H12-224 : HCNP-R&S Fast Track (Huawei Certified Network Professional – Routing & Switching Fast Track) : Part 35

  1. Which following module is not the functional module of NFV framework?

    • VIM
    • VNF
    • VNFM
    • OSS
  2. Which of the following information can be learned based on the industry background of the project?

    • Common solutions in the industry
    • Problems to be resolved by the project
    • Organizational structure of customers
    • Implementation scope of the project
  3. After the project delivery, the O&M expenses are continuously generated. Which of the following items are the expenses generated during the O&M? (Choose all that apply.)

    • Energy expenses
    • Line construction expenses
    • Line lease expenses
    • Equipment depreciation expenses
    • Staff expenses
  4. When a large number of IP phones and WLAN APs exist on a network, which of the following switches is used?

    • Switches supporting STP edge ports
    • Switches supporting PoE
    • Switches supporting SACG
    • Switches supporting QoS
  5. To improve STP running stability, a network administrator wants to configure some STP features or protection mechanism on switches. Which of the following configuration roadmaps is correct?

    • Configure the user access port as an edge port to prevent the user from connecting to the switch on this port.
    • Configure root protection on the user access port to ensure that the user does not connect to a switch with a higher priority.
    • Configure loop protection on positions where loops have occurred so that loops are always blocked.
    • Configure BPDU protection so that the switch checks the validity of each received BPDU to prevent attacks of forged BPDUs.
  6. The greatest difference between a Fat AP and a Fit AP is that a Fat AP provides access to more users, has higher performance, and is more applicable to large networks.

    • TRUE
    • FALSE
  7. AR series routers provide various slots. Which of the following is not included?

    • SIC
    • WSIC
    • HSIC
    • XSIC
  8. Which of the following formulas is used to calculate availability?

    • MTBF/MTTR x 100%
    • MTTR/MTBF x 100%
    • (MTBF + MTTR)/MTBF x 100%
    • MTBF/(MTBF + MTTR) x 100%
  9. An enterprise network usually uses private IP addresses for internal communication. Which of the following addresses is a private IP address?

    • 0.1.1.1
    • 127.5.4.3
    • 128.0.0.5
    • 172.24.35.56
    • 231.33.24.35
  10. Huawei’s enterprise network NMS eSight has three editions: simplified, standard, and professional. Unlike the standard edition, which of the following features is provided by the professional edition?

    • Provide a database backup tool.
    • Support multi-user management.
    • Support management of the WLAN and MPLS VPN.
    • Support hierarchical management model.
  11. During unpacking and inspection, the device appearance is intact and all modules work properly after the first power-on. After the device continuously runs for 24 hours, a fault occurs on a card. This situation does not conform to DOA conditions.

    • TRUE
    • FALSE
  12. Which of the following operations is performed in the risky operation process?

    • Solution formulation
    • Authorization obtaining
    • Technical review
    • Implementation and result feedback
  13. Which of the following statements regarding the operation window time for a software upgrade is false?

    • It is determined by the accepted service interruption duration.
    • It must be longer than the upgrade execution time.
    • Troubleshooting time must be reserved.
    • Only network maintenance personnel need to be notified of the operation window time, while the customer does not.
  14. Which of the following statements regarding the device running check is true?

    • You can run the display memory-usage command to check the memory usage of the device. If the value of Memory Using Percentage exceeds 80%, pay attention to the memory usage.
    • You can run the display device command to check the running status of a board. If the board is online, the value of Online should be Present.
    • You can run the display fan command to check the fan status. If the value of Present is NO, the fan is in normal state.
    • You can run the display ftp-server command to check FTP ports. The FTP ports not in use should be recorded.
  15. Which of the following statements regarding the software and configuration backup is true?

    • The software version needs to be backed up for multiple times for the same product and the same version.
    • Licenses do not need to be backed up.
    • After the device configuration changes, the configuration file does not need to be backed up.
    • Backup is used to restore network functions in extreme cases.
  16. Ethernet supports broadcast. Once a network loop occurs, this simple broadcast mechanism will cause catastrophic consequences. Which of the following symptoms may be caused by a loop? (Choose all that apply.)

    • Users cannot log in to the device remotely.
    • The display interface command output shows a large number of broadcast packets received on an interface.
    • The CPU usage exceeds 70%.
    • A lot of ICMP packets are lost in ping tests.
  17. Which of the following troubleshooting methods is not based on the TCP/IP reference model?

    • Configuration comparison
    • Top-down
    • Bottom-up
    • Replacement
  18. In a complex network environment containing finance, OA, production, and more service systems, which of the following items is the first concern for troubleshooting?

    • IP address assignment
    • Network device model
    • Data flow direction of each service system
    • Equipment room environment
  19. Which of the following is the purpose of access security optimization?

    • To ensure that sensitive management information will not be intercepted.
    • To prevent or reduce external network attacks and harm.
    • To ensure secure access to key services.
    • To achieve secure user access control.
  20. Which of the following aspects should be considered during preliminary analysis of a migration project? (Choose all that apply.)

    • Necessity
    • Feasibility
    • Risks
    • Costs
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments