Huawei h12-223 online test

HCIP-Routing & Switching-IEEP Exam

What students need to know about the h12-223 exam

  • Total 166 Questions & Answers

Question 1

After the connection is completed, what items are generally required to be checked?

  • A. Data flow
  • B. Indoor topology
  • C. Software version
  • D. Control plane entries
Answer:

A, B, C, D

Discussions

Question 2

Which of the following is not a preliminary preparation for the dry cutover plan?

  • A. Risk assessment
  • B. Cutover target
  • C. On-site defense
  • D. Overview of the live network
Answer:

C

Discussions

Question 3

As shown in the figure, the GE0/0/0 and GE0/0/1 interfaces of RTA are respectively connected to
department 1..2, and their network segments are respectively 10.1.2.0/24 and 10.1.3.0/24, which
are restricted departments Questions between 1 and 2, when deploying traffic-filter on RTA, which
options are positive for the following deployment methods?

  • A. Configure ACL3000 to reject traffic from 10.1.2.0/24 whose source is 10.13.0/24, and call the traffic-filter in the inbound direction on GE0/0/1 to call ACL3000
  • B. Configure ACL3000 to reject traffic whose source is 10.1.2.0/24 and destination is 10.1.3.0/24, and call traffiefilter in the outbound direction on GE0/0/1 to call ACL3000
  • C. Configure ACL3000 to reject the traffic whose source is 10.12.0/24 and destination is 10.1.3.0/24, and call the traffic-filter in the inbound direction on G0/0/0 to call ACL3000
  • D. Configure ACL3000 to reject the traffic whose source is 10.1.3.0/24 and destination is 10.1.2.0/24, call the traffic-filter in the outbound direction on GE0/0/0 to call ACL3000
Answer:

A, B, C, D

Discussions

Question 4

Network administrator A wants to use ACL to match a specific routing target. Which routing entry will
be matched by the ACL rule in the figure?

  • A. 10.0.0.0/24 B.10.0.2.0/24
  • C. 10.0. 0. 1/32
  • D. 10. 0. 1.0/24
Answer:

A, B, D

Discussions

Question 5

oSPF is a very popular protocol. In the case of regular networking and correct configuration, routing
calculations generally do not make mistakes. Which of the following reasons may cause 0SPF
neighbors no

  • A. The link works abnormally
  • B. Interface OSPF MTU configuration is different
  • C. The 0SPF network types at both ends of the link are inconsistent
  • D. Neighbors have the same Router ID
Answer:

A, B, C, D

Discussions

Question 6


  • A. The type of the LSA is AS-tenaL-L84
  • B. This device is AER
  • C. The LSA in Figure is generated by Xinyi
  • D. The destination network described by this LSA is 10.0.23.0/24
Answer:

D

Discussions

Question 7

In the process of daily troubleshooting, engineers may need to check some reported information of
the equipment.
By executing the terminal______ command, turn on the terminal to display the debugging/logging
information function sent by the information center. (Please use English lowercase letters to
complete the command, and the command cannot be abbreviated)

Answer:

Monitor

Discussions

Question 8

As shown in the figure, all interfaces of the router have ospf enabled. Which one of the following
descriptions is correct?

  • A. The Type3LSA generated by A.R6 in area 1 contains 10.0.2.2/32 routing information
  • B. R5 will generate Type3 LSA in area 1
  • C. The Type3 LSA generated by R3 in area 0 contains 10.0.2.2/32 routing information
  • D. The Type3 LSA generated by R4 in area 1 contains 10.0.2.2/32 routing information
Answer:

D

Discussions

Question 9

As shown in the figure, it is assumed that STP is not enabled and a loop has occurred. The possible
phenomena include which of the following options?

  • A. A large number of broadcast messages can be received on the Host
  • B. Device CPU usage is too high
  • C. MAC address table oscillating
  • D. A loop alarm will appear on the device.
Answer:

A, B, C

Discussions

Question 10

During the structured network troubleshooting process, which of the following items require
attention in the information collection phase? (Multiple Choice)

  • A. What information to collect
  • B. How to collect information
  • C. Whether authorization is required
  • D. Risks in the information collection phase
Answer:

ABCD

Discussions
To page 2