H12-224 : HCNP-R&S Fast Track (Huawei Certified Network Professional – Routing & Switching Fast Track) : Part 35
-
Which following module is not the functional module of NFV framework?
- VIM
- VNF
- VNFM
- OSS
-
Which of the following information can be learned based on the industry background of the project?
- Common solutions in the industry
- Problems to be resolved by the project
- Organizational structure of customers
- Implementation scope of the project
-
After the project delivery, the O&M expenses are continuously generated. Which of the following items are the expenses generated during the O&M? (Choose all that apply.)
- Energy expenses
- Line construction expenses
- Line lease expenses
- Equipment depreciation expenses
- Staff expenses
-
When a large number of IP phones and WLAN APs exist on a network, which of the following switches is used?
- Switches supporting STP edge ports
- Switches supporting PoE
- Switches supporting SACG
- Switches supporting QoS
-
To improve STP running stability, a network administrator wants to configure some STP features or protection mechanism on switches. Which of the following configuration roadmaps is correct?
- Configure the user access port as an edge port to prevent the user from connecting to the switch on this port.
- Configure root protection on the user access port to ensure that the user does not connect to a switch with a higher priority.
- Configure loop protection on positions where loops have occurred so that loops are always blocked.
- Configure BPDU protection so that the switch checks the validity of each received BPDU to prevent attacks of forged BPDUs.
-
The greatest difference between a Fat AP and a Fit AP is that a Fat AP provides access to more users, has higher performance, and is more applicable to large networks.
- TRUE
- FALSE
-
AR series routers provide various slots. Which of the following is not included?
- SIC
- WSIC
- HSIC
- XSIC
-
Which of the following formulas is used to calculate availability?
- MTBF/MTTR x 100%
- MTTR/MTBF x 100%
- (MTBF + MTTR)/MTBF x 100%
- MTBF/(MTBF + MTTR) x 100%
-
An enterprise network usually uses private IP addresses for internal communication. Which of the following addresses is a private IP address?
- 0.1.1.1
- 127.5.4.3
- 128.0.0.5
- 172.24.35.56
- 231.33.24.35
-
Huawei’s enterprise network NMS eSight has three editions: simplified, standard, and professional. Unlike the standard edition, which of the following features is provided by the professional edition?
- Provide a database backup tool.
- Support multi-user management.
- Support management of the WLAN and MPLS VPN.
- Support hierarchical management model.
-
During unpacking and inspection, the device appearance is intact and all modules work properly after the first power-on. After the device continuously runs for 24 hours, a fault occurs on a card. This situation does not conform to DOA conditions.
- TRUE
- FALSE
-
Which of the following operations is performed in the risky operation process?
- Solution formulation
- Authorization obtaining
- Technical review
- Implementation and result feedback
-
Which of the following statements regarding the operation window time for a software upgrade is false?
- It is determined by the accepted service interruption duration.
- It must be longer than the upgrade execution time.
- Troubleshooting time must be reserved.
- Only network maintenance personnel need to be notified of the operation window time, while the customer does not.
-
Which of the following statements regarding the device running check is true?
- You can run the display memory-usage command to check the memory usage of the device. If the value of Memory Using Percentage exceeds 80%, pay attention to the memory usage.
- You can run the display device command to check the running status of a board. If the board is online, the value of Online should be Present.
- You can run the display fan command to check the fan status. If the value of Present is NO, the fan is in normal state.
- You can run the display ftp-server command to check FTP ports. The FTP ports not in use should be recorded.
-
Which of the following statements regarding the software and configuration backup is true?
- The software version needs to be backed up for multiple times for the same product and the same version.
- Licenses do not need to be backed up.
- After the device configuration changes, the configuration file does not need to be backed up.
- Backup is used to restore network functions in extreme cases.
-
Ethernet supports broadcast. Once a network loop occurs, this simple broadcast mechanism will cause catastrophic consequences. Which of the following symptoms may be caused by a loop? (Choose all that apply.)
- Users cannot log in to the device remotely.
- The display interface command output shows a large number of broadcast packets received on an interface.
- The CPU usage exceeds 70%.
- A lot of ICMP packets are lost in ping tests.
-
Which of the following troubleshooting methods is not based on the TCP/IP reference model?
- Configuration comparison
- Top-down
- Bottom-up
- Replacement
-
In a complex network environment containing finance, OA, production, and more service systems, which of the following items is the first concern for troubleshooting?
- IP address assignment
- Network device model
- Data flow direction of each service system
- Equipment room environment
-
Which of the following is the purpose of access security optimization?
- To ensure that sensitive management information will not be intercepted.
- To prevent or reduce external network attacks and harm.
- To ensure secure access to key services.
- To achieve secure user access control.
-
Which of the following aspects should be considered during preliminary analysis of a migration project? (Choose all that apply.)
- Necessity
- Feasibility
- Risks
- Costs
Subscribe
0 Comments
Newest