2019 Up to Date Huawei H12-211 Dumps PDF with 100% Passing Guarantee


Vicky114

Uploaded on Aug 19, 2019

Category Education

H12-211 study material has revolutionized the way students prepare for their IT exam. It proposes a short and simple study plan with passing surety. Well experienced experts have designed this using their knowledge and experience. They will supervise your performance when you will get money back guarantee at Realexamdumps. Though free demo version is enough for quality confirmation but money back guarantee is also being offered for further satisfaction. H12-211 questions and answers depict every exam related concept precisely and offer students a complete understanding of the discipline. This syllabus will assure your success at the first attempt. When you have enough time after finishing your preparation from H12-211 dumps, you are suggested to use Online Practice Test to upgrade your performance. For more info:https://www.realexamdumps.com/huawei/h12-211-practice-test.html

Category Education

Comments

                     

2019 Up to Date Huawei H12-211 Dumps PDF with 100% Passing Guarantee

H u a w e i H12-211 Exam Dumps Huawei Network Technology and Device (HCDA-HNTD) For More Info: https://www.realexamdumps.com/huawei/h12-211-practice-test.html Question: 1 An administrator currently manages AR2200 devices in the network through a single password, however the company wishes to introduce another two administrators and provide unique user credentials and privilege levels for telnet access to the network devices. What action can be taken? (Choose three) A. Configure three users under the AAA-view, and assign each a different password. B. The authentication mode must be changed to AAA. C. Each administrator must be assigned a privilege level. D. A public IP address must be assigned to each user for telnet access Answer: A, B, C Question: 2 Which of the following authentication methods are supported for Telnet users? (Choose three) A. Password authentication B. AAA local authentication C. MD5 authentication D. No authentication Answer: A, B, D Question: 3 Which authentication modes does AAA support? (Choose three). A. None B. Local C. Radius D. 802.1X Answer: A, B, C Question: 4 [RTA]aaa [RTA-aaa]domain huawei [RTA-aaa-domain-huawei]authentication-scheme au1 [RTA-aaa-domain-huawei]authentication-scheme au2 Refer to the configuration output. RTA has been configured using AAA as shown, and associated with the “huawei” domain. For users in the huawei domain, which authentication-scheme will be used A. au1 B. au2 C. au1 will be used. When au1 is deleted, users will use au2 D. au2 will be used. When au2 is deleted, users will use au1 Answer: B Question: 5 A user accesses a server supporting AAA, for which the authorization mode on the AAA server has been configured using the command “authorization-mode hwtacacs if-authenticated”. Which of the following statements regarding this command are true? (Choose three). A. If the hwtacacs server fails to respond, the user will be authenticated using local authentication. B. If the hwtacacs server fails to respond, the user will be authenticated using remote authentication. C. If the hwtacacs server fails to respond, the user will bypass authentication. D. The hwtacacs server will authorize the user. Answer: A, B, D Question: 6 Which of the following descriptions regarding eSight is not correct? A. eSight is used to monitor and manage enterprise networks. B. eSight supports only Huawei devices C. eSight supports WLAN management and monitoring of hotspot coverage. D. eSight supports the backup of configuration files and network traffic analysis. Answer: B Question: 7 What of the following statements is correct regarding access control list types and ranges? A. A basic ACL value ranges from 1000-2999 B. An advanced ACL value ranges from 3000-4000 C. A layer 2 ACL value ranges from 4000-4999 D. An interface ACL value ranges 1000-2000 Answer: C Question: 8 Which of the following parameters is not used by Advanced ACL? A. Source interface B. Destination port number C. Protocol number D. Time-range Answer: A Question: 9 [RTA]acl 2001 [RTA-acl-basic-2001]rule permit source 10.0.1.0 0.0.0.255 [RTA-acl-basic-2001]rule deny source 10.0.1.0 0.0.0.255 Refer to the configuration output. Which of the following statements regarding ACL 2001 is correct? A. Packets from network 10.0.1.0/24 network will be denied. B. Packets from network 10.0.1.0/24 network will be permitted. C. Packets destined for network 10.0.1.0/24 will be denied. D. Packets destined for network 10.0.1.0/24 will be permitted. Answer: B Question: 10 [RTA]acl 2002 [RTA-acl-basic-2002]rule permit source 20.1.1.1 0 [RTA-acl-basic-2002]rule permit source 30.1.1.1 0 Refer to the configuration output. A network administrator configured the ACL on router RTA, as shown. Which of the following statements regarding the rule order are correct? (Choose two). A. The rule-number of the first rule is 1 B. The rule-number of the first rule is 5 C. The rule-number of the second rule is 2 D. The rule-number of the second rule is 10 Answer: B, D Question: 11 Refer to the graphic. The network administrator has configured ACL 2000 to filter packets on RTA, as shown. Which of following statements regarding the subsequent behavior are correct? (Choose two). A. RTA will forward packets received from Host A. B. RTA will drop packets received from Host A. C. RTA will forward packets received from Host B. D. RTA will drop packets received from Host B. Answer: B, C Question: 12 Refer to the graphic. The network administrator wishes to deny Host A access to the HTTP server but allow access to all other servers. Which of the following ACL rules will achieve this? A. Rule deny tcp source 10.1.1.1 0 destination 202.100.1.12 0.0.0.0 destination-port eq 21 B. Rule deny tcp source 10.1.1.1 0 destination 202.100.1.12 0.0.0.0 destination-port eq 80 C. Rule deny udp source 10.1.1.1 0 destination 202.100.1.12 0.0.0.0 destination-port eq 21 D. Rule deny udp source 10.1.1.1 0 destination 202.100.1.12 0.0.0.0 destination-port eq 80 Answer: B Question: 13 Following a failure of services in the network, an administrator discovered that the configuration in one of the enterprise routers had been changed. What actions can be taken by the administrator to prevent further changes? (Choose three) A. The administrator should limit access by setting the login privilege of users to 0. B. The administrator should configure AAA to manage user authorization on the router. C. The administrator should configure an ACL to allow only the administrator to manage the router. D. The administrator should configure port-security on the router Answer: A, B, C Question: 14 [RTA]acl 2001 [RTA-acl-basic-2001]rule 20 permit source 20.1.1.0 0.0.0.255 [RTA-acl-basic-2001]rule 10 deny source 20.1.1.0 0.0.0.255 Refer to the configuration output. Which of the following statements is correct regarding the configuration of the ACL on RTA? A. Packets from network 20.1.1.0/24 network will be denied. B. Packets from network 20.1.1.0/24 network will be permitted. C. Packets destined for network 20.1.1.0/24 will be denied. D. Packets destined for network 20.1.1.0/24 will be permitted. Answer: A Question: 15 [RTA]acl 2001 [RTA-acl-basic-2001]rule deny source 172.16.1.1 0.0.0.0 [RTA-acl-basic-2001]rule deny source 172.16.0.0 0.255.0.0 Refer to the configuration output. Which of the following statements are correct regarding the configuration of the ACL on RTA? (Choose two). A. Packets from network 172.16.1.1/32 will be denied. B. Packets from network 172.16.1.0/24 will be denied C. Packets from network 172.17.1.0/24 will be denied D. Packets from network 172.18.0.0/16 will be denied. Answer: A, D Question: 16 The network administrator wants to improve the performance of network transmission, what steps can the administrator take? (Choose two) A. Change the work mode to full duplex of each end station. B. Link the end stations together using a switch. C. Change the work mode to half duplex of each end station. D. Link the end stations together using a hub. Answer: A, B Question: 17 On Huawei switch, which of the following commands can be used to set port duplex mode as "auto negotiation"? (Choose two) A. duplex negotiation auto B. duplex auto-negotiation C. duplex auto D. undo duplex Answer: C, D Question: 18 The network administrator wishes to transmit data between two end stations. The network interface cards of both devices operates at 100Mbps however one supports half duplex while the other uses full duplex mode. What will occur as a result? A. The end stations cannot communicate. B. The end stations can communicate, but data may be lost during transmission of large amounts of traffic. C. The end stations will operate normally D. The end stations can communicate, but speed is different during transmission of large amounts of traffic. Answer: B Question: 19 An Ethernet port can work one of three duplex modes, whereas an Optical Ethernet port only supports one single mode. Which of the following represents this mode? A. Full-duplex B. Half-duplex C. Auto-negotiation D. Simplex Answer: A Question: 20 While inspecting packets in the network, a network administrator discovers a frame with the destination MAC address of 01-00-5E-A0-B1-C3. What can the administrator determine from this? A. The MAC address is a unicast address. B. The MAC address is a broadcast address C. The MAC address is a multicast address. D. The MAC address is incorrect Answer: C Question: 21 According to OSI reference model, which layer is responsible for end to end error checking and flow control? A. Physical layer B. Data link layer C. Network layer D. Transport layer Answer: D Question: 22 Which of the following mechanisms are used for flow control? (Choose three) A. Acknowledgement B. Buffering C. Source quench messages D. Windowing Answer: B, C, D Question: 23 Source Destination Protocol Info 10.0.12.1 10.0.12.2 TCP 50190 > telnet [SYN] Seq=0 Win=8192 Len=0 MSS=1460 10.0.12.2 10.0.12.1 TCP telnet> 50190 [SYN, ACK] Seq=0 Ack=1 Win=8192 Len=0 MSS=1460 10.0.12.1 10.0.12.2 TCP 50190 > telnet [ACK] Seq=1 Ack=1 Win=8192 Len=0 Refer to the capture output.The administrator has captured three packets in the network. Which statement regarding the capured packets is incorrect? A. This packets represent a TCP three-way handshake process. B. 10.0.12.1 is the telnet server, while 10.0.12.2 is the telnet client. C. The three packets contain no application data. D. 10.0.12.1 uses port 50190 to buid the telnet connection. Answer: B Question: 24 An Ethernet frame is captured by network protocol analyzer tool and the value of Type/Length field is 0x0800. Which of the following statements about the frame are correct? (Choose two) A. The frame structure of the frame is Ethernet_II B. The frame structure of the frame is 802.3 C. Its upper layer protocol is IP D. Its upper layer protocol is IPX Answer: A, C Question: 25 Which of the following descriptions regarding the TTL field of the IP packet is correct? A. The TTL defines how many packets the source can send. B. The TTL defines the duration during which the source can send packets. C. The TTL value will decrement by 1 each time the packet is routed. D. The TTL value will increment by 1 each time the packet is routed. Answer: C Question: 26 Which of the following statements are correct about TTL field in IP packet? (Choose two) A. The maximum value of TTL is 65535 B. Normally, it's impossible for a router to receive a packet whose TTL is zero. C. The main purpose of TTL is to prevent IP packets from circulating endlessly in a network which can consume a lot of bandwidth D. TTL value will be decremented as a packet is passed through the network devices such as hub, LAN switch and router. Answer: B, C Question: 27 In the case of Huawei router, what is the "-i" parameter in a Ping command issued on a VRP operating system used to set? A. Interface for sending an Echo Request packet B. Source IP address for sending an Echo Request packet C. Interface for receiving an Echo Reply packet D. Destination IP address for receiving an Echo Reply packet Answer: A Question: 28 To provide the information about the IP addresses that a user packet traverses along the path to the destination, which of the following does Tracert record in each expired ICMP TTL packet? A. Destination port B. Source port C. Destination address D. Source address Answer: D Question: 29 Which of the following statements regarding the verification of IP connectivity are false? (Choose three) A. The ping 127.0.0.1 command can be used to check whether the network cable is correctly inserted into the host’s Ethernet port. B. The ping command with the host IP address as the destination can be used to verify that the TCP/IP protocol suite is functioning correctly. C. The ping command can be used to verify connectivity between the host and the local gateway. D. The command “ipconfig /release” can be used to check connectivity problems between the host and the local gateway. Answer: A, B, D Question: 30 A network administrator uses the ping command to check for points of failure in the network. Which protocols will be used during this process? (Choose two) A. ICMP B. TCP C. ARP D. UDP Answer: A, C