Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

H12-891_V1.0 Huawei HCIE-Datacom V1.0 Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Huawei H12-891_V1.0 HCIE-Datacom V1.0 certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 4
Total 322 questions

On the campus network shown, IPv6 is deployed for service tests. Four routers are deployed on the network, and these routers use OSPFv3 for network connectivity. Which of the following statements about LSAs generated by the OSPFv3 network is incorrect?

A.

R1 generates Router-LSAs describing interface information and receives Router-LSAs generated by R2 and R3.

B.

R1 receives two Link-LSAs generated by R2. The two Link-LSAs describe information about the two links connected to R2.

C.

The LSDB of R1 contains Network-LSAs generated by R3, indicating that R3 may be the DR on the local link.

D.

R2 functions as an area border router (ABR), generates Inter-Area-Prefix-LSAs that describe the IPv6 address prefix of area 1, and advertises these Inter-Area-Prefix-LSAs to R1 and R3.

When Huawei iMaster NCE-IP is used to configureSR-MPLS TE tunnels, which of the following protocols is used by the controller to collect device running status information?

A.

Telemetry

B.

Telnet

C.

BGP-LS

D.

IS-IS

An SRv6 Policy can be either statically configured on a device, or be delivered to a device after being dynamically generated by the controller.

A.

TRUE

B.

FALSE

Which of the following parameters is not included in an IPsec security association (SA)?

A.

Security parameter index (SPI)

B.

Destination IP address

C.

Security protocol ID (AH or ESP)

D.

Source IP address

In the firewall hot standby scenario, which of the following status information can be backed up between the active and standby firewalls?

A.

Server mapping table

B.

AAA user table (excluding the default user admin)

C.

Session table

D.

Dynamic MAC address table

SSH connections are usually established based on TCP/IP connections. In specific cases, SSH connections can be established based on UDP connections.

A.

TRUE

B.

FALSE

This figure shows anSRv6 (Segment Routing over IPv6)packet. If theDestination Addressfield in the IPv6 basic header isFC04::4, the value of theSL (Segment Left)field in the SRv6 header should be____.(Enter only digits.)

The naming of SRv6 instructions complies with certain rules. You can quickly determine the function of an instruction based on the instruction name. Which of the following statements about the keywords in SRv6 instruction names are correct?

A.

T: searches a specified routing table to forward packets.

B.

M: searches a Layer 2 forwarding table for unicast forwarding.

C.

V: searches a VPN instance routing table to forward packets.

D.

X: forwards packets through one or a group of specified Layer 3 interfaces.

IPsec uses an asymmetric encryption algorithm to encrypt the symmetric algorithm key, which it uses to encrypt/decrypt data, ensuring security and performance.

A.

TRUE

B.

FALSE

A network administrator runs thedisplay telemetry subscriptioncommand on a device to check telemetry subscription information. The command output is as follows:

[~CE] display telemetry subscription

Sub-name : Sub1

Sensor group:

Sensor-name Sample-interval(ms) State

Sensor1 1000 RESOLVED

Destination group:

Dest-name Dest-IP Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20000 RESOLVED - GRPC

Sub-state : PASSIVE

Total subscription number is : 1

Which of the following statements is incorrect?

A.

The device sends sampled data every second.

B.

The subscription name is Sub1.

C.

The subscription mode is static subscription.

D.

The IP address of the device is 192.168.56.1.

The channelized sub-interface and FlexE technologies both can be used to implement network slicing, but the application scenarios of the two technologies are slightly different. Which of the following statements about the two technologies are correct?

A.

It is recommended that channelized sub-interface be used to reserve resources for interfaces with a bandwidth of less than 50 Gbit/s.

B.

It is recommended that FlexE be used to reserve resources for 50GE and higher-rate interfaces.

C.

Only FlexE-based network slicing can be deployed across OTN devices.

D.

Only network slicing based on channelized sub-interface can be deployed across MSTP devices.

Which of the following are advantages of GRE tunnels? (Select All that Apply)

A.

GRE tunnels enlarge the scope of a hop-limited network

B.

GRE tunnels can be used to construct VPN networks

C.

ARP packets can be encapsulated through GRE tunnels

D.

Multicast data can be encapsulated through GRE tunnels

OSPF is a mature protocol and is unlikely to have route computation errors in a regular networking environment under correct configurations. Which of the following statements are correct about the possible causes preventing an OSPF neighbor relationship from entering Full state?

A.

A link works abnormally.

B.

The OSPF network types on both ends of the link are inconsistent.

C.

The router IDs of neighbors are the same.

D.

The OSPF MTU values of interfaces on both ends of the link are different.

On a VXLAN-based virtualized network, if the fabric networking mode is centralized gateway networking, the gateway is located on the _____ device. (Capitalize the first letter.)

OSPF is deployed on a campus network to implement network interconnection. The LSDB of R2 is shown in the figure.

What can be determined from the LSDB?

A.

Area 1 is an NSSA.

B.

R2 translates Type 7 default route into Type 5 default route.

C.

R2 advertises the default route in the OSPF process.

D.

Area 1 does not have Type 3 LSAs. The possible cause is that R2 filters Type 3 LSAs in the outbound direction of area 1.

A network administrator runs the display telemetry subscription command on a device to check telemetry subscription information. The command output is as follows. Which of the following statements is incorrect?

[~CE] display telemetry subscription

Sub name : Sub1

Sensor group:

Sensor-name Sample-interval(ms) State

Sensor1 1000 RESOLVED

Destination group:

Dest-name Dest-IP Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20030 RESOLVED - GRPC

Sub state : PASSIVE

Total subscription number is : 1

A.

The device sends sampled data every second.

B.

The subscription mode is static subscription.

C.

The IP address of the device is 192.168.56.1.

D.

The subscription name is Sub1.

BFD can implement millisecond-level link status detection.

A.

TRUE

B.

FALSE

BGP routing policies can be used to control the advertisement and acceptance of routes.

A.

TRUE

B.

FALSE

A network administrator runs the display telemetry destination command on a device to check information about a destination group that sampled data is sent to. The command output is as follows. Which of the following statements is incorrect?

[~CE-telemetry-sensor-group-Sensor1]display telemetry destination

Dest-name Dest-addr Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20000 RESOLVED - GRPC

A.

The IP address of the destination group is 192.168.56.1

B.

The destination group name is Dest1.

C.

VPN encapsulation is used for data push.

D.

The gRPC protocol is used for data push.

Refer to the following command output on the router R1. Which of the following statements isincorrect?

display interface Tunnel

Tunnel0/0/0 current state : UP

Line protocol current state : UP

Last line protocol up time : 15:21:23 UTC-08:00

Description: ! 0.0.3.3

Route Port, The Maximum Transmit Unit is 1500

Internet Address is 20.1.1.1/24

Encapsulation is TUNNEL, loopback not set

Tunnel source 10.0.1.1 (LoopBack0), destination 10.0.3.3

Tunnel protocol/transport GRE/IP, key disabled

keepalive disabled

Checksumming of packets disabled

Current system time: 15:21:37-08:00

300 seconds input rate 0 bits/sec, 0 packets/sec

300 seconds output rate 0 bits/sec, 0 packets/sec

13 seconds input rate 0 bits/sec, 0 packets/sec

13 seconds output rate 448 bits/sec, 0 packets/sec

9 packets output, 824 bytes

0 output error

Input bandwidth utilization : -

Output bandwidth utilization : -

A.

Key authentication is disabled for the tunnel.

B.

The destination IP address of the tunnel is 10.0.3.3.

C.

The tunnel is a GRE tunnel.

D.

Keepalive detection is enabled on the tunnel.

Page: 2 / 4
Total 322 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved