature only supports the number of connections initiated by the specified IP or the number of connections received.

A.

TRUE

B.

FALSE

Four routers run ISIS and have established adjacencies. The area IDs and router levels are marked in the following figure. If route leaking is configured on R3, which of the following is the cost of the route from R4 to 10.0.2.2/32?

A.

80

B.

50

C.

40

D.

30

Security policy is the core feature of firewalls. Only valid traffic that complies with security policies can be forwarded by firewalls. Which of the following statements are true about security policy matching rules?

A.

Multiple values can be configured for a single matching condition, and the values are logically ANDed.

B.

If a security policy contains multiple matching conditions, the relationship between them is AND.

C.

The system has a default security policy nameddefault, where all matching conditions areanyand the default action ispermit.

D.

When multiple security policy rules are configured, they are sorted in a list by configuration sequence by default. A security policy rule configured earlier is placed higher in the list and has a higher priority.

As shown in the figure, SWA, SWB, SWC, and SWD run the Rapid Spanning Tree Protocol (RSTP). Which of the following statements are true?

A.

Once receiving OPOUs, the edge port re-partlci pates in the calculation of the spanning tree.

B.

After a port is Configured as an edge port, the port can quickly enter the Forwarding state.

C.

You can enable the edge port on SWD's GEO/0/2 connected to the terminal so that this port can quickly enter the Forwarding state.

D.

You can enable the edge port on SWC's GE0/0/2 connected to the terminal so that this port can quickly enter the forwarding state.

In IPv6, to communicate with a destination host, a host must obtain the link-layer address of the destination host through ARP.

A.

TRUE

B.

FALSE

Which of the following protocols are multi-channel protocols?

A.

H.323

B.

FTP

C.

Telnet

D.

SMTP

There are two types of routing entries on a PIM network. (S, G) routing entries are used to set up on a PIM network and are applicable to both PIM-DM and PIM-SM networks.

Which of the following statements regarding the BGP error display of a router false?

A.

The error may be caused by the incorrect neighbor address.

B.

The neighbor address of this router is 10.1.1.5.

C.

Error Type indicates that the BGP error is caused by the neighbor relationship error.

D.

The error occurred at 12:40:39 on March 22, 2010.

An OSPF AS-external LSA describes a route to an AS external network. When the field in the LSA is 0.0.0.0, the traffic destined for the external network is sent to the ASBR that imports this external route. (Enter the acronym in uppercase.)

Route attributes are specific descriptions of routes. BGP route attributes can be classified into four types. Which of the following are well-known discretionary attributes?

A.

Atomic_Aggregate

B.

Local-Preference

C.

Community

D.

MED

This configuration is part of RTA configuration. Which of the following statements regarding the configuration are true?

[RTA] ospf 100

[RTA-ospf-100]silent-interface GigabitEthernet 1/0/0

A.

RTA cannot establish a neighbor relationship with the neighbor that this interface is directly connected to.

B.

GigabitEthernet 1/0/0 is prohibited from sending OSPF packets.

C.

Direct routes of GigabitEthernet 1/0/0 can still be advertised.

D.

This interface cannot send Hello packets.

Page: 2 / 5
Total 346 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved