H12-223 : HCNP-R&S-IENPÂ (Huawei Certified Network Professional-Improving Enterprise Network Performance) : Part 01

  1. The project scope can be determined from three aspects. Which of the following is not included?

    • Functions and modules to be realized by the project
    • Geographic range of the network
    • Investment budget of the project
    • Responsibility division between the project and other matching systems
  2. Which of the following task need to be completed during the planning stage of a project?

    • Work out the technical design
    • Know the project background
    • Determine the model of networks devices in the project
    • Make clear the requirements of a project
    • Plan IP addresses
  3. After the project delivery, the O&M expenses are continuously generated.

    Which of the following items are the expenses generated during the O&M?

    • Energy expenses
    • Line construction expenses
    • Line lease expenses
    • Equipment depreciation expenses
    • Staff expenses
  4. Determining members in the project team is one of tasks in the implementation stage.

    • TRUE
    • FALSE
  5. Which of the following events represent the end of the network planning stage?

    • Project initiation
    • Bid release
    • Contract signing
    • Preliminary project acceptance
  6. Which of the following information can be learned based on the industry background of the project?

    • Common solutions in the industry
    • Problems to be resolved by the project
    • Organizational structure of customers
    • Implementation scope of the project
  7. The essence of SDN is to construct a brain for a network and achieve optimal global traffic through the global view and centralized control.

    • TRUE
    • FALSE
  8. Ethernet is the most mainstream LAN. Which of the following factors should be considered in Ethernet type selection? (Choose two.)

    • Network rate
    • Network medium
    • Network scale
    • Network hierarchy
    • Encapsulation standard
  9. Enterprise networks usually use DHCP to assign IP addresses to users. Unlike static IP address assignment, DHCP address assignment greatly reduces the workload for managing network addresses.

    • TRUE
    • FALSE
  10. Which of the following routers provides the cluster function?

    • AR G3
    • NE20S
    • NE40E
    • NE5000E
  11. Which of the following fiber interface types is usually used on the device side?

    • LC interface
    • RJ interface
    • FC interface
    • BNC interface
  12. Switches run the MSTP protocol by default. Which of the following statements regarding the default status is true?

    • All switches run in the same region by default.
    • The STP calculation speed is faster than that when multiple instances are configured.
    • Due to lack of configuration, all switches switch the running mode to RSTP.
    • Each switch runs in an independent region.
  13. Which of the following scenarios is a loop test applicable to?

    • To test whether applications are properly connected
    • To test whether a routing protocol can prevent loops
    • To test whether a switch can prevent loops and broadcast
    • To test whether a physical link is disconnected
  14. DHCP snooping is a valid security mechanism. Which of the following attack prevention methods can DHCP snooping provide? (Choose two.)

    • Defense against bogus DHCP server attacks
    • Defense against DoS attacks on the DHCP server
    • Defense against MAC address flooding attacks
    • Source MAC address check for data packets in collaboration with DAI
    • Source IP address check for data packets in collaboration with IPSG
  15. Which of the following networks are involved during construction of a large enterprise network?

    • Backbone network
    • Transport network
    • Data center network
    • Wireless network
    • Storage network
  16. Which of the following features is not applied to enterprise WANs?

    • Wide coverage
    • Difficult O&M
    • Multiple types
    • High costs of utilization
  17. Employees in an enterprise often need to connect to the enterprise’s intranet for remote access when going on business.

    Which of the following technologies can meet this demand? (Choose two.)

    • MPLS VPN
    • IPSec VPN
    • SSL VPN
    • ISDN Dial-in
  18. To improve STP running stability, a network administrator wants to configure some STP features or protection mechanism on switches.

    Which of the following configuration roadmaps is correct?

    • Configure the user access port as an edge port to prevent the user from connecting to the switch on this port.
    • Configure root protection on the user access port to ensure that the user does not connect to a switch with a higher priority.
    • Configure loop protection on positions where loops have occurred so that loops are always blocked.
    • Configure BPDU protection so that the switch checks the validity of each received BPDU to prevent attacks of forged BPDUs.
  19. Huawei’s enterprise network NMS eSight has three editions: simplified, standard, and professional.

    Unlike the standard edition, which of the following features is provided by the professional edition?

    • Provide a database backup tool.
    • Support multi-user management
    • Support management of the WLAN and MPLS VPN
    • Support hierarchical management model
  20. Current enterprise networks usually use OSPF as the routing protocol.

    What precautions are there when OSPF is used? (Choose four.)

    • Determine that the backbone area will not split.
    • Check whether secondary optimal routes exist on the network according to OSPF route selection rules.
    • Check whether all non-backbone areas are correctly and reliably connected to the backbone area.
    • Check the OSPF network topology and ensure that no loop exists when OSPF routes are being calculated.
    • Verify that OSPF costs can correctly demonstrate the actual bandwidth of links at more than 100 Mbit/s.
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments