Huawei H12-261_V3.0 Exam (page: 2)
Huawei HCIE-Routing & Switching (Written) V3.0 Exam
Updated on: 25-Dec-2025

Viewing Page 2 of 97

HW users are transferring a very large number of files via TFTP.
What protocol does TFTP rely on for transmission?

  1. ICMP and UDP
  2. IP and TCP
  3. UDP
  4. NFS
  5. FTP

Answer(s): C

Explanation:

TFTP (Trivial File Transfer Protocol, Simple File Transfer Protocol) is one of the TCP/IP protocol suite used between client and serverA protocol for simple file transfer between them, providing uncomplicated and inexpensive file transfer services. It is implemented based on the UDP protocol, and the port number is 69.



Bandwidth parameters need to be configured when deploying LLQ.
What is the significance of the bandwidth parameters?

  1. Provides a built-in policer to limit the maximum available bandwidth for low-latency queues during times of congestion
  2. This parameter should be as small as possible. It means that the bandwidth is always reserved, even if LLQ is used, this parameter will reduce the available bandwidth of the interface
  3. It means reference CIR to calculate burst size of built-in policer token bucket
  4. This parameter is optional because LLQ always takes precedence over other queues

Answer(s): A

Explanation:

LLQ (Priority Queue) Provides absolute priority queuing for class-based weighted fair queuing (CBWFQ). A strict priority queue is a priority queue with a minimum guaranteed bandwidth.
When congestion occurs, the amount of data in the queue cannot exceed the allowed amount. bandwidth, otherwise it will be discarded.



Assuming that the shaping rate of a port is 100Mbps, the input bandwidth of each service on the interface and the PIR of the IP configuration are as follows: After the first round of scheduling, what is the bandwidth allocated by the EF queue?

  1. 30M
  2. 15M
  3. 90M
  4. 25M

Answer(s): D



As shown in the figure, there are two IPv6 networks that can access the IPv4 network. At the same time, an IPSec tunnel needs to be established between the two IPv6 networks for communication.Which of the following packaging modes can meet the above requirements?

  1. ESP+tunnel mode
  2. AH+ transmission mode
  3. AH+tunnel mode
  4. None of the above options are correct

Answer(s): D

Explanation:

The correct one should be AH+ESP+ tunnel mode (inter-access between IPV6 sites), NAT-PT technology (inter-access between IPV4 and IPV6) IPSec sub-protocol header authentication protocol AH, which provides data integrity verification and data source identity for IP packets Authentication, using the HMAC algorithm,The HMAC algorithm is very similar to the Hash algorithm, which is generally evolved from the Hash algorithm, that is, the input message is combined with the symmetric key that has been shared by both parties in advance, and then the Hash algorithm is applied.
ESP. The principle of the protocol providing data integrity verification and data source identity authentication is the same as that of AH, but the verification scope of AH is smaller than that of ESP. The ESP protocol specifies the authentication algorithms that all IPSec systems must implement:
HMAC-MD5, HMAC-SHA1, NULL. Compared with other rail technologies such as L2TP, GRE, AH, etc., ESP has a unique security mechanism - encryption, and can be used in combination with other tunneling protocols to provide stronger security support for users' remote communication.
Two modes of IPSec:
transfer mode (Transport Mode) is the default mode of IPSec, also known as end-to-end (End-to-End) mode, which is suitable for IPSec communication between two hosts. Tunnel modeMode) is used for site-to-site communication between two gateways. The two gateways involved in the communication actually serve to provide secure communication services for the computers in the two networks bounded by them.



A digital certificate does not contain which of the following?

  1. digital envelope
  2. Issuer
  3. digital signature
  4. public key information

Answer(s): A

Explanation:

User basic information, public key information, digital signature The issuance of a digital certificate is a process in which the user verifies the transmission of his/her own key and public key and his/her physical information to the verification center. After verification, the verification center will send the corresponding digital certificate to the applicant. The improved digital certificate contains basic user information and public key information, and some related information signed by the certification center will also be attached. The encryption technology (encrypted transmission, digital signature, digital envelope and other security technologies) with digital certificate as the core can encrypt the information transmitted on the network and decryption, digital signature and signature verification to ensure the confidentiality and integrity of information transmitted online and the non-repudiation of transactions.



Viewing Page 2 of 97



Share your comments for Huawei H12-261_V3.0 exam with other users:

exampei 10/4/2023 2:40:00 PM

need dump c_tadm_23
Anonymous


Eman Sawalha 6/10/2023 6:18:00 AM

next time i will write a full review
GREECE


johnpaul 11/15/2023 7:55:00 AM

first time using this site
ROMANIA


omiornil@gmail.com 7/25/2023 9:36:00 AM

please sent me oracle 1z0-1105-22 pdf
BANGLADESH


John 8/29/2023 8:59:00 PM

very helpful
Anonymous


Kvana 9/28/2023 12:08:00 PM

good info about oml
UNITED STATES


Checo Lee 7/3/2023 5:45:00 PM

very useful to practice
UNITED STATES


dixitdnoh@gmail.com 8/27/2023 2:58:00 PM

this website is very helpful.
UNITED STATES


Sanjay 8/14/2023 8:07:00 AM

good content
INDIA


Blessious Phiri 8/12/2023 2:19:00 PM

so challenging
Anonymous


PAYAL 10/17/2023 7:14:00 AM

17 should be d ,for morequery its scale out
Anonymous


Karthik 10/12/2023 10:51:00 AM

nice question
Anonymous


Godmode 5/7/2023 10:52:00 AM

yes.
NETHERLANDS


Bhuddhiman 7/30/2023 1:18:00 AM

good mateial
Anonymous


KJ 11/17/2023 3:50:00 PM

good practice exam
Anonymous


sowm 10/29/2023 2:44:00 PM

impressivre qustion
Anonymous


CW 7/6/2023 7:06:00 PM

questions seem helpful
Anonymous


luke 9/26/2023 10:52:00 AM

good content
Anonymous


zazza 6/16/2023 9:08:00 AM

question 21 answer is alerts
ITALY


Abwoch Peter 7/4/2023 3:08:00 AM

am preparing for exam
Anonymous


mohamed 9/12/2023 5:26:00 AM

good one thanks
EGYPT


Mfc 10/23/2023 3:35:00 PM

only got thru 5 questions, need more to evaluate
Anonymous


Whizzle 7/24/2023 6:19:00 AM

q26 should be b
Anonymous


sarra 1/17/2024 3:44:00 AM

the aaa triad in information security is authentication, accounting and authorisation so the answer should be d 1, 3 and 5.
UNITED KINGDOM


DBS 5/14/2023 12:56:00 PM

need to attend this
UNITED STATES


Da_costa 8/1/2023 5:28:00 PM

these are free brain dumps i understand, how can one get free pdf
Anonymous


vikas 10/28/2023 6:57:00 AM

provide access
EUROPEAN UNION


Abdullah 9/29/2023 2:06:00 AM

good morning
Anonymous


Raj 6/26/2023 3:12:00 PM

please upload the ncp-mci 6.5 dumps, really need to practice this one. thanks guys
Anonymous


Miguel 10/5/2023 12:21:00 PM

question 16: https://help.salesforce.com/s/articleview?id=sf.care_console_overview.htm&type=5
SPAIN


Hiren Ladva 7/8/2023 10:34:00 PM

yes i m prepared exam
Anonymous


oliverjames 10/24/2023 5:37:00 AM

my experience was great with this site as i studied for the ms-900 from here and got 900/1000 on the test. my main focus was on the tutorials which were provided and practice questions. thanks!
GERMANY


Bhuddhiman 7/20/2023 11:52:00 AM

great course
UNITED STATES


Anuj 1/14/2024 4:07:00 PM

very good question
Anonymous