H12-223 : HCNP-R&S-IENPÂ (Huawei Certified Network Professional-Improving Enterprise Network Performance) : Part 01
-
The project scope can be determined from three aspects. Which of the following is not included?
- Functions and modules to be realized by the project
- Geographic range of the network
- Investment budget of the project
- Responsibility division between the project and other matching systems
-
Which of the following task need to be completed during the planning stage of a project?
- Work out the technical design
- Know the project background
- Determine the model of networks devices in the project
- Make clear the requirements of a project
- Plan IP addresses
-
After the project delivery, the O&M expenses are continuously generated.
Which of the following items are the expenses generated during the O&M?
- Energy expenses
- Line construction expenses
- Line lease expenses
- Equipment depreciation expenses
- Staff expenses
-
Determining members in the project team is one of tasks in the implementation stage.
- TRUE
- FALSE
-
Which of the following events represent the end of the network planning stage?
- Project initiation
- Bid release
- Contract signing
- Preliminary project acceptance
-
Which of the following information can be learned based on the industry background of the project?
- Common solutions in the industry
- Problems to be resolved by the project
- Organizational structure of customers
- Implementation scope of the project
-
The essence of SDN is to construct a brain for a network and achieve optimal global traffic through the global view and centralized control.
- TRUE
- FALSE
-
Ethernet is the most mainstream LAN. Which of the following factors should be considered in Ethernet type selection? (Choose two.)
- Network rate
- Network medium
- Network scale
- Network hierarchy
- Encapsulation standard
-
Enterprise networks usually use DHCP to assign IP addresses to users. Unlike static IP address assignment, DHCP address assignment greatly reduces the workload for managing network addresses.
- TRUE
- FALSE
-
Which of the following routers provides the cluster function?
- AR G3
- NE20S
- NE40E
- NE5000E
-
Which of the following fiber interface types is usually used on the device side?
- LC interface
- RJ interface
- FC interface
- BNC interface
-
Switches run the MSTP protocol by default. Which of the following statements regarding the default status is true?
- All switches run in the same region by default.
- The STP calculation speed is faster than that when multiple instances are configured.
- Due to lack of configuration, all switches switch the running mode to RSTP.
- Each switch runs in an independent region.
-
Which of the following scenarios is a loop test applicable to?
- To test whether applications are properly connected
- To test whether a routing protocol can prevent loops
- To test whether a switch can prevent loops and broadcast
- To test whether a physical link is disconnected
-
DHCP snooping is a valid security mechanism. Which of the following attack prevention methods can DHCP snooping provide? (Choose two.)
- Defense against bogus DHCP server attacks
- Defense against DoS attacks on the DHCP server
- Defense against MAC address flooding attacks
- Source MAC address check for data packets in collaboration with DAI
- Source IP address check for data packets in collaboration with IPSG
-
Which of the following networks are involved during construction of a large enterprise network?
- Backbone network
- Transport network
- Data center network
- Wireless network
- Storage network
-
Which of the following features is not applied to enterprise WANs?
- Wide coverage
- Difficult O&M
- Multiple types
- High costs of utilization
-
Employees in an enterprise often need to connect to the enterprise’s intranet for remote access when going on business.
Which of the following technologies can meet this demand? (Choose two.)
- MPLS VPN
- IPSec VPN
- SSL VPN
- ISDN Dial-in
-
To improve STP running stability, a network administrator wants to configure some STP features or protection mechanism on switches.
Which of the following configuration roadmaps is correct?
- Configure the user access port as an edge port to prevent the user from connecting to the switch on this port.
- Configure root protection on the user access port to ensure that the user does not connect to a switch with a higher priority.
- Configure loop protection on positions where loops have occurred so that loops are always blocked.
- Configure BPDU protection so that the switch checks the validity of each received BPDU to prevent attacks of forged BPDUs.
-
Huawei’s enterprise network NMS eSight has three editions: simplified, standard, and professional.
Unlike the standard edition, which of the following features is provided by the professional edition?
- Provide a database backup tool.
- Support multi-user management
- Support management of the WLAN and MPLS VPN
- Support hierarchical management model
-
Current enterprise networks usually use OSPF as the routing protocol.
What precautions are there when OSPF is used? (Choose four.)
- Determine that the backbone area will not split.
- Check whether secondary optimal routes exist on the network according to OSPF route selection rules.
- Check whether all non-backbone areas are correctly and reliably connected to the backbone area.
- Check the OSPF network topology and ensure that no loop exists when OSPF routes are being calculated.
- Verify that OSPF costs can correctly demonstrate the actual bandwidth of links at more than 100 Mbit/s.
Subscribe
0 Comments
Newest