Huawei H12-261_V3.0 Exam (page: 1)
Huawei HCIE-Routing & Switching (Written) V3.0 Exam
Updated on: 25-Sep-2025

Viewing Page 1 of 97

Which of the following advanced features does BGP EVPN support?

  1. ARP broadcast suppression
  2. VRRP over VXL AN
  3. Multi-active gateway
  4. VXL AN Qos

Answer(s): A,B,C,D



Which of the following statements about VXLAN packets is correct?

  1. The outer destination IP address is VXLAIP address of the remote VTEP of the N tunnel
  2. The source UDP port number is 4789
  3. PurposeUDP port number is 4789
  4. VNI has 24 bits for distinguishing VLAN segments

Answer(s): A,C,D

Explanation:

VXLAN (Virtual eXtensible Local Area Network, virtual extended local area network), is NVO3

(Network Virtualization) defined by IETF over Layer 3) One of the standard technologies, using L2 over L4 (MAC-in-UDP) packet encapsulation mode, which encapsulates Layer 2 packetsEncapsulation with the Layer 3 protocol can realize the expansion of the Layer 2 network within the scope of the Layer 3, and at the same time meet the needs of the large Layer 2 virtual migration and multi- tenancy of the data center.
VTEP (VXLAN Tunnel Endpoints, VXLAN tunnel endpoints): VXLAThe edge device of the N network is the start and end point of the VXLAN tunnel, and the related processing of VXLAN packets is performed on this.
VNI (VXLAN Network Identifier, VXLAN network identifier):
VXLAThe N header and the original Ethernet frame are used as UDP data. In the UDP header, the destination port number (VXLAN Port) is fixed to 4789, the source port number (UDP Src. Port) is the value of the original ether frame calculated by the hash algorithm. source IP address (Outr Src. IP) is the V to which the source VM belongsThe IP address of the TEP, the destination IP address (Outer Dst. IP) is the V to which the destination VM belongsIP address of the TEP.
Source MAC address (Src. MAC Addr.) is the MAC address of the VTEP to which the source VM belongs, and the destination MAC address (Dst. MAC Addr.) is the MAC address of the next-hop device on the path to the destination VTEP.



BGP EVPNWhich of the following types of packets are required to implement virtual machine migration in a distributed gateway scenario?

  1. Type5
  2. Type4
  3. Type1
  4. Type2
  5. Type3

Answer(s): D

Explanation:

To support EVPN, BGP EVPFive new EVPNs have been added to the N address family NLRI (Network Layer Reachability Information, network layer reachability information), that is, EVPN routing:
Ethernet Auto-discovery Route (RT-1): used to advertise ES information in site multi-homing networking to achieve split horizon and Aliasingand active/standby backup. MAC/IP Advertisement Route (RT-2): used to advertise MAC/IP address information. Inclusive Multicast Ethernett Tag Route (RT-3): It is used to advertise VTEP and its VXLAN to realize automatic VTEP discovery, automatic establishment of VXLAN tunnel, automatic creation of VXLAN broadcast table, etc.
Ethernet Segment Route (RT-4): used to advertise ES and its connected VTEP information, so as to discover other members of the VTEP redundancy group connected to the same ES, and to elect a designated forwarder DF among the redundancy groups.
IP Prefix Advertisement Route (RT-5): IP prefix route, used to advertise imported external routes in the form of IP prefixes.



Which of the following statements about the BFD single-arm echo function is correct

  1. BFDThe one-arm echo function must configure the local identifier and the terminal identifier
  2. BPThe default destination IP address of the protocol packet of the D one-arm echo is 224.0.0.184
  3. BAfter the FD one-arm echo function is enabled, the destination IP and source IP of BFD packets are the same
  4. BFDThe one-arm echo function is suitable for scenarios where one device supports BD and the other device does not.

Answer(s): C,D

Explanation:

BFDThe one-arm echo function detects the connectivity of the forwarding link through the loopback operation of BFD packets.
Among two directly connected devices, one device supports the BFD function, and the other device does not support the BFD function and only supports basic network layer forwarding. To quickly detect the fault between the two devices, you can create a BFD session with the one-arm echo function on the device that supports the BFD function. A device that supports the BFD function actively initiates the echo request function, and a device that does not support the BFD function directly loops back the packet after receiving it, thereby implementing the connectivity detection function of the forwarding link.
One-arm detection Huawei equipment will send one to the opposite end every 3S or soUDP packet, the source IP and destination IP in the packet are the IP of their own interface



Which of the following statements about the VRRP protocol is correct?

  1. Both VRRPv2 and VRRPv3 support authentication
  2. VRRPv3 does not support the authentication function, while VRRPv2 supports the authentication function.
  3. VRRPv2 is only applicable to IPv4 networks, and VRRPv3 is only applicable to IPv6 networks.
  4. Masterr The owner of the IP address VThe RP priority is 255, so the configurable priority range is 0-254

Answer(s): B

Explanation:

VRRP forIPv4 supports VRRPv2 and VRRPv3, while VRRP for IPv6 only supports VRRPv3. Through packet construction, it can be found that v2 has an authentication field, but v3 does not.





Viewing Page 1 of 97



Share your comments for Huawei H12-261_V3.0 exam with other users:

RITEISH 12/24/2023 4:33:00 AM

thanks for the exact solution
Anonymous


SB 10/15/2023 7:58:00 AM

need to refer the questions and have to give the exam
INDIA


Mike Derfalem 7/16/2023 7:59:00 PM

i need it right now if it was possible please
Anonymous


Isak 7/6/2023 3:21:00 AM

i need it very much please share it in the fastest time.
Anonymous


Maria 6/23/2023 11:40:00 AM

correct answer is d for student.java program
IRELAND


Nagendra Pedipina 7/12/2023 9:10:00 AM

q:37 c is correct
INDIA


John 9/16/2023 9:37:00 PM

q6 exam topic: terramearth, c: correct answer: copy 1petabyte to encrypted usb device ???
GERMANY


SAM 12/4/2023 12:56:00 AM

explained answers
INDIA


Andy 12/26/2023 9:35:00 PM

plan to take theaws certified developer - associate dva-c02 in the next few weeks
SINGAPORE


siva 5/17/2023 12:32:00 AM

very helpfull
Anonymous


mouna 9/27/2023 8:53:00 AM

good questions
Anonymous


Bhavya 9/12/2023 7:18:00 AM

help to practice csa exam
Anonymous


Malik 9/28/2023 1:09:00 PM

nice tip and well documented
Anonymous


rodrigo 6/22/2023 7:55:00 AM

i need the exam
Anonymous


Dan 6/29/2023 1:53:00 PM

please upload
Anonymous


Ale M 11/22/2023 6:38:00 PM

prepping for fsc exam
AUSTRALIA


ahmad hassan 9/6/2023 3:26:00 AM

pd1 with great experience
Anonymous


Žarko 9/5/2023 3:35:00 AM

@t it seems like azure service bus message quesues could be the best solution
UNITED KINGDOM


Shiji 10/15/2023 1:08:00 PM

helpful to check your understanding.
INDIA


Da Costa 8/27/2023 11:43:00 AM

question 128 the answer should be static not auto
Anonymous


bot 7/26/2023 6:45:00 PM

more comments here
UNITED STATES


Kaleemullah 12/31/2023 1:35:00 AM

great support to appear for exams
Anonymous


Bsmaind 8/20/2023 9:26:00 AM

useful dumps
Anonymous


Blessious Phiri 8/13/2023 8:37:00 AM

making progress
Anonymous


Nabla 9/17/2023 10:20:00 AM

q31 answer should be d i think
FRANCE


vladputin 7/20/2023 5:00:00 AM

is this real?
UNITED STATES


Nick W 9/29/2023 7:32:00 AM

q10: c and f are also true. q11: this is outdated. you no longer need ownership on a pipe to operate it
Anonymous


Naveed 8/28/2023 2:48:00 AM

good questions with simple explanation
UNITED STATES


cert 9/24/2023 4:53:00 PM

admin guide (windows) respond to malicious causality chains. when the cortex xdr agent identifies a remote network connection that attempts to perform malicious activity—such as encrypting endpoint files—the agent can automatically block the ip address to close all existing communication and block new connections from this ip address to the endpoint. when cortex xdrblocks an ip address per endpoint, that address remains blocked throughout all agent profiles and policies, including any host-firewall policy rules. you can view the list of all blocked ip addresses per endpoint from the action center, as well as unblock them to re-enable communication as appropriate. this module is supported with cortex xdr agent 7.3.0 and later. select the action mode to take when the cortex xdr agent detects remote malicious causality chains: enabled (default)—terminate connection and block ip address of the remote connection. disabled—do not block remote ip addresses. to allow specific and known s
Anonymous


Yves 8/29/2023 8:46:00 PM

very inciting
Anonymous


Miguel 10/16/2023 11:18:00 AM

question 5, it seems a instead of d, because: - care plan = case - patient = person account - product = product2;
SPAIN


Byset 9/25/2023 12:49:00 AM

it look like real one
Anonymous


Debabrata Das 8/28/2023 8:42:00 AM

i am taking oracle fcc certification test next two days, pls share question dumps
Anonymous


nITA KALE 8/22/2023 1:57:00 AM

i need dumps
Anonymous