HCIE-Datacom

Here you have the best Huawei H12-891 practice exam questions

  • You have 32 total questions to study from
  • Each page has 5 questions, making a total of 7 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on December 2, 2024
Question 1 of 32

In 6PE and 6VPE networking, no VPN instance needs to be created on PEs.

    Correct Answer: B

    In 6PE and 6VPE networking, VPN instances typically need to be created on PEs (Provider Edge routers). For 6VPE (IPv6 VPN Provider Edge), VPN instances are necessary to isolate and manage the IPv6 VPN traffic. These instances, known as Virtual Routing and Forwarding (VRF) tables, are used to store and process the routes for different VPNs. Therefore, the statement that no VPN instance needs to be created on PEs is false.

Question 2 of 32

By default, the domain ID of an OSPF process is the same as the process ID. You can run the domain-id command in the OSPF process view to change a domain ID.

    Correct Answer: B

    By default, the domain ID of an OSPF process is null, not the same as the process ID. You need to explicitly set a domain ID using the domain-id command in the OSPF process view if you want to assign a specific domain ID.

Question 3 of 32

VXLAN identifies tenants using VNIs, which are 24 bits long. A tenant can have one or more VNIs, and VXLAN supports a maximum of 12 million tenants.

    Correct Answer: B

    VXLAN identifies tenants using VNIs, which are indeed 24 bits long. However, a 24-bit identifier can support up to 16 million different values (2^24 = 16,777,216), not 12 million. Therefore, the statement that VXLAN supports a maximum of 12 million tenants is false.

Question 4 of 32

In the SSH algorithm negotiation phase, the SSH server and client exchange the list of algorithms that hey support. The list of symmetric encryption algorithms of the SSH server is as follows: aes256-ctr, aes192-ctr, aes128-ctr, and aes256-cbc. The list of symmetric encryption algorithms of the SSH client is as follows: aes128-ctr, aes192-ctr, aes256-ctr, and aes256-cbc. Which of the following symmetric encryption algorithms can be used by both the SSH server and client?

    Correct Answer: A, B, C, D

    The symmetric encryption algorithms that can be used by both the SSH server and client are those that appear in both lists. In this case, the algorithms that match are aes256-ctr, aes192-ctr, aes128-ctr, and aes256-cbc. Therefore, all the provided options are correct.

Question 5 of 32

SR-MPLS is enabled on all routers. The label information encapsulated by R1 into a data packet is shown in the figure. Which of the following MPLS labels is carried in the data packet when it is sent from R2 to R4?

    Correct Answer: B

    The MPLS label stack originating from R1 encapsulates the path information through the network. When a packet traverses through intermediary routers, each router swaps the top label with the appropriate label for the next hop. Starting from R1, the packet is labeled with 2013 (R1 to R3), then 2032 (R3 to R2), and then 2024 (R2 to R4). When R2 forwards the packet to R4, it uses the top label 2024 because that’s the next hop label instructed by the label switching mechanism.