View: 1790|Reply: 1

How many of these HCIE test questions can you do right?

[Copy link]

908

Threads

993

Posts

8925

Credits

Admin

Rank: 9Rank: 9Rank: 9

Credits
8925
Post time 7-9-2021 15:30:21 | Show all posts |Read mode
1. (Judgment) IPSec uses the ESP protocol to transmit and encapsulate data to provide authentication and encryption services for the data payload.

A. Yes
B. Wrong

2. (Judgment) Hybrid interface is similar to Trunk interface, and also allows data frames of multiple VLANs to pass through. These data frames are distinguished by 802.1Tag. Users can flexibly specify whether the Hybrid interface carries tags when sending data frames of a certain (or certain) VLANs.

A. Yes
B. Wrong

3. (Single choice) Among the following positioning methods, the network plan suggests that the AP deployment point is different from other solutions:

A. Wi-Fi terminal positioning
B. Bluetooth tag positioning
C. Bluetooth navigation
D. UWB positioning

4. (Single choice) Which template needs to be configured in the Bluetooth tag positioning solution for Huawei Intent-Driven Campus?

A.IoT-profile
B.BLE-profile
C.location-profile
D.scan-profile

5. (Judgment) When two switches are connected through a Layer 2 interface, the Layer 2 interface types at both ends must be the same, for example, both must be Access or both must be Trunks.

A. Yes
B. Wrong

6. (Judgment) Using LACP mode in Eth-trunk can not only detect limited failures such as disconnection of member links in the same aggregation group, but also detect link failures, link misconnections and other failures.

A. Yes
B. Wrong

7. (Single choice) Which of the following options describes the cloud management campus network incorrectly?

A. In the integrated deployment scenario of iMaster NCE-CampusInsight and iMaster NCE-Campus, if the tenant does not synchronize the license data on the iMaster NCE-Campus business plane, the license cannot be set on the iMaster NCE-B.CampusInsight page.
C. In Huawei public cloud scenarios, iMaster NCE-CampusInsight can be integrated and deployed with iMaster NCE-Campus.
D. For local deployment scenarios, iMaster NCE-CampusInsight must be integrated and deployed with iMaster NCE-Campus.
E. MSP self-built cloud scenarios, iMaster NCE-CampusInsight can be integrated and deployed with iMaster NCE-Campus.

8. (Single choice) Which of the following descriptions about iMaster NCE-CampusInsight data acquisition protocol configuration is wrong?

A. WLAN device performance data is reported through WMI.
B. In Huawei public cloud scenarios, the log information of the device is reported through WMI.
C. For local deployment scenarios, the log information of the device can be reported through the UDP protocol of the info-center module.
D. For Huawei public cloud scenarios, the log information of the device can be reported through the UDP protocol of the info-center module.

9. (Single choice) Which of the following descriptions does not meet the actual situation of the Telemetry feature of WLAN network operation and maintenance?

A. WLAN equipment reports data to iMaster NCE-CampusInsight based on Http2+Protobuf
B. Publish based on subscription and use on demand
C. Efficient encoding and decoding technology, obtaining multiple data at a time, realizing the ability to obtain data in seconds
D. It can support the operation and maintenance of virtual machine network traffic in the server

10. (Multiple choice) What are the advantages of MAC address authentication?

A. The authentication message and the data message are separated through a logical interface
B. Able to authenticate terminals that do not have 802.1X authentication capabilities, such as dumb terminals such as printers and fax machines
C. During the MAC authentication process, the user does not need to manually enter the user name and password
D. In the CloudCampus solution, you can rely on the terminal's intelligent identification function to avoid the action of copying the terminal's MAC address

11. (Multiple choice) In Huawei's wireless cloud network planning tool (WLAN Planner), users can complete the WLAN network planning through simple steps. Which of the following steps are involved in this process?

A. Environment and regional settings
B. Equipment deployment
C. Signal simulation
D. Export report
E. Configuration delivery

12. (Judgment) Wired network data needs to be collected when WLAN network planning is optimized, including network architecture and key equipment configuration and operating status.

A. Yes
B. Wrong

13. (Judgment) iMaster NCE CampusInsight can test the signal quality of the entire network and output evaluation reports.

A. Yes
B. Wrong

14. In the detailed design stage, security policy design is required. What is wrong in the description of the security policy design in the following options?

A. The security strategy needs to be designed based on the scene of the existing network, for example, in public places, Portal authentication can be used.
B. If the customer has no special requirements, it is generally recommended to use 802.1x authentication in office scenarios, because the authentication is safe and economical.
C. In order to ensure the security of the network, the authentication escape function is generally not recommended.
D. The deployment of WIDS and WIPS functions can improve the security of WLAN networks, but it may bring higher project costs.

15. (Multiple choice) Among the following options, which AP supports 8*8 MIMO technology?

A. AirEngine 8760-X1-PRO
B.AirEngine 6760-X1E
C.AirEngine 5760-51
D. AP7060DN

16. (Multiple choice) What are the components of traffic policing?

A.Meter
B. Marker
C.Action
D. Remark

17. (Multiple choice) What are Huawei's RF tuning strategies?

A. Intrusion mode (rogue-ap)
B. Non-Wi-Fi (non-wifi)
C. Virus (AV)
D. Noise-floor tuning (noise-floor)

18. (Judgment) Inter-AC roaming is supported between Huawei AC and onboard AC.

A. Yes
B. Wrong

19. (Single choice) PMK fast roaming shortens the roaming delay of the user in which way.

A. The key negotiation process is omitted
B. The 802.1x authentication process is omitted
C. The 802.1x authentication process and key negotiation process are omitted
D. The user's re-association process is omitted

20. (Single choice) Smart Application Control SAC (Smart Application Control) is an intelligent application protocol identification and classification engine. It uses business-aware technology to analyze the () layer content in the message and some dynamic protocols (such as HTTP, RTP). ) Perform detection and identification, and implement refined QoS policy control based on the classification results.

A.1~4
B.1~3
C.3~7
D.4~7
Reply and you will get the answer

Guest, if you want to see the hidden content, please Reply



BBSDUMP Global IT certification
Free dumps issue, latest pass report, work experience sharing
Skype: ff5816000@outlook.com
WhatsApp/Telegram: +852 46231530
Email: bbsdump@gmail.com
https://bbsdump.com
Reply

Use magic Report

0

Threads

3

Posts

12

Credits

L1-Private

Rank: 1

Credits
12
Post time 1-10-2021 11:07:06 | Show all posts
good material
Reply

Use magic Report

You have to log in before you can reply Login | Register Now

Points Rules