Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Huawei H12-891_V1.0 HCIE-Datacom V1.0 Exam Practice Test

Page: 1 / 61
Total 610 questions

HCIE-Datacom V1.0 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

The following topology diagram is available, and it is correct to analyze the following statement accordingly

Options:

A.

There are route entries for 10022/32 and 10000/16 in the IP routing table for AR1

B.

R1's IP routing table has both 10033/32 and 10000/16-bit route entries

C.

Because R does the route aggregation, R1 Only route entries of 10000/16 exist in the IP routing table

D.

There are route entries for 10022/32 and 10033/32 in the IP routing table for R1

Question 2

Regarding route introduction, the following description is correctly ?( Multiple choice questions).

Options:

A.

OSPF introduces two types of external routes, with the first type of external route taking precedence over the second type of external route.

B.

Use the default-route imported command in BGP only to introduce default routes that already exist in the local IP routing table.

C.

When ISIS introduces an external route, if you do not specify the route type that is introduced, the Level-1 route is introduced by default on the L1/2 router

D.

When ISIS introduces an external route, if you do not specify the type of route that is introduced, the Leve1-1 route is introduced by default on the L1 router .

Question 3

Regarding the difference between NSR and NSF, the correct one is?

Options:

A.

The NSR must rely on a neighbor router to complete

B.

Both NSR and NSF require a neighbor router to complete

C.

NSF must rely on neighbor routers to complete

D.

NSF does not require a neighbor router to complete

Question 4

As shown in figure, Clent1, C lent2 and Clent3 are simultaneously clients of RR1. Ri introduces 10 routes. It is assumed that the RGP is configured correctly. The neighbor relationship has been established, how many route entries exist in the BGP routing table of the most clIient3?

A15

B. 10

C. 20

D. 1

Options:

Question 5

As shown in the figure, an engineer uses four routers to test the interoperability of branch networks, where R1, R2, and R3 in branch 1 deploy OSPF Network interoperability is implemented, and R, R3, R4 in Branch 2 is deployed is-IS to achieve network interoperability. Now that the engineer wants to implement R1 access to R4's loopback address, which of the following actions will meet this requirement?

Options:

A.

No configuration is required

B.

Publish default routes only in the OSPF process for R2

C.

In the OSPF process of R2 and the IS-IS process, the default routes are published separately

D.

Publish the default route only in the IS-IS process of R2

Question 6

There is a new HW office that needs to use their router as a DHCP server. When configuring the DHCP server to provide DHCP services to the current office, what of the following items need to be configured?

Options:

A.

Exclude unused IP addresses from the DHCP server

B.

Configure the timeout period for ping packets

C.

Configure the startup file for the DHCP server

D.

Configure manual binding

E.

Configure dhcp address pool

Question 7

What information does this contain in a basic layer packet? (Multiple choice) A Data link layer header

B. Upper-level data

C. The network layer header

D. path records

E. Network Layer Tail

Options:

Question 8

Which of the following descriptions of MPLS header TTL are correct?

Options:

A.

Copy IPTIL value is handled in such a way that the LSR of the MPLS domain is hidden, which plays a certain security role

B.

Can prevent wireless circular forwarding of messages

C.

MPLS has two ways of handling TTL, one is that the IP packet copies the PTTL of the MPLS header hen it enters the MPLS network Value; Another is to set the TTL of the MPLS header to 255 at the entrance LER

D.

When copying TTL is disabled, tracert can see the LSR of the passing MPLS domain

Question 9

In an HW MPLS network, what parameters are used to define a forwarding equivalent class??

Options:

A.

BGP MED ?

B.

IP prefix

C.

RSVP requests resource reservation

D.

from CE Layer 2 links

Question 10

The following description of Filter-Policy is correct?( Radio).

A With Filter-Policy, on ASBR in OSPF, type5LSA and type7LSA can be applied The build is filtered.

B. Prefix lists can be used to filter both routes and packets.

C. Filter-policy filters the link state information received or published, and can modify the properties of route entries.

D. When filtering routes using the pre-slow list, the table entry ip-prefxldeny0000 0 lese-qual 32 indicates that only the default route matches

Options:

Question 11

As shown in the figure, three switches S1, SW, and SN3, where SWI is the root bridge, and link congestion occurs between SI and SW2, SWD cannot receive the configuration BPDU sent by the root bridge, which spanning tree protection mechanism does the administrator need to configure to prevent the problem caused by link congestion?( Single choice questions).

Options:

A.

root protection

B.

PreventS TC-BPDU attacks

C.

BPDU Protection

D.

Loop Protection

Question 12

If multiple candidate RPs are configured in a multicast group, which of the following parameters does the RP that elect the group from multiple candidate RPs need to be compared?

Options:

A.

The mask length of the group range for the C-RP service that matches the group address that the user joined

B.

C-RP priority

C.

The IP address of the C. C-RP interface Number of

D.

C-RP interface

Question 13

There is an existing router running OSPF HWL, HW1 interface serial0 is published in zone 1, configure commands under the OSPF process nssa default-route-advertise, based on the previous description, infers which of the following options are correct?

Options:

A.

When HW1 injects a default route into Zone 1, HW1's local route table can not contain a single default route

B.

HW1 injects a Type 7 default route into Zone 0

C.

HW1 injects a type 7 default route into zone 1

D.

HW1 injects a Type 3 default route into Zone 1

E.

When HW1 injects a default route into zone 1, HW1's local route table needs to answer the default route

Question 14

A campus deploys OSPF to achieve network interoperability, and an engineer configures R2 as shown in the figure, then the following description of the LSA in the OSPF network is wrong

Options:

A.

There is no Type3 LsA flooding within Areal

B.

There is no Type3 LSA flooding in Area2

C.

There is Type5 LSA flooding within Areal

D.

Area2 contains Type5 LSA generic adverb

Question 15

/R1Jospf1lRL-osp- jarea.2[RLospf-1-arca-0002]network1001310000 As shown in the configuration, the administrator configured OSPF but RI on R1 You cannot learn routes for other routing rings. Then the possible cause is the question).

Options:

A.

This router does not have an OSPF process number configured

B.

This router is configured with a different zone ID than its neighbor router's zone ID

C.

This router does not have authentication features configured, but neighbor routers configure authentication features

D.

The declared network address of this router does not match the interface mask

Question 16

In a multicast network running PIM-SM mode, how does the router choose the upstream interface?

Options:

A.

looks up the outgoing interface corresponding to the RP address in the unicast routing table

B.

Interfaces to which multicast group members are directly connected

C.

Find the outbound interface corresponding to the mapping proxy in the unicast routing table

D.

The interface that is fast to the PIlM Join message

E.

Interface for sending PIM Heilo messages.

Question 17

During isis ' broadcast network database synchronization, is the following statement correct?

Options:

A.

R2, as DIS, sends CSNP periodically.

B.

R2 As DIS, Hello time is 3 times that of a normal router . C. R2 as DIS does not receive PSNP nouns for other routes.

C.

RI and R3 maintain database consistency by periodically sending PSNP requests.

Question 18

Regarding the MPLS handling mode of TTL, the following description is correct?

Options:

A.

Pipe mode. When an IP message passes through an MPLS network, the IPTTL minus l at the entry point is mapped to the MPLS TTL field

B.

MPLS tags in the TTL, which mean the same as the TTL domain in the IP header. TTL prevents mpLS networks from creating routing loops

C.

In Unifor mode, when an IP message passes through an MPLS network, the inbound IPTTL is minus 1. The MPLSTTL field is a fixed value

D.

In MMLSVPI, if you need to hide the structure of the MPLS backbone network, you can use the Uniform mode on Ingress for private network messages

Question 19

BGP routing policies can control the publication and acceptance of routes

Options:

A.

TRUE

B.

FLASE

Question 20

There is an existing router running OSPF connected to Zone 0 and Zone 1 You configured Zone 1 as a stub zone, what classes does LSA that only operates inside Zone 1 include?

Options:

A.

7 ? LSA

B.

1 ? LSA ? 2 ? LSA

C.

I LSA,2 LSA 5 LSA

D.

3 ? LSA ? 4 ? LSA

E.

1 LSA,2 LSA 3 LSA

Question 21

Without dividing the zone, is the following description of the link state routing protocol correct?

Options:

A.

Each router establishes a topology for the entire floodplain

B.

Each router learns route entries directly from the route update and adds them to the routing table

C.

Routers in the flood domain may receive the same link state information repeatedly

D.

Routers throughout the flood domain have the same database of wrong-state states

E.

The router will send all the mis-routing status information from one neighbor to all other neighbors to ensure the synchronization of the database

Question 22

There is an As-path-filter.ip as-path-filter 1 permit*(100l400) $, which As-path-filter can match which of the following AS_PATH Attribute?( Confirmed).

Options:

A.

300 4200

B.

1234 1400

C.

3100

D.

100

Question 23

The following description of the characteristics of cross-domain VN-Optionc is correct?

Options:

A.

A maximum of two layers of tags need to be used in the message forwarding process.

B.

VPMV4 routes are not saved on the ASBR, and VPNv routes are not advertised to each other.

C.

VPN routes are exchanged directly between the ingress PE and egress PE and do not require an intermediate device to secure a circular VPN route.

D.

Cross-domain VN-Optionc, which is not suitable for use when spanning multiple AS.

Question 24

A company network runs the OSPF protocol, a project in order to understand the OSPF mechanism in the network to perform packet transfer operations, the following description of ospf messages is correct?

Options:

A.

The interface sends a Hello packet immediately after joining the OSPF region

B.

LS update packet is sent only when the adjacency relationship is established

C.

When an LsUpdate packet is received, the router must send an LsAck acknowledgment

D.

LS update packet synchronizes the link state database by sending detailed LSA information

2

Question 25

D Class IP address range 239000-239255255,What does 255 do? Radio

Options:

A.

SSM multicast address, the multicast address segment is valid for the whole network

B.

Any legitimate multicast traffic and multicast application can adopt this address C. Locally managed multicast address, which is valid only locally

C.

Link-local multicast address, where traffic that uses that address includes network control messages and that address range is only the multicast address segment used by the E. routing protocol

Question 26

The following statement about the BFD one-arm echo function is correct (multiple choice).

Options:

A.

The BFD one-arm echo function must be configured with local identifiers and carrier identifiers

B.

The default destination IP address for the protocol message for BFD one-arm echo is 22400184

C.

After the BFD one-arm echo function is turned on, the destination IP and source IP of the BFD message are inducted

D.

BFD One-Arm Echo function is suitable for scenarios where one device supports BDD and the other device does not support

Question 27

The CPU was attacked by malicious traffic. Here are some of the following ways to prevent an attack: Multi-select

Options:

A.

USE CPCAR to rate limit messages sent up to the CPU according to the protocol type

B.

Speed limiting of messages sent to the CPu on the soil.

C.

Filter packets with AcL on the compromised router port

D.

Turn off the remote login function of the router.

E.

Analyze and count the packets sent to the CPU to find out the user of the attack source or the interface of the attack source.

Question 28

To build a loopless Layer 2 network, which of the following schemes is optimal?( Single Choice)

Options:

A.

Stacking + Link Aggregation

B.

TRILL+MSTP

C.

??+MSTP

D.

Link Collection + MSTP

Question 29

What are the reasons why the BGP connection is down after it is successfully established ? ( Single choice questions) Single choice

Options:

A.

The wrong BGP packet was received.

B.

The mandatory attribute in the route update packet is missing.

C.

Open message negotiation failed.

D.

After the BGP connection is established, the keepalive message is not received within the negotiated holdtime time.

Question 30

RD is used to distinguish the same IP address in different VPNs, how many bits does RD contain ? (Single choice)

Options:

A.

64

B.

32

C.

16

D.

128

Question 31

The following statement about ISIS (IPv6) is correct?

Options:

A.

In order to support the processing and calculation of IPV6 routes, IS-IS has added TLV232, 236

B.

By default, IS-IS has the multi-topology feature turned on

C.

IS-IS works at the data link layer and only needs to add a new TLV to support IPv6

D.

To support the processing and computation of IPv6 routes, IS-IS has added NLPID to the 129TLV

Question 32

Regarding the characteristics of CE double attribution, the description is wrong with ?

Options:

A.

CE accesses the backbone through two links that can be used as both load sharing and primary and standby links.

B.

CE and PE form a CE dual-home network, which can ensure high network availability.

C.

VRFs of two PEs connected to the same CE can belong to different VPNs.

D.

In the CE dual home network, it is possible to generate loops, and you can use route-tag to solve the loop problem.

Question 33

As shown in the figure, all routing diagrams declare the loopback address in OSPF, where R2 does not return the address is 10022/32, it is advisable to tell AraD. The R3 loopback address is 10033/321001.1.0/24 external routing, in order to reduce the burden on the RI router, the configuration command is as follows:( Multiple choice questions)[Rlip ip-prefix 1 permit 001.1.024 [RLIJospfl [RL-ospf-1]filter-policy ip-prefix l import please ask the following description is correct?

Options:

A.

In the P route table of router R1, there is no external route to 1001.1.0/24

B.

In the IP routing table of router R1, there is an external route to 1001.1.0/24

C.

In the IP routing table of router R1, there is no loopback route to R2

D.

In the IP routing table of router RI, there is no loopback route to R3

Question 34

There is no routing protocol running on the router HW and only one default route reaches the remote network. On the router job with the extension Ping remote file server address 105401. The result of Ping on the router job is presented as "Request time." out”? Based on the above description, the error in the following analysis is ?

Options:

A.

Router HW's next hop router does not have a path to the destination address

B.

Ping is successful, but congestion occurs on the path to the destination address

C.

ICMP packets can reach the destination address But the destination device failed to reply

D.

Router HW does not have a legitimate route to the destination address

E.

There is a firewall in the remote destination network, and no ICMP traffic is allowed

Question 35

Deploying the ISIS protocol in an IPv6 environment is true in the following statement (radio).

Options:

A.

By default, the DIS priority of broadcast network interfaces at Level-1 and Level-2 is 1 B In broadcast networks, the DIS priority for IPV4 and IPV6 can be set separately

B.

In the same broadcast network. If each router supports both IPV4 and Pv6, the DISC of JPV4 and Pv6 must be the same device

C.

IS-IS sient is configured under the finger port, this interface will not send ISIS packets, but will receive ISIS packet

Question 36

There are two Communily filters: ip comimuniy-lite lpemit 101201 ip community fiter 2permit101 ip commmuriyfilter 2pemit21 Regarding the above ommuniyfiter, the correct description is ?( Multiple choice questions).

Options:

A.

As long as the group attribute value carried in the BGP route contains 100:1 or 200:1, or both, the BGP route matches the community-filterl

B.

As long as the group attribute value carried in the BGP route contains 100:1 or 200:1, or both, the BGP route matches community-filter2

C.

The BGP route matches community-filter 1 only if the community attribute values carried in the BGP route contain 100:1 and 200:1

D.

A BGP route matches community-filter2 only if the group attribute values carried in the BGP route include 100:1 and 200:1

Question 37

Which of the following LSAs propagate in a single region only?

Options:

A.

Router LSA

B.

Summary LSA

C.

Network LSA

D.

AS External LSA

Question 38

Auto-negotiate mode is to obtain the maximum interface rate and operating mode, the network administrator configures all Ethernet interface rates of a working switch to 10OMbps, and the operating mode is configured as Full-duplex, when a network card is configured After the auto-negotiate workstation is connected to the switch, the negotiation result is that the interface rate is 10OMbps and the working mode is half-duplex, which of the following explanations is the most reasonable for this phenomenon?

Options:

A.

The problem is on the workstation's NIC, mostly due to the aging of the NIC driver on the workstation , which causes the workstation NIC to learn the interface rate and operating mode configured on the switch

B.

Port rate negotiation is negotiated through the initial port sending FLP , and the operating mode is not negotiated through FLP

C.

STP initializes the port into the blocking state, causing auto-negotiation to fail, so the port should be configured as an edge port

D.

At higher port rates and operating modes, the workstation's network interface card cannot be configured as auto-negotiate

E.

Auto-negotiation is not configured on the switch, resulting in the switch not being able to send FLP messages to the workstation, causing the workstation to set its own operating mode to Half-duple

Question 39

Router RL and Router R2 run BGP both routers are in the AS65234 The router R2 route is present in the BGP routing table of router RI, but not in the P of router R1 road

Options:

A.

With BGP, both routers are in the AS65234 Route cry PD is done by the right big worker

B.

By the table, so what causes the problem to occur? A, synchronization is turned off

C.

The B. BGP neighbor relationship is Down

D.

Router R1 does not enable BGPMulti-hop D Routing is not optimal

Question 40

One of the things you're doing is compressing the length of ip6 addresses as much as possible . The existing IP6 address is

2013xX0C130F006009cO87641308, to be able to make this P6 address more concise, you can compress the IP6 address into which of the following?( Single choice questions).

Options:

A.

2013:0:130F:0:0:09CO:876Answer: 130B

B.

2013:130F::9CO:876Answer: 130B

C.

2013:0:130F:0:0:9CO:876Answer: 130B

D.

213::13F::9C:876Answer: 13B

E.

2013:0:130F::9CO:876Answer: 130B

Question 41

The following description of the Layer 6 functionality in the OSI reference model is correct?

Options:

A.

Synchronous communication

B.

Establishing, maintaining, and terminating communication sessions

C.

Provides a common data compression and encryption scheme

D.

Determines the availability of resources

Question 42

The Option field in OSPFv3 appears in all LSAs

Options:

A.

True

B.

False

Question 43

Protocols with TCP ports 443, 179, 137, 110, and 23 are, in order: radio

Options:

A.

Finger,DHCP Server,NetBios Name Server,POP3,TelnetB

B.

LDAP,SNMP,TFTP,POP3,Telnet

C.

HTTPS,SNMP,POP3,DNS ,Telnet

D.

HiPS,BGP, NetBios Name Server ,POP3,TelnetE. BGP,POP3,SNMP,TFTP,Teinet

Question 44

If all the public IP addresses are used by a company's intranet users to access the Internet using NAT's No-pat method, what will happen to subsequent intranet users who access the Internet?

Options:

A.

automatically switch NAT to PAT after the Internet

B.

Subsequent intranet users will not be able to access the Internet

C.

Synchronize messages to other NAT conversion devices for NAT conversion

D.

Squeeze out the previous user and force NAT conversion to go online

Question 45

A medium-sized campus network manages the network through the SNMP protocol, and the campus is highly network-safe, so which version of SNMP is recommended for management?

Options:

A.

SNMPv1 B. SNMPv2C

B.

SNMPV3

C.

All versions are available to implement

Question 46

: :1/128 is the IPV6 loopback address

Options:

A.

TRUE

B.

False

Question 47

As shown in the figure,

in the context of IPv4 and IPv6, the SEL field in the NET address of the ISIS is always valued as 00?

Options:

A.

True

B.

False

Question 48

When configuring the source NAT and having no pat configuration parameters, which of the following statements is true?( Radio) A Perform destination IP address and destination port translation

B. Only source P address translation occurs

C. Only destination IP address translation occurs

D. Simultaneous source P address and source port translation

Options:

Question 49

An existing router running OSPF is connected to zone 0 and zone l. You configured zone l as the Stub domain. What classes does an LSA that operates only inside zone l contain?

Options:

A.

1LSA,2 3LSA

B.

3LSA 4LSA1 2

C.

1 ?LSA ? 2 ?LSA

D.

1 ??LSA,2 ??LSA 5 ??LSA

E.

7 ?LSA

Question 50

In EPIM-SM, the following description of the PIM Join message is correct?

APIM Join messages are sent every 3 minutes, and status B. PIM Join messages for the multicast tree are only sent when the multicast tree is first established

C. The PIM Join message is sent every 60 seconds to refresh the status of the upstream router mroute for the multicast tree

D. The upstream router sends a PIM Join acknowledgment in response to each PIM Join message received from the downstream router

Options:

Question 51

What messages can Huawei equipment suppress traffic for?

Options:

A.

Multicast

B.

Known unicast

C.

Broadcast

D.

Unknown unicast

Question 52

The following description of the CHAP authentication function in the PPP protocol is correct?( Multiple choice questions).

Options:

A.

The user name must be configured under the authenticated party interface for CHAP authentication

B.

If the authenticator does not have a username configured, password

C.

can also be configured without the authenticated party interface Using the authentication sequence ID, random number, and key, a Hash value

D.

is calculated using the MD5 algorithm Three message interactions are required for authentication, and only the user name is transmitted on the network without the password

Question 53

MPLS is called multiprotocol label switching, and with respect to label descriptions in MPLS, the correct one is ?( Multiple select).

Options:

A.

The MPLS system has a variety of label publishing protocols, such as LDP is a label publishing protocol

B.

The label is carried by the head of the MPLS message and has a global significance, that is, the label value of all routers cannot repeat

C.

A tag is a fixed-length, locally only meaningful identifier that uniquely identifies the FEC to which a group belongs

D.

MPLS supports single-layer tags as well as multi-tier tags

Question 54

When the IPv6 address of a host is configured with a stateless address configuration, and other parameters other than the address are obtained through DHCPv6, how to set the M and 0 bits in the RA message ?

Options:

A.

M=10=1

B.

M=10=0

C.

M=1 0=0

D.

M=00=1

Question 55

Communityflter has two types of basic group nature filters and advanced group property filters. Which of the following filters makes the Advanced Group Genus Filter more flexible than the Basic Group Attribute Filter to match group attributes?

Options:

A.

IP-prefix

B.

AS-path-filter

C.

Regular-expression

D.

ACL

Question 56

A home user has opened a 1Mb/s bandwidth, and in order to improve the user experience, the operator can stabilize 2Mb/s when measuring speed If we use the listening bucket technology to achieve this requirement, which of the following methods is optimal.

Options:

A.

cir 10000 pir 12000

B.

cir 10o00 cbs 12000 pbd 12000

C.

cir 8000 pir 12000

D.

cir 10000 cbs 10000 pbs 12000

Question 57

In different scenarios, RSTP provides different protection functions, and the wrong statement about this statement is

Options:

A.

The root protection feature is enabled for the specified port, and its port role can only remain as the specified port

B.

When the anti-TC-BPDU packet attack feature is enabled, the number of times the switching device processes IC BPDU packets per unit time is configurable

C.

after the BPDU protection function is enabled on the switching device, if the edge port receives RST BPDU, the edge port will be set to a non-remote port and the spanning tree calculation will be re-performed

D.

Start the specified port of root protection, when the port receives a better RSTBPDU, the port will enter the Discarding state and is no longer forwarding packets. If the port does not receive a better RSTBPD for a period of time then automatically revert to the normal Forwarding state

Question 58

For Layer 2 VPN technology, the following statement is correct? Multi-select

Options:

A.

VPLS is a widely used technology in the live network, which can provide transparent transmission of three-layer messages and achieve multi-point access.

B.

The VPLS configuration is complex and the Layer 2 network transmits BUM packets.

C.

BGPEVPN supports features such as tenant isolation, Multi-homing, and broadcast suppression. D. BGPEVPN addresses mac address drift and multi-tenancy that VPLS cannot support.

Question 59

The Layer 3 logical interface on XLAN L3 Gateway that enables communication between different VXLAN virtual networks is ?

Options:

A.

Layer 2 sub-interface

B.

NVE interface

C.

VBDIF interface

D.

VLANIF interface

Question 60

As shown in the figure, in the context of IPv4 and IPv6, the SEL field in the NET address of isis always takes a value of 00 ?

Options:

A.

Right

B.

Wrong

Question 61

In RSTP , which port provides a backup path to reach the root node of the spanning tree? What state is the port in?

Options:

A.

Root Port and Listening Status

B.

Alternate Port and Forwarding Status

C.

Alternate Port and Learning Status

D.

Designated port and Listening status

E.

Alternate port and Discarding status

Question 62

When deploying the ISIS protocol in an IPv6 environment , the following statement is correct (single choice).

Options:

A.

By default, the DIS priority for broadcast network interfaces at Level-1 and Level-2 is 1

B.

In broadcast networks, IPv4 and The DIS priority for IPv6 can be set separately

C.

In the same broadcast network. If each router supports both IPv4 and IPv6 The DIS for IPv4 and IPv6 must be the same device

D.

IS-IS is configured under the finger port is ISIS silent, this interface will not send ISIS packets, but will receive ISIS packets

Question 63

After BGP introduces routes for other protocols, the next hop in the BGP routing table is consistent with the next hop of the introduced routing protocol

Options:

A.

True

B.

False

Question 64

All interfaces of the router have OSPF enabled, the Cost value of the link is identified in the figure, and the Loopback0 socket for R2 is advertised in area 1 , then Rl reaches 10022/32 with a Cost value of ?

Options:

A.

50

B.

150

C.

200

D.

100

Question 65

The following description of ISIS's routed infiltration is correct?( Multi-select)

Options:

A.

ISIS routing penetrates | Can be used in Pv6 environments.

B.

Route penetration for ISIS can be deployed on Level-1 routers.

C.

Route penetration for ISIS does not include aggregated routes.

D.

Route penetration of ISIS does not cause neighbor concussions.

E.

Route infiltration of ISIS is used to prevent routing loops.

Question 66

ICMPv6 has two types: Error Messages and Information Messages.

Options:

A.

TRUE

B.

FALSE

Question 67

MSTP switches treat RSTP switches as MSTP domains, MSTP, which are formed by a single switch The interchange resolves the RSTBPDU to MSTBPDU, where IRPC is 0

Options:

A.

True

B.

False

Question 68

Is the following statement about VLAN aggregation correct?

Options:

A.

Sub-VLAN is used to isolate broadcast domains

B.

A Super VLAN can contain one or more Sub-VLANs

C.

The super Sub-VLAN contains a physical interface that can establish a Layer 3 VLANIF interface

D.

Sub-VLAN contains a physical interface that can establish a Layer 3 VLANIF interface

Question 69

As shown in the figure, in the HUB & Spoke networking mode of MPLS BGPVPN, in order to achieve the division can only communicate with the headquarters, the division can not communicate with each other When setting up RT, which of the following scenarios is this?( Radio).

A???:import Target:12:3EpodTarget:12:3

B. Headquarters: importTarget:1:1EpodTarget:3:3

C. Headquarters: Impot Target:2:2; Expor Target:3:3 D. Headquarters: importTarget: 12:3EpodTarget: 3:12

Options:

Question 70

The following description of the process of sending and receiving data frames in switch interface Access mode is correct? ( Single choice questions).

Options:

A.

In Access mode, labeled data frames are discarded directly when they are received.

B.

Access mode strips off the VLAN tag of the dataton when sending .

C.

Access mode receives only unlabeled data frames.

D.

When a data frame enters the switch interface, the switch learns the destination MAC address in the data frame.

Question 71

Regarding the WRR (Weight Round Robin) description of the error is ?( Multiple select).

Options:

A.

WRR avoids congestion in the network

B.

WRR guarantees that various queues are allocated to a certain amount of bandwidth

C.

WRR is a congestion management technique

D.

WRR can no longer use

E.

WRR on GE interfaces to ensure that critical services are prioritized for

Question 72

As shown in the figure, SWA, SWB runs the PSTP protocol, and Cost of Path remains the default without modification, so the following statement is correct

Options:

A.

GEO/0/1 on ASWB is Alternative port

B.

GE0/0/2 on SWB is Alternative port

C.

SWA On GEO/0/1 for backup port

D.

SWB will become the root bridge

Question 73

Because BGP is an EGP routing protocol, BGP routing policies can only be deployed between EBGP neighbors, and routing policies between IBGP neighbors are not valid.

Options:

A.

TRUE

B.

FALSE

Question 74

Regarding the mpLS handling mode of TTL, is the following description correct?

Options:

A.

Pipe mode. When an IP message passes through the MPLS network, the IPTTL minus 1 is mapped to the WLSTTL field at the incoming node.

B.

The TTL in the B. MPLS label has the same meaning as the TTL field in the head. TTL prevents mpLS networks from developing bad routing.

C.

Unifore style, when an IP packet passes through the MPLS network, the IPTTL of the incoming node is minus l. The MPLS TTL field is a fixed value.

D.

In MPLSVPI, if you need to hide the structure of the MPLS backbone network, you can use Uniform mode on Ingress for private network messages .

Question 75

What is correct below about LDP synchronization in ISIS?

Options:

A.

LDP synchronization can be turned on globally.

B.

LDP establishes neighbors faster than ISIS, so LDP synchronization is turned off by default

C.

LDP synchronization avoids traffic loss when the active-standby link is switched.

D.

LDP synchronization can be deployed on the Loopback interface.

Question 76

Run the SSM across the entire HW IP multicast network. The following about SSM understands correctly?( Multiple choice question)

Options:

A.

No RP is required

B.

SSM uses only shared trees

C.

SSM uses only the SPT tree

D.

Ideal for 1-to-many applications

E.

SSM is recommended when you have multiple sources and expect to minimize the state of mroute in your network Ideal for many-to-many applications

Question 77

MACsec provides users with secure MAC layer data sending and receiving services. Which of the following is not a service available by ACsec?

Options:

A.

User data encryption

B.

Data source authenticity verification

C.

Integrity check

D.

Controllability check

Question 78

R3 is not established with the RI's IS-IS neighbor, and according to the information in this figure, the possible cause is ?

Options:

A.

R3 duplicates the System ID of R1

B.

R3 does not match the IS-Level of R1

C.

R3 and R1 interconnection ports circuit-type do not match the lH authentication of

D.

R3 and R1

Question 79

What is the field that the IPv6 header has similar to the IPv4 header "Type of Service" field?

Options:

A.

Version

B.

Flow Label

C.

Next Header

D.

Traffic Class

Question 80

Four routers running IS-4S and an adjacency relationship has been established, the area number and the level of the router are noted in the figure, and the R4 reaches 10022/32 on the RI device Cost for how much?

Options:

A.

50

B.

80

C.

40

D.

30

Question 81

IsIS IPv6 cost 50 is configured under the interface, and the meaning of the command is ?

Options:

A.

The LEVEL-1 and Level-2 costs of the interface's IS-IS IPv6 are 50

B.

The LEVEL-1 and Leve1-2 costs of the INTERFACE's IS-IS IPv6 are both 60

C.

The LEVEL-2 cost of the interface's IS-IS IPv6 is 50

D.

The LEVEL-1 cost of the interface's IS-IS IPv6 is 50

Question 82

What are the following techniques for improving MPLS BGP VPN reliability?( Multiple choice question)

Options:

A.

dual home networking is configured at the access layer

B.

VPN FRR

C.

VPN GR Private IP routing between

D.

PE-CE FRR

Question 83

The correct description of the scene shown in the following figure is:

Options:

A.

LSDB

B.

R1, which exists in both Level-1 and Leve-2, can ping the interface address of R2 loopback0

C.

R there is a route to R2 loopback0 10022/32

D.

No neighbor relationship can be established between R1 and R2

Question 84

Compared to IPV4 multicast, which of the following descriptions is the characteristic of IP6 multicast?

Options:

A.

IPv6 multicast does not contain MSDP and dense mode

B.

The first 8bit IPV6 multicast address is always FF(11111111).

C.

IPv6 multicast clients use IGMPv3 to join multicast groups

D.

IPv6 multicast load sharing extends the multicast routing rules and is completely independent of RPF check

Question 85

You want to set the DSCP value of VolP traffic in HW network devices to EF. According to the differentiated service model RFC, traffic token EF should be set to:

Options:

A.

DSCP is set to decimal 36

B.

IP ToS is set to OXEF

C.

IP Experimental ECN

D.

DSCP is set to decimal 5

E.

Bitstream 101110

Question 86

As shown in the figure, three switches SI, SN2, and SN3, where SN1 is the root bridge between S1 and SN2 Now that link support SN2 cannot receive the configuration BPDU sent by the root car, the administrator needs to configure which spanning tree protection mechanism to prevent the problem of link congestion?

Options:

A.

root protection

B.

Anti-TC-BPDU attack

C.

BPD protection

D.

Loop protection

Question 87

A workstation is connected to an Ethernet switch in the work through a super-class 5 wire, the workstation can access the entire network (that is, full connection) through the switch, but the access rate is much lower than expected, when viewing the switch interface statistics, you can detect that there are many ultra-small frames, with software to read the statistics of the workstation network card, found that there are Many FCS and frame alignment errors, what causes the machine to cause these errors?

Options:

A.

The rate mismatch between the workstation and the switch

B.

Interface mismatched to an 8021Qtrunk interface

C.

The line between the workstation and the switch has been completely damaged

D.

The operating mode between the workstation and the switch does not match

E.

The network interface card on the workstation is damaged

Question 88

Regarding BGP MED, which of the following descriptions is correct?

Options:

A.

In the BGP routing rules, MED has a lower priority than AS Path, Praferred-value, Local-Preference, etc Origin

B.

The default value for the B. BGP routing MED is 0

C.

By default, if there is no MED value in the route attribute, it is processed by 0 If the bestroute med-none-as-maximum command is configured, MED is processed as the maximum 4294967295

D.

By default, BGP routing rules can MED comparison of routes from different autonomous systems

Question 89

In Huawei switches, the hybird port can select vlan1 as an untagged vlan

Options:

A.

True

B.

False

Question 90

The command to adjust the LINK cost value for the IS-IS interface is ?( Radio)

Options:

A.

ISIS cost

B.

ISIS timer hello

C.

lSIS circuit type

D.

ISIS circuit level

Question 91

Which IPV6 address would you ping to confirm that OSPFv3 is capable of pastoring unicast messages over the link?

Options:

A.

Site local Multicast

B.

Anycast Address

C.

Global Address of the link

D.

Unique Local Add

E.

Link Local Address

Page: 1 / 61
Total 610 questions