HCIP-Routing & Switching-IENP V2.5
H12-222_V2.5 Free Questions
Which of the following SNMP packets are sent to the NMS by the Agent on the managed
What types of protocols can eSight use to discover network elements? (Multiple choice)
A. SNMP protocol
B. netconf protocol
C. Telnet protocol
D. ICMP protocol
Which of the following statements about traffic shaping are correct? (Multiple choice)
A. Traffic shaping can only be used in the outbound direction
B. Traffic shaping will discard excess traffic
C. Traffic shaping will cache the excess traffic
D. Traffic shaping can only be used in the inbound direction
When the stateful inspection firewall forwards subsequent data packets (not the first packet), which
of the following is the main basis?
A. MAC address table
B. Session table
C. Route table
D. FIB table
Which of the following is the broadcast domain of VXLAN called?
A. Exchange domain
B. Bridge domain
C. VLAN domain
D. Wide finger area
When the BFD detection interval at both ends is 30ms and 40ms respectively, which of the following
descriptions is correct?
A. The bfd session cannot be established.
B. The bfd session can be established, 30ms after negotiation.
C. The bfd session can be established, and it takes 40ms after negotiation.
D. The bfd session can be established, and each is sent at its own time interval.
The network management workstation manages network devices through the SNMP
protocol. When an abnormality occurs in the managed device, which SNMP message will
the network management workstation receive?
A. Get-Response message
B. Set-Request message
C. Get-Request message
D. Trap message
Configuring DHCP Snooping can be used to prevent counterfeit attacks. Which of the following
steps should be included in the configuration p