2018 Huawei H12-224 Real Questions Killtest

Slides:



Advertisements
Similar presentations
Release 5.1, Revision 0 Copyright © 2001, Juniper Networks, Inc. Advanced Juniper Networks Routing Module 9: Static Routes & Routing Table Groups.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Common Layer 2 Attacks and Countermeasures.
RIP V1 W.lilakiatsakun.
The subnet /28 has been selected to be further subnetted to support point-to-point serial links. What is the maximum number of serial links.
Virtual LANs.
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: EIGRP Advanced Configurations and Troubleshooting Scaling.
Cisco 3 - Switch Perrine. J Page 15/8/2015 Chapter 8 What happens to the member ports of a VLAN when the VLAN is deleted? 1.They become inactive. 2.They.
DHCP Dynamic Host Configuration Part 7 NVCC Professional Development TCP/IP.
Wireless and Switch Security NETS David Mitchell.
Lesson 1: Configuring Network Load Balancing
Hands-On Microsoft Windows Server 2003 Networking Chapter 5 Dynamic Host Configuration Protocol.
IST 228\Ch5\IP Routing1. 2  Review of Chapter 4 Start the router simulator. You will see the prompt "Router>". This is the user mode prompt. Change the.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
VLAN Trunking Protocol (VTP) W.lilakiatsakun. VLAN Management Challenge (1) It is not difficult to add new VLAN for a small network.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Multicast routing.
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
Dynamic Routing Protocols  Function(s) of Dynamic Routing Protocols: – Dynamically share information between routers (Discover remote networks). – Automatically.
M. Menelaou CCNA2 DYNAMIC ROUTING. M. Menelaou DYNAMIC ROUTING Dynamic routing protocols can help simplify the life of a network administrator Routing.
Objectives Configure routing in Windows Server 2008 Configure Network Address Translation 1.
Common Devices Used In Computer Networks
VLAN Trunking Protocol (VTP)
Cisco – Chapter 11 Routers All You Ever Wanted To Know But Were Afraid to Ask.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
VLAN V irtual L ocal A rea N etwork VLAN Network performance is a key factor in the productivity of an organization. One of the technologies used to.
NUS.SOC.CS2105 Ooi Wei Tsang Application Transport Network Link Physical you are here.
1 Virtual Router Redundancy Protocol (VRRP) Speaker: Li-Wen Chen Date:
What’s New in Fireware v11.9.5
CS 4396 Computer Networks Lab IP Multicast - Fundamentals.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
Chapter 6: Securing the Local Area Network
Switching Topic 2 VLANs.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
Routing Protocols and Concepts – Chapter 7
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
Network Security Principles & Practices By Saadat Malik Cisco Press 2003.
RIP V1 W.lilakiatsakun. RIP V1 characteristics RIP is a distance vector routing protocol. RIP is a distance vector routing protocol. RIP uses hop count.
CCNP Routing and Switching Exam Pass4sure.
Cisco Study Guide
Routing and Routing Protocols CCNA 2 v3 – Module 6.

1 CMPT 471 Networking II Multicasting © Janice Regan,
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Single-Area OSPF Routing & Switching.
Device Infrastructure
Layer 3 Redundancy 1. Hot Standby Router Protocol (HSRP)
Kapitel 19: Routing. Kapitel 21: Routing Protocols
Instructor Materials Chapter 5: Network Security and Monitoring
How to pass Cisco Exam in first attempt?
Obtain Your Dream Certification
100% Exam Passing Guarantee & Money Back Assurance
Layer 2 Attacks and Security
Routing Loops.
Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0)
Chapter 4: Routing Concepts
Chapter 2: Basic Switching Concepts and Configuration
Virtual Router Redundancy Protocol (VRRP)
CCNA 2 v3.1 Module 7 Distance Vector Routing Protocols
Troubleshooting IP Addressing
Chapter 5: Network Security and Monitoring
Routing and Switching Essentials v6.0
Chapter 2: Static Routing
– Chapter 3 – Device Security (B)
Chapter 10 IGMP Prof. Choong Seon HONG.
Chapter 4: EtherChannel and HSRP
Cisco networking CNET-448
AbbottLink™ - IP Address Overview
Sécurisation au niveau 2 pour certains matériels Cisco
DHCP: Dynamic Host Configuration Protocol
Multicasting Unicast.
Chapter 4: EtherChannel and HSRP
Presentation transcript:

2018 H Questions KillTest

Question 1 When a Huawei router serves as an SSH client and attempts b log in to another Huawei muter, the login fails. It is suspected that the SSI-I server configuration is incorrect. Which of the following causes is the most impossible for the server fault? A. The SSH protocol is not bound in the VTY user interface view. B. The user service type, authentication type, and user service type are not configured. C. The SSH server and client have inconsistent versions. D. The SSH first-time authentication function is disabled. Answer: D

Question 2 Which of the following items are used to remind customers of information security? (Multiple Choice) A. Account soft-out reminder B. Password update reminder C. Log protection reminder D. Data backup reminder Answer: ABCD

Question 3 Which of the following statements regarding the static LACP mode are false? A. If a high bandwidth of the link between two directly connected devices is required but the remote device does not support LACP, you can use the manual load balancing mode. B. In static LACP mode, a larger LACP priority of an interface indicates a higher priority of the interface and a high probability of becoming the active interface. C. The interface that forwards data is called the active interface, whereas the interface that does not forward data is called the inactive interface. The backup interface changes from inactive to active only when the active interface fails. D. When preemption is enabled and an active interface fails, the backup interface with a larger priority becomes the active interface after a delay. If preemption is disabled, the faulty interface cannot automatically become the active interface. Answer: B

Question 4 What features must a risky operation solution have?(Multiple Choice) A. Accuracy B. Good operability C. Verification D. Rollback Answer: ABCD

Question 5 Which of the following BGP attributes can define a set of destination addresses with the public characteristics? A. Origin B. Community C. AS_Path D. MED Answer: B

Question 6 Which command is used to enable association between BFD and VRRP? A. vrrp vrid 1 track bfd-session session-name 1 reduced 100 B. bfd-session vrrp vrid 1 track session-name 1 reduced 100 C. track vrrp vrid 1 bfd-session session-name 1 reduced 100 D. vrrp vrid 1 track bfd-session-name 1 reduced 100 Answer: A

Question 7 Which of the following route selection tools can be used by other routing protocols in addition to BGP? (Multiple Choice) A. route-policy B. IP-prefix C. as-path-filter D. community-filter Answer: AB

Question 8 Which of the following commands can leak routes of Level-2 areas into Level-1 areas? A. import isis level-2 into level-1 B. import-route isis level-2 into level-1 C. advertise isis level-2 into level-1 D. export isis level-2 into level-1 Answer: B

Question 9 Man-in-the-middle attacks or IP/MAC Spoofing attacks are common on intra nets and will cause information leakage. Which configuration method can prevent these attacks? A. Configure the trusted or untrusted interface. B. Limit the maximum number of MAC addresses that can be learned on a switch interface. C. Configure DHCP snooping to check the CHADDR field carried in a DHCP Request packet. D. Configure association between DHCP snooping and IPSG or DAI on the switch. Answer: D

Question 10 In the multicast network environment, how do an IGMPv1 host and an IGMPv2 muter on the same LAN interact with each other? (Multiple Choice) A. If any host on a LAN is running IGMPv1, all hosts on the LAN must also use IGMPv1. B. Membership Report messages sent from the IGMPv1 host will be received by the IGMPv2 muter. C. If the IGMPv1 is in a specific group, the IGMPv2 muter must ignore all Leave messages received from this group. D. The version 2 muter must set a countdown timer associated with the group that takes into account the presence of the version 1 host. Answer: BCD

Question 11 In most cases, an IP address that is dynamically assigned by a DHCP server has a lease. Which of the following statements regarding the IP address lease is false? A. The lease renewal timer is 50% of the total lease. When the lease renewal timer expires, the DHCP server must renew the IP address lease. B. The rebinding timer is 87.5% of the total lease. C. If the rebinding timer expires but the DHCP client does not receive any responses from the DHCP server, the DHCP client keeps sending DHCP Request packets to the DHCP server which assigned an IP address to it before, until the total lease expires. D. If the DHCP client receives a DHCP NAK packet within the lease, the client stops using the current IP address immediately and returns to the initialization state. The DHCP client then applies for a new IP address. Answer: C

Question 12 MPLS performs different actions on labels. What is the meaning of the pop action? A. The top label is removed from the MPLS label stack. B. The top label is added to the MPLS label stack. C. The top label is replaced with another value. D. The top label is replaced with the label of another group. Answer: A

Question 13 What happens when the topology of a network running RSTP changes? A. Packets are flooded on the entire network. B. The aging time of MAC address entries is changed. C. Some MAC address entries are deleted. D. The entire MAC address table is deleted. Answer: C

Question 14 In the Agile Controller’s access control scenario, Which of the following statements regarding the roles of the RADIUS server and client is true? A. The Agile Controller integrates all functions of the RADIUS server and client. B. The Agile Controller as the RADIUS server, while the user terminal as the RADIUS client. C. The authentication device (such as a 802.1X switch as the RADIUS server, while the user terminal as the RADIUS client. D. The Agile Controller as the RADIUS server, while the authentication device (such as a 802.1X switch) as the RADIUS client. Answer: D

Question 15 Which of the following statements regarding the any-source multicast (ASM) and source-specific multicast (SSM) models are true? (Multiple Choice) A. In the SSM model, the receiver hosts have obtained the specific location of the multicast source in advance by other methods. B. In the ASM model, receiver hosts cannot obtain locations of multicast sources in advance. C. The SSM model and ASM model use the same multicast group address range. D. In the SSM model, a multicast distribution tree is established directly between a multicast source and its receiver hosts. Answer: ABD

Thank You