Download HCIE-R&S (Written) (Huawei Certified Internetwork Expert-Routing & Switching).H12-261.NewDumps.2021-01-25.311q.tqb

Vendor: Huawei
Exam Code: H12-261
Exam Name: HCIE-R&S (Written) (Huawei Certified Internetwork Expert-Routing & Switching)
Date: Jan 25, 2021
File Size: 6 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
Cross-device link aggregation enables data stream transmission and mutual backup of stack member switches. However, because of the limited bandwidth of stack cables between stack devices, which of the following methods can be used to improve forwarding efficiency?
  1. Connect stack devices through stack cards
  2. Enable stack multiple master check function
  3. Configure stack system MAC address switching
  4. Enable traffic local priority forwarding
Correct answer: D
Explanation:
In a CSS or stack, an Eth-Trunk is configured as the outbound interface of traffic to ensure reliable transmission. Member interfaces of the Eth-Trunk are located on different chassis. When devices in the CSS or stack forward traffic, the Eth-Trunk may select an inter-chassis member interface based on a hash algorithm. The cable bandwidth between devices in the CSS or stack is limited, so inter-chassis traffic forwarding occupies bandwidth resources between devices, lowering traffic forwarding efficiency. To address this issue, you can enable an Eth-Trunk to preferentially forward local traffic.
In a CSS or stack, an Eth-Trunk is configured as the outbound interface of traffic to ensure reliable transmission. Member interfaces of the Eth-Trunk are located on different chassis. When devices in the CSS or stack forward traffic, the Eth-Trunk may select an inter-chassis member interface based on a hash algorithm. 
The cable bandwidth between devices in the CSS or stack is limited, so inter-chassis traffic forwarding occupies bandwidth resources between devices, lowering traffic forwarding efficiency. To address this issue, you can enable an Eth-Trunk to preferentially forward local traffic.
Question 2
About the description of CHAP authentication function in the PPP protocol, which of the following are correct? (Multiple Choice) 
Which of the following description about the CHAP authentication function in the PPP protocol is correct? (Multiple Choice)
  1. If the authenticator does not have a username, the password cannot be configured on the authenticated interface
  2. Calculate a hash value using the authentication sequence lD, random number, and key by the MD5 algorithm
  3. Three-message interactive authentication is required, and the username is transmitted only on the network without transmitting the password.
  4. The user name must be configured under the authenticated interface of CHAP authentication.
Correct answer: BCD
Explanation:
A. If the authenticator does not configure a username, the password cannot be configured on the authenticated interface. B. Calculate a Hash value by the MD5 algorithm using the authentication sequence ID, random number and key C. Three-message interactive authentication is required, and the username is transmitted CONFIDENTIAL only on the network without transmitting the password. D. The user name must be configured under the authenticated interface of CHAP authentication.
A. If the authenticator does not configure a username, the password cannot be configured on the authenticated interface. 
B. Calculate a Hash value by the MD5 algorithm using the authentication sequence ID, random number and key 
C. Three-message interactive authentication is required, and the username is transmitted CONFIDENTIAL only on the network without transmitting the password. 
D. The user name must be configured under the authenticated interface of CHAP authentication.
Question 3
A switch is running the Rapid Spanning Tree Protocol (RSTP). Upon a topology change, what happens to dynamic entries in the L2 forwarding table? 
An existing switch runs RSTP. If the network topology changes, what happens to the Layer 2 forwarding entries learned automatically by the switch?
  1. Only entries behind the port where TC was received are removed.
  2. All entries are removed except for those behind edge ports and the port where TC was received.
  3. All entries are removed (purged).
  4. All entries are removed except for entries behind edge ports.
  5. The aging timer is set to 15 seconds, so idle entries age out.
Correct answer: B
Explanation:
A. All entries are deleted B. Only entries related to the port that received the TC message will be deleted. C. Other entries are deleted except the entries related to the edge port. D. If the aging time is set to 15 seconds, the entries that exceed the aging time will be deleted- E. Other entries are deleted except the entries related to the edge port and the entries related to the port that receives the TC message. (Right Answers)
A. All entries are deleted 
B. Only entries related to the port that received the TC message will be deleted. 
C. Other entries are deleted except the entries related to the edge port. 
D. If the aging time is set to 15 seconds, the entries that exceed the aging time will be deleted- 
E. Other entries are deleted except the entries related to the edge port and the entries related to the port that receives the TC message. (Right Answers)
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!