H12-891_V1.0 無料問題集「Huawei HCIE-Datacom V1.0」
What can be determined from the following figure?
<R1> display ipv6 routing-table protocol isis
Public Routing Table : ISIS
Summary Count: 6
ISIS Routing Table's Status : < Active >
Summary Count: 6
Destination : 3000:FDEA::4
NextHop : FE80::2E0:FCFF:FE98:2577
Cost : 20
Interface : GigabitEthernet0/0/1
PrefixLength : 128
Preference : 15
Protocol : ISIS-L2
Flags : D
<R1> display ipv6 routing-table protocol isis
Public Routing Table : ISIS
Summary Count: 6
ISIS Routing Table's Status : < Active >
Summary Count: 6
Destination : 3000:FDEA::4
NextHop : FE80::2E0:FCFF:FE98:2577
Cost : 20
Interface : GigabitEthernet0/0/1
PrefixLength : 128
Preference : 15
Protocol : ISIS-L2
Flags : D
正解:A、B、D
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
K company has two types of network services: UDP-based real-time video streaming services and TCP-based FTP download services. The company's network administrator often receives complaints that the FTP download speed is slow or unstable. What are the possible causes?
正解:C、D
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
Network Admission Control (NAC) needs to be deployed on the network shown in the figure. Drag a proper authentication mode to each authentication point.




正解:

Explanation:
Correct Matching of Authentication Methods:
1#802.1X authentication#PC (GE0/0/2 on SW3)
2#MAC address authentication#IP Phone (GE0/0/3 on SW3)
3##Portal authentication#Wireless Clients (Connected via SW2/AP)
Understanding Network Admission Control (NAC) Authentication Methods
#Network Admission Control (NAC)enforcessecurity policies before allowing devices onto the network.
#Different types of devices requiredifferent authentication methodsbased oncapabilities and security requirements.
Analysis of Each Authentication Type:
#1##802.1X Authentication (Used for PC on GE0/0/2 of SW3)
Best for devices that support user authentication (e.g., PCs, Laptops).
Requiressupplicant software (e.g., Windows or macOS built-in 802.1X client).
Providesstrong security using EAP (Extensible Authentication Protocol) over RADIUS.
#2##MAC Address Authentication (Used for IP Phone on GE0/0/3 of SW3)
Best for devices that do not support username/password authentication (e.g., IP Phones, IoT devices).
UsesMAC addresses as identity credentials.
Suitable forVoIP networks, industrial IoT, and surveillance cameras.
#3##Portal Authentication (Used for Wireless Clients on SW2/AP)
Best for guests or mobile users accessing Wi-Fi networks.
Redirects users to aweb-based login pagebefore granting access.
Used inpublic hotspots, campus Wi-Fi, and enterprise guest networks.
Why These Assignments Are Correct?
1##802.1X for PC:
PCs support 802.1X authentication via supplicants (EAP-MD5, PEAP, etc.).
Ensureshigh security by verifying user credentials.
2##MAC Address Authentication for IP Phone:
IP Phones lack a username/password interface, so authentication is done via MAC addresses.
Simplifies authentication while maintaining security.
3##Portal Authentication for Wireless Clients:
Wireless users do not use 802.1X authentication directly; instead, they are redirected to a web login page.
Common in enterprise guest Wi-Fi and public hotspots.
Real-World Application:
Enterprise NAC Deployment:Ensuresonly authorized users and devices access the corporate network.
Campus & Hotel Wi-Fi Security:UsesPortal Authentication for guests, 802.1X for employees, and MAC- based for VoIP.
#Reference:Huawei HCIE-Datacom Guide - NAC Authentication Methods & Best Practices