Download HCIE-R&S (Written) (Huawei Certified Internetwork Expert-Routing & Switching).H12-261.NewDumps.2021-01-25.311q.vcex

Vendor: Huawei
Exam Code: H12-261
Exam Name: HCIE-R&S (Written) (Huawei Certified Internetwork Expert-Routing & Switching)
Date: Jan 25, 2021
File Size: 5 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
Cross-device link aggregation enables data stream transmission and mutual backup of stack member switches. However, because of the limited bandwidth of stack cables between stack devices, which of the following methods can be used to improve forwarding efficiency?
  1. Connect stack devices through stack cards
  2. Enable stack multiple master check function
  3. Configure stack system MAC address switching
  4. Enable traffic local priority forwarding
Correct answer: D
Explanation:
In a CSS or stack, an Eth-Trunk is configured as the outbound interface of traffic to ensure reliable transmission. Member interfaces of the Eth-Trunk are located on different chassis. When devices in the CSS or stack forward traffic, the Eth-Trunk may select an inter-chassis member interface based on a hash algorithm. The cable bandwidth between devices in the CSS or stack is limited, so inter-chassis traffic forwarding occupies bandwidth resources between devices, lowering traffic forwarding efficiency. To address this issue, you can enable an Eth-Trunk to preferentially forward local traffic.
In a CSS or stack, an Eth-Trunk is configured as the outbound interface of traffic to ensure reliable transmission. Member interfaces of the Eth-Trunk are located on different chassis. When devices in the CSS or stack forward traffic, the Eth-Trunk may select an inter-chassis member interface based on a hash algorithm. 
The cable bandwidth between devices in the CSS or stack is limited, so inter-chassis traffic forwarding occupies bandwidth resources between devices, lowering traffic forwarding efficiency. To address this issue, you can enable an Eth-Trunk to preferentially forward local traffic.
Question 2
About the description of CHAP authentication function in the PPP protocol, which of the following are correct? (Multiple Choice) 
Which of the following description about the CHAP authentication function in the PPP protocol is correct? (Multiple Choice)
  1. If the authenticator does not have a username, the password cannot be configured on the authenticated interface
  2. Calculate a hash value using the authentication sequence lD, random number, and key by the MD5 algorithm
  3. Three-message interactive authentication is required, and the username is transmitted only on the network without transmitting the password.
  4. The user name must be configured under the authenticated interface of CHAP authentication.
Correct answer: BCD
Explanation:
A. If the authenticator does not configure a username, the password cannot be configured on the authenticated interface. B. Calculate a Hash value by the MD5 algorithm using the authentication sequence ID, random number and key C. Three-message interactive authentication is required, and the username is transmitted CONFIDENTIAL only on the network without transmitting the password. D. The user name must be configured under the authenticated interface of CHAP authentication.
A. If the authenticator does not configure a username, the password cannot be configured on the authenticated interface. 
B. Calculate a Hash value by the MD5 algorithm using the authentication sequence ID, random number and key 
C. Three-message interactive authentication is required, and the username is transmitted CONFIDENTIAL only on the network without transmitting the password. 
D. The user name must be configured under the authenticated interface of CHAP authentication.
Question 3
A switch is running the Rapid Spanning Tree Protocol (RSTP). Upon a topology change, what happens to dynamic entries in the L2 forwarding table? 
An existing switch runs RSTP. If the network topology changes, what happens to the Layer 2 forwarding entries learned automatically by the switch?
  1. Only entries behind the port where TC was received are removed.
  2. All entries are removed except for those behind edge ports and the port where TC was received.
  3. All entries are removed (purged).
  4. All entries are removed except for entries behind edge ports.
  5. The aging timer is set to 15 seconds, so idle entries age out.
Correct answer: B
Explanation:
A. All entries are deleted B. Only entries related to the port that received the TC message will be deleted. C. Other entries are deleted except the entries related to the edge port. D. If the aging time is set to 15 seconds, the entries that exceed the aging time will be deleted- E. Other entries are deleted except the entries related to the edge port and the entries related to the port that receives the TC message. (Right Answers)
A. All entries are deleted 
B. Only entries related to the port that received the TC message will be deleted. 
C. Other entries are deleted except the entries related to the edge port. 
D. If the aging time is set to 15 seconds, the entries that exceed the aging time will be deleted- 
E. Other entries are deleted except the entries related to the edge port and the entries related to the port that receives the TC message. (Right Answers)
Question 4
Which of the following statements is true about the MUX VLAN feature of Huawei switches? 
Which of the following description of the MUX VLAN in the Huawei switch is correct?
  1. The MUX VLAN and the Super VLAN features can be used together on the same VLAN.
  2. The Principal Port can communicate with all ports in the MUX VLAN.
  3. The Mux VLAN is classified into Principal VLAN and Subordinate VLAN. The Subordinate VLAN is classified into Separate VLAN and Isolate VLAN.
  4. Each Separate VLAN can be bound to multiple Principal VLANs.
Correct answer: B
Explanation:
A. In the same VLAN, the MUX VLAN can be mixed with the Super VLAN to use. B. The MUX VLAN is divided into a Principal VLAN and a Subordinate VLAN. The Subordinate VLAN is further divided into a Separate VLAN and an Isolate VLAN. CONFIDENTIAL C. Each Separate VLAN can be bound to multiple Principal VLANs D. Principal Port can communicate With all interfaces in the MUX VLAN.
A. In the same VLAN, the MUX VLAN can be mixed with the Super VLAN to use. 
B. The MUX VLAN is divided into a Principal VLAN and a Subordinate VLAN. The Subordinate VLAN is further divided into a Separate VLAN and an Isolate VLAN. 
CONFIDENTIAL 
C. Each Separate VLAN can be bound to multiple Principal VLANs 
D. Principal Port can communicate With all interfaces in the MUX VLAN.
Question 5
When you perform troubleshooting on a LAN deployed with Huawei devices, you find that there is a large number of unicast frames with unknown MAC addresses. 
What is the biggest risk for the switches? 
When you troubleshoot a LAN that has Huawei devices deployed, you find that there are many unicast frames with unknown source MAC addresses in the LAN. 
What is the greatest harm that many unknown source MAC address unicast frames will cause to the switch?
  1. Available MAC address table entries in the system will be consumed.
  2. Increased power consumption.
  3. Exhausts memory for buffered frames.
  4. Exhausts available TCAM entries
  5. Exhausts available bandwidth
Correct answer: A
Explanation:
A. Consume available bandwidth B. Increase the power consumption of the power supply C. Occupy the memory of cached frames D. Consume available MAC address entries in the system E. Occupy TCAM entries
A. Consume available bandwidth 
B. Increase the power consumption of the power supply 
C. Occupy the memory of cached frames 
D. Consume available MAC address entries in the system 
E. Occupy TCAM entries
Question 6
About the description of the process of sending and receiving data frames in the Access mode of the switch interface, which is correct? 
Which of the following description about the process of sending and receiving data frames in the Access mode of the switch interface is correct? 
Which of the following description is correct about the process of sending and receiving data frames in the Access mode of the switch interface?
  1. Directly discards when receiving a tagged data frame in Access mode
  2. Only receive unlabeled data frames in Access mode
  3. When the data frame enters the switch interface, the switch learns the destination MAC address in the data frame
  4. In the Access mode, the VLAN tag of the data frame will be stripped off when sent.
Correct answer: D
Explanation:
CONFIDENTIAL A. When receiving a tagged data frame directly discards in Access mode B. Only receive unlabeled data frames in Access mode C. When the data frame enters the switch interface, the switch learns the destination MAC address in the data frame- [D. In the Access mode, the VLAN tag of the data frame will be stripped off when sending. (Right Answers)
CONFIDENTIAL 
A. When receiving a tagged data frame directly discards in Access mode 
B. Only receive unlabeled data frames in Access mode 
C. When the data frame enters the switch interface, the switch learns the destination MAC address in the data frame- 
[D. In the Access mode, the VLAN tag of the data frame will be stripped off when sending. (Right Answers)
Question 7
In Rapid Spanning Tree Protocol (RSTP), which port provides a backup path to the root bridge and which state should this port be in?
  1. Root port/listening
  2. Alternate port/forwarding
  3. Alternate port/teaming
  4. Designated port/learning
  5. Alternate port/discarding
Correct answer: E
Question 8
Which of the following options may affect the establishment of IBGP neighbors? (Multiple Choice)
  1. Authentication is unsuccessful
  2. The BGP protocol version is inconsistent
  3. IBGP-MuIti-hop is not configured
  4. IGP routing is unreachable
Correct answer: ABD
Question 9
The following is about the RD attribute filter of BGP, what is the correct description? 
(Multiple Choice) 
Which of the following about the RD attribute filter of BGP is correct? (Multiple Choice)
  1. If RD-filter is configured, but the RD of the route does not match any of the RDs defined in the rule, the default match result is Permit.
  2. The relationship between the rules configured by RD-filter is "or"
  3. If RD-filter is not configured, but this RD-filter is used for filtering, the matching result is CONFIDENTIAL deny
  4. Matching multiple rules in the order of configuration
Correct answer: BD
Explanation:
A. If RD-filter is configured, but the RD of the route does not match any of the RDs defined in the rule, the default match result is Permit. B. The relationship between the rules configured by RD-filter is "or". C. If RD-filter is not configured, but this RD-filter is used for filtering, the matching result is deny. D. Match multiple rules in the order of configuration
A. If RD-filter is configured, but the RD of the route does not match any of the RDs defined in the rule, the default match result is Permit. 
B. The relationship between the rules configured by RD-filter is "or". 
C. If RD-filter is not configured, but this RD-filter is used for filtering, the matching result is deny. 
D. Match multiple rules in the order of configuration
Question 10
ISIS will elect DIS in the broadcast multi-access network- Which of the following statement about DIS is correct? (Multiple Choice)
  1. ISIS elects the DIS by comparing the priorities and compares the MAC addresses if the priorities are the same
  2. DIS guarantees database synchronization by periodically sending CSNP messages
  3. In a broadcast multi-access network, the DIS sends Hello PDUs three times as often
  4. DIS supports the preemption function. After the new DIS preemption is successful, you do not need to flood any LSP packets
Correct answer: ABC
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!