Uploaded on Jan 18, 2020
https://www.realexamcollection.com/huawei/h12-211-dumps.html No one should look at H12-211 exam as an easy attempt because Huawei includes very difficult contents. Without expertly composed stuff and guidance, it becomes almost impossible to ace this IT exam with high grades. H12-211 dumps material is expertly written and verified stuff especially designed for the candidates of this certification. You can get it right now from realexamcollection.com at a price affordable for everyone. A unique feature of services on this site is the free availability of demo questions that can be accessed quickly for quality check. PDF H12-211 questions and answers will orient you with only relevant and precise knowledge of the exam topics. It is the right place where you get guarantee for you success at the first attempt. Further, free latest exam updates will give you an edge to work according to the exam schedule and format. After perusing H12-211 dumps, you will use expertly designed online practice test for pushing your performance to the peak.
H12-211 Dumps & Test Certification H12-211Cost - Christmas Offer
Huaw ei H12-21 1 Huawei Network Technology and Device (HCDA-HNTD) https://www.realexamcollection.com/huawei/h12-211-dumps.html Question: 1 An administrator currently manages AR2200 devices in the network through a single password, however the company wishes to introduce another two administrators and provide unique user credentials and privilege levels for telnet access to the network devices. What action can be taken? (Choose three) A. Configure three users under the AAA-view, and assign each a different password. B. The authentication mode must be changed to AAA. C. Each administrator must be assigned a privilege level. D. A public IP address must be assigned to each user for telnet access Answer: A, B, C Question: 2 Which of the following authentication methods are supported for Telnet users? (Choose three) A. Password authentication B. AAA local authentication C. MD5 authentication D. No authentication Answer: A, B, D Question: 3 Which authentication modes does AAA support? (Choose three). A. None B. Local C. Radius D. 802.1X Answer: A, B, C Question: 4 [RTA]aaa [RTA-aaa]domain huawei [RTA-aaa-domain-huawei]authentication-scheme au1 [RTA-aaa-domain-huawei]authentication-scheme au2 Refer to the configuration output. RTA has been configured using AAA as shown, and associated with the “huawei” domain. For users in the huawei domain, which authentication-scheme will be used A. au1 B. au2 C. au1 will be used. When au1 is deleted, users will use au2 D. au2 will be used. When au2 is deleted, users will use au1 Answer: B Question: 5 A user accesses a server supporting AAA, for which the authorization mode on the AAA server has been configured using the command “authorization-mode hwtacacs if-authenticated”. Which of the following statements regarding this command are true? (Choose three). A. If the hwtacacs server fails to respond, the user will be authenticated using local authentication. B. If the hwtacacs server fails to respond, the user will be authenticated using remote authentication. C. If the hwtacacs server fails to respond, the user will bypass authentication. D. The hwtacacs server will authorize the user. Answer: A, B, D Question: 6 Which of the following descriptions regarding eSight is not correct? A. eSight is used to monitor and manage enterprise networks. B. eSight supports only Huawei devices C. eSight supports WLAN management and monitoring of hotspot coverage. D. eSight supports the backup of configuration files and network traffic analysis. Answer: B Question: 7 What of the following statements is correct regarding access control list types and ranges? A. A basic ACL value ranges from 1000-2999 B. An advanced ACL value ranges from 3000-4000 C. A layer 2 ACL value ranges from 4000-4999 D. An interface ACL value ranges 1000-2000 Answer: C Question: 8 Which of the following parameters is not used by Advanced ACL? A. Source interface B. Destination port number C. Protocol number D. Time-range Answer: A Question: 9 [RTA]acl 2001 [RTA-acl-basic-2001]rule permit source 10.0.1.0 0.0.0.255 [RTA-acl-basic-2001]rule deny source 10.0.1.0 0.0.0.255 Refer to the configuration output. Which of the following statements regarding ACL 2001 is correct? A. Packets from network 10.0.1.0/24 network will be denied. B. Packets from network 10.0.1.0/24 network will be permitted. C. Packets destined for network 10.0.1.0/24 will be denied. D. Packets destined for network 10.0.1.0/24 will be permitted. Answer: B Question: 10 [RTA]acl 2002 [RTA-acl-basic-2002]rule permit source 20.1.1.1 0 [RTA-acl-basic-2002]rule permit source 30.1.1.1 0 Refer to the configuration output. A network administrator configured the ACL on router RTA, as shown. Which of the following statements regarding the rule order are correct? (Choose two). A. The rule-number of the first rule is 1 B. The rule-number of the first rule is 5 C. The rule-number of the second rule is 2 D. The rule-number of the second rule is 10 Answer: B, D Question: 11 Refer to the graphic. The network administrator has configured ACL 2000 to filter packets on RTA, as shown. Which of following statements regarding the subsequent behavior are correct? (Choose two). A. RTA will forward packets received from Host A. B. RTA will drop packets received from Host A. C. RTA will forward packets received from Host B. D. RTA will drop packets received from Host B. Answer: B, C Question: 12 Refer to the graphic. The network administrator wishes to deny Host A access to the HTTP server but allow access to all other servers. Which of the following ACL rules will achieve this? A. Rule deny tcp source 10.1.1.1 0 destination 202.100.1.12 0.0.0.0 destination-port eq 21 B. Rule deny tcp source 10.1.1.1 0 destination 202.100.1.12 0.0.0.0 destination-port eq 80 C. Rule deny udp source 10.1.1.1 0 destination 202.100.1.12 0.0.0.0 destination-port eq 21 D. Rule deny udp source 10.1.1.1 0 destination 202.100.1.12 0.0.0.0 destination-port eq 80 Answer: B Question: 13 Following a failure of services in the network, an administrator discovered that the configuration in one of the enterprise routers had been changed. What actions can be taken by the administrator to prevent further changes? (Choose three) A. The administrator should limit access by setting the login privilege of users to 0. B. The administrator should configure AAA to manage user authorization on the router. C. The administrator should configure an ACL to allow only the administrator to manage the router. D. The administrator should configure port-security on the router Answer: A, B, C Question: 14 [RTA]acl 2001 [RTA-acl-basic-2001]rule 20 permit source 20.1.1.0 0.0.0.255 [RTA-acl-basic-2001]rule 10 deny source 20.1.1.0 0.0.0.255 Refer to the configuration output. Which of the following statements is correct regarding the configuration of the ACL on RTA? A. Packets from network 20.1.1.0/24 network will be denied. B. Packets from network 20.1.1.0/24 network will be permitted. C. Packets destined for network 20.1.1.0/24 will be denied. D. Packets destined for network 20.1.1.0/24 will be permitted. Answer: A Question: 15 [RTA]acl 2001 [RTA-acl-basic-2001]rule deny source 172.16.1.1 0.0.0.0 [RTA-acl-basic-2001]rule deny source 172.16.0.0 0.255.0.0 Refer to the configuration output. Which of the following statements are correct regarding the configuration of the ACL on RTA? (Choose two). A. Packets from network 172.16.1.1/32 will be denied. B. Packets from network 172.16.1.0/24 will be denied C. Packets from network 172.17.1.0/24 will be denied D. Packets from network 172.18.0.0/16 will be denied. Answer: A, D Question: 16 The network administrator wants to improve the performance of network transmission, what steps can the administrator take? (Choose two) A. Change the work mode to full duplex of each end station. B. Link the end stations together using a switch. C. Change the work mode to half duplex of each end station. D. Link the end stations together using a hub. Answer: A, B Question: 17 On Huawei switch, which of the following commands can be used to set port duplex mode as "auto negotiation"? (Choose two) A. duplex negotiation auto B. duplex auto-negotiation C. duplex auto D. undo duplex Answer: C, D Question: 18 The network administrator wishes to transmit data between two end stations. The network interface cards of both devices operates at 100Mbps however one supports half duplex while the other uses full duplex mode. What will occur as a result? A. The end stations cannot communicate. B. The end stations can communicate, but data may be lost during transmission of large amounts of traffic. C. The end stations will operate normally D. The end stations can communicate, but speed is different during transmission of large amounts of traffic. Answer: B Question: 19 An Ethernet port can work one of three duplex modes, whereas an Optical Ethernet port only supports one single mode. Which of the following represents this mode? A. Full-duplex B. Half-duplex C. Auto-negotiation D. Simplex Answer: A Question: 20 While inspecting packets in the network, a network administrator discovers a frame with the destination MAC address of 01-00-5E-A0-B1-C3. What can the administrator determine from this? A. The MAC address is a unicast address. B. The MAC address is a broadcast address C. The MAC address is a multicast address. D. The MAC address is incorrect Answer: C Question: 21 According to OSI reference model, which layer is responsible for end to end error checking and flow control? A. Physical layer B. Data link layer C. Network layer D. Transport layer Answer: D Question: 22 Which of the following mechanisms are used for flow control? (Choose three) A. Acknowledgement B. Buffering C. Source quench messages D. Windowing Answer: B, C, D Question: 23 Source Destination Protocol Info 10.0.12.1 10.0.12.2 TCP 50190 > telnet [SYN] Seq=0 Win=8192 Len=0 MSS=1460 10.0.12.2 10.0.12.1 TCP telnet> 50190 [SYN, ACK] Seq=0 Ack=1 Win=8192 Len=0 MSS=1460 10.0.12.1 10.0.12.2 TCP 50190 > telnet [ACK] Seq=1 Ack=1 Win=8192 Len=0 Refer to the capture output.The administrator has captured three packets in the network. Which statement regarding the capured packets is incorrect? A. This packets represent a TCP three-way handshake process. B. 10.0.12.1 is the telnet server, while 10.0.12.2 is the telnet client. C. The three packets contain no application data. D. 10.0.12.1 uses port 50190 to buid the telnet connection. Answer: B Question: 24 An Ethernet frame is captured by network protocol analyzer tool and the value of Type/Length field is 0x0800. Which of the following statements about the frame are correct? (Choose two) A. The frame structure of the frame is Ethernet_II B. The frame structure of the frame is 802.3 C. Its upper layer protocol is IP D. Its upper layer protocol is IPX Answer: A, C Question: 25 Which of the following descriptions regarding the TTL field of the IP packet is correct? A. The TTL defines how many packets the source can send. B. The TTL defines the duration during which the source can send packets. C. The TTL value will decrement by 1 each time the packet is routed. D. The TTL value will increment by 1 each time the packet is routed. Answer: C Question: 26 Which of the following statements are correct about TTL field in IP packet? (Choose two) https://www.realexamcollection.com/huawei/h12-211-dumps.html
Comments