Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Huawei H12-841_V1.5 Practice Exam with Questions & Answers | Set: 2

Questions 11

(When access authentication is deployed on a network, which of the following servers typically reside in the pre-authentication domain?)

Options:
A.

FTP server

B.

Antivirus server

C.

DHCP server

D.

DNS server

Huawei H12-841_V1.5 Premium Access
Questions 12

(The following figure shows a policy control matrix on a virtualized network deployed using iMaster NCE-Campus. Which of the following statements about the policy control matrix are true?Choose all that apply.)

H12-841_V1.5 Question 12

Options:
A.

Users in Guest_Group cannot communicate with those in Research_Group.

B.

Users within Sales_Group can communicate with each other.

C.

If a user is not within Guest Group, Research Group, or Sales Group, that user cannot access any network resources.

D.

Users in Research_Group cannot communicate with those in Guest_Group.

Questions 13

(Which of the following statements about configuring user access authentication is false?)

Options:
A.

To implement network access control on users, you need to determine the domains to which they belong and the AAA schemes that they use.

B.

You need to bind an access profile to an authentication profile to specify the user authentication mode. Then, apply the authentication profile to an interface or VAP profile to enable network access control.

C.

iMaster NCE-Campus cannot interconnect with a third-party RADIUS server.

D.

If the RADIUS or HWTACACS server is used for authentication, you need to configure parameters for interconnection with the authentication server in the AAA scheme.

Questions 14

(Which of the following commands needs to be run in the BGP view to enable a VPN instance to advertise IP routes to the BGP-EVPN address family?)

Options:
A.

advertise vpnv4

B.

advertise irbv6

C.

advertise irb

D.

advertise l2vpn evpn

Questions 15

(An MSP administrator creates a tenant account. Which of the following logs records the operation?)

Options:
A.

Operation Log

B.

System Log

C.

Security Log

D.

Device Channel Log

Questions 16

(Which of the following is used to implement inter-subnet communication on a VXLAN network and allow access from a VXLAN network to an external non-VXLAN network?)

Options:
A.

Layer 3 VXLAN gateway

B.

VLANIF interface

C.

NVE interface

D.

Layer 2 VXLAN gateway

Questions 17

(Based on the VXLAN tunnel creation mode, what are the different types of VXLAN tunnels?)

Options:
A.

Stateless VXLAN tunnel

B.

Static VXLAN tunnel

C.

Dynamic VXLAN tunnel

D.

Stateful VXLAN tunnel

Questions 18

(As shown in the following figure, R1 and R2 establish an IPsec VPN in ISAKMP mode for communication. For IPsec proposals on R1 and R2, ESP is used, the encapsulation mode is set to tunnel mode, SHA1 is configured as the authentication algorithm, and AES-256 is configured as the encryption algorithm. In addition, IKEv1 is configured for IKE peers, the main mode is configured for IKEv1 negotiation phase 1, and the PSK Huawei@123 is configured for PSK authentication between IKE peers. For IKE proposals on R1 and R2, SHA1 is configured as the authentication algorithm, AES-256 is configured as the encryption algorithm, and DH group 1 is configured for IKE negotiation. Based on these configurations on R1 and R2, drag the configuration items on the left to the correct locations on the right.)

H12-841_V1.5 Question 18

H12-841_V1.5 Question 18

H12-841_V1.5 Question 18

Options:
Questions 19

(On a small- or medium-sized campus network, multi-carrier links can be deployed at the egress for backup to ensure egress reliability.)

Options:
A.

TRUE

B.

FALSE

Questions 20

(O&M personnel for a large-scale event center receive feedback about Wi-Fi access failures. iMaster NCE-CampusInsight provides the function for personnel to view packet exchange processes and locate the root cause. It is found that IP addresses in the DHCP address pool are exhausted, preventing IP addresses from being assigned to mobile terminals. Which of the following functions is used by O&M personnel in this scenario?)

Options:
A.

Protocol trace

B.

Simulation feedback

C.

Issue analysis

D.

Client journey