Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

H12-891_V1.0 Huawei HCIE-Datacom V1.0 Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Huawei H12-891_V1.0 HCIE-Datacom V1.0 certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 4
Total 322 questions

SR-MPLS uses the MPLS forwarding plane, and therefore requires MPLS to be enabled. Which of the following conditions must be met for MPLS to be automatically enabled on an interface? (Select all that apply)

A.

The SRGB is configured for the IGP process.

B.

Segment routing is enabled for IGP, and IGP is enabled on the interface.

C.

The static adjacency label of the corresponding interface is configured in the segment routing view.

D.

Segment routing is enabled in the system view.

Before connecting an SSH client to an SSH server in public key authentication mode, a client needs to create a key pair. Which of the following commands is used to create a DSS key pair on the client using Git Bash?

A.

ssh-keygen -t dss

B.

ssh-keygen -t ecc

C.

ssh-keygen -t dsa

D.

ssh-keygen -t rsa

If the number of MAC addresses learned on an interface enabled with port security reaches the upper limit, which of the following actions may the switch take?

A.

Discards packets with unknown source MAC addresses without generating any alarm.

B.

Sets the interface state to error-down without generating any alarm.

C.

Discards packets with unknown source MAC addresses and generates an alarm.

D.

Sets the interface state to error-down and generates an alarm.

On a virtualized network deployed using iMaster NCE-Campus, after creating VNs, you need to configure inter-VN communication. Which of the following configurations is used to achieve VN communication?

A.

Configure traffic filtering.

B.

Create a static route for the VPN instance corresponding to the VN.

C.

Deploy OSPF for the VPN instance corresponding to the VN.

D.

Deploy a routing policy.

The ________ command can be run to completely isolate Layer 2 and Layer 3 of different interfaces in a VLAN. (Use lowercase letters to supplement the command, which cannot be abbreviated.)

Based on the figure, which of the following statements are correct?

tracert 172.17.1.5

1 10.1.12.2 40 ms 10 ms 10 ms

2 10.1.24.2 30 ms 20 ms 20 ms

3 10.1.34.1 20 ms 20 ms 20 ms

4 10.1.13.1 20 ms 20 ms 10 ms

5 10.1.12.2 20 ms 30 ms 20 ms

6 10.1.24.2 30 ms 30 ms 30 ms

7 10.1.34.1 50 ms 40 ms 40 ms

8 10.1.13.1 20 ms 30 ms 30 ms

A.

A. R1 does not have a route to 172.17.1.5.

B.

B. R1 has a route to 172.17.1.5.

C.

C. The path for R1 to access 172.17.1.5 is normal.

D.

D. A loop occurs when R1 accesses 172.17.1.5.

O&M personnel for a large-scale event center receive feedback about Wi-Fi access failures. iMaster NCE-CampusInsight provides the function for personnel to view packet exchange processes and locate the root cause. It is found that IP addresses in the DHCP address pool are exhausted, preventing IP addresses from being assigned to mobile terminals. Which of the following functions is used by O&M personnel in this scenario?

A.

Simulation feedback

B.

Protocol trace

C.

Issue analysis

D.

Client journey

Which of the following statements are correct about the command:

ping -aX -cY -sZ -vpn-instance M 10.5.16.2

A.

The source IP address of the ping packets is X.

B.

The ping packets belong to VPN instance M.

C.

During the ping operation, the quantity of ICMP Request packets is Y.

D.

The size of each ICMP Request packet for the ping operation is Z bytes.

When designing IGP routes for an enterprise bearer WAN, ensure that the metric of aggregation-layer links is smaller than that of access-layer links, so that data can be preferentially forwarded over aggregation-layer links.

A.

TRUE

B.

FALSE

Which of the following link types may appear in OSPF Router-LSAs?

A.

TransNet

B.

P-2-P

C.

Vlink

D.

StubNet

Which of the following fields is added to BGP4+ Update packets to advertise IPv6 routes?

A.

A new path attribute: MP_UNREACH_NLRI

B.

A new path attribute: MP_REACH_NLRI

C.

A new path attribute: IPv6_REACH_NLRI

D.

A new NLRI type: IPv6_NLRI, which carries the IPv6 NLRI prefix length and IPv6 NLRI prefix.

Which of the following methods can be used to establish IPsec SAs? (Select All that Apply)

A.

Establish IPsec SAs through template negotiation

B.

Establish IPsec SAs in IKE auto-negotiation mode

C.

Establish IPsec SAs through certificate negotiation

D.

Manually establish IPsec SAs

On a small- or medium-sized campus network deployed based on the Huawei CloudCampus Solution, an AR functioning as the egress gateway supports web-based network management, registration center query, and DHCP Option 148-based deployment, but does not support CLI-based deployment.

A.

TRUE

B.

FALSE

In the admission design for large- and medium-sized campus networks, which of the following authentication modes can be used for PCs connected to IP phones?

A.

MAC address authentication

B.

802.1X authentication

C.

Multi-mode authentication

D.

Portal authentication

Which of the following statements aboutSR-MPLS Policy path planningare correct?

A.

When planning paths based on bandwidth, you need to set the available bandwidth of each interface in advance.

B.

When planning paths based on delay, you must deploy TWAMP or iFIT in advance to measure real-time network delay.

C.

If you use the controller to plan SR-MPLS Policy paths, only primary and backup paths can be deployed, and load balancing cannot be implemented for the primary path.

D.

When statically planning SR-MPLS Policy paths, you can plan load balancing for the primary path.

In the following figure, R1, R2, R3, and R4 all belong to OSPF area 0. The link costs are marked in the figure. The Loopback0 addresses of R1, R2, R3, and R4 are advertised to OSPF. R1, R2, and R3, which are R4 clients, use Loopback0 to establish an iBGP peer relationship with R4. The directly connected network segment 172.20.1.4/32 of R4 is advertised to BGP. Which of the following statements are correct about the direction of traffic from R1 to 172.20.1.4/32?

A.

The preferred path is R1–R3–R4.

B.

If the stub router on-startup command is run on R3, packet loss occurs during the power-off process of R3 but no packet loss occurs during the startup process of R3.

C.

The preferred path is R1–R2–R4.

D.

Packet loss occurs during both the power-off and startup processes of R3.

Node segments in SR-MPLS must be manually configured.

A.

TRUE

B.

FALSE

Free mobility implements policy management and permission control based on users' VLAN IDs and IP addresses.

A.

TRUE

B.

FALSE

An engineer often remotely logs in to the device to check the device status. The engineer can use the Python Paramiko and telnetlib libraries to implement automatic remote login through Python scripts. The remote login implemented using telnetlib is more secure.

A.

TRUE

B.

FALSE

Drag theIPsec functionson the left to the corresponding function description on the right.

Page: 1 / 4
Total 322 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved