New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Note! Huawei has retired the H12-222 Exam Contact us through Live Chat or email us for more information.

H12-222 Huawei Certified Network Professional-R&S-IENP Questions and Answers

Questions 4

The LDP session establishment process will go through the opensent status. Which state will the opensent state change to after the device receives an Initialization message and sends a Keepalive message?

Options:

A.

initialized

B.

openrec

C.

operational

D.

non-existent

Buy Now
Questions 5

Which of the following statements regarding Network Address and Port Translation (NAFT) and No Port Translation (No-PAT) is true?

Options:

A.

After NAFT translation, all packets are from the same IP address for external users.

B.

In No-PAT mode, only the transport layer protocol port number can be converted.

C.

In NAFT mode, only the network layer protocol address can be converted.

D.

In No-PAT mode, the network layer protocol address can be converted.

Buy Now
Questions 6

Which of the following is not included in the three elements of Servermap table on the USG series firewall?

Options:

A.

Destination IP address

B.

Destination port number

C.

Protocol number

D.

Source IP address

Buy Now
Questions 7

Which are the Agile Controller functional components? (Multiple Choice)

Options:

A.

Free Mobility

B.

Service Chain

C.

Access Control

D.

United Security

E.

Ubiquitous Resources

Buy Now
Questions 8

When BFD is not used, the OSPF neighbor relationship that is established through the Ethernet link is terminated after 40s upon a link fault.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 9

Which of the following protocols can be associated with BFD? (Multiple Choice)

Options:

A.

VRRP

B.

OSPF

C.

BGP

D.

Static route

Buy Now
Questions 10

For interzone packet filtering, which traffic is belong to transmitted to outbound direction?

Options:

A.

Trusted zone -> Untrusted zone

B.

Untrusted zone -> Trusted zone

C.

Untrusted zone -> DMZ

D.

Trusted zone -> Local zone

Buy Now
Questions 11

Which of the following statements regarding data forwarding on a traditional IP network are true? (Multiple Choice)

Options:

A.

The traditional IP forwarding is connection-oriented and has low efficiency.

B.

On a traditional IP network, optimal paths are calculated based on the IGP metrics.

C.

All the routers on a traditional IP network need to know routes on the entire network or default routes.

D.

Traditional IP forwarding uses hop-by-hop forwarding.

E.

A traditional IP network cannot provide a good QoS guarantee.

Buy Now
Questions 12

NAT technology implements data security transmission through data encryption.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 13

MPLS can forward packets only after an LSP is established. Which of the following statements regarding static LSP establishment are true? (Multiple Choice)

Options:

A.

After a static LSP is established, each node on the LSP can detect the entire LSP.

B.

When MPLS is enabled on the outbound interface of the ingress node and the physical status and the protocol status of the outbound interface are Up, the static LSP is Up regardless of whether there is an egress node or a transit node.

C.

The transit node of a static LSP is configured and MPLS is enabled on both the inbound and outbound interfaces. If the physical status and the protocol status of the inbound and outbound interfaces are Up, the static LSP is Up.

D.

The egress node of the static LSP is configured and MPLS is enabled on the inbound interface. If the physical status and the protocol status of the inbound interface are Up, the static LSP is Up regardless of whether there is an ingress node or a transit node.

Buy Now
Questions 14

In the MPLS VPN, RD values are added to IPv4 addresses to distinguish IPv4 prefixes with the same address space. Which of the following statements are true? (Multiple Choice)

Options:

A.

The RD is encapsulated into the Update packet as the BGP extended attribute.

B.

After receiving IPv4 routes from a CE, a PE adds RDs to them to convert them to globally unique VPN-IPv4 routes and advertises the routes on the public network.

C.

Each VPN instance on a PE corresponds to a RD value. The RD on the same PE must be globally unique.

D.

The RD can be used to control advertisement of VPN routing information.

Buy Now
Questions 15

How is NFV defined?

Options:

A.

Network infrastructure virtualization

B.

Network function virtualization

C.

Network bus virtualization

D.

Network architecture virtualization

Buy Now
Questions 16

Which of the following statements regarding the delay and jitter is true?

Options:

A.

The jitter is relevant to the delay.

B.

The jitter occurs because the E2E delays of data packets in the different flow are different.

C.

A long delay indicates a short jitter and a short delay indicates a large jitter.

D.

Jitter is independent of delay.

Buy Now
Questions 17

Which of the following statements regarding the DSCP priority is false?

Options:

A.

The first 6 bits of the ToS field (leftmost 6 bits) mark different types of services, namely, DSCP priority.

B.

The DSCP priority can be used to classify traffic into 32 types.

C.

Each DSCP priority corresponds to a Behavior Aggregate (BA), and a PHB can be specified for each BA.

D.

You can use some QoS mechanisms to implement PHB.

Buy Now
Questions 18

Congestion management technology defines scheduling policies to determine the order of packet processing sequence.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 19

MPLS is short for Multiprotocol Label Switching, so the core technology of MPLS is label switching.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 20

When the IP address of an interface on a firewall is pinged/ ping packets are processed by the internal module of the firewall but are not forwarded,

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 21

VXLAN is irrelevant to SDN technology.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 22

Man-in-the-middle attacks or IP/MAC Spoofing attacks are common on intranets and will cause information leakage. Which configuration method can prevent these attacks?

Options:

A.

Configure the trusted or untrusted interface.

B.

Limit the maximum number of MAC addresses that can be learned on a switch interface.

C.

Configure DHCP snooping to check the CHADDR field carried in a DHCP Request packet.

D.

Configure association between DHCP snooping and IPSG or DAI on the switch.

Buy Now
Questions 23

Which of the port mirroring modes are supported by Huawei S series switches? (Multiple Choice)

Options:

A.

Local port mirroring

B.

Remote port mirroring

C.

Global mirroring

D.

Flow mirroring

Buy Now
Questions 24

SDN and NFV are essentially the same concept and both define network function visualization.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 25

LR can be used on a physical interface to limit the total rate of sent packets including packets of burst traffic.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 26

Which of the following statements regarding the DiffServ model is false?

Options:

A.

Signaling is required. Before transmitting packets, an application does not need to notify a router and the network does not need to maintain the status for each flow.

B.

Different methods can be used to specify QoS of packets, for example, IP precedence, source IP address, and destination IP address of IP packets.

C.

The DiffServ model provides the E2E QoS guarantee for important applications.

D.

It can be implemented through technologies such as CAR or queue scheduling technologies.

Buy Now
Questions 27

Complex traffic classification means that packets are classified based on the quintuple including the source and destination addresses, source and destination port numbers, and protocol type. It is usually deployed on the network core.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 28

On the network shown in the following figure, a MPLS LSP is configured and a local LDP session is established between SWA and SWB. Which of the following statements is true?

Options:

A.

The configuration is correct.

B.

The MPLS LSR IDs of the two devices must be different.

C.

MPLS does not need to be enabled globally.

D.

MPLS does not need to be enabled on interfaces.

Buy Now
Questions 29

Which of the following statements regarding the characteristics of HA network are true? (Multiple Choice)

Options:

A.

Faults cannot occur frequently.

B.

Faults can be recovered rapidly.

C.

No fault occurs.

D.

When faults occur, services can be only restored manually.

Buy Now
Questions 30

MPLS forwards data packets based on labels. How is IP packets passing through the MPLS domain forwarded if they do not carry any label?

Options:

A.

Common IP forwarding

B.

ATM forwarding

C.

Multi-label MPLS forwarding

D.

Single-label MPLS forwarding

Buy Now
Questions 31

LDP is dedicated for label distribution and supports multiple message types. Which of the following messages is used to create, change, or delete label mapping messages for FECs?

Options:

A.

Discovery message

B.

Session message

C.

Advertisement message

D.

Notification message

Buy Now
Questions 32

Which of the following are label distribution control modes in the MPLS system? (Multiple Choice)

Options:

A.

Liberal

B.

Independent

C.

Conservative

D.

Ordered

Buy Now
Questions 33

The traditional tail drop method is used for packet loss, which causes global TCP synchronization.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 34

Which packet information can be marked or re-marked?

Options:

A.

DSCP priority, IP precedence, 802.1p priority, and EXP priority

B.

Source and destination addresses, and EXP priority

C.

MAC address

D.

Any packet information

Buy Now
Questions 35

During the DHCP interaction process, the DHCP server and client exchange various types of packets. Which of the following packets is not sent from the client to the server?

Options:

A.

DHCP NAK

B.

DHCP Request

C.

DHCP Discover

D.

DHCP Release

Buy Now
Questions 36

To avoid global TCP synchronization, which congestion avoidance mechanisms can be used? (Multiple Choice)

Options:

A.

RED

B.

WRED

C.

Tail drop

D.

WFQ

Buy Now
Questions 37

Which of the following statements regarding Huawei eSight network management software is false?

Options:

A.

Multiple users can be created for network management.

B.

Users may be asked to log in to eSight from specified IP addresses in specific time ranges.

C.

The administrator can force unauthorized login users to log out.

D.

The login time of the administrator role also can be limited.

Buy Now
Questions 38

Which of the following steps are required when configuring a DHCP relay agent? (Multiple Choice)

Options:

A.

Configure the DHCP server group name.

B.

Configure IP addresses of DHCP servers in the DHCP server group.

C.

Configure the number and IP address of the interface enabled with the DHCP relay function.

D.

Configure the Option 82 field.

Buy Now
Questions 39

Besides resource discovery, allocation, and management, which function else does the VIM management module of NFV provide?

Options:

A.

Resource scheduling

B.

Resource monitoring

C.

Resource reclaiming

D.

Troubleshooting

Buy Now
Questions 40

Which of the following items is not the disadvantage of the traditional congestion avoidance mechanism (tail drop)?

Options:

A.

Global TCP synchronization

B.

High jitter and long delay

C.

High cost

D.

Packets are discarded without differentiating the priority

Buy Now
Questions 41

What about all outgoing labels in the label forwarding table of a MPLS-capable device for different routes with the same next hop?

Options:

A.

They must be different.

B.

They must be the same.

C.

They may be the same.

Buy Now
Questions 42

Which of the following statements regarding the free mobility application scenario of the Agile Controller is false?

Options:

A.

The Agile Controller uniformly deploys permission policies for controlling server access from personnel in each department. The administrator needs to focus on access permissions between departments. A key device in the campus can function as the policy execution point. After the deployment is complete, users can obtain access permissions no matter where they are and what access mode is used.

B.

Policies are deployed automatically to control access between outsourcing personnel and

employees by policies and IP addresses, while ensuring correct the network access permissions of each user. It can also control data sharing among team members to guarantee enterprise data security.

C.

When gateway resources are limited, automatic gateway selection and preferential forwarding of packets from VIP users guarantee fine network experience of VIP users.

D.

The Agile Controller can automatically identify office requirements of working staff, without the need for manual configurations. Users can obtain network access permissions anytime, anywhere.

Buy Now
Questions 43

The E2E delay is the sum of all processing delays and queue delays.

Options:

A.

TRUE

B.

FALSE

Buy Now
Exam Code: H12-222
Exam Name: Huawei Certified Network Professional-R&S-IENP
Last Update: Dec 22, 2024
Questions: 287