Exam4Training

Huawei H12-222-ENU HCIP-Routing&Switching-IENP(Huawei Certified ICT Professional-Improving Enterprise Network Performance) Online Training

Question #1

A flow mirroring port can transmit the specified service flows on the mirroring port to the monitoring device for analysis and monitoring.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #2

In peer-to-peer VPN model, which of the following devices is directly connected to a client and is responsible for connecting VPN services to the carrier network?

  • A . CE
  • B . PE
  • C . P
  • D . Client device

Reveal Solution Hide Solution

Correct Answer: B
Question #3

QoS provides different service quality to meet a variety of different needs.

Which of following functions are provided by the QoS? (Multiple Choice)

  • A . Provide dedicated bandwidth.
  • B . Reduce the packet loss ratio.
  • C . Prevent and manage network congestion.
  • D . Setting the source address of packets.

Reveal Solution Hide Solution

Correct Answer: ABC
Question #4

Which IP precedence value represents the critical service traffic?

  • A . 0
  • B . 2
  • C . 5
  • D . 6

Reveal Solution Hide Solution

Correct Answer: C
Question #5

What about all outgoing labels in the label forwarding table of a MPLS-capable device for the same route with the same next hop?

  • A . They must be different.
  • B . They must be the same.
  • C . They may be the same.

Reveal Solution Hide Solution

Correct Answer: B
Question #6

How is traffic classification classified based on reference different information of rules? (Multiple Choice)

  • A . Simple traffic classification
  • B . Complex traffic classification
  • C . On-demand classification
  • D . Service traffic classification

Reveal Solution Hide Solution

Correct Answer: AB
Question #7

Which of the following command is used to configure the listening address of the SDN controller?

  • A . openflow listening-ip 1.1.1.1
  • B . sdn controller souce-address 1.1.1.1
  • C . controller-ip 1.1.1.1
  • D . sdn listening-ip 1.1.1.1

Reveal Solution Hide Solution

Correct Answer: A
Question #8

Which of the following statements regarding the firewall zone is true?

  • A . Different zones of Firewall can use the same priority.
  • B . A firewall interface can belong to different zones.
  • C . Different firewall interfaces can belong to the same zone.
  • D . The default firewall zone can be deleted.

Reveal Solution Hide Solution

Correct Answer: C
Question #9

eSight single-server mode allows login of only one user. If another user logs in, the system displays a message indicating that a user is online currently.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: B
Question #10

Which of the following are highlights of the Service Chain component of the Agile Controller? (Multiple Choice)

  • A . Services are orchestrated based on the Layer 3 GRE tunnels and service devices can be deployed flexibly.
  • B . Service orchestration operations are visualized in the topology, simplifying the configuration and management.
  • C . Adding or deleting service devices does not change the physical topology of the live network and existing routes.
  • D . Services are orchestrated automatically, without the need for manual maintenance.

Reveal Solution Hide Solution

Correct Answer: ABC

Question #11

Which of the following statements regarding Agile Controller guest account application mode is false?

  • A . Created by the administrator
  • B . Created by employees with guest management rights
  • C . Created by the receptionist
  • D . Registered by guests

Reveal Solution Hide Solution

Correct Answer: C
Question #12

Which of the following statements regarding the trusted and untrusted zones are true? (Multiple Choice)

  • A . The direction for the access from the trusted zone to the untrusted zone is the outbound direction.
  • B . The direction for the access from the trusted zone to the untrusted zone is the inbound direction.
  • C . The security level of the trusted zone is 85.
  • D . The security level of the untrusted zone is 50.

Reveal Solution Hide Solution

Correct Answer: AC
Question #13

MPLS is a label forwarding technology.

Which of the following MPLS statements is false?

  • A . MPLS uses the connection-oriented control plane and connectionless data plane.
  • B . The control plane transmits route information and distributes labels. The data plane transmits packets along the created label switched path (ISP).
  • C . Switches in an MPLS domain only need to forward packets based on the label added before the IP header.
  • D . Compared with traditional IP forwarding, MPLS label forwarding greatly improves the data forwarding efficiency.

Reveal Solution Hide Solution

Correct Answer: A
Question #14

Which information of IPv4 packets is used for simple traffic classification? (Multiple Choice)

  • A . DSCP information
  • B . IP precedence
  • C . Traffic class information
  • D . 802.1p information

Reveal Solution Hide Solution

Correct Answer: AB
Question #15

The interface IP address and VRRP virtual IP address can be the same.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #16

NFV and SDN depend on each other and must be used together.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: B
Question #17

Which of the following methods can be used to improve network QoS? (Multiple Choice)

  • A . Increasing link bandwidth
  • B . Using proper queue scheduling and congestion avoidance mechanisms
  • C . Using high-performance devices
  • D . Provide services at different times for different business

Reveal Solution Hide Solution

Correct Answer: ABC
Question #18

In the port mirroring, real and reliable data must be collected in real time.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #19

SDN technology advocate layered open architecture. Then which organization advocate and defines the centralized architecture and Open Flow?

  • A . ONF
  • B . IETF
  • C . ETSI
  • D . ITU

Reveal Solution Hide Solution

Correct Answer: A
Question #20

What are the prerequisites for eSight to receive and manage alarms reported by devices? (Multiple Choice)

  • A . The devices are managed by eSight.
  • B . Trap parameters have been correctly configured on the devices.
  • C . The SNMP protocol and parameters are correctly configured for managed devices on eSight.
  • D . There are reachable routes between eSight and devices.

Reveal Solution Hide Solution

Correct Answer: ABCD
Exit mobile version