1 / 11

HCIE-Routing & Switching (Written) V3.0 H12-261_V3.0 Questions and Answers

PassQuestion new released high quality HCIE-Routing & Switching (Written) V3.0 H12-261_V3.0 Questions and Answers that will help you save time and prepare well for your test.

Download Presentation

HCIE-Routing & Switching (Written) V3.0 H12-261_V3.0 Questions and Answers

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. H12-261_V3.0 Free Questions H12-261_V3.0 Free Questions HCIE-Routing & Switching (Written) V3.0 HCIE-Routing & Switching (Written) V3.0 https://www.passquestion.com/ https://www.passquestion.com/H12-261_V3.0 H12-261_V3.0.html .html

  2. Question 1 Question 1 Which of the following statements about the concept of multicast is wrong? Which of the following statements about the concept of multicast is wrong? A. Multicast router: router or layer three switch that supports the three-layer multicast A. Multicast router: router or layer three switch that supports the three-layer multicast function function B. Multicast group members: Multicast group members can be widely distributed B. Multicast group members: Multicast group members can be widely distributed anywhere in the network anywhere in the network C. Multicast group: a set identified by an IP multicast address C. Multicast group: a set identified by an IP multicast address D. Multicast source: the sender of information, who needs to join the multicast group to D. Multicast source: the sender of information, who needs to join the multicast group to provide the forwarding of multicast group messages provide the forwarding of multicast group messages Answer: D Answer: D

  3. Question 2 Question 2 Which of the following functions will affect BGP neighbor establishment? (Multiple choice) Which of the following functions will affect BGP neighbor establishment? (Multiple choice) A. BGP authentication A. BGP authentication B. BGP GSTM B. BGP GSTM C. BGP route filtering C. BGP route filtering D. ebgp max hop D. ebgp max hop Answer: ABD Answer: ABD

  4. Question 3 Question 3 Which of the following statements about IS-IS Hello packets are correct? (Multiple choice) Which of the following statements about IS-IS Hello packets are correct? (Multiple choice) A. P2P IIH and LAN IIH are exactly the same A. P2P IIH and LAN IIH are exactly the same B. P2P IH has no Priority field B. P2P IH has no Priority field C. Level-1 LAN IH is sent by multicast C. Level-1 LAN IH is sent by multicast D. Level-1 LAN IIH does not contain System ID D. Level-1 LAN IIH does not contain System ID Answer: BC Answer: BC

  5. Question 4 Question 4 Which of the following statements about the format of OSPFv3 packets are correct? (Multiple choice) Which of the following statements about the format of OSPFv3 packets are correct? (Multiple choice) A. There is no change in the option field of the Hello message A. There is no change in the option field of the Hello message B. Hello message no longer contains address information, but carries Interface ID B. Hello message no longer contains address information, but carries Interface ID C. Removed Authentication and AuthType fields C. Removed Authentication and AuthType fields D. OSPF version number changed from 2 to 3 D. OSPF version number changed from 2 to 3 Answer: BCD Answer: BCD

  6. Question 5 Question 5 Which of the following description is wrong about the MAC address spoofing attack? Which of the following description is wrong about the MAC address spoofing attack? A. Attackers can implement MAC address spoofing attacks by sending data frames with forged A. Attackers can implement MAC address spoofing attacks by sending data frames with forged source Mac addresses to the switch source Mac addresses to the switch B. MAC address spoofing attacks will cause the data that the switch to send to the correct destination B. MAC address spoofing attacks will cause the data that the switch to send to the correct destination is sent to the attacker is sent to the attacker C. MAC address spoofing attacks will cause the switch to learn the wrong mapping relationship C. MAC address spoofing attacks will cause the switch to learn the wrong mapping relationship between Mac address and IP address between Mac address and IP address D. MAC address spoofing attacks mainly use the switch Mac address learning mechanism D. MAC address spoofing attacks mainly use the switch Mac address learning mechanism Answer: C Answer: C

  7. Question 6 Question 6 Which multicast protocol can generate a multicast distribution tree? Which multicast protocol can generate a multicast distribution tree? A. PIMv2 A. PIMv2 B. IGiMPv2 B. IGiMPv2 C. OSPF C. OSPF D. BGP D. BGP Answer: A Answer: A

  8. Question 7 Question 7 Regarding the multicast ASM model and the SSM model, which of the following statements are correct? (Multiple Regarding the multicast ASM model and the SSM model, which of the following statements are correct? (Multiple choice) choice) A. SSM and ASM use the same multicast address range A. SSM and ASM use the same multicast address range B. In the SSM model, the receiver already knows the specific location of the multicast source in advance through B. In the SSM model, the receiver already knows the specific location of the multicast source in advance through other means other means C. In the ASM model, the receiver cannot know the location of the multicast source in advance C. In the ASM model, the receiver cannot know the location of the multicast source in advance D. SSM directly establishes a multicast forwarding tree between the recipient and the multicast source D. SSM directly establishes a multicast forwarding tree between the recipient and the multicast source Answer: BCD Answer: BCD

  9. Question 8 Question 8 Which of the following description is wrong about sham link? Which of the following description is wrong about sham link? A. The endpoint address of the Sham link is advertised by BGP as the VPNv4 address. Routes that A. The endpoint address of the Sham link is advertised by BGP as the VPNv4 address. Routes that have passed through the sham link can also be imported into BGP in the form of VPNv4 routes have passed through the sham link can also be imported into BGP in the form of VPNv4 routes B. Sham link can be configured in any area and needs to be configured manually, and there must be a B. Sham link can be configured in any area and needs to be configured manually, and there must be a route to the sham link destination address (the sham link endpoint address of the peer PE) in the route to the sham link destination address (the sham link endpoint address of the peer PE) in the local VPN instance local VPN instance C. Sham link is regarded as a link between two VPN instances. Each VPN instance must have an C. Sham link is regarded as a link between two VPN instances. Each VPN instance must have an endpoint address of the sham link, which must be a Loopback with a 32bit mask in the VPN address endpoint address of the sham link, which must be a Loopback with a 32bit mask in the VPN address space on the PE router. interface address space on the PE router. interface address D. In order to forward VPN traffic through the MPLS backbone network, the route cost of the sham D. In order to forward VPN traffic through the MPLS backbone network, the route cost of the sham link should be less than the OSPF route cost of the backdoor link link should be less than the OSPF route cost of the backdoor link Answer: A Answer: A

  10. Question 9 Question 9 Which of the following descriptions are correct about IGMPv1 and IGMPv2? (Multiple choice) Which of the following descriptions are correct about IGMPv1 and IGMPv2? (Multiple choice) A. IGMPv2 does not support specific group queries A. IGMPv2 does not support specific group queries B. IGMPv1 message type does not include member leave messages B. IGMPv1 message type does not include member leave messages C. IGMPv1 supports general group query C. IGMPv1 supports general group query D. IGMPv2 message types include member leave messages D. IGMPv2 message types include member leave messages Answer: BCD Answer: BCD

  11. Question 10 Question 10 What are the benefits of OSPF area division? (Multiple choice) What are the benefits of OSPF area division? (Multiple choice) A. It can reduce the size of LSDB and thus reduce the consumption of router memory A. It can reduce the size of LSDB and thus reduce the consumption of router memory B. LSA can also be reduced with the division of areas, reducing the consumption of router CPU B. LSA can also be reduced with the division of areas, reducing the consumption of router CPU C. A large number of LSA flooding is restricted to a single area C. A large number of LSA flooding is restricted to a single area D. Routers in an area can understand the topology details outside their area D. Routers in an area can understand the topology details outside their area Answer: ABC Answer: ABC

More Related