Huawei H12-261_V3.0 Exam (page: 3)
Huawei HCIE-Routing & Switching (Written) V3.0 Exam
Updated on: 25-Dec-2025

Viewing Page 3 of 97

LANDThe attack method is that the attacker sends a source address to the target host and the destination address is the target host, and the source port and the destination port are the same.
When the receiving end is waiting for the final ACK packet to be sent, the connection is always in a semi-connected state, resulting in a waste of receiving full and limited TCP resources.

  1. True
  2. False

Answer(s): A

Explanation:

LAND attack (LAN denial of service attack): It is a type of denial of service attack (DoS attack) by sending carefully constructedThe spoofed packets with the same source address and destination address will paralyze the target device that lacks the corresponding protection mechanism. This attack method uses a specially constructed TCP SYN packet (usually used to open a new connection), so that the target machine opens an empty connection whose source address and target address are both its own IP address, and continuously responds to itself, consuming the system resources until it crashes. This attack method is not the same as a SYN flood attack.



Which of the following statements about SA in IPSec is wrong is

  1. SA is uniquely identified by a triple, This triplet includes the security parameter prime SPI ( Security Parate Inder), the source IP address and the security protocol number used (AsESP)
  2. use display The ipsec command can check the encryption algorithm used with another IPSec peer, the traffic of interest and other information.
  3. IPSec only supports symmetric encryption algorithms to encrypt data.
  4. Bidirectional SAs must exist between IPSec peers to establish IPSecc VPN connection

Answer(s): A

Explanation:

Security AllianceSA, records the policy and policy parameters of each IP security path. Security Association is IPSec The basics,It is an agreement established by both communication parties, which determines the protocol, transcoding method, key and key validity period used to protect the data packet. ABoth H and ESP use SA, IKE'sA major function is to establish and maintain security alliances.



The router HW1 and the router HW2 are connected to the network A and the network B, respectively. As shown in the figure below, if you want to establish IPsec VPN between router HW1 and router HW2.

  1. rule permit ip source 192.168.1.10 destination 192.168.1.2 0
  2. rule permit ip source 10.1.1.0 0.0.0.255 destination 192.168.1.2 0
  3. rule permit ip source 10.1.1.0 0.0.0 .255 destination 10.1.2.0 0.0.0.255
  4. rule permit ip source 192 .168.1.10 destination 10.1.2.0 0.0.0.255
  5. rule permit ip source 10.1.2.0 0.0.0 255 destination 10.1.1.0 0.0.0.255

Answer(s): C



Which of the following options describes the assertion mechanism correctly?

  1. The size of the IP address will not be used as a condition for the election of the winner.
  2. In assertion mechanismThe winner is responsible for forwarding multicast data to the broadcast network segment.
  3. The assertion mechanism is used for DR election.
  4. In the assertion mechanism, the loser will shut down is the interface connected to the broadcast network.

Answer(s): B

Explanation:



The router receives the same multicast traffic from the downstream interface again, then it starts the assertion mechanism and sends the assert message, including: routing protocol priority, cost, and packet source IP (preferably larger). The routing protocol priority and cost are the source's IGP route. After comparison, the winner is selected, and the loser is the loser. Loser will prune the downstream interface and will continue to send pruning messages to the upstream. However, a pruning message is also sent to the downstream to detect whether there is a downstream receiver. The downstream receiver router will send a join message to the upstream router to suppress pruning. Eventually the link does not turnsend traffic.



If there are multiple receivers in a multicast group, the administrator enables IGM on the switch connecting the receiversP Snooping function, when the receiver changes from When the switch receives the general group query message from the querier, how should multiple receivers respond?

  1. The first receiver whose response time times out is sentReport messages are not sent by other receivers.
  2. Only run ICMPv2, all receivers will respond to the Report message.
  3. Only when IGMPvI is running will all receivers respondReport message.
  4. All recipients will respondReport message

Answer(s): D

Explanation:

IGMP Snooping is to monitor IGMP protocol packets.
IGMPSnooping is the same as IGMP. Both are used for multicast group management and control, and they both use IGMP packets. IGMPagreement line at the network layer, while the IGMP Snooping runs at the link layer, when the Layer 2 Ethernet switch receives the IGM transmitted between the host and the routerP message, IGMP Snooping analyzes the information carried by IGMP packets, and establishes and maintains MAs at Layer 2C table, the multicast packets sent from the router in the future will be forwarded according to the MAC table. IGMP Snooping will actively send IGMP specific group query packets to the port only when it receives an IGMP leave packet from a port or the aging time timer of a port expires.
IGMPmessage.



Viewing Page 3 of 97



Share your comments for Huawei H12-261_V3.0 exam with other users:

Asad Khan 11/1/2023 2:44:00 AM

answer 10 should be a because only a new project will be created & the organization is the same.
Anonymous


Raj 9/12/2023 3:49:00 PM

can you please upload the dump again
UNITED STATES


Christian Klein 6/23/2023 1:32:00 PM

is it legit questions from sap certifications ?
UNITED STATES


anonymous 1/12/2024 3:34:00 PM

question 16 should be b (changing the connector settings on the monitor) pc and monitor were powered on. the lights on the pc are on indicating power. the monitor is showing an error text indicating that it is receiving power too. this is a clear sign of having the wrong input selected on the monitor. thus, the "connector setting" needs to be switched from hdmi to display port on the monitor so it receives the signal from the pc, or the other way around (display port to hdmi).
UNITED STATES


NSPK 1/18/2024 10:26:00 AM

q 10. ans is d (in the target org: open deployment settings, click edit next to the source org. select allow inbound changes and save
Anonymous


mohamed abdo 9/1/2023 4:59:00 AM

very useful
Anonymous


Tom 3/18/2022 8:00:00 PM

i purchased this exam dumps from another website with way more questions but they were all invalid and outdate. this exam dumps was right to the point and all from recent exam. it was a hard pass.
UNITED KINGDOM


Edrick GOP 10/24/2023 6:00:00 AM

it was a good experience and i got 90% in the 200-901 exam.
Anonymous


anonymous 8/10/2023 2:28:00 AM

hi please upload this
Anonymous


Bakir 7/6/2023 7:24:00 AM

please upload it
UNITED KINGDOM


Aman 6/18/2023 1:27:00 PM

really need this dump. can you please help.
UNITED KINGDOM


Neela Para 1/8/2024 6:39:00 PM

really good and covers many areas explaining the answer.
NEW ZEALAND


Karan Patel 8/15/2023 12:51:00 AM

yes, can you please upload the exam?
UNITED STATES


NISHAD 11/7/2023 11:28:00 AM

how many questions are there in these dumps?
UNITED STATES


Pankaj 7/3/2023 3:57:00 AM

hi team, please upload this , i need it.
UNITED STATES


DN 9/4/2023 11:19:00 PM

question 14 - run terraform import: this is the recommended best practice for bringing manually created or destroyed resources under terraform management. you use terraform import to associate an existing resource with a terraform resource configuration. this ensures that terraform is aware of the resource, and you can subsequently manage it with terraform.
Anonymous


Zhiguang 8/19/2023 11:37:00 PM

please upload dump. thanks in advance.
Anonymous


deedee 12/23/2023 5:51:00 PM

great great
UNITED STATES


Asad Khan 11/1/2023 3:10:00 AM

answer 16 should be b your organizational policies require you to use virtual machines directly
Anonymous


Sale Danasabe 10/24/2023 5:21:00 PM

the question are kind of tricky of you didnt get the hnag on it.
Anonymous


Luis 11/16/2023 1:39:00 PM

can anyone tell me if this is for rhel8 or rhel9?
UNITED STATES


hik 1/19/2024 1:47:00 PM

good content
UNITED STATES


Blessious Phiri 8/15/2023 2:18:00 PM

pdb and cdb are critical to the database
Anonymous


Zuned 10/22/2023 4:39:00 AM

till 104 questions are free, lets see how it helps me in my exam today.
UNITED STATES


Muhammad Rawish Siddiqui 12/3/2023 12:11:00 PM

question # 56, answer is true not false.
SAUDI ARABIA


Amaresh Vashishtha 8/27/2023 1:33:00 AM

i would be requiring dumps to prepare for certification exam
Anonymous


Asad 9/8/2023 1:01:00 AM

very helpful
PAKISTAN


Blessious Phiri 8/13/2023 3:10:00 PM

control file is the heart of rman backup
Anonymous


Senthil 9/19/2023 5:47:00 AM

hi could you please upload the ibm c2090-543 dumps
Anonymous


Harry 6/27/2023 7:20:00 AM

appriciate if you could upload this again
AUSTRALIA


Anonymous 7/10/2023 4:10:00 AM

please upload the dump
SWEDEN


Raja 6/20/2023 5:30:00 AM

i found some questions answers mismatch with explanation answers. please properly update
UNITED STATES


Doora 11/30/2023 4:20:00 AM

nothing to mention
Anonymous


deally 1/19/2024 3:41:00 PM

knowable questions
UNITED STATES