Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Huawei H12-821_V1.0 HCIP-Datacom-Core Technology V1.0 Exam Practice Test

Page: 1 / 33
Total 329 questions

HCIP-Datacom-Core Technology V1.0 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

On a WLAN, MAC address authentication controls network access rights of a user based on the user's access interface and terminal MAC address.

Which of the following statements is false about MAC address authentication?

Options:

A.

User passwords can be processed using PAP or CHAP.

B.

By default, the MAC address of a terminal is used as the user name and the last 6 hexadecimal digits of the terminal MAC address are used as the password for MAC address authentication.

C.

No client software needs to be installed on user terminals.

D.

A MAC address authentication system consists of three types of entities: terminal, access device, and authentication server.

Question 2

A wide area network (WAN) is a remote network that connects local area networks (LANs) or metropolitan area networks (MANs) in different areas for communication purposes. It is typically used to interconnect campus networks or data center networks.

Options:

A.

TRUE

B.

FALSE

Question 3

When receiving a packet that does not match any session table entry, the firewall discards the packet to prevent external attacks and ensure internal information security.

Options:

A.

TRUE

B.

FALSE

Question 4

If a router ID is configured in both the system via and the BGP view, BGP uses the router ID configured in the BGP view because the BGP view takes precedence over the system view.

Options:

A.

TRUE

B.

FALSE

Question 5

A router uses an advanced ACL to filter data. The ACL configuration is shown below. Which of the following statements is false about the configuration?

csharp

CopyEdit

[Huawei] acl 3001

[Huawei-acl-adv-3001] rule permit icmp source 192.168.1.3 0 destination 192.168.2.0 0.0.0.255

Options:

A.

The ACL permits ICMP packets from host 192.168.1.3 to host 192.168.2.200.

B.

The ACL denies ICMP packets from host 192.168.1.2 to network segment 192.168.2.0/24.

C.

The ACL permits IP packets from host 192.168.1.3 to network segment 192.168.2.0/24.

D.

The ACL is a numbered ACL whose number is 3001.

Question 6

Which of the following statements about the forwarding plane of a switch is false?

Options:

A.

Provides high-speed and non-blocking data channels.

B.

Can encapsulate and decapsulate packets.

C.

Can collect packet statistics.

D.

Consists of main control boards and interface boards.

Question 7

Which of the following statements about BFD operating modes are true?

Options:

A.

In demand mode, once a BFD session is set up, the system no longer periodically sends BFD Control packets.

B.

Asynchronous mode does not support the Echo function.

C.

In asynchronous mode, two systems periodically exchange BFD Control packets at the negotiated interval. If one system does not receive any BFD Control packets from the other within the detectiontime, the BFD session is declared down.

D.

Asynchronous mode is the primary BFD operating mode.

Question 8

As a next-generation wireless technology, Wi-Fi 6 greatly improves bandwidth rate and performance. Which of the following statements isfalseabout the features of Wi-Fi 6?

Options:

A.

Uses OFDMA technology to achieve high concurrency.

B.

Realizes zero latency, ensuring efficient service running.

C.

Provides high bandwidth, up to 9.6 Gbps.

D.

Uses TWT technology to reduce terminal power consumption.

Question 9

Which of the following statements regarding the firewall zone security level is false?

Options:

A.

The configured security level cannot be changed.

B.

Two zones cannot be configured with the same security level.

C.

The default security level of the new zone is 1.

D.

Only the security level of the user-defined zone can be configured.

Question 10

Which of the following statements regarding the MED value in BGP are true?

Options:

A.

According to BGP route selection rules, the MED value has a lower priority than AS_Path, Preferred-Value, Local-Preference, and Origin.

B.

The default MED value of BGP routes is 0.

C.

By default, BGP can compare the MED values of routes from different ASs.

D.

By default, if there is no MED value in routes, the value 0 is used. If the bestroute med-none-as-maximum command is configured, the maximum MED value 4294967295 is used.

Question 11

iMaster NCE-Campus can be used as an authentication server on a WLAN to authenticate STAs.

Options:

A.

TRUE

B.

FALSE

Question 12

Route summarization can effectively reduce the number of BGP routes. However, many parameters need to be properly set when configuring BGP route summarization. Otherwise, problems such as routing loops may occur.

Which of the following statements is false about BGP route summarization?

Options:

A.

If the aggregate command with suppress-policy specified is run on a device, the device advertises only the specific routes that match the given routing policy.

B.

If the aggregate command is run on a device, the device advertises both specific and summary routes.

C.

If the summary automatic command is run on a device, the device summarizes subnet routes based on natural network segments.

D.

If the aggregate command with detail-suppressed specified is run on a device, the device advertises only the summary route.

Question 13

See the following figure. All routers on the network run IS-IS and are in area 49.0001. By referring to the LSDB of R1, the Level-2 DIS is. (Enter the device name, for example, R1.)

Options:

Question 14

GRE is a VPN encapsulation technology that is widely used to transmit packets across heterogeneous networks. Which of the following statements is false about GRE?

Options:

A.

GRE supports encryption and authentication.

B.

GRE supports multicast transmission.

C.

GRE is a Layer 3 VPN encapsulation technology.

D.

GRE can work with other VPN protocols to better ensure data security.

Question 15

BGP is a distance-vector protocol that implements route reachability between ASs and selects optimal routes. Which of the following statements are true about this protocol?

Options:

A.

BGP does not support authentication. Therefore, it cannot ensure network security.

B.

BGP uses TCP as the transport layer protocol.

C.

BGP provides various routing policies.

D.

BGP supports automatic peer discovery.

Question 16

In PIM-DM, which of the following processes are involved in SPT establishment?

Options:

A.

Prune

B.

Graft

C.

Flooding

D.

State-refresh

Question 17

Which of the following statements regarding routing policy and policy-based routing are true?

Options:

A.

A routing policy is used to control import, advertisement, and receiving of routing information.

B.

Policy-based routing is used to control import, advertisement, and receiving of routing information.

C.

Policy-based routing is used to control packet forwarding without following routes in the routing table.

D.

A routing policy is used to control packet forwarding without following routes in the routing table.

Question 18

When receiving a packet, a Huawei router matches the packet against ACL rules. The default ACL matching order used by the Huawei router is.

Options:

Question 19

IGMPv2 uses the timeout mechanism for group members leaving a group. Group members can only leave a group silently. Before the timeout period expires, multicast traffic is still forwarded by the multicast router, and this is a defect.

Options:

A.

TRUE

B.

FALSE

Question 20

During routine maintenance, an enterprise administrator runs a command to check VRRP group information. Which of the following statements is false about the command output?

yaml

CopyEdit

display vrrp verbose

Vlanif100 | Virtual Router 1 State: Master

Virtual IP: 10.1.1.100

Master IP: 10.1.1.2

PriorityRun: 120 PriorityConfig: 120

DR: None BDR: None MTU: 0

Preempt: YES Delay Time: 20s

Remain: --

Track: YES Priority Reduced: 20

Auth Type: MD5

BFD-session State: UP

Options:

A.

Preemption is enabled for the VRRP group.

B.

This VRRP group is an mVRRP group.

C.

Authentication is enabled for the VRRP group.

D.

The ID of the VRRP group is 1.

Question 21

After BGP initiates a TCP connection, the ConnectRetry timer is disabled if the TCP connection is successfully established. If the TCP connection fails to be established, the device tries to reestablish the TCP connection when the ConnectRetry timer expires.

Options:

A.

TRUE

B.

FALSE

Question 22

The Neighbor Discovery Protocol (NDP) is an important basic protocol in the IPv6 protocol suite and plays an important role. Which of the following functions and features does it support?

Options:

A.

Address resolution

B.

Neighbor state tracing

C.

Duplicate address detection

D.

Redirection

Question 23

On an OSPF network, Type 7 LSAs can be generated only by ASBRs in NSSAs or stub areas and describe AS-external routes.

Options:

A.

TRUE

B.

FALSE

Question 24

Which of the following statements regarding IGMPv1 and IGMPv2 are true?

Options:

A.

1GMPv2 supports only general query.

B.

1GMPv2 defines the Leave message type.

C.

IGMPv1 does not define the IGMP Leave message type.

D.

IGMPv1 supports general query.

Question 25

ICMPv6 messages are classified as error or informational messages.

Options:

A.

TRUE

B.

FALSE

Question 26

The VRID of the VRRP virtual router is 3 and the virtual IP address is 100.1.1.10. What is the virtual MAC address?

Options:

A.

01-00-5E-00-01-64

B.

01-00-5E-00-01-03

C.

00-00-5E-00-01-64

D.

00-00-5E-00-01-03

Question 27

IGMP group entries play an important role in multicast forwarding. An administrator runs a command to view information about a multicast entry. The information is as follows:

sql

Copy

display igmp group

Interface group report information

Vlanif100(10.1.6.2):

Total 1 IGMP Group reported

Group Address Last Reporter Uptime Expires

225.1.1.2 10.1.6.10 00:02:04 00:01:17

Given this, which of the following statements are true?

Options:

A.

This entry can be used to construct the corresponding (S, G) entry.

B.

This entry is created when the device receives an IGMP Join message from a user.

C.

Expires indicates the aging time of the IGMP group.

D.

225.1.1.2 is the address of the group that the user joins.

Question 28

Which of the following is used as the destination port for single-hop BFD?

Options:

A.

UDP port 3784

B.

UDP port 4784

C.

TCP port 3784

D.

TCP port 4784

Question 29

An enterprise network runs OSPF to implement network communication. Which of the following types of LSAs may be generated by an ABR?

Options:

A.

NSSA LSA

B.

AS External LSA

C.

Network Summary LSA

D.

ASBR Summary LSA

Question 30

Which of the following statements regarding the display bgp routing-table command output is true?

Options:

A.

The route to the destination address 192.168.1.0 is learned through AS 200.

B.

The MED value of the route to the destination address 192.168.1.0 is 100.

C.

The route to the destination address 192.168.1.0 is not the optimal route in the BGP routing table.

D.

The route to the destination address 192.168.1.0 is injected into the BGP routing table using the network command.

Question 31

Compared with RSTP, which of the following port roles are added to MSTP?

Options:

A.

Backup port

B.

Master port

C.

Edge port

D.

Regional edge port

Question 32

On a broadcast IS-IS network, a DIS needs to be elected to create and update pseudonodes. Which of the following values is the default DIS priority of an IS-IS interface?

Options:

A.

200

B.

64

C.

1

D.

100

Question 33

InIP multicast transmission, packets are transmitted from a source to agroup of receivers. Which of the following statements aretrueabout IP multicast technologies?

Options:

A.

Compared with broadcast, IP multicast prevents information flooding.

B.

Compared with broadcast, IP multicast effectively conserves network bandwidth.

C.

Compared with unicast, IP multicast improves information transmission security.

D.

Compared with unicast, IP multicast increases the load of information sources.

Question 34

ACLs are a common matching tool in routing policies. An ACL can be configured on a router to match routes.

Options:

A.

TRUE

B.

FALSE

Question 35

On an OSPF network, interfaces are classified into four types based on link layer protocols. Which of the following types can interfaces on an IS-IS network be classified into based on physical links?

Options:

A.

P2P

B.

Broadcast

C.

P2MP

D.

NBMA

Question 36

A monitoring plane usually comprises the monitoring units of main control boards and interface boards. This plane can monitor the system environment independently. Which of the following environment monitoring functions can be provided by the monitoring plane?

Options:

A.

Voltage monitoring

B.

Temperature monitoring

C.

Fan control

D.

System power-on and power-off control

Question 37

There are two types of routing entries on a PIM network. (S, G) routing entries are used to set up on a PIM network and are applicable to both PIM-DM and PIM-SM networks.

Options:

Question 38

Which of the following statements regarding the OSPF protocol is false?

Options:

A.

Each OSPF router uses only one Router-LSA to describe the local active connection status of an area.

B.

Routing information can be advertised only between backbone and non-backbone areas and cannot be advertised directly between non-backbone areas.

C.

Router-LSA describes four connection types: P2P, TransNet, SubNet, and virtual link.

D.

Link State ID in a Type 3 LSA indicates the router ID of an ABR.

Question 39

As shown in the figure, data traffic is forwarded in tunnel mode along the path of STA -> HAP -> HAC -> upper-layer network before roaming. What is the flow direction of data traffic after Layer 3 roaming?

Options:

A.

STA -> FAP -> FAC -> HAC -> HAP -> HAC -> Upper-layer network

B.

STA -> FAP -> FAC -> HAC -> Upper-layer network

C.

STA -> FAP -> FAC -> Upper-layer network

D.

STA -> FAP -> FAC -> HAC -> HAP -> Upper-layer network

Question 40

During BGP route summarization configuration, the keyword can be used to suppress all specific routes so that only the summary route is advertised. The summary route carries the Atomic-aggregate attribute rather than the community attributes of specific routes.

Options:

Question 41

Which of the following statements regarding DR/BDR are false?

Options:

A.

In a broadcast network, DR and BDR must be elected. A broadcast network without a DR or BDR cannot operate normally.

B.

DR others listen on the multicast address 224.0.0.5.

C.

All DR others establish neighbor relationships with DR and BDR only.

D.

DR others listen on the network address 224.0.0.6.

Question 42

BGP routes have multiple path attributes. When a router advertises a BGP route to its peers, the route carries multiple path attributes. These attributes describe the characteristics of the BGP route and affect route selection in some scenarios. The attribute is Huawei-specific. It is valid only on the local device and is not transmitted to BGP peers. (Enter the attribute name in lowercase as it appears in the command output about the BGP routing table.)

Options:

Question 43

On an OSPF network, if a router functions as an ABR, the router must also be a BR.

Options:

A.

TRUE

B.

FALSE

Question 44

On aBGP network, aroute-policycan be used to modify route attributes. Which of the following statements isfalseaboutroute-policies?

Options:

A.

When OSPF routes are imported using the import command, aroute-policycan be used to change their defaultMED value.

B.

When direct routes are imported using the import command, aroute-policycan be used to filter out the routes that you do not want to advertise.

C.

When routes are imported using the network command, aroute-policycannot be used to modify the attributes of the imported routes.

D.

In the address family view, the peer command can be run to reference aroute-policyto modify thelocal preferenceof the routes to be advertised.

Question 45

RSTP provides different functions in different scenarios. Which of the following statements Is false?

Options:

A.

After TC-BPDU attack defense function is enabled, you can set the number of times the switch processes TC BPDUs within a certain period

B.

The role of the designated port that is enabled with root protection cannot be changed

C.

If the edge port on the switch enabled with BPDU protection receives RST BPDU, the switch sets the edge port as a non-edge-port and triggers STP calculation

D.

When the designated port enabled with root protection receives optimal RST BPDUs, the port enters the Discarding state and does not forward packets. If the port does not receive optimal RST BPDUs within a certain period of time, the port will automatically restore to the Forwarding state

Question 46

On an RSTP network, port priorities may be compared during root port or designated port election. Which of the following values is the default priority of a port on a Huawei switch?

Options:

A.

1

B.

128

C.

4096

D.

32768

Question 47

Hackers often obtain the login permissions of system administrators through various attacks.

Which of the following measures can be taken to enhance the security of administrator accounts?(Select all that apply)

Options:

A.

Periodically check whether unnecessary administrator accounts exist in the system. If such accounts exist, delete them to reduce the attack surface.

B.

Encrypt passwords before transferring them. Whenever possible, transfer passwords by email.

C.

Assign exclusive accounts for administrators with different maintenance roles to avoid account sharing.

D.

To ensure security and make the password easier to remember, you can set the password to be valid for a long time.

Question 48

As shown in the figure, R1 imports the direct route10.1.1.0/24to OSPF. An engineer enablesbidirectional route re-advertisementon R2 and R3.

After the network becomes stable, which of the following is thePre (preference) valueof the route10.1.1.0/24in therouting table of R3?

Options:

A.

0

B.

10

C.

150

D.

15

Question 49

An IP prefix list is a common matching tool used in routing policies. Which of the following cannot be configured as matching conditions in an IP prefix list on a Huawei router?

Options:

A.

Port number

B.

Mask

C.

Action

D.

Index

Question 50

InIPv6,NDP (Neighbor Discovery Protocol)uses multiple types ofICMPv6 packets. Which of the following functions areRS (Router Solicitation) packetsused for?

Options:

A.

Duplicate address detection

B.

Prefix readdressing

C.

Redirection

D.

Address resolution

Question 51

On an OSPF or IS-IS network, the filter-policy import command can be run on a router to filter out the LSAs forwarded by its neighbors.

Options:

A.

TRUE

B.

FALSE

Question 52

In BGP, Notification messages are used to request peers to resend routing information after routing policies are changed.

Options:

A.

TRUE

B.

FALSE

Question 53

ACLs are a common tool for matching routes. ACLs are classified into multiple types based on ACL rule functions. An ACL can be identified by a number, and the number range for each type of ACLs is different. Which of the following type of ACLs are numbered from 4000 to 4999?

Options:

A.

User-defined ACL

B.

Basic ACL

C.

Layer 2 ACL

D.

Advance ACL

Question 54

Roaming technologyis typically used on alarge WLANto ensure thatSTA (station) servicesare not interrupted when STAs move between coverage areas of different APs.

Options:

A.

TRUE

B.

FALSE

Question 55

To prevent inter-area routing loops, OSPF does not allow advertising routing information between two non-backbone areas and allows sing routing information only within an area or between the backbone area and a non-backbone area. Therefore, each ABR must be connected to the backbone area.

Options:

A.

TRUE

B.

FALSE

Question 56

On a broadcast IS-IS network shown in the following figure, a DIS needs to be elected to create and update pseudonodes. Which of the following routers is elected as the DIS?

Options:

A.

R1

B.

R3

C.

R4

D.

R2

Question 57

In the OSPF protocol, inter-area route calculation involves only Router LSA, Network LSA, and Summary LSA.

Options:

A.

TRUE

B.

FLASE

Question 58

Which of the following methods is usually used by a network administrator to configure a newly purchased device for the first time?

Options:

A.

Telnet

B.

SNMP

C.

Login through the Console port

D.

FTP

Question 59

Which of the following TLVs is used by ISIS to describe the IP address of an interface?

Options:

A.

129

B.

131

C.

128

D.

132

Question 60

Which of the following statements regarding multicast MAC addresses are false?

Options:

A.

One multicast MAC address maps to 32 multicast IP addresses.

B.

One multicast MAC address maps to only one multicast IP address.

C.

The high 24 bits of the multicast MAC address are 0x01005E, the 25th bit is fixed to 1, and the lower 23 bits of the MAC address map to the lower 23 bits of the multicast IP address.

D.

A multicast MAC address identifies receivers of a multicast group on the data link layer.

Question 61

Security policy is the core feature of firewalls. Only valid traffic that complies with security policies can be forwarded by firewalls. Which of the following statements are true about security policy matching rules?

Options:

A.

Multiple values can be configured for a single matching condition, and the values are logically ANDed.

B.

If a security policy contains multiple matching conditions, the relationship between them is AND.

C.

The system has a default security policy nameddefault, where all matching conditions areanyand the default action ispermit.

D.

When multiple security policy rules are configured, they are sorted in a list by configuration sequence by default. A security policy rule configured earlier is placed higher in the list and has a higher priority.

Question 62

In BGP, the AS_Path attribute records the numbers of all ASs that a route passes through from the local end to the destination in the vector order.

Which of the following statements is false about the attribute change during route transmission?

Options:

A.

When advertising the route to an IBGP peer, the BGP speaker creates an empty AS_Path in the Update message.

B.

When advertising the route to an EBGP peer, the BGP speaker adds the local AS number to the end of the AS_Path.

C.

When advertising the route to an EBGP peer, the BGP speaker creates an AS_Path carrying the local AS number in the Update message.

D.

When advertising the route to an IBGP peer, the BGP speaker does not change the AS_Path attribute of the route.

Question 63

See the network shown in the following figure.

R1 and R2 run IS-IS and establish an adjacency. IS-IS is enabled on Loopback0 of R2 but disabled on Loopback3 of R2. The configurations shown in the figure are performed in the IS-IS process of R2. Which of the following statements are true?

Options:

A.

The routing table of R1 contains the route 10.0.2.3/32.

B.

The routing table of R1 does not contain the route 10.0.2.3/32.

C.

The routing table of R1 does not contain the routes 10.0.2.2/32 and 10.0.2.3/32.

D.

The routing table of R1 contains the route 10.0.2.2/32.

Question 64

The typical characteristics of the AI era are that it focuses on data, explores data value, and improves AI efficiency. Therefore, the core requirement of AI for data center networks is speed, meaning low latency.

Options:

A.

TRUE

B.

FALSE

Question 65

On an IS-IS network, the length and components of aNETare the same as those of anNSAP. Which of the followingNETfields is used to uniquely identify a host or router in an area?

Options:

A.

System ID

B.

IDI

C.

SEL

D.

Area Address

Question 66

AnIP prefix listis a common matching tool in routing policies. When anIP prefix listis configured on a Huawei router, which of the following parameters areoptional?

Options:

A.

Index of the prefix list

B.

Longest mask length to be matched

C.

Shortest mask length to be matched

D.

Mask length

Question 67

When a routing policy is used to filter routes, which of the following route prefixes will be denied by the IP prefix below?

Options:

A.

1.1.1.1/26

B.

1.1.1.2/16

C.

1.1.1.1/32

D.

1.1.1.1/24

Question 68

L2TP does not provide security encryption. Therefore, other security measures, such as IPsec, are required to ensure the security of the entire tunnel for data transmission.

Options:

A.

TRUE

B.

FALSE

Question 69

Both MQC and PBR can be applied on device interfaces to filter received and sent packets or control packet forwarding paths.

Options:

A.

TRUE

B.

FALSE

Question 70

On an enterprise WLAN where Portal authentication is deployed, an AC functions as an access device and communicates with a Portal server using the Portal protocol. Which of the following statements are true about the Portal protocol?

Options:

A.

The HTTP or HTTPS protocol can be used as the Portal access or authentication protocol.

B.

By default, the access device processes Portal protocol packets through port 2000.

C.

By default, the device uses the destination port number 50100 to proactively send packets to the Portal server.

D.

Portal protocol packets are transmitted over TCP.

Question 71

When creating a single-hop BFD session for the first time, bind the single-hop BFD session to the peer IP address and the local address. To modify a configured BFD session, delete it and create a new one.

Options:

A.

TRUE

B.

FALSE

Question 72

PBR is a mechanism for selecting routes based on user-defined policies. There are two types of PBR: interface-based PBR and local PBR. Which of the following statements is false about these two types of PBR?

Options:

A.

Interface-based PBR takes effect only for forwarded packets.

B.

Local PBR takes effect only for locally originated packets.

C.

Interface-based PBR is configured on an interface and takes effect only for incoming packets on the interface.

D.

Local PBR is configured in the protocol view.

Question 73

Which of the following statements is false?

Options:

A.

If the current DR fails, the current BDR automatically becomes a new DR, and a BDR will be elected again.

B.

A device with a higher router priority has a higher election priority.

C.

When a router with the highest router priority joins an OSPF network, this router will become the new DR.

D.

If two devices have the same router priority, the device with a larger router ID has a higher election priority.

Question 74

Which of the following statements is false about the default processing of the next hop address when a BGP device advertises a route?

Options:

A.

When advertising a locally originated route to an IBGP peer, a BGP device sets the next hop address to the IP address of its interface connected to the peer.

B.

When advertising a non-labeled route received from an EBGP peer to an IBGP peer, a BGP device changes the next hop address to the IP address of its interface connected to the IBGP peer.

C.

When advertising a route to an EBGP peer, a BGP device sets the next hop address to the IP address of its interface connected to the peer.

D.

A BGP device does not change the next hop address of a route if the route is received from an IBGP peer and is to be sent to another IBGP peer.

Question 75

OSPF has several types of special areas, which are used to reduce the LSDB size and improve device performance.

Which of the following LSAs cannot be in a totally stub area?

Options:

A.

Type 3 specific LSA

B.

Type 1 LSA

C.

Type 3 LSA that describes a default route

D.

Type 2 LSA

Question 76

A forwarding information database (FIB) can directly guide packet forwarding on a router.

Options:

A.

TRUE

B.

FALSE

Question 77

The administrator of an enterprise configuresSNMPv3on a device for communicating with theNMS (Network Management System). After the configuration is complete, thedisplay trapbuffercommand output shows that there are traps in the trap buffer of theinformation center, but theNMS does not receive any of them. Which of the following may cause this problem?

Options:

A.

The SNMP version configured on the device is different from the SNMP version of traps sent by the device.

B.

The SNMPv3 password used by the NMS is incorrect.

C.

The size of packets sent by the NMS exceeds the threshold set on the device.

D.

The community name configured on the NMS is inconsistent with that configured on the device.

Question 78

The Next_Hop attribute in BGP records the next hop of a route. Similar to the next hop in an IGP, the Next_Hop attribute in BGP must be the IP address of a peer interface.

Options:

A.

TRUE

B.

FALSE

Question 79

On an IS-IS network, areas are divided by router, and a router can belong to only one area. Therefore, an IS-IS router only needs to maintain the LSDB of its area.

Options:

A.

TRUE

B.

FALSE

Question 80

In BGP, Keepalive messages are used to maintain BGP peer relationships. When a BGP router receives a Keepalive message from a peer, the BGP router sets the state of the peer to Established and periodically sends Keepalive messages to maintain the connection. By default, the device sends Keepalive messages every seconds.

Options:

Question 81

Match the following IPv4 multicast protocols with the corresponding functions.

Options:

Question 82

A non-client is an IBGP peer that functions as neither an RR nor a client. A non-client must establish fully meshed connections with the RR and all the other non-clients.

Options:

A.

TRUE

B.

FALSE

Question 83

Which of the following attribute must be carried in an Update message?

Options:

A.

Local-pref

B.

Prefval

C.

MED

D.

AS-Path

Question 84

The following figure shows acampus network. IS-IS is configured on all routers, and the network runs normally.

By default, which of the following routers havespecific routeson the entire network?

Options:

A.

R2

B.

R3

C.

R1

D.

R7

Question 85

Which of the following statements regarding Local-Preference in BGP is true?

Options:

A.

Local-Preference affects traffic that enters an AS.

B.

Local-Preference can be transmitted between ASs.

C.

The default Local-Preference value is 100.

D.

Local-Preference is a well-known mandatory attribute.

Question 86

OSPF has five types of packets, which have the same header format. If the Auth Type field in the packet header is 1, which of the following authentication modes is used?

Options:

A.

Non-authentication

B.

MD5 authentication

C.

Plaintext authentication

D.

Hash authentication

Question 87

Which of the following statement regarding the display ospf peer command output is true?

Options:

A.

Address: 10.1,1.1 Indicates that the local interface address is 10.1.1.1.

B.

Through negotiation during DD packet exchange, the local end becomes the slave.

C.

Router ID indicates that the local router ID Is 10.1.1.1.

D.

The DR address is 10.1.1.1

Question 88

A session is an entry used to record the connection status of a protocol and is fundamental for the firewall to forward packets. Which of the following protocol packets will the firewall create sessions for?

Options:

A.

Subsequent fragment

B.

ICMP error packet

C.

GRE

D.

TCP

Question 89

Based on IGMP snooping, IGMP snooping proxy enables a switch to act as a substitute for an upstream Layer 3 device to send IGMP Query messages to downstream hosts, and also to act as a substitute for downstream hosts to send IGMP Report/Leave messages to an upstream device. As such, this function conserves bandwidth between the upstream device and the local device.

Options:

A.

TRUE

B.

FALSE

Question 90

A Layer 2 switch supports multiple types of Ethernet interfaces. Similar to a trunk interface, a hybrid interface allows data frames from multiple VLANs to pass through. In addition, you can determine whether data frames from a VLAN sent out from a hybrid interface are tagged or untagged.

Options:

A.

TRUE

B.

FALSE

Question 91

In IPv6, to communicate with a destination host, a host must obtain the link-layer address of the destination host through ARP.

Options:

A.

TRUE

B.

FALSE

Question 92

Which of the following statements regarding OSPF multi-instance is false?

Options:

A.

Route exchange between different OSPF processes is similar to route exchange between different routing protocols.

B.

An interface of a router belongs to only a certain OSPF process.

C.

The OSPF process IDs must be the same when OSPF neighbor relationships are established between different routers.

D.

Multiple OSPF processes can run on the same router, and they are independent of each other.

Question 93

An edge port is a new port role added to RSTP to overcome the disadvantages of STP. Which of the following statements is false about this port role?

Options:

A.

The port does not participate in RSTP calculation.

B.

The port can directly enter the Forwarding state from the Discarding state.

C.

After receiving a configuration BPDU, the port is still in the Forwarding state.

D.

The Up and Down states of the port do not cause network topology changes.

Question 94

On an OSPF network, routers learn routing information on the entire network by exchanging LSAs. Which of the following values is the LS Age in the LSA header when an LSA is deleted?

Options:

A.

1800s

B.

3600s

C.

1200s

D.

600s

Question 95

An enterprise administrator wants to configure single-hop BFD to implement fast detection of direct links. Which of the following configurations are mandatory?

Options:

A.

Configure the remote discriminator of a BFD session.

B.

Configure the local discriminator of a BFD session.

C.

Configure a multicast IP address for BFD.

D.

Enable BFD globally.

Question 96

In BGP, the Origin attribute is used to identify the origin of a route. Which of the following statements are true about the Origin attribute?

Options:

A.

If a route is imported to BGP by the originator using the network command, the Origin attribute of the BGP route is displayed as i in the BGP routing table.

B.

If a route is learned through EGP, the Origin attribute of this BGP route is displayed as ? in the BGP routing table.

C.

If multiple routes carry the same destination address but different Origin attributes and all other route selection conditions are the same, BGP selects the optimal route according to the Origin attribute in the following order: IGP > EGP > Incomplete.

D.

This attribute is a well-known mandatory attribute.

Question 97

Which of the following statements regarding the LSA age field are true?

Options:

A.

The unit of this field is seconds. In a LSDB, the LS age of a LSA increases with time.

B.

If the LS age of a LSA has reached the LSRefreshTime (30 minutes), any router can regenerate an instance of this LSA again.

C.

The unit of this field is seconds. In a LSDB, the LS age of a LSA decreases with time.

D.

If the LS age of a LSA has reached the LSRefreshTime (30 minutes), the originator of this LSA needs to regenerate an instance of this LSA again.

Question 98

OSPF neighbors have multiple states, such as Down, Init, 2-way, Loading, or Full. In which of the following states do OSPF routers negotiate the master and slave roles?

Options:

A.

Exchange

B.

Init

C.

2-way

D.

ExStart

Page: 1 / 33
Total 329 questions