H12-831_V1.0-ENU 無料問題集「Huawei HCIP-Datacom-Advanced Routing & Switching Technology V1.0」
When configuring port security on a switch, the administrator also enables static MAC address flapping detection. If static MAC address flapping occurs, the switch takes the configured action to protect the interface.
Match the names of interface security protection actions with corresponding operations.

Match the names of interface security protection actions with corresponding operations.

正解:

Explanation:
* Restrict # Discards the packets that trigger static MAC address flapping and reports an alarm.
* Protect # Discards the packets that trigger static MAC address flapping only and does not report an alarm.
* Shutdown # Sets the interface state to error-down and reports an alarm.
Comprehensive and Detailed In-Depth Explanation:
1. Understanding Port Security Modes
Port security is used to control access on a switch port based on MAC addresses. If a MAC address violation occurs (e.g., static MAC address flapping), the switch can take different actions based on the configured security mode.
Security Mode
Description
Restrict
Drops the violating packets and logs the violation by generating an alarm.
Protect
Drops the violating packets but does not generate an alarm.
Shutdown
Places the interface into error-disabled (error-down) state and logs an alarm.
2. Matching Each Security Mode with Its Operation
* Protect Mode:
* The switch drops the packets from the unauthorized MAC address.
* No alarm is generated or logged.
* Correct Mapping: "Discards the packets that trigger static MAC address flapping only and does not report an alarm."
* Restrict Mode:
* The switch drops the packets from the unauthorized MAC address.
* An alarm is generated and logged in the system.
* Correct Mapping: "Discards the packets that trigger static MAC address flapping and reports an alarm."
* Shutdown Mode:
* The switch shuts down the interface by placing it into the error-down state.
* An alarm is generated and logged.
* Correct Mapping: "Sets the interface state to error-down and reports an alarm."
On the 05PFv3 network shown in the figure, each interface of R1 and R2 has two IPv6 addresses. Although the IPv6 address prefixes of R1 and R2 are different, they can still be used to establish an OSPFv3 neighbor relationship. If R2 is the DR, the Intra-Area-Prefix-LSA generated by R2 contains four prefixes.


正解:B
解答を投票する
The figure shows the logical network architecture of a migration project. The purpose of the migration is to add network device R4 between R2 and R3.
* OSPF runs between network devices.
* After the physical network is connected, a network engineer incorrectly imports the backup configuration of R3 to R4 during the migration.
Given this, which of the following statements are true?

Options:
* OSPF runs between network devices.
* After the physical network is connected, a network engineer incorrectly imports the backup configuration of R3 to R4 during the migration.
Given this, which of the following statements are true?

Options:
正解:C、D
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
As shown in the figure, R1 to R4 are four routers in AS123. They all run OSPF to implement route reachability within the AS.
* Network segments 10.1.1.0/24 and 10.4.4.0/24 are not advertised into OSPF.
* R1 and R4 establish an IBGP peer relationship using Loopback0 and advertise network segments
10.1.1.0/24 and 10.4.4.0/24 into BGP.
Which of the following methods can be used to implement communication between PC1 and PC2?

Options:
* Network segments 10.1.1.0/24 and 10.4.4.0/24 are not advertised into OSPF.
* R1 and R4 establish an IBGP peer relationship using Loopback0 and advertise network segments
10.1.1.0/24 and 10.4.4.0/24 into BGP.
Which of the following methods can be used to implement communication between PC1 and PC2?

Options:
正解:C、D
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
On the IS-IS IPv6 network shown in the figure, multi-topology is enabled on all routers.
* The IPv6 address of Loopback0 on R4 is 2000::4/128.
* The command ipv6 summary 2000::/64 level-1-2 is configured in the IS-IS process of R4.

Which of the following statements is false?
* The IPv6 address of Loopback0 on R4 is 2000::4/128.
* The command ipv6 summary 2000::/64 level-1-2 is configured in the IS-IS process of R4.

Which of the following statements is false?
正解:A
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)