Spring Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Huawei H12-841_V1.5 Dumps

Page: 1 / 10
Total 104 questions

HCIP-Datacom-Campus Network Planning and Deployment V1.5 Questions and Answers

Question 1

(The Huawei CloudCampus Solution divides the network architecture into three layers: network layer, management layer, and application layer.)

Options:

A.

TRUE

B.

FALSE

Question 2

(As shown in the following figure, R1 and R2 establish an IPsec VPN in ISAKMP mode for communication. For IPsec proposals on R1 and R2, ESP is used, the encapsulation mode is set to tunnel mode, SHA1 is configured as the authentication algorithm, and AES-256 is configured as the encryption algorithm. In addition, IKEv1 is configured for IKE peers, the main mode is configured for IKEv1 negotiation phase 1, and the PSK Huawei@123 is configured for PSK authentication between IKE peers. For IKE proposals on R1 and R2, SHA1 is configured as the authentication algorithm, AES-256 is configured as the encryption algorithm, and DH group 1 is configured for IKE negotiation. Based on these configurations on R1 and R2, drag the configuration items on the left to the correct locations on the right.)

as

as

as

Options:

Question 3

(If the number of MAC addresses learned on an interface enabled with port security reaches the upper limit, which of the following actions may the switch take?)

Options:

A.

Sets the interface state to error-down and generates an alarm.

B.

Sets the interface state to error-down without generating any alarm.

C.

Discards packets with unknown source MAC addresses without generating any alarm.

D.

Discards packets with unknown source MAC addresses and generates an alarm.

Question 4

(Which of the following fields is not carried in a BGP EVPN Type 5 route?)

Options:

A.

GW IP Address

B.

Route Distinguisher

C.

MAC Address

D.

IP Prefix Length

Question 5

(Which of the following technologies can be used to isolate users in the same VLAN, enhance user communication security, and prevent invalid broadcast packets from affecting services?)

Options:

A.

Super VLAN

B.

Port isolation

C.

IPSG

D.

Ethernet port security

Question 6

(A supermarket chain wants to manage all its branch networks through iMaster NCE-Campus. However, it does not want to purchase physical servers or software. In this case, which of the following deployment modes is recommended?)

Options:

A.

On-premise

B.

Cloud management

C.

Huawei public cloud

D.

MSP-owned cloud

Question 7

(On the Device Management page of iMaster NCE-Campus, which of the following functions will automatically enable the SSH proxy tunnel of the network device?)

Options:

A.

Summary

B.

Entry Query

C.

Device Configuration

D.

Command Line

Question 8

(On a small- or medium-sized campus network deployed based on the Huawei CloudCampus Solution, if a single AP is used as the network egress and needs to be managed by iMaster NCE-Campus, in which of the following modes should the AP work?)

Options:

A.

RU

B.

Fit

C.

Cloud

D.

Fat

Question 9

(In the Huawei CloudCampus Solution, which of the following provisioning modes isnot supportedby firewalls?)

Options:

A.

Web interface

B.

Registration center query

C.

DHCP Option 148

D.

CLI

Question 10

(Which of the following statements about static VXLAN tunnel configuration are true?Choose all that apply.)

Options:

A.

One NVE interface must be created for each BD. If there are multiple BDs, multiple NVE interfaces must be created.

B.

An NVE interface can be associated with multiple VNIs. Therefore, you can create one NVE interface when there are multiple BDs.

C.

One NVE interface must be created for each VXLAN tunnel, and the source and destination IP addresses must be specified for the NVE interface. Therefore, the number of NVE interfaces is the same as the number of VXLAN tunnels on the VTEP.

D.

On an NVE interface, the destination address of a VXLAN tunnel is specified based on the address in the ingress replication list. You can create one NVE interface for multiple VXLAN tunnels.

Question 11

(Huawei iMaster NCE-Campus provides the financial SD-WAN SRv6 solution to help the financial industry implement end-to-end scheduling. To use this function, you need to obtain the SRv6 function package license.)

Options:

A.

TRUE

B.

FALSE

Question 12

(APs in the Agile Distributed Wi-Fi Solution include central APs and RUs. A central AP can manage multiple RUs, so no AC is needed in the Agile Distributed Wi-Fi Solution.)

Options:

A.

TRUE

B.

FALSE

Question 13

(On a virtualized campus network deployed using iMaster NCE-Campus, implementing mutual access between users in different virtual networks only requires the administrator to deploy a policy control matrix on iMaster NCE-Campus.)

Options:

A.

TRUE

B.

FALSE

Question 14

(Huawei CloudEngine S series switches can provide PoE using Cat5e cables over a distance of up to 200 m.)

Options:

A.

TRUE

B.

FALSE

Question 15

(DHCP dynamically configures and centrally manages IP addresses of hosts. Which of the following statements about DHCP is false?)

Options:

A.

If only the gateway and DNS server information needs to be delivered to a DHCP client, the DHCP Offer message sent by the DHCP server to the client does not carry the Options field.

B.

The Options field in DHCP messages uses the type-length-value (TLV) structure and can carry parameters such as the NTP server address, AC address, and log server address.

C.

DHCP supports static IP address allocation, in which it assigns fixed IP addresses to specified terminals.

D.

When a DHCP client and a DHCP server are located on different Layer 3 networks, a DHCP relay agent is needed for forwarding packets between the DHCP client and server.

Question 16

(When configuring access authentication, you need to define the items authorized to users in the authorization result. Which of the following items does not need to be defined?)

Options:

A.

VLAN

B.

IP address

C.

Security group

D.

ACL

Question 17

(In the admission design for large- and medium-sized campus networks, which of the following authentication modes can be used for PCs connected to IP phones?)

Options:

A.

Multi-mode authentication

B.

Portal authentication

C.

802.1X authentication

D.

MAC address authentication

Question 18

(Refer to the figure.

as

Which of the following steps aremandatoryto enable 802.1X authentication on GE0/0/2 and GE0/0/3 of SW3 and configure a RADIUS server to authenticate and deliver network access rights to users?Choose all that apply.)

Options:

A.

Configure an authentication domain.

B.

Configure an authentication profile.

C.

Configure an 802.1X access profile.

D.

Configure an AAA scheme.

Question 19

(To isolate communication between wired terminals, you can enable port isolation on the access switches. However, APs cannot implement wireless user isolation.)

Options:

A.

TRUE

B.

FALSE

Question 20

Network admission control (NAC) needs to be deployed on the network shown in the figure. Drag a proper authentication mode to each authentication point.

as

Options:

Question 21

(Refer to the following routing entries queried using a command on the VTEP. Which of the following statements about these routes are true?)

Network(EthTagId/IpPrefix/IpPrefixLen) NextHop

*>i 0:172.16.2.0:24 1.1.1.2

*>i 0:172.16.13.0:24 1.1.1.2

*>i 0:192.168.122.0:30 1.1.1.2

Options:

A.

These routes carry the L2VNI.

B.

These routes carry the L3VNI.

C.

These routes are Type 2 routes and carry host IP addresses.

D.

These routes are Type 5 routes and carry network segment or mask information.

Question 22

(On a campus network, iMaster NCE-Campus is used to deploy two VNs: R&D VN and marketing VN, users in these two VNs belong to two security groups, respectively. The campus network requires R&D personnel and sales personnel to communicate with each other. To meet this requirement, which of the following tasks does a network administrator need to perform?)

Options:

A.

Deploy a policy control matrix.

B.

Deploy an external network.

C.

Configure access management.

D.

Configure inter-VN communication.

Question 23

(Which of the following roles is not a core role in Huawei's free mobility solution?)

Options:

A.

Policy enforcement device

B.

Policy control device

C.

iMaster NCE-Campus

D.

Authentication device

Question 24

(Which of the following statements about the underlay network of a VXLAN-based virtualized campus network isfalse?)

Options:

A.

When iMaster NCE-Campus is used to implement automatic orchestration of routing domains on the underlay network, only OSPF is supported.

B.

When iMaster NCE-Campus is used to implement automatic orchestration of the routing domain on the underlay network, only OSPF single-area deployment is supported.

C.

The virtualized campus network solution introduces VXLAN technology, which uses MAC-in-UDP encapsulation to build a logical network over a traditional IP network.

D.

The underlay network provides IP reachability so that VXLAN-encapsulated service packets can be transmitted between VTEPs.

Question 25

(The Huawei CloudCampus Solution supports various rate limiting modes for wireless users in small- and medium-sized campus scenarios. Which of the following modes is suitable for refined traffic control of each user?)

Options:

A.

User-based rate limiting

B.

SSID-based rate limiting

C.

ACL-based rate limiting

D.

Radio-based rate limiting

Question 26

Drag the user authentication results to the corresponding network access rights.

as

Options:

Question 27

(iMaster NCE-CampusInsight uses SNMP technology to collect metrics and logs of network devices and detects network exceptions based on real service traffic.)

Options:

A.

TRUE

B.

FALSE

Question 28

(In Huawei's free mobility solution, if one device functions as both an authentication point and a policy enforcement point, the administrator needs to subscribe to IP-security group entries to view user information.)

Options:

A.

TRUE

B.

FALSE

Question 29

(Fabric nodes need to be planned during fabric design on a CloudCampus virtualized campus network. Which of the following statements about node planning on a fabric is false?)

Options:

A.

It is recommended that core devices be deployed as border nodes, and access or aggregation devices be deployed as edge nodes.

B.

It is recommended that access devices be deployed as edge nodes to implement end-to-end automatic VXLAN deployment.

C.

When the fabric needs to connect to two external networks located in different physical locations, two border nodes need to be deployed.

D.

If a BGP EVPN RR is required on a VXLAN network, BGP peer relationships need to be established between edge nodes and border nodes and between edge nodes.

Question 30

(Which of the following statements about configuring user access authentication is false?)

Options:

A.

To implement network access control on users, you need to determine the domains to which they belong and the AAA schemes that they use.

B.

You need to bind an access profile to an authentication profile to specify the user authentication mode. Then, apply the authentication profile to an interface or VAP profile to enable network access control.

C.

iMaster NCE-Campus cannot interconnect with a third-party RADIUS server.

D.

If the RADIUS or HWTACACS server is used for authentication, you need to configure parameters for interconnection with the authentication server in the AAA scheme.

Question 31

Free mobility is deployed on a campus network through iMaster NCE-Campus. During this deployment, which of the following steps are performed by administrators and which are automatically performed by iMaster NCE-Campus?

as

Options:

Page: 1 / 10
Total 104 questions