Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

H12-891_V1.0 Huawei HCIE-Datacom V1.0 Free Practice Exam Questions (2026 Updated)

Prepare effectively for your Huawei H12-891_V1.0 HCIE-Datacom V1.0 certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 3 / 4
Total 322 questions

Which of the following statements about OPS (Open Programmability System) application scenarios is incorrect?

A.

To enable a network device to automatically send a configuration file to the server after the device configuration is saved, users can use the maintenance assistant to create a timer trigger condition and periodically run the Python script.

B.

When the OPS is used to automatically deploy unconfigured devices, a Python script is used to obtain the IP addresses of the software and configuration file server and download the system software and configuration file.

C.

The OPS can reduce the impact of the network environment in some cases. For example, when collected information is transmitted to a server, the Python script can be used to temporarily store the execution result to the device when the network is disconnected. After the network is reconnected, the execution result is transmitted to the server.

D.

The OPS can be used to automatically check the health status of devices.

Which of the following channels are involved in the Huawei SD-WAN Solution?

A.

Management channel

B.

Control channel

C.

Data channel

D.

Orchestration channel

With telemetry, certain data can be sampled based on specific sampling paths. Which of the following sampling paths are supported by telemetry?

A.

Interface statistics

B.

Information about the optical module on an interface

C.

CPU information

D.

Memory information

As shown in the figure, what is known about the default routes on R4?

Routing Table on R4:

< R4 > display ip routing-table protocol isis

Destination/Mask Proto Pre Cost Flags NextHop Interface

0.0.0.0/0 ISIS-L1 15 10 D 10.1.24.1 GigabitEthernet0/0/1

ISIS-L1 15 10 D 10.1.34.1 GigabitEthernet0/0/0

172.16.1.2/32 ISIS-L1 15 10 D 10.1.24.1 GigabitEthernet0/0/1

172.16.1.3/32 ISIS-L1 15 10 D 10.1.34.1 GigabitEthernet0/0/0

A.

Four equal-cost default routes

B.

One default route

C.

Two default routes with different costs

D.

Two equal-cost default routes

To prevent hackers from attacking user devices or networks using MAC addresses, you can configure MAC addresses of untrusted users as blackhole MAC addresses to filter out such invalid MAC addresses. When receiving a packet whose source or destination MAC address is a blackhole MAC address on a device, the device discards the packet.

A.

TRUE

B.

FALSE

Drag the OSPFv3 LSAs to map them to their corresponding transmission ranges.

The ________ command can be run to completely isolate Layer 2 and Layer 3 of different interfaces in a VLAN. (Use lowercase letters to supplement the command, which cannot be abbreviated.)

A network administrator runs the display telemetry subscription command on a device to check telemetry subscription information. The command output is as follows. Which of the following statements is incorrect?

[~CE] display telemetry subscription

Sub name : Sub1

Sensor group:

Sensor-name Sample-interval(ms) State

Sensor1 1000 RESOLVED

Destination group:

Dest-name Dest-IP Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20030 RESOLVED - GRPC

Sub state : PASSIVE

Total subscription number is : 1

A.

The device sends sampled data every second.

B.

The subscription mode is static subscription.

C.

The IP address of the device is 192.168.56.1.

D.

The subscription name is Sub1.

On traditional campus networks, network admission control (NAC), VLAN, and ACL technologies are used to control users ' network access rights. This results in heavy network O & M workload. Which of the following improvements does the free mobility solution of iMaster NCE-Campus make to traditional campus networks in terms of policy management and control?

A.

Administrators can use iMaster NCE-Campus to centrally manage service policies on network-wide policy enforcement points.

B.

Administrators can define service policies based on security groups to decouple service policies from IP addresses.

C.

Administrators need to configure service policies multiple times for each policy enforcement point through iMaster NCE-Campus, which then automatically delivers the policies to the corresponding policy enforcement points.

D.

Policy enforcement points on a network can subscribe to IP-security group entries through iMaster NCE-Campus to obtain the mapping between users and IP addresses on the entire network.

OSPF is a mature protocol and is unlikely to have route computation errors in a regular networking environment under correct configurations. Which of the following statements are correct about the possible causes preventing an OSPF neighbor relationship from entering Full state?

A.

A link works abnormally.

B.

The OSPF network types on both ends of the link are inconsistent.

C.

The router IDs of neighbors are the same.

D.

The OSPF MTU values of interfaces on both ends of the link are different.

Which of the following is the drop probability of packets exceeding the upper threshold in WRED?

A.

0.2

B.

0.5

C.

1

D.

0.8

In the admission design for large- and medium-sized campus networks, which of the following authentication modes can be used for PCs connected to IP phones?

A.

MAC address authentication

B.

802.1X authentication

C.

Multi-mode authentication

D.

Portal authentication

When you configure a virtualized campus network on iMaster NCE-Campus and enable external networks to connect to the Internet, iMaster NCE-Campus will automatically deliver a specific route to direct traffic to the corresponding external network.

A.

TRUE

B.

FALSE

The Ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is ______ IRB forwarding. (Capitalize the first letter.)

VLAN-based MAC address flapping detection is configured. If MAC address flapping occurs, actions to be taken on an interface can be configured as required. Which of the following actions cannot be configured?

A.

Traffic filtering

B.

Alarm sending

C.

MAC address blocking

D.

Interface blocking

The naming of SRv6 instructions complies with certain rules. You can quickly determine the function of an instruction based on the instruction name. Which of the following statements about the keywords in SRv6 instruction names are correct? (Select all that apply)

A.

X: Forwards packets through one or a group of specified Layer 3 interfaces.

B.

M: Searches a Layer 2 forwarding table for unicast forwarding.

C.

V: Searches a VPN instance routing table to forward packets.

D.

T: Searches a specified routing table to forward packets.

Which of the following statements about GRE is incorrect?

A.

GRE can encapsulate IPv6 unicast packets.

B.

GRE can encapsulate IPv4 unicast packets.

C.

GRE can encapsulate IPv6 broadcast packets.

D.

GRE is easy to implement and puts little burden on devices at both ends of a tunnel.

Which of the following operations is not involved in the middle phase of a migration?

A.

Migration preparation

B.

On-site monitoring

C.

Migration implementation

D.

Service test

During telemetry static subscription, the NMS delivers subscription configuration to devices for data sampling. Which of the following statements is incorrect about the sampling path huawei-debug:debug/cpu-infos/cpu-info?

A.

cpu-info may be a list node of the YANG model.

B.

The sampling path uses the YANG model structure.

C.

debug may be the top node of the YANG model.

D.

cpu-infos may be a container node of the YANG model.

Which of the following is the mapping between VNIs and BDs in VXLAN implementation?

A.

N:M

B.

1:1

C.

N:1

D.

1:N

Page: 3 / 4
Total 322 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved