Huawei h12-223 practice test

HCIP-Routing & Switching-IEEP Exam

Last exam update: Apr 19 ,2024
Page 1 out of 12. Viewing questions 1-15 out of 166

Question 1

Which of the following statements regarding common functions of the NMS is true?

  • A. The alarm management function does not allow the NMS to directly display alarm information about devices and ports on the topology.
  • B. The performance management function does not allow the NMS to collect statistics about performance data.
  • C. During performance management, the NMS presets default thresholds for key performance counters. If a counter exceeds the threshold, an alarm is generated.
  • D. After configuration file backup is configured, the NMS automatically compares differences between configuration files. When obtaining the configuration change, the NMS generates an alarm, which, however, cannot be notified to the preset contact through an email.
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Which of the following statements regarding the device environment check is true?

  • A. Devices should be placed stably in flat positions in a ventilated and dry environment, and only a few sundries can be placed around the devices.
  • B. For energy saving, the current temperature and humidity in the equipment room must meet requirements of devices. Air conditioners are not required to run continuously and stably.
  • C. It is recommended that power cables and service cables be placed together in a neat and orderly manner.
  • D. When the grounding mode and the grounding resistance are checked, the working ground, protection ground, and building lightning protection ground should be separately configured in the equipment room.
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

Which of the following operations is performed in the risky operation process?

  • A. Solution formulation
  • B. Authorization obtaining
  • C. Technical review
  • D. Implementation and result feedback
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Risky operation refers to all operations that may affect the stable running of the device/ proper
running of customer services, or normal monitoring on the NMS.

  • A. TRUE
  • B. FALSE
Answer:

A

User Votes:
A
50%
B
50%

Discussions
vote your answer:
A
B
0 / 1000

Question 5

When a large number of IP phones and WLAN APs exist on a network, which of the following
switches is used?

  • A. Switches supporting STP edge ports
  • B. Switches supporting PoE
  • C. Switches supporting SACG
  • D. Switches supporting QoS
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Which of the following link can run PPP instead of HDLC? (Multiple Choice)

  • A. ATM
  • B. ISDN
  • C. MSTP
  • D. PSTN
  • E. El
Answer:

BD

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 7

During troubleshooting, you analyze and check the fault cause at the access layer, aggregation layer,
and core layer in sequence. Which of the following troubleshooting methods is used in this process?

  • A. Chunking
  • B. Configuration comparison
  • C. Segmentation
  • D. Bottom-up
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Which of the following causes for a VRRP group two-master fault is the most impossible?

  • A. The configurations of the devices in the VRRP group are different.
  • B. The link where VRRP Advertisement packets are transmitted is faulty.
  • C. The VRRP Advertisement packets received by the VRRP backup group with a lower priority are taken as invalid packets and are discarded.
  • D. The master device sends a VRRP Advertisement packet every 1 second.
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Which of the following items are used to remind customers of information security? (Multiple
Choice)

  • A. Account sort-out reminder
  • B. Password update reminder
  • C. Log protection reminder
  • D. Data backup reminder
Answer:

ABCD

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Which of the following statements regarding the operation window time for a software upgrade is
false?

  • A. It is determined by the accepted service interruption duration.
  • B. It must be longer than the upgrade execution time.
  • C. Troubleshooting time must be reserved.
  • D. Only network maintenance personnel need to be notified of the operation window time, while the customer does not.
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Which of the following architecture is used by mainstream switches?

  • A. Bus
  • B. Shared memory
  • C. Switching matrix
  • D. Distributed
  • E. Clos architecture
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 12

Which of the following authorization items is not required for risky operations?

  • A. Management authorization
  • B. Technology authorization
  • C. Customer authorization
  • D. Administrative authorization
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

Which of the following statements is not included in network security optimization?

  • A. Management security
  • B. Border security
  • C. Access control
  • D. Log management
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

In the fault determining and analysis phase of the structured network troubleshooting process,
summarizing the fault, maintenance, and change information can obtain a network fault cause list.

  • A. TRUE
  • B. FALSE
Answer:

B

User Votes:
A
50%
B
50%

Discussions
vote your answer:
A
B
0 / 1000

Question 15

Which of the following statements regarding the device software upgrade feasibility is true?

  • A. To ensure the stable running of network devices, you are advised to upgrade the device software in a timely manner.
  • B. Generally, the device software upgrade does not affect the stable network running. Therefore, risk assessment and avoidance are not required before the upgrade.
  • C. The upgrade only causes service interruption for a very short time. Therefore, you do not need to confirm with the customer about the upgrade, improving efficiency.
  • D. Before performing a major upgrade or complex upgrade operations, you need to conduct commissioning and test the upgrade plan and contingency plan in the simulation environment.
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2