H12-223 : HCNP-R&S-IENPÂ (Huawei Certified Network Professional-Improving Enterprise Network Performance) : Part 03

  1. When a Huawei router serves as an SSH client and attempts to log in to another Huawei router, the login fails. It is suspected that the SSH server configuration is incorrect.

    Which of the following causes is the most impossible for the server fault?

    • The SSH protocol is not bound in the VTY user interface view.
    • The user service type, authentication type, and user service type are not configured.
    • The SSH server and client have inconsistent versions.
    • The SSH first-time authentication function is disabled.
  2. Which of the following causes may result in an IS-IS neighbor relationship fault?

    • The devices on two ends of a link have the same system ID.
    • The devices on two ends of a link have inconsistent IS-IS levels.
    • When an IS-IS Level-1 neighbor relationship is established, the devices on two ends of a link have inconsistent area addresses.
    • The IP addresses of interfaces on two ends of a link are on different network segments.
  3. Ethernet supports broadcast. Once a network loop occurs, this simple broadcast mechanism will cause catastrophic consequences.

    Which of the following symptoms may be caused by a loop?

    • Users cannot log in to the device remotely.
    • The display interface command output shows a large number of broadcast packets received on an interface.
    • The CPU usage exceeds 70%.
    • A lot of ICMP packets are lost in ping tests.
  4. To rectify a VRRP group two-master fault, run the display this command on VLANIF interfaces on both ends of the VRRP group.

    Which of the following operations is not performed?

    • Check whether the interface IP addresses are on the same network segment.
    • Check whether the VLANIF interfaces have the same VRRP group ID.
    • Check whether the virtual IP address is the same on the VLANIF interfaces in the VRRP group.
    • You do not need to check whether the interval for sending VRRP Advertisement packets is the same on the VLANIF interfaces.
  5. Which of the following causes may result in a BGP peer relationship fault?

    • An ACL is configured to disable TCP port 179.
    • The peer router ID conflicts with the local router ID.
    • The peer ebgp-max-hop command is not configured when loopback interfaces are used to establish the EBGP peer relationship.
    • The peer connect-interface command is not configured when loopback interfaces are used to establish the BGP peer relationship.
  6. The structured network troubleshooting process is triggered by a fault report. The basic principle is to simplify troubleshooting by narrowing down or isolating all possible causes of a fault into several small subsets. In what sequence are structured network troubleshooting steps carried out?

    1. Information collection. 2. Fault identification. 3. Cause list. 4. Troubleshooting assessment. 5. Fault analysis. 6. One-by-one check. 7. Fault rectification.

    • 1->2->3->6->4->5->7
    • 1->2->3->6->5->4->7
    • 2->1->3->5->6->4->7
    • 2->1->5->3->4->6->7
  7. During the structured network troubleshooting process, which of the following statements regarding the fault identification phase is true?

    • Focus on how to better solve faults, regardless of whether a fault is within your own responsibility scope.
    • Pay attention to user feedback and identify faults based on user feedback.
    • To minimize the fault effect, try not to let others know the network fault.
    • Check whether the troubleshooting is within your own responsibility scope.
  8. Which of the following causes may lead to a failure for hosts in the same VLAN to communicate with each other?

    • The interfaces connected to the users are shut down manually or the physical interfaces are damaged.
    • The switch learns incorrect MAC addresses.
    • Port isolation is configured on the switch.
    • Incorrect mappings between interfaces and MAC addresses are configured on the switch.
  9. Generally, which of the following enterprise services require user experience optimization?

    • Video surveillance
    • Videoconferencing
    • Voice call
    • Network management
  10. Which of the following work is not performed in network optimization?

    • Hardware optimization
    • Software optimization
    • Network expansion
    • Air conditioner replacement in the equipment room
  11. Access control is used to limit the traffic rate or block specific traffic based on reachable network routes to meet service management and control needs.

    • TRUE
    • FALSE
  12. Which of the following operations are performed during migration acceptance? (Choose three.)

    • Documentation transfer
    • Transfer-to-maintenance training
    • Acceptance meeting
    • Business expense accounting
  13. The migration rollback time can be determined based on the actual migration situation, without the need to plan in advance.

    • TRUE
    • FALSE
  14. Which of the following contents are included in a migration project solution?

    • Migration preparation
    • Migration implementation
    • Rollback solution
    • Contingency plan
  15. During the migration test, which of the following indicates that the test is completed?

    • The network is running properly.
    • Tested network services are running properly.
    • Tested upper-layer application services are running properly on the network.
    • Command outputs are correct.
  16. Which of the following work is not prepared before the migration?

    • Hardware test
    • Software test
    • Expenses
    • Tools
  17. Which of the following aspects should be considered during preliminary analysis of a migration project? (Choose three.)

    • Necessity
    • Feasibility
    • Risks
    • Costs
  18. Which of the following are migration difficulties? (Choose three.)

    • Minimizing on services
    • Achieving optimal risk prevention
    • Formulating a complete migration solution
    • ulating a complete migration solution
  19. Which of the following aspects should be considered for migration risk assessment?

    • Key risk positions
    • Risk impact scope
    • Risk impact time
    • Loss caused by risks
  20. Migration rollback is to restore the network state back before the migration.

    • TRUE
    • FALSE
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments