Uploaded by berndl

H12-891

advertisement
Question: 1
What are the following advanced features supported by BGP EVPN?
A. ARP broadcast suppression
B. VRRP overVXLAN
C. Multi-active gateway
D. WI-AN Qos
Answer: ABCD
Explanation:
Question: 2
Is the following correct statement for the VXLAN message?
A. The outer destination IP address is the IP address of the VTEP at the far end of the VXLAN tunnel
B. The source UDP port number is 4789
C. The destination UDP port number is 4789
D. VNI has 24 T bits to distinguish the VIAN segment
Answer: ACD
Explanation:
Question: 3
To achieve an on-machine migration in the BGP EVPN distributed gateway scenario, which of the
following messages is required?
A. Type5
B. Type4
C. Typel
D. Type2
E. Type3
Questions & Answers PDF
P-3
Answer: D
Explanation:
Question: 4
The means of the LAND attack is that the attacker sends an SVN packet message with the same
source and destination addresses to the target host, the source port and the destination port are the
same, and the receiver waits for the final ACK packet to be sent , the connection is always in a semiconnected state, resulting in a full limited TCP reception Waste of resources
A. True
B. False
Answer: A
Explanation:
Question: 5
The following statement about the Security Alliance SA in IPSec is wrong with ?
A. SA is uniquely identified by a triple that includes the Security Parameter Inder ,Security Parameter
Inder), the source IP address, and the Security Protocol Number (ASESP) used
B. Use the display ipsec command to view information such as the encryption method used with
another IPSEC peer, the traffic of interest, and so on.
C. IPSec only supports encrypting data using the pair encryption algorithm.
D. IpSec peers must be at a two-way SA to establish an IPSec VPN connection to
close
Answer: A
Explanation:
Question: 6
If there are multiple recipients in a multicast group, the administrator enables the IGMP-Snooping
function on the switch connecting the recipient, and when the receiver receives the universal group
query packet of the queryer from the switch, how should multiple recipients respond?
A. The first recipient whose response time time expires sends the Report message, the other
receivers do not.
B. All recipients will respond to Report messages only if ICMPV2 is running.
C. All recipients will respond to the Report message only if IGMPvl is running.
D. All recipients will respond to the Report message
Answer: D
Explanation:
Questions & Answers PDF
P-4
Question: 7
If you run PIM-SM in a multicast network, you need to build a multicast forwarding tree between the
multicast source and the receiver to enable the receiver to receive the multicast effect, so what are
the following options for the correct tree sketch for the build?
A. What is built between the multicast source and the RP is the SPT tree
B. RP and the receiver is built between the RPT tree
C. Built between the RPT tree
D. RP and the swap is the SPT tree
Answer: AB
Explanation:
Question: 8
Is the following description of the BSR/RP mechanism correct?
A. PIM-SM domain can have more than one C-BSR, but only one BSR can be elected by the C-BSR
that receives the C-RP Packets are collected C-one RP information
B. BSR advertises BSR and C-RP information to all routers in the PIM-SM domain by flooding
Bootstrap packets
C. A C-BSR can also collect C-RP information by receiving C-RP packets
Answer: ABC
Explanation:
Question: 9
What is the following description of LDP reliability?
A. LGP GR (Graceful Restart) takes advantage of the high difference between the LS forwarding plane
and the control plane to realize that the device forwards without interruption when the protocol is
restarted or the master-standby is reversed
B. Manually configured LDP FRR policy defaults to a 32-bit backup route that triggers LDP to establish
a backup ISP
C. The LDP ERR can also generate an ISP for a tag map from a non-optimal next hop, and create a
forwarding table entry as a backup of the primary LSP
D. LDP and LGP linkage, the need for IGP to suppress the release of routes, to ensure that LDP and
LGP paths are consistent
Answer: B
Explanation:
Question: 10
Questions & Answers PDF
P-5
RD is used to distinguish the same IP address in different VPNs, how many bits does RD contain ?
(Single choice)
A. 64
B. 32
C. 16
D. 128
Answer: A
Explanation:
Question: 11
Regarding the mpLS handling mode of TTL, is the following description correct?
A. Pipe mode. When an IP message passes through the MPLS network, the IPTTL minus 1 is mapped
to the WLSTTL field at the incoming node.
B. The TTL in the B. MPLS label has the same meaning as the TTL field in the head. TTL prevents
mpLS networks from developing bad routing.
C. Unifore style, when an IP packet passes through the MPLS network, the IPTTL of the incoming
node is minus l. The MPLS TTL field is a fixed value.
D. In MPLSVPI, if you need to hide the structure of the MPLS backbone network, you can use
Uniform mode on Ingress for private network messages .
Answer: B
Explanation:
Question: 12
In an MPLS VPN network, different CE devices exchange routing information with the same PE
device using different routing protocols, and different CE devices use routing protocols that are
independent of each other
A.
True
B. False
Answer: A
Explanation:
Question: 13
Which of the following options uses an alternate channel to enable communication between IPV6
addresses?
A. DualStack
B. 6to4
Questions & Answers PDF
P-6
C. ISATAP
D. NAT64
Answer: BC
Explanation:
Question: 14
If a router only needs to forward iPv6 packets, you do not need to configure any IPV4 agreements
and addresses on that router.
A. True
B. False
Answer: A
Explanation:
Question: 15
BGP4+ is running between two routers, and the neighbor relationship is normal, but the BGP routing
table of the router on this side does not have a neighbor route entry.
A. The route entry in the peer BGP route table is non-optimal.
B. The next hop address of the
C. BGP route entry is unreachable
D. Peer ignore is configured on the peer
E. The peer is configured with active-route-advertise
Answer: ABD
Explanation:
Question: 16
Which of the following options can affect the establishment of IBGP neighbors?
A. iBGP-Multi-hop is not configured
B. Authentication is unsuccessful
C. IGP routing is not passable
D. BGP protocol version inconsistencies
Answer: BCD
Explanation:
Question: 17
Which of the following tools cannot be referenced directly by the If-match clause in Route-policy?
Questions & Answers PDF
P-7
A. Regular expression
B. IP-prefix
C. AS-path-filter
D. Community-filt
Answer: A
Explanation:
Question: 18
What information does this contain in a basic layer packet? (Multiple choice) A Data link layer header
B. Upper-level data
C. The network layer header
D. path records
E. Network Layer Tail
Answer: BC
Explanation:
Question: 19
The correct description of configuring BGP4+ is that
A. BGP4+ does not support route reflectors.
B. The next hop of a B. BGP4 route can use the Link-Local address.
C. BGP4 configures the reflector, the role positioning of the reflector and the client needs to be
consistent with the configuration of BGP4
D. BGP4 specifies p
E. BGP4+? Router-ID ? BGP4 ? Router-ID—??
Answer: BE
Explanation:
Question: 20
A company network runs the OSPF protocol, a project in order to understand the OSPF mechanism in
the network to perform packet transfer operations, the following description of ospf messages is
correct?
A. The interface sends a Hello packet immediately after joining the OSPF region
B. LS update packet is sent only when the adjacency relationship is established
C. When an LsUpdate packet is received, the router must send an LsAck acknowledgment
D. LS update packet synchronizes the link state database by sending detailed LSA information
2
Answer: AD
Explanation:
Questions & Answers PDF
P-8
Question: 21
Regarding the Stub region in the OSPF protocol , the following statement is correct.
A. ASBR cannot exist in the Stub zone
B. Virtual connections cannot traverse the Stub region.
C. Injecting typeT LSA
D. backbone areas that are not allowed in Stub regions cannot be configured as Stub regions.
Answer: ABCD
Explanation:
Question: 22
The LSA of type certainly does not exist in the 220SPF Stub zone
A. Type7
B. Type5
C. Type4
D. Type3
Answer: ABC
Explanation:
Question: 23
There is an existing router running OSPF connected to Zone 0 and Zone 1 You configured Zone 1 as a
stub zone, what classes does LSA that only operates inside Zone 1 include?
A. 7 ? LSA
B. 1 ? LSA ? 2 ? LSA
C. I LSA,2 LSA 5 LSA
D. 3 ? LSA ? 4 ? LSA
E. 1 LSA,2 LSA 3 LSA
Answer: E
Explanation:
Question: 24
An engineer performed the ingestion operation on an OSPF router in a network of the company, is
the following statement about the introduction of the routing LSA correct?
Questions & Answers PDF
P-9
A. The A. Advertising Router report is set to as the Router ID of ASBR
B. Net Mask is set to all 0
C. Link State lD is set as the destination network segment address
D. Using the Link State ID and Advertising Router, you can uniquely identify an LSA
Answer: AC
Explanation:
Question: 25
In broadcast networks, elections to DIS begin only after a neighbor relationship has been established
A. True
B. False
Answer: A
Explanation:
Question: 26
Which of the following statement about isis protocol route aggregation is correct?
A. Route aggregation can be configured and takes effect on all types of routers
B. Route aggregation can only take effect if configured on Leve-1 port routers
C. Route aggregation can only be configured on Leve-2 routers to take effect
D. Route aggregation can only be configured on Leve-1-2 routers to take effect with
Answer: A
Explanation:
Question: 27
ISIS does not send CSNP packets under the P2P network type during the neighbor establishment
process.
A. True
B. False
Answer: B
Explanation:
Question: 28
In 0SPFv3 , Router-LSA is generated by each router, which describes the interface address and cost of
each link of the router, and also includes the RouterlD of the neighbor router
Questions & Answers PDF
P-10
A. True
B. False
Answer: B
Explanation:
Question: 29
Is the following GR description of ISIS correct?
A. The GR feature of AISIS is turned on by default.
B. ISIS's GR has a total of four timers.
C. ISIS's GR notifies of events and maintains neighbor relationships through CSNP messages.
D. ISIS's GR defines a new TLV structure to support this feature.
Answer: D
Explanation:
Question: 30
Both the CSNP packet of ISlS and the DD packet of OSPF have a role in the MA network, describing
the role of the link state database summary, which is correct compared to the following statements
of these two types of messages
A. Both packets need to be confirmed to the terminal router after being sent, otherwise they need to
be retransmitted
B. Once the adjacency relationship is established, the CSRP packet and the D message will stop
sending
C. The two packets do not need to be confirmed to the router after they are sent the master-slave
relationship in the DD message interaction of
D. OSPF is not identity bound to dr/BDR; the CSN message is generated only by DIS
Answer: D
Explanation:
Question: 31
Regarding route introduction, what is the following description of the error?
A. BGP supports both import and network when generating routes, and the network mode is more
precise.
B. By default, OSPF introduces an external route with a default metric of 1, and the level-2 network
of the ingested external route type type, Type2
C. ISIS, routes to Level After the 1 makes a route ingestion, if you do not manually configure the
ingestion policy, a bad route will be formed.
Questions & Answers PDF
P-11
D. Introducing IBGP routing in OSPF may cause routing loops
Answer: C
Explanation:
Question: 32
The following description of the RD attribute filter for BGP is correct?
A. If RD-filter is not configured, but the RD-filter is referenced for filtering, the matching result is
deny.
B. If RD-filter is configured, but the routed RD is not matched with any of the RDs defined in the rule,
the default match result is permit.
C. Multiple rules are matched in the order in which they are configured.
D. There is always an "or" relationship between the rules configured by RD-filter.
Answer: CD
Explanation:
Question: 33
The following description of the Lsp shard extension for ISIS is correct?
A. Enables is routers to generate more LSP shards to carry more ISIS information.
B. Isis' shard extension is equally valid for Hello packets.
C. Shard scaling for ISIS is achieved by adding virtual systems, up to 1000 virtual systems.
D. The isis router can produce a maximum of 1024 shards.
Answer: A
Explanation:
Question: 34
?? Route ? Policy ??:ip community-filter Ipermit 100: 1 ip as-path-filter 2 permit ^I00$ route-policy
test permit node 10 if-match communityfilter 1 if-match as-path-filter 2 apply
as-path 200 Is the above configuration description correct?
A. The BGP route matches the above only if the BGP route carries a community attribute value of
100:1 or if the AS PATH is 100 route one policy. The AS-one PATH attribute that matches the route is
changed to 200
B. The BGP route matches the above only if the BGP route carries a community attribute value of
100:1 and the AS-One PATH is 100 route policy? The AS-PATH nature of the matching route is
changed to 200
C. Only if the BGP route carries an AS-PATH of 100, the BGP route matches the route one policy
Questions & Answers PDF
P-12
above. The AS-one PATH attribute that matches the route is changed to 200
D. As long as the BGP route carries a community attribute value of 100:1, the BGP route matches the
route-policy above The AS-PATH attribute of the matching route is changed to 200
Answer: B
Explanation:
Question: 35
When DLDP detects the presence of a one-way link in the fiber, the default actions of Huawei
equipment include: the DLDP state machine migrates to the Disable state, outputs Trap information,
and automatically sets the interface to a blocked state.
A. True
B. False
Answer: A
Explanation:
Question: 36
What are the main reasons why RSTP converges faster than STP?
A. RSTP increases the variety of port states
B. RSTP has a smaller overhead
C. RSTP does not converge based on timer
D. RSTP has a smaller timer
Answer: C
Explanation:
Question: 37
The following description of the characteristics of cross-domain VN-Optionc is correct?
A. A maximum of two layers of tags need to be used in the message forwarding process.
B. VPMV4 routes are not saved on the ASBR, and VPNv routes are not advertised to each other.
C. VPN routes are exchanged directly between the ingress PE and egress PE and do not require an
intermediate device to secure a circular VPN route.
D. Cross-domain VN-Optionc, which is not suitable for use when spanning multiple AS.
Answer: BC
Explanation:
Question: 38
Questions & Answers PDF
P-13
What is the following description of MPLS incorrect?
A. The length of the MPLS tag is 20 to 20 for packet forwarding.
B. The tag space range of dynamic signaling protocols such as LDP, M P-BGP is 16 to 1023
C. When using the TTL processing method of Pipe mode, the IP packet transmits the TTL of the IP
packet over the IPLS network. The value is only minus 1 for the MPLS in and out nodes.
D. MPLS supports multi-layer label nesting, and the S bit value of the innermost label is 1.
Answer: B
Explanation:
Question: 39
What of the following actions can enable fast failure detection on multicast networks?
A. Shorten the Holdtime of Join/Prune messages
B. Reduce the interval at which the interface sends Hello messages
C. A PIM BFD session is established between neighbors
D. Reduce the interval between sending Join/Prune messages
Answer: B
Explanation:
Question: 40
If the PIM-SM protocol is running in a multicast network , you need to configure RP, and the
configuration equation of RP is divided into dynamic RP and static RP. The following configuration
description of the RP is correct (radio).
A. When you configure Dynamic RP , you need to configure BSR as a backup of the RP.
B. When you configure a static RP , you need to configure the BSR to advertise the RP information.
C. When configuring a static RP, you need to specify the information for the RP on all PIM routers.
D. When you configure Dynamic RP, you do not need to configure BSR.
Answer: C
Explanation:
Question: 41
What is the following correct for the process of registering the source-side DR with RP in PIM-SM?
A. Encapsulated in the registered message is multicast service data
B. RP sends a registration stop message as soon as it receives the registration message.
C. Registered messages are used to build the RPT tree between source DR and RP
D. Registered packets are multicast packets.
Questions & Answers PDF
P-14
Answer: A
Explanation:
Question: 42
In a multicast network, what causes multicast traffic to not forward properly?
A. The router does not have an RPF route
B. PIM is not enabled on the RPF interface
C. The upstream router will receive the PIM Join message dropped
D. Multi-router egress network, this router is not DR
Answer: ABC
Explanation:
Question: 43
IPSGs can statically configure binding tables or form binding tables by using them with DHCPSnooping
A. True
B. False
Answer: A
Explanation:
Question: 44
Which of the following are single-packet attacks?
A. Special control message attacks
B. Scan Probe Attack
C. DDos Attack
D. Malformed Message Attack
Answer: ABD
Explanation:
Question: 45
What is wrong with the following statement about digital certificates?
A. Digital signatures guarantee the integrity of digital certificates.
B. Digital certificates contain public key information.
C. Authentication fails when the peer certificate is received within the validity period, but the device
Questions & Answers PDF
P-15
itself is in the wrong time if it is not within the validity period of the certificate.
D. Even if two PRI entities are not in the same CA system, authentication can be completed as long as
both parties can recognize each other's CA.
Answer: D
Explanation:
Question: 46
What is the relationship between CIR, BC and TC? (single select)
A. CIR=TC/BC
B. CIR=BE/TC
C. TC=CIR/BC
D. TC=BC/CIR
Answer: D
Explanation:
Question: 47
WRED is configured on the newly deployed router HW. What is the correct description of the WRED
features below? (Multiple choice questions).
A. WRED can set different drop thresholds and packet loss rates for packets of different priority
B. When the flow exceeds the minimum threshold, WRED begins to discard all inlet flow (tail drop)
C. Avoid global synchronization by selectively dropping multiple TCP streams
D. Low-bandwidth traffic is easier to drop than high-bandwidth traffic
Answer: AC
Explanation:
Question: 48
Regarding the FTP protocol, is it correct in the description below?
A. In ftP-style, the client completes the initialization of the TCP session for control and data
B. In ftP Activee, the server side tells the client which port it expects to send data on by commanding
"PORT"
C. FTP always uses a TCP session to transmit control information and data information
D. FTP always uses the TCP port to establish a data session and ICP port 21 to establish a control
session
E. FTP always uses TCP port 21 to establish a data session and TCP port 20 to establish a control
session
Questions & Answers PDF
P-16
Answer: A
Explanation:
Question: 49
If a Huawei switch runs the RSTP protocol, when will the BPDUs on a port on the switch be aged?
A. On the interface, RSTP does not age BPDU
B. After more than 6 seconds
C. After Ma ge times out
D. After Hello time times out
E. after the Forward Delay timeout
Answer: C
Explanation:
Question: 50
In the use of the CP protocol, the following description is correct?
by frequent oscillation interfaceethA. The Eth-Trunk interface can be avoided
trunkllacppreemptenablelacppreemptdelaydelay-time by following command
B. Source A address can be configured for load sharing in an enabled link aggregation group with the
following command: interface eth-trunk 110ad-balance src-dst-ip
C. A member interface can be removed from an enabled link aggregation group with the following
command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 undo eth-trunk
1 interfaceGigabitEthernet0/0/1undoshutdown
D. The member interface can be joined in the link aggregation group by enabling the following
command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 trunkport
Answer: A
Explanation:
Question: 51
Which of the following are used in Ethernet?
A. A MAC address in a non-canonical format
B. CSMA/CD in multiplexed interviews
C. Mac address in canonical format
D. 8025 encapsulated frames
E. 8023 Encapsulated Frame
Answer: BCE
Explanation:
Questions & Answers PDF
P-17
Question: 52
In RSTP , which port provides a backup path to reach the root node of the spanning tree? What state
is the port in?
A. Root Port and Listening Status
B. Alternate Port and Forwarding Status
C. Alternate Port and Learning Status
D. Designated port and Listening status
E. Alternate port and Discarding status
Answer: E
Explanation:
Question: 53
ISlS protocol In broadcast networks and P2P networks, when the router receives LSP, it needs to use
PSNP to confirm and ensure the synchronization of LSDB
A. True
B. False
Answer: B
Explanation:
Question: 54
The following statement about isis protocol LSP messages is correct
A. The isP rapid diffusion feature, which first diffuses out LSPs that are smaller than a specified
number , speeding up the synchronization process of LSDB
B. By configuring an LSP-generated smart timer, the timer automatically adjusts the delay time based
on the frequency at which the routing information changes
C. As link status information increases, the packet length of the LSP can be increased so that each
ISP can carry more information.
D. Reducing the minimum interval at which LSPs are sent per port can speed up the diffusion of
LSPs.
Answer: ABCD
Explanation:
Question: 55
Questions & Answers PDF
P-18
Router RI and Router R2 run BGP. Both routers are in the AS65234 The route for router R2 exists in
the BGP routing table of the router RI, but not in the IP routing table of the router RI . So what
causes the problem to occur? (Single Choice Questions).
A. Synchronization is turned off
B. The B. BGP neighbor relationship is Down
C. Router R1 does not enable BGP Multi-hop
D. Routing is not optimal
Answer: D
Explanation:
Question: 56
Regarding the OSPFv3 protocol, what is the error described below?
A. Under the sukugan of a shared router, each OSPFv3 process runs independently
B. Multiple instances can be run in the same OSPFv3 under the same interface
C. Can support running multiple instances on a single link
D. OSPFv3 message header will contain instance IDFu Duan flogging
Answer: B
Explanation:
Question: 57
The following is the correct statement about the LSA of OSPFv3?
A. Inter-AreaPrefix-SA's LinkStatelD contains the prefix
B. Router-LSA and Network-LSA does not contain routing information
C. When the Intra-AreaPrefixLSA's ReferencedLinkStateType-2, referencedLinkStatelD contains the
interface to DR ID
D. Inter-AreaPrefirLSA also contains LinkLocal information file
Answer: B, C
Explanation:
Question: 58
Router HW enables OSPF and router HW has the role of ABR and is configured with abr-summary,
then which class LSA Will it be aggregated?
A. 1 Class LSA
B. 2 kind LSA
C. 3 kind LSA
Questions & Answers PDF
P-19
D. 4 kind LSA
E. 5 Class LSA
Answer: AB
Explanation:
Question: 59
In Huawei devices, when SIS introduces external routes and sets external route tags for route
information, the Metric type of ISIS does not need to be modified and remains default.
A. True
B. False
Answer: B
Explanation:
Question: 60
There is an existing router interface serial 0 in OSPF area 1 , well will interface Serial 0 is set to silent
interface. So what is the impact of this setting?
A. OSPF establishes usable adjacencies through this junction
B. OSPF does not join the routes learned from the connector to the local routing table
C. OSPF does not establish any adjacency relationships through the junction
D. OSPF receives a route update answer from the neighbor.
Answer: C
Explanation:
Question: 61
The Option field in OSPFv3 appears in all LSAs
A. True
B. False
Answer: B
Explanation:
Question: 62
Is the following information about BGP4+ described correctly?
A. BGP4 can use dampening commands to suppress oscillations on IBGP routes.
B. Modifying the RouterID of BGP causes the BGP connection between routers to be re-established.
Questions & Answers PDF
P-20
C. The Next Hop attribute in BGP4+ is represented by an IPv6 address, which can be the link-local
address of the next hop.
D. BGP4+ does not support route auto-aggregate
Answer: AB
Explanation:
Question: 63
Is the following description of ospf virtual links correct?
A. A virtual connection can be established in any area, after which it itself belongs to the region
B. The virtual connection ip is used as the link address
C. Virtual links can be used to solve the problem of zone 0 being segmented
D. The cost of a virtual connection is zero and is the optimal link
Answer: C
Explanation:
Question: 64
What kind of scenario can use AS one path and one filter?
A. Filter routes received from BGP neighbors based on the AS PATH attribute that the route carries.
For example, the command peer x.X.x.x as path-filter import
B. The apply clause in Routepolicy
C. Filter routes sent to BGP neighbors based on the AS PATH attribute that the route carries. For
example, the command peerx. X.x.x as path-filter export
D. If-natch clause answer in Route-policy.
Answer: ACD
Explanation:
Question: 65
Without dividing the zone, is the following description of the link state routing protocol correct?
A. Each router establishes a topology for the entire floodplain
B. Each router learns route entries directly from the route update and adds them to the routing table
C. Routers in the flood domain may receive the same link state information repeatedly
D. Routers throughout the flood domain have the same database of wrong-state states
E. The router will send all the mis-routing status information from one neighbor to all other
neighbors to ensure the synchronization of the database
Answer: ACD
Questions & Answers PDF
P-21
Explanation:
Question: 66
If the OSPP protocol is running in the network , after configuring the non-backbone area in the OSPP
area as the Totally Stub region, the ABR router sends a message to Totally. The Stub region issues an
LSA with an LS ID of 0000, and what type of LSA is the LAS to?
A. LSA5
B. LSA2
C. LSA1
D. LSA3
Answer: D
Explanation:
Question: 67
If an administrator wants to manage certain routes on the router during operations, the following
tools are listed below. These routes can be flagged so that administrators can configure policies
A. If the BGP protocol is running, the route is marked with the community attribute
B. Use ACLs to tag routes on the router.
C. Use the Tag value to mark the route on the router.
D. Use ipprefix to tag routes on the router.
Answer: AC
Explanation:
Question: 68
An existing router running BGP, HW1, has both IBGP neighbors and EBGP neighbors configured on
the router. Are the IP Neighbors and EBGP Neighbors described below correctly?
A. The router will be connected directly from its EBGP IBGP neighbor, otherwise, IBGP-Multi-hop
must be configured
B. The router sends BGP updates learned from its EBGP neighbors to its other IBGP neighbors and
EBGP neighbors
C. IBGP neighbors can establish neighbor relationships through Loopback engagements
D. The router sends BGP updates learned from its IBGP neighbors to its other IBGP neighbors and
EPGP neighbors
E. EBGP neighbors must be directly connected, otherwise, EBGP-Multi-hop must configure
Answer: BCE
Explanation:
Questions & Answers PDF
P-22
Question: 69
After BGP introduces routes for other protocols, the next hop in the BGP routing table is consistent
with the next hop of the introduced routing protocol
A. True
B. False
Answer: B
Explanation:
Question: 70
In addition to stateless address autoconfiguration, IPV6 devices can also obtain addresses, gateways,
DNS, and other information through DHCPv6
A. True
B. False
Answer: B
Explanation:
Question: 71
In an IPv6 network, two nodes A and B are neighbors to each other if Node A sends NS messages to
Node B if node B is B After receiving the message, reply to the NA message, then view it on node A,
what will the neighbor status be marked? (Single Choice Questions).
A. Reachable
B. Incomplete
C. Stale
D. Probe
Answer: A
Explanation:
Question: 72
In an MPLS IBGP VPN environment, if tags are distributed only through BGP, LDP, the MPLS tags for a
message can be up to two layers of tags.
A. True
B. False
Answer: A
Explanation:
Questions & Answers PDF
P-23
Question: 73
Regarding the cross-domain VPN-OptionB scenario, what is the following description incorrect?
A. In the process of packet forwarding, the private network LSP of the VPN should be exchanged
once on the two ASBRs An EBGP neighbor relationship.
C. Cross-domain VPN An Option
B. scheme is not limited by the number of interconnection links between ASBRs
D. The outer layer label is exchanged between two ASBRs to VPNv4 routes.
Answer: D
Explanation:
Question: 74
Command IP as-path-filter1 permit^12,*74$ can match to which AS_PSTH?
A. AS_PATH(321122374)
B. AS PATH Q236217 ? 2374)
C. AS_PATH(125 328 74 23)
D. AS_PATH(32127423)
Answer: B
Explanation:
Question: 75
You need to configure smart policy routing on the router to specify that specific traffic is forwarded
through an interface. When policy-based routing is applied, what are the two most typical types of
information that can be used to forward traffic along a particular path?
A. The TTL and source IP address of the packet
B. Source A address and the Layer 2 source address
C. Source IP address and specific protocol (such as FTP, HTTP, etc.)
D. Service type header and message length
Answer: C
Explanation:
Question: 76
Cross-device link aggregation realizes the back-to-back transmission of data traffic and the mutual
Questions & Answers PDF
P-24
spare of the heap member switches, but due to the limited bandwidth of the heap cable between
the heap devices, the forwarding efficiency can be improved in the following ways?
A. Enable traffic to be forwarded locally first
B. Connect the stacking device via a stacking card
C. Configure the stacking system MAC address switching
D. Enables the stacking multi-master check function
Answer: A
Explanation:
Question: 77
s the following description of THE MUX VLA N in huawei switches correct?
A. MUX VLAN ??Principal VI-AN ?Subordinate VI-AN ???Separate VLAN ? Isolate VLAN
B. Each Separate VLAN can bind multiple Principal VLANs
C. Under the same VLAN, muX VLANs can be mixed with SuperVLANs
D. The Principal port can pass the answer to all ends within the MUX VLAN
Answer: D
Explanation:
Question: 78
The fields that represent priority in the VLAN (8021Q) data encapsulation are a total of 6 bits.
A. True
B. False
Answer: B
Explanation:
Question: 79
Router R1 runs the OSPF protocol, use the "display ip routing-table" command to view the routing
table of the router R1, the following about the OSPF in the routing table Is the information
described correctly?
A. In the routing table, route table entries identified by the "OSPF" identifier can only be learned
through LSAs of Type 3
B. In the routing table, the routing table entries identified by the "OSPF" identifier can only pass
Class 1 LSA
C. In the routing table, the routing table entries identified by the "OSPF" identifier can be learned
through the 1/2/3/5 LSA
D. In the routing table, the routing table entry identified with the "O_ASE" identifier can only be
Questions & Answers PDF
P-25
learned by routing introduction
Answer: D
Explanation:
Question: 80
The following statement about the five types of LSAs in OSPF is used to pass external routes, and the
following statement about the five types of LSAs is incorrect and flooding in
A. OSPF networks in non-Stub/NSSA regions
B. Routers in the same zone as ASBR can calculate external routes by chanting the LSA and the five
types of ISAs in the region
C. The FA address is included in the five types of LSAs, and the FA address is 000 only as reserved for
no practical purpose
D. Configuring the appropriate filtering policy on the ABR or ASBR can filter five types of LSAs
Answer: C
Explanation:
Question: 81
Regarding the certification of the ISIS protocol, there is a correct statement
A. Connection authentication can realize the authentication of the hello messages of Leve-1 and
Leve-2
B. After configuring the connection authentication, the IIH issued by the router must carry the
authentication TLV
C. After configuring zone authentication, the router issues an IIH, SNP, LSP—strap-to-tape
authentication TLV
D. The two routers are configured for area authentication and interface authentication, and the
passwords are the same, so the two can establish an isocopied relationship
Answer: AB
Explanation:
Question: 82
If the Option field value in the 0SPFv3 Hello message issued by the router's GIgabit Ethermet0/0
interface is 0x000013, the following description is correct
A. The Gigabit/thernetO/0/0 interface of Router A adds IPv6 routing to compute
B. Router A's Gigabit/thernetO/0/0 interface belongs to the NSSA zone
C. Router A supports AS-An External-LSA flood
D. Router A is an OSPFv3 device with forwarding capability
Questions & Answers PDF
P-26
Answer: ACD
Explanation:
Question: 83
Regarding the BGP ring protection mechanism, is the following description correct?
A. The AS_ PATH attribute is used between autonomous systems to prevent ring cats
B. The Cluster List property is used for loop guard within the reflector cluster, and the router rejects
the route when it finds that the Cluster List of the route entry contains its own Cluster ID.
C. Routes learned from IBGP are not advertised to IBGP neighbors and are used to prevent routing
loops inside the AS.
D. You can use the AS_ CONFED_SET attribute to prevent loops within a consortium.
Answer: ACD
Explanation:
Question: 84
Regarding Route Policy, is the following description correct?
A. Advanced ACLs can be applied in route-policy to filter routes
B. The table entries pernit::0 Less an equal 128 indicate that all IPV6 routes are allowed through
C. If more than one node is defined in Route one policy, there should be at least one node in each
node that matches permit
D. Route one policy filters only the default route
Answer: BCD
Explanation:
Question: 85
Which of the following routing tools is unique to BGP?
A. Route-policy
B. ACL
C. IP-prefix
D. AS-path-filter
Answer: D
Explanation:
Question: 86
Questions & Answers PDF
P-27
The following is the correct description of the aggregation of BGP? (Single Choice Questions).
A. After you configure aggregate ipv4-address mask , only aggregate routes are published, not detail
routes.
B. For IPv6 routing, BGP supports manual coalescing and automatic aggregation
C. By default, BGP enables automatic aggregation
D. You can manually aggregate the routes in the BGP local routing table with a profile
Answer: D
Explanation:
Question: 87
The following about BGP routing, what is the wrong description?
A. Non-aggregate routes take precedence over aggregate routes.
B. In the case of PrefVal, Local_Preference equality, if the BGP preference of the locally generated
route, IBGP route, EBGP route is equal, the valid reference of this generation is preceded by priority.
C. See the following entry in the BGP routing table: • *172 16 1. 11/32 0 00010 0? Indicates that the
route is available non-optimal.
D. For next_hop unreachable routes are invalid cat by and do not participate in the preference.
Flogging case
Answer: A
Explanation:
Question: 88
The following description of Filter-Policy is correct?( Radio neck).
A. With Filter-Policy, on ASBR in OSPF, you can filter the generation of type5 LSA and type7LSA.
B. Prefix lists can be used to filter both routes and packets.
C. Filter-policy filters the link state information received or published, and can modify the properties
of route entries.
D. When using a prefix list to filter routes, the table entry ip-prefix 1 deny 0000 0 less-equal
32 matches only the default route.
Answer: A
Explanation:
Question: 89
When deploying the ISIS protocol in an IPv6 environment , the following statement is correct
(single choice).
A. By default, the DIS priority for broadcast network interfaces at Level-1 and Level-2 is 1
Questions & Answers PDF
P-28
B. In broadcast networks, IPv4 and The DIS priority for IPv6 can be set separately
C. In the same broadcast network. If each router supports both IPv4 and IPv6 The DIS for IPv4 and
IPv6 must be the same device
D. IS-IS is configured under the finger port is ISIS silent, this interface will not send ISIS packets, but
will receive ISIS packets
Answer: C
Explanation:
Question: 90
A lot of overwave techniques have emerged in the process of replacing the IPV4 addresses used in
the network with lP6 addresses. These technologies are divided into two categories, one is IP4IPV6
coexistence technology, the other is PA/IP>6 interoperability technology, which of the following
options sleep in IPv4/IPv6 coexistence technology?
A. NAT64
B. IPv6 over IPv4
C. Dual Stack
D. ISATAP
Answer: BCD
Explanation:
Question: 91
In cross-domain VPN-OptionB packet forwarding, two ASBRs exchange the same LSP tags once.
A. True
B. False
Answer: B
Explanation:
Question: 92
In the city, that is, mpLS BGPVPN network, when the packet enters the public network forwarding, it
will be encapsulated with two layers of MPLS tags, the following description of the two layers of tags,
the error is ?
A. Private network tags are carried and distributed by MP-BGP when routing, and public network
tags are distributed by the LDP protocol.
B. MPLS BGPVPN uses two layers of tags: public labels (also known as outer labels) and private
network labels (also known as inner labels).
C. By default, the router assigns the same tag value to all VPNv4 routes destined for the peer
D. The egress PE uses the inner tag when determining which egress CE the message should be sent
Questions & Answers PDF
P-29
to.
Answer: C
Explanation:
Question: 93
The following description of the LDPLSP establishment process is correct?
A. By default, LSRs are for the same FEC, and the received tag mappings can only come from the
optimal next hop, not from the non-optimal next hop.
B. When a network topology change causes the next hop neighbor to change, the free label keep
method is used. LSR can quickly rebuild the LSP by directly using the labels sent by the original nonoptimal next-hop neighbor. Liberal needs more memory and tag space.
C. In the DoD mode of label publishing, for a specific FEC, the LSR does not need to obtain a label
request message from upstream to distribute the label.
D. The process of establishing a D. LSP is actually to bind the FEC to the tag and advertise this binding
to the LSP upstream LSR process.
Answer: BD
Explanation:
Question: 94
What improvements have been made to the IGMPv2 protocol compared to IGMPv1? ( Multiple
Choice)
A. Added maximum response time field
B. Added high group messages
C. Added specific group query message
D. Added a specific source group query packet
Answer: ABC
Explanation:
Question: 95
Which of the following attacks are DoS (Denial of servioe) attacks?( Multiple choice question)
A. Single packet attack
B. Source P address spoofing attack
C. Man-in-the-middle attack
D. Flood Attack
Answer: AD
Explanation:
Questions & Answers PDF
P-30
Question: 96
Configure queue-based traffic shaping, which defaults to tailing if the queue length exceeds the
cache size
A. True
B. False
Answer: A
Explanation:
Question: 97
For Layer 2 VPN technology, the following statement is correct?( Multiple choice questions).
A. VPLS is a widely used technology in the live network, which can provide transparent transmission
of three-layer messages and achieve multi-point access.
B. The VPLS configuration is complex and the Layer 2 network transmits BUM packets.
C. BGP EVPN supports features such as tenant isolation, Multi-homing , and broadcast suppression.
D. BGP EVPN addresses issues such as MAC address drift and multi-tenancy that VPLS cannot
support.
Answer: BC
Explanation:
Question: 98
In the forwarding table of the switch, a MAC address can correspond to only one outlet at a time
A. True
B. False
Answer: B
Explanation:
Question: 99
How do.8021w and 8021D handle BPDUs?( Single choice questions).
A. The 8021D bridge only forwards BPDU packets received from the root bridge
B. 8021D bridges do not forward BPDU packets
C. The 8021w bridge only forwards BPDU packets received from the root bridge
D. 8021w Bridge does not forward BPDU packets
Questions & Answers PDF
P-31
Answer: A
Explanation:
Question: 100
Which of the following scenarios send free ARP messages?( Multiple choice questions).
A. After the VRRP protocol master and standby role election is completed
B. The DHCP client receives an acknowledgment message from the server after it sends it
C. When a new host configured with an IP address is connected to the network
D. When a host connected to the switch issues a Ping message.
Answer: ABC
Explanation:
Question: 101
When you troubleshoot a local area network with Huawei equipment deployed, you find that there
are a large number of unicast frames with unknown source AC addresses in the local area network .
A large number of unknown source MAC addresses single-plug frames can cause the switch the
biggest danger is ?
A. Memory that occupies the cache ton
B. Increases the power consumption of the power supply
C. Consumes a TCAM table entry
D. Consume the available bandwidth
E. Consume the MAC address table entry available in the system
Answer: E
Explanation:
Question: 102
Which of the following IEEE standards is specific to Gigabit Ethernet?
A. 8023z
B. 8023ab
C. 8023ad
D. 8023af
Answer: A, B
Explanation:
Question: 103
Questions & Answers PDF
P-32
What are the reasons why the BGP connection is down after it is successfully established ? ( Single
choice questions) Single choice
A. The wrong BGP packet was received.
B. The mandatory attribute in the route update packet is missing.
C. Open message negotiation failed.
D. After the BGP connection is established, the keepalive message is not received within the
negotiated holdtime time.
Answer: C
Explanation:
Question: 104
BGP can only automatically aggregate routes whose source is Incomplete.
A. True
B. False
Answer: A
Explanation:
Question: 105
There are two Communily filters: ip comimuniy-lite lpemit 101201 ip community fiter 2permit101 ip
commmuriyfilter 2pemit21 Regarding the above ommuniyfiter, the correct description is ?( Multiple
choice questions).
A. As long as the group attribute value carried in the BGP route contains 100:1 or 200:1, or both, the
BGP route matches the community-filterl
B. As long as the group attribute value carried in the BGP route contains 100:1 or 200:1, or both, the
BGP route matches community-filter2
C. The BGP route matches community-filter 1 only if the community attribute values carried in the
BGP route contain 100:1 and 200:1
D. A BGP route matches community-filter2 only if the group attribute values carried in the BGP
route include 100:1 and 200:1
Answer: B, C
Explanation:
Question: 106
Regarding Policy Routing, the following description error is ?( Single choice questions).
A. When configuring local policy routing, if two next hop and two outbound interfaces are set in the
policy at the same time, packet forwarding only distributes the load between the two outbound
Questions & Answers PDF
P-33
interfaces.
B. Interface policy routing is only supported for application in the inbound direction of an interface.
C. Interface policy routing only takes effect for forwarded packets, but has no effect on packets sent
locally.
D. If the message matches the permit table entry in the interface policy route , the message must be
forwarded according to the next hop specified by the interface policy route
Answer: D
Explanation:
Question: 107
Regular expressions can be used for Community-filter and AS-path-filter definition attribute types for
route filtering.
A. True
B. False
Answer: A
Explanation:
Question: 108
What type of prefix does a router running BGP advertise to its IBGP neighbor (assuming the router is
not configured as a route reflector)? (radio).
A. Prefixes are learned through other IBGP neighbors, or prefixes are learned from EBGP neighbors,
or prefixes are learned through routing introduction
B. A prefix that exists in the routing table
C. Prefixes are learned through other BGP neighbors, or prefixes are learned locally through network
or routing introduction
D. Prefixes are learned through EBGP neighbors, or prefixes are learned locally through network or
routing introduction
E. The prefix is learned through an EBGP neighbor, or the prefix is learned from an from RR
Answer: D
Explanation:
Question: 109
One of the things you're doing is compressing the length of ip6 addresses as much as possible . The
existingIP6 address is
2013xX0C130F006009cO87641308, to be able to make this P6 address more concise, you can
compress the IP6 address into which of the following?( Single choice questions).
A. 2013:0:130F:0:0:09CO:876
Questions & Answers PDF
P-34
Answer: 130B
Explanation:
B. 2013:130F::9CO:876Answer: 130B
Explanation:
C. 2013:0:130F:0:0:9CO:876Answer: 130B
Explanation:
D. 213::13F::9C:876Answer: 13B
Explanation:
E. 2013:0:130F::9CO:876Answer: 130B
Explanation:
Answer: E
Explanation:
Question: 110
The router is running both OSPFv3 and ISIS, and the OSPFv3 route needs to be introduced to ISIS,
which of the following ingestion configurations is correct:( Multiple choice questions).
A. Huawel ias 1 ltuawei-i- isHeveleve!. l Huave-s-1 networkenity 47001.0000020 Hawe -sis-1
ipv6enabletopolog standard Htuawer is-] pob impot.
B. (Huawei isis l Huawei-si-1 s-levelve!-l Huavei- ti.-1] networkentiy
4 .001.00001. Huawei sis pob enable topogy s andard Hhuawelitis ]l p6 importroute ospfv3 1 [Hu
C. [Huawei] sis 1 [Huawel-isis-1] networkentity47001.000000200 Huawe-ss 1 ipb6enable topologist
standard Huawei is l p6 importroue esgp.31lese! [Huaweisis-1] quit [Huawei
D. HuaweJ IsIS
[Huaweij isis 1 Huavei-isis-1]networkentity470001.000000020Huawei-sis- 1limpotroueosph31
ltuowe.is- ut tuawl sph 1 fhuwf spol Jronea d2222 [Huawei) isis 1 Huawe-sis-1] is level level-1
[Huavei-sis-1 etworkentity 47001.0000020 Huawel-d.-1[impotroteosph-1 le e. [tuawelts a ut
ltunweospfv3 1 [Huawei
Answer: AC
Explanation:
Question: 111
Which address prefix in the following options indicates that the address is globally unique and
globally routable among unicast addresses in IPv6, similar to a public address in IPv4?(). Single choice
questions).
A. ::1/128
B. FE80:/10
C. FE80::/10
D. 2000:;/3
Answer: D
Explanation:
Questions & Answers PDF
P-35
Question: 112
The following description of the characteristics of multi-instance CE is ?
A. Since the MCE device is already bound to the VPN, there is no need to bind the VPN on the PE
connected to the MCE device
B. The MCE device can determine the source of the routing information according to the interface
that receives the routing information, and maintain it in the route forwarding table of the
corresponding VP.
C. MCE is implemented by creating their own routing forwarding tables for different VPNs on the
MCE device and binding to the corresponding interface o
D. Configuring MCE enables a CE to connect to multiple VPNs at the same time, which can not only
completely isolate the service between different VPN users, but also reduce the input cost of
network equipment.
Answer: A
Explanation:
Question: 113
Users within a typical VPN can only communicate with each other, not with Internet users, and with
Internet. But VPN individual sites may have access to internet's needs. The correct description of the
implementation of VPN interconnection with internet is ?( Multiple choice questions).
A. is implemented on the user side, and the CE is directly connected to the Internet. Each user site
can be connected to the Internet separately, that is, the CE of each site is configured with a default
route to the Internet.
B. Implementing a complex implementation on PE and having security implications, PE devices may
be subject to Dos attacks on the Internet.
C. Implemented on PE, the PE device issues a default route to the CE to the Internet and adds a
default route to the VPN instance routing table pointing to the Internet Gateway o
D. Implemented on the user side, the implementation method is simple, and the public network and
private network routes are isolated, safe and reliable.
Answer: ABCD
Explanation:
Question: 114
The following message about the Register in PIM-SM describes the correct ?( Multiple choice
questions).
A. The Register message enables the RP to learn the multicast source information
B. The Register message is sent by the receiver router
C. Register messages are sent to RPv via unicast instead of multicast
D. The Register message is sent by the source DR
Questions & Answers PDF
P-36
Answer: ACD
Explanation:
Question: 115
Host HW1 in the HW device network Wants to join a video conference, so what does that host do?
A. Sends an IGMPv2 membership report to the default router unicast of the local network
B. Sends a unicast IGMPv2 membership report to the RP
C. The IGMPv2 membership report is sent over multicast in the local network, and the multicast
address carried in the IGMPv2 membership report is the multicast address that you want to join
D. The IGMPV2 membership report is sent over multicast in the local network, and the destination
multicast address of the IGMPv2 membership report is "All PIM Routers" 224002 Multicast address
Answer: C
Explanation:
Question: 116
A bookstore provides a wired network for customers to learn online. However, one day, it was found
that some users could not access the network, and after inspection, it was found that the IP
resources of the DHCP address pool had been exhausted. Which of the following is the best way to
solve the problem of the moment? ( Single choice questions).
A. Configure the static ARP binding table
B. Configure the IPSG
C. Limits the maximum number of DHCP Snooping binding table entries that the interface allows to
learn
D. Configuration DAI
Answer: C
Explanation:
Question: 117
You want only his telnet stream to be able to access the server (address 1011.100). Then, you add the
following ACL to the routing ring: nule5pemit cp source ny destination 1011.100000destinationporteq 23 rule 1l0 deny ip source any destination any Then you apply that ACL to the ingress
direction of the router's seial interface. What type of message is allowed to pass through the router?(
Multiple choice questions).
A. A non-sharded, port 21-accessing packet
B. Non-first-sharded messages that use port 23 to access the server's message
C. Non-first-of-sharded messages to access other hosts
D. Non-first-of-its-kind packets that use port 21 to access the server
E. Packet answer for the first sharded or non-sharded, using port 23 to access the server
Questions & Answers PDF
P-37
Answer: BDE
Explanation:
Question: 118
Dual-bucket, two-speed is used in traffic governance, where the number of tokens in a C bucket is TC
and the number of tokens in a P bucket is TP. When a message of length B enters, which of the
following sentences is correctly described? (Multiple choice questions).
A. If TP-B~O and TC-B < 0, the message is marked green
B. If TP-B<0 and TC-B-0, the message is marked in red
C. If TP-B>0 and TC-B < 0, the message is marked yellow
D. If TP-B >O and TC-B > 0, the message is marked as a green
Answer: BCD
Explanation:
Question: 119
Which SNMP message type sent to NMS reports events that are reliable? ( Single choice questions).
A. Inform
B. Get
C. Response
D. Trap
E. Get Bulk
Answer: A
Explanation:
Question: 120
NSF (Non-StoppingForwarding ) and non-stop circuits are transmitted NSR (Non-Stopping Routing)
are two highly reliable solutions, and the following statement is correct
A. After NSR enablement, if the business batch backup has not yet ended, a master board failure
occurs, the NSR cannot be completed
B. NSR backers require the ability to support NSR through specific message negotiation
C. After NSF is enabled, the router is switched back, and the routing table and forwarding table
remain unchanged, so traffic is not lost during grf time
D. NSF routers do not need to negotiate the ability to support NSF through specific messages
Answer: A
Explanation:
Questions & Answers PDF
P-38
Question: 121
Assume that BGP/MPLSIPVVPN, OSPF, LDP, and static routing protocols are already enabled on the
PE router . Which of the following protocols need to enable GR on PE in order to get NSF
functionality? (Multiple choice questions).
A. BGP
B. Static circuit
C. OSPF
D. MPLS LDP
Answer: ACD
Explanation:
Question: 122
Huawei's SDN controller using VXLAN technology is fixed?
A. Agile Controller-Campus
B. Agile Controller-WAN
C. Agile Controller-DCN
Answer: C
Explanation:
Question: 123
Two VTEPs in an XLAN can identify a VXLAN tunnel, and this VXLAN tunnel between the VTEPs will
be covered by two NDEs is common to all VNI.
A. True
B. False
Answer: A
Explanation:
Question: 124
The following statement about the VXLAN gateway is incorrect?( Single choice questions).
A. Layer 2 gateway: Used to solve the problem of tenant access to the VXLAN virtual network, and
can also be used for subnet communication of the same VXLAN virtual network.
B. Layer 3 gateway: Used for cross-subnet communication of the VXLAN virtual network and access
to external networks.
Questions & Answers PDF
P-39
C. VXLAN Layer 3 gateways can be divided into centralized gateways and distributed gateways.
D. Layer 2 gateway and VPN instance binding.
Answer: D
Explanation:
Question: 125
To build a loopless Layer 2 network, which of the following schemes is optimal?( Single Choice)
A. Stacking + Link Aggregation
B. TRILL+MSTP
C. ??+MSTP
D. Link Collection + MSTP
Answer: A
Explanation:
Question: 126
The default configured switch has an empty MAC address table at this time , and Host A connected
to the switch issues the first unicast data frame, so what will the switch do after receiving the
teaching system?( Single choice questions).
A. The switch will drop the data frame
B. The switch records the source MAC address of the data frame and floods the data frame
C. The switch will forward data to interface
D. based on the mesh MAC address of the data frame The switch caches the data frame and waits for
the destination host to send the effect frame before forwarding it
Answer: B
Explanation:
Question: 127
If a Huawei S series switch needs to designate a member switch as the primary switch of the stack, it
can power on this switch first, and then power on other member switches after 20s.
A. True
B. False
Answer: A
Explanation:
Question: 128
Questions & Answers PDF
P-40
The following description of 8021S deployment characteristics is correct?( Multiple choice question)
A. All VLANs share a spanning tree instance
B. Multiple bridges share a spanning tree instance
C. Each VLAN has one spanning tree instance
D. Multiple VLANs share a spanning tree instance
Answer: D
Explanation:
Question: 129
The following description of the attributes of BGP is correct?( Single choice questions).
A. The AS deficit of the adjacent AS is ranked at the far right of the list of AS_Path in the BGP route
entry.
B. When the B. BGP Speaker publishes a route learned from an EBGP peer to an IBGP peer, it does
not change the next hop attribute of that routing information.
C. Local_Pref is valid only between EBGP peers and is not advertised to third-party AS.
D. A route can have only one community attribute value.
Answer: B
Explanation:
Question: 130
The following statement about the alliance is correct?( Single choice questions).
A. The consortium divides an AS into sub-AS, and the alliance external AS still considers the
consortium to be an AS
B. Subsystems within a consortium can use private AS numbers. Huawei NE/AR routers, a consortium
can be configured with up to 32 subsystems
C. Consortium can easily detect the routing loop within the AS because EBGP is running between the
subAS.
D. The subas number of the consortium, which by default notifies BGP peers outside the consortium
Answer: D
Explanation:
Question: 131
When the ABR is a Type 5/7 LSA Switch router in the NSSA zone, then the ABR can be used against
the Type 7 LSA The converted type 5 LSA is aggregated.
A. True
B. False
Questions & Answers PDF
P-41
Answer: A
Explanation:
Question: 132
The following about the Router-LSA of OSPFv3 is correct?( Single choice questions).
A. The router-LSA data area contains the Link-Local address
B. The router-LSA data area contains the Interface ID of the neighbor on this side
C. Similar to OSPFv2, the Option field exists in the header of LSA, not in the data area of Router-LSA
D. When LS type= Ox0001 in the head of LSA, the data area representing LSA is Router-LSA
Answer: B
Explanation:
Question: 133
When judging the old and new LSA, the serial number parameter and the age parameter are used ,
and the following two parameters are correct for ?( Multiple choice questions).
A When the router receives two LSAs, where the sequence number is the same and the checksum is
the same, the smaller the age, the better
B. When the router receives—The age of the LSA is set to 3600S, the LSA is unavailable
C. If the serial number of the LSA reaches the end value of Ox7FFFFFFF, the current router advertises
an LSA with an age of 3600S
D. Both the serial number and age parameters can determine whether the LSA is old or new, and the
router prioritizes the sequence to participate in the teaching, and the larger the better
Answer: CD
Explanation:
Question: 134
?? ipIp- prefoi p prefierame lndeindeoxrunmber)( pemit demy)ip+4adrssmasklengh gratrequa gratercqual abel]lescqualesequl ole) for • Pprefofiier? If a pre-list of tooequal has been specified, but the
greater-equal has not been specified, then how much of the prefix's range is sufficient?(). Radio
neck).
A. [0, less-equal-value]
B. [mask-length, less-equal-value]
C. [less-equal-value,32]
B. No limit
Answer: B
Explanation:
Question: 135
Questions & Answers PDF
P-42
Which nationality meets the following two conditions: 1] BGP Router A can choose whether the
Ulpdate message is based on the nationality. ( ) If Router B receives a Updae message containing a
cross-hatch, run-by B does not have an identified solidity, but will also contain a multifaceted]
Ulpdate retracts the advertisement to Router C. Router C may recognize and apply this attribute.
(Multiple choice questions).
A. Aggregator
B. Local_Pref
C. Multi_Exit_Disc
D. Community
Answer: AD
Explanation:
Question: 136
The following description of MP-BGP is incorrect?( Single choice questions).
A. The MP_UNREACH_NLRl of the update message, excluding the path nationality.
B. MP-BGP can be used to assign tags.
C. MP_REACH_NLRI and MP_UNREACIH_NLRI are optional transition properties.
D. A complete MP_REACH_NLRI attribute structure contains address family, next hop, and prefix
information.
Answer: C
Explanation:
Question: 137
The following description of the BGP route reflector is ?( Multiple choice questions).
A. Cluster_List is an optional non-staging property for ring protection within the cluster.
B. The route learned from the client, all non-clients and clients published to this RR.
C. A network of bones is divided into multiple reflection clusters, each of which configures the other
RRs as non-clients, and establishes an IBGP full connection between the RRs.
D. The Originator_ID attribute is generated by the Route Reflector (RR) for inter-cluster ring
protection.
Answer: BC
Explanation:
Question: 138
The router connects two EBGP neighbors through two parallel Serial cables, what do you do to
Questions & Answers PDF
P-43
achieve bidirectional negative sharing between two EBGP neighbors connected by these two parallel
Serial cables? ( Single choice questions).
A. Without any method, BGP automatically implements load sharing of traffic across different
autonomous systems on the available links
B. Use the Loopback interface to establish an EBGP neighbor relationship, configure EBGP Muti-hop,
configure the Loopback interface as the update source, and then use IGP to implement Equivalent
path load sharing between Loopback addresses
C. Configure the EBGP neighbor relationship with the Loopback interface as the update source, and
the IGP in each AS needs to introduce two equivalent paths to the loopback address of the EBGP
neighbor; And you need to use the command "next-hop?local"
D. Use the command "ebgp-load-balance" at both ends
E. To configure an EBGP neighbor relationship with the Loopback interface as the update source, the
IGP in each AS needs to introduce two equivalent paths to the EBGP neighbor loopback address ;
And the commands "ebgp maxhop" and "next-hop-local" are used
Answer: B
Explanation:
Question: 139
IPv6 introduces the Solicited-Node address, which is described correctly below (multiple choice)
A. This is a specific address that is used for resolution in ARPv6 The MAC address.
B. The Solicited-Node address on the router interface is automatically generated and can have
multiple.
C. If the Solicited-Node address is not configured , the router automatically generates one on each
interface.
D. IPv6 introduced the Solicited-Node address to support IPv6 multicast.
Answer: B
Explanation:
Question: 140
What messages does an NMS (Network Management Station) running SNMPv1 send to the agent?
A. Trap,Get ? Set
B. Get,Set ? Getnext
C. Get,Set,Getnext ? GetBulk
D. Get,Set ? GetBulk
E. Get Trap
Answer: B
Explanation:
Questions & Answers PDF
P-44
Question: 141
NXLAN under different VPNs need to be accessed, one of the subnets is as follows, EVPN under RT
10: 10 both, RT 1000: 1000 export, VPN RT 100: 100 The other subnet can be configured as ?
A. Vpn configure 1000:1000 both evpn
B. EVPN configures 1000:1000 both
C. Configure 1000:1000 export under EVPN
D. Configure 10:10 both under VPN.
Answer: AB
Explanation:
Question: 142
If you have a LOCAL AREA NETWORK running 8021D Spanning Tree Protocol, the non-root switch
does not receive which parameter under the root switch?
A. MaxAge
B. Root cost
C. Forward delay
D. Hold time
E. Hello time
Answer: D
Explanation:
Question: 143
The following description of the CHAP authentication function in the PPP protocol is correct?(
Multiple choice questions).
A. The user name must be configured under the authenticated party interface for CHAP
authentication
B. If the authenticator does not have a username configured, password
C. can also be configured without the authenticated party interface Using the authentication
sequence ID, random number, and key, a Hash value
D. is calculated using the MD5 algorithm Three message interactions are required for
authentication, and only the user name is transmitted on the network without the password
Answer: ACD
Explanation:
Question: 144
The following message about OSPFV3 is correct?
Questions & Answers PDF
P-45
A. The Option field of the Hello and DD packets extends to 24-bit
B. LSR packets containing the full LSA header information for requesting an update to the LSA
C. The LSACK message contains LSA header information to confirm receipt of the LSU message
D. The Hello message must contain the interface ID of the sending interface
Answer: ACD
Explanation:
Question: 145
When configuring ISIS zone authentication, which ISIS message will carry the authentication letter? (
Single choice questions).
A. ISIS ?Level-1 ?SNP ?LSP?
B. ISIS ?Level-2 ?SNP ?LSP?
C. Hello message of ISIS's Level-1.
D. Hello message of ISIS's Level-2
Answer: A
Explanation:
Question: 146
ISIS elects DIS in broadcast multiplexed access networks, and the following statement about DIS is
correct?( Multiple choice)
A. ISIS elects dis by comparing priorities, and mac addresses if the priorities are consistent
B. In a broadcast multiple access network, DIS sends Hello PDUs at three times the frequency
C. DIS guarantees database synchronization by periodically sending CSNP messages
D. DIS supports preemption function, after the new DIS preemption is successful, there is no need to
flood any LSP packet
Answer: ABC
Explanation:
Question: 147
The following is an error in the OSPF routing calculation (single choice).
A. Compared to the PRC algorithm, the ISPF algorithm only calculates the changed leaf nodes when
the route changes PRC algorithm to recalculate routes
B. When the first and second class LSAs on the network change, OSPF uses the ISPF algorithm to
recalculate the routes The
C. OSPF router uses the FULL SPF algorithm to calculate all nodes in the network when initially
calculating routes
Questions & Answers PDF
P-46
Answer: A
Explanation:
Question: 148
Level-1-2IS transmits Level-2LSP to the Level-1 area if the AT location 1 in Level-2LSP is delivered It
means that the Level-1lS in the area can be accessed to the outer area through Level-1-2IlS
A. True
B. False
Answer: B
Explanation:
Question: 149
The correct description about the BGP reflector is ?( Multiple choice questions).
A. IBGP neighbor relationships need to be fully interconnected without a route reflector. The
introduction of route reflectors can reduce the need for full interconnection
B. The route reflector can advertise routes learned from non-clients to all clients
C. The route reflector can advertise routes learned from one client to other clients and non-clients
D. The route reflector can advertise routes learned from IBGP neighbors to all clients and non-client
Answer: ABC
Explanation:
Question: 150
A router receives a BGP route with the community attribute NO-Export , how will the router handle
the BGP route?
A. Drop the route directly.
B. No more advertising to other BGP routers.
C. Advertise only to IBGP neighbors.
D. The route is advertised normally, but the route is not used to forward data.
Answer: C
Explanation:
Question: 151
You want to set the DSCP value of VolP traffic in HW network devices to EF. According to the
differentiated service model RFC, traffic token EF should be set to:
Questions & Answers PDF
P-47
A. DSCP is set to decimal 36
B. IP ToS is set to OXEF
C. IP Experimental ECN
D. DSCP is set to decimal 5
E. Bitstream 101110
Answer: E
Explanation:
Question: 152
You are now troubleshooting a LAN, and you suspect that the error is due to a mismatch in the work
mode. Which switch interface error indicates that the 10/100/100O IEE gigabit interface operating
mode does not match?( Multiple choice questions).
A. Alignment error
B. FCS error
C. Super Small Frame
D. Excess Conflict
E. Lag conflicts
Answer: ABCDE
Explanation:
Question: 153
The HW appliance network administrator plans to migrate IGMPv2 in the multicast network to
IGMPV3 Where does IGMPV3 improve over IGMPv2?
A. IGMPv3 adds the ability for hosts to specify multicast groups that do not join a specific multicast
source
B. IGMPv3 adds the ability for hosts to specify multicast groups that are joined to a specific multicast
source
C. IGMPv3 adds Request-to-send and Clear-to-send between source and local IGMP queries
D. IGMPv3 removes the Report-suppression feature for membership reporting
E. IGMPv3 removes the ability to include all sources in a wildcard group
Answer: ABD
Explanation:
Question: 154
The multicast IP address is 2291301301, and its corresponding MAC address is :(Multilist)
Questions & Answers PDF
P-48
A. 01-00-5E-O2-82-01
B. 01-00-5E-82-82-01
C. 00-00-5E-02-82-01
D. 00-00-5E-82-82-01
Answer: A
Explanation:
Question: 155
What does RT do in MPLS VPN? Multiple choice questions).
A. Allows the peer PE to decide which VPNv4 routes to import into a particular VRF
B. Allows peer PE to decide which VPNv4 routes not to import into a particular VRF
C. Allows the peer CE to decide which VPNv4 routes to import into a particular VRF
D. Allows the peer CE to decide which VPNv4 routes not to import into a particular VRF
Answer: AB
Explanation:
Question: 156
The network administrator is ready to use the 6to4 automatic tunnel to carry IPv6 data on the IPv4
network, and the IPv4 address of the router interface is 1381485210, so the corresponding tunnel
address is 2001:8a0e:55d2:1:230:65ff:fe2:9a6?
A. True
B. False
Answer: B
Explanation:
Question: 157
The following description of the process of sending and receiving data frames in switch interface
Access mode is correct? ( Single choice questions).
A. In Access mode, labeled data frames are discarded directly when they are received.
B. Access mode strips off the VLAN tag of the dataton when sending .
C. Access mode receives only unlabeled data frames.
D. When a data frame enters the switch interface, the switch learns the destination MAC address in
the data frame.
Answer: B
Explanation:
Questions & Answers PDF
P-49
Question: 158
What is the wrong description of the function of OSPFv3 protocol authentication?
A. OSPFv3 can only establish a security alliance SA using manual mode
B. Huawei router OSPFv3 IPSec authentication can not only support transmission mode, but also
support tunnel mode
C. OSPFv3 authentication relies on IPv6 packet authentication headers and encapsulation security
net load headers
D. The OSPFv3 protocol header removes the Type and Automation fields
Answer: B
Explanation:
Question: 159
The OSPF3 protocol is a separately developed protocol that differs somewhat from OSPF2 in that
OSPFv3 is link-based rather than network segmented, and the following statement is incorrect?().
Single choice questions).
A. Two OSPF routers connected to the link can establish a neighbor relationship even if their IPv6
address prefixes are different
B. The routing information obtained by the B. OSPFv3 router from the neighbor uses the neighbor's
Link-Local address as the next hop in the forwarded packet
C. For two OSPF routers connected to the link, you can establish a neighbor relationship even if you
do not configure a unicast IPv6 address
D. All OSPFv3 interfaces use the Link-Local address as the destination address of the message
Answer: D
Explanation:
Question: 160
In order to reduce the number of OSPF routes in some unscheduled areas, the OSPF protocol has
developed special area functions, and the following characteristic description of ospf special areas is
correct?( Single choice questions).
A. ASBR-Sunmary-LSA is allowed to be published to NSSA regions
B. AS-External-LSA is allowed to be published to Stub regions
C. Any OSPF zone can be configured as a special zone
D. Special area routers cannot establish OSPF neighbor relationships with regular area routers
Answer: D
Explanation:
Questions & Answers PDF
P-50
Question: 161
There is an existing network of router RI, router R, router R3, and router R4 The 4 routers are
interconnected via an LN network. All 4 routers are equipped with basic oSPF. When you execute the
command "displayosp" on router R2 f peer", router R2 and router R3 are discovered The status
between is "2-way". So what conclusions can you draw from this output? Multiple choice questions).
A. Router R2 is not a DR
B. Router R3 is not a DR, nor is it a BDR
C. There is no full adjacency between router R2 and router R3
D. Router R4 is destined for DR
E. Router R2 is DR or BDR
Answer: ABC
Explanation:
Question: 162
The following description of BGP load sharing is wrong with ?( Multiple choice question)
A. The AS_Path properties of the equivalent routes that form load sharing must be different.
B. The destination CIDR blocks are the same, and load sharing can be formed between BGP routes
with different sources.
C. If BGP load sharing is implemented , the local device needs to configure the peer next-hop-local
command to change the next hop address to its own address when issuing a route to an IBGP peer
group .
D. IBGP routes and EBGP routes that reach the same destination in the public network can form a
load sharing
Answer: ABCD
Explanation:
Question: 163
If you delete a declared route entry on a BGP router, the BGP routing ring is triggered to send an
Update message for route scattering, which carries the accepted mandatory attribute of the route
entry that was discarded.
A. True
B. False
Answer: B
Explanation:
Question: 164
Questions & Answers PDF
P-51
The following statement about OSPF route filtering is incorrect.( Single choice questions).
A. In the NSSA area, filtering for external route ingestion and advertisement can be configured on
ASBR or ABR
B. Filtering for the three types of LSAs needs to be configured on the ABR across OSPF regions
C. Interface-based filtering of LSAs allows all LSAs in the inbound and outbound directions except
grace LSAs
D. Based on the link state database, when calculating routes, the fiter-policy import command is
used, which only affects the route addition in the route table, and has no effect on the OSPF link state
database
Answer: C
Explanation:
Question: 165
Regarding the Stub region and the Totally Stub region of the OSPF protocol, the following statement
is correct (multiple choice)
A. After modifying the original Stub area to a Totally Stub area, the number of LSAs in the LSDB of
each router in the region will definitely be reduced
B. ASBR cannot be present in either the Stub zone or the Totally Stub zone
C. When you modify the original Stub area to a Totally Stub region, the number of LSAs propagating
within the region will definitely decrease
D. If there are two ABR in the Totally Stub zone, each ABR sends an LS ID of 0000 to the router in the
zone LSA
Answer: BD
Explanation:
Question: 166
When there are multiple rule rules for ACLs in VRP, which of the following statements is true
regarding the order of matching? Single choice questions).
A. By default, matching is based on the principle of "depth first"
B. By default, matching occurs in the order in which the permit is matched first and denim later.
C. By default, matching is made from smallest to largest according to the Rule-ID.
D. There is only one matching order and cannot be modified.
Answer: C
Explanation:
Question: 167
Which of the following is incorrect about HTTPS?( Multiple Choice)
Questions & Answers PDF
P-52
A. HTTPS secures access to data by using SSLVPN.
B. If the HTTPS traffic contains a virus, the router cannot detect the virus directly using IPS
technology
C. When using HTTPS to access a website, the website cannot be accessed if the user's browser does
not recognize the website's digital certificate.
D. HTTPS protocol uses TCP port 443 by default
Answer: C
Explanation:
Question: 168
What are the differences between traffic policing and traffic shaping?
A. Traffic shaping is applied in the inlet direction and traffic supervision is applied in the outlet
direction
B. For traffic shaping, the router caches excess packets until bandwidth is available again
C. The token bucket algorithm is used for traffic supervision, and the SPD algorithm is used for traffic
shaping
D. For traffic policing, the usage of the buffer can be adjusted for traffic exceeding the CIR
E. For traffic shaping, it can be over-CIR Traffic adjustment for the usage of the buffer
Answer: BE
Explanation:
Question: 169
The following description of VRRP load sharing is correct?( Multiple choice questions).
A. When configuring priority, make sure that the same router acts as a master in the three VRRP
backup groups
B. You can create multiple VRRP backup groups on one interface of a router . The router can act as a
master for one VRRP backup group and as a backup for other VRRP backup groups
C. When you deploy load sharing, hosts in the same LAN are required to configure the IP addresses of
different virtual routers as gateway addresses for missing provinces
D. VRRP load sharing requires at least two virtual routers to provide forwarding services at the same
time
Answer: BCD
Explanation:
Question: 170
VrRP priority is not configured as O, devices that issue VRRP priority of 0 stop participating in the
VRRP backup group, notifying the backup device to become a laster device as soon as possible
Questions & Answers PDF
P-53
without having to wait until the Master_Down_Interval timer times out
A. True
B. False
Answer: A
Explanation:
Question: 171
The following statement about EVPN Type5 routing is wrong?( Single choice questions).
A. Type5 routes carry Layer 3 VNI.
B. Type5 routing carries both Layer 2 VWI and Layer 3 VNI
C. The IP Prefix field can carry both host and network segment addresses.
D. Type5 is an IP prefix route.
Answer: B
Explanation:
Question: 172
XLAN uses BGP EVPN to establish a tunnel, what type of message is used? ( Single choice questions).
A. Typel
B. Type2
C. Type3
D. Type4E. Type5
Answer: C
Explanation:
Question: 173
Which levels are common in the OSI reference model and the ICP/IP model? ( Multiple choice
question)
A. Session layer
B. Data link layer
C. Transmission layer
D. Presentation Layer
E.
F. Application Layer
Physical
Layer
Answer: CF
Explanation:
Questions & Answers PDF
P-54
Question: 174
A home user has opened a 1Mb/s bandwidth, and in order to improve the user experience, the
operator can stabilize 2Mb/s when measuring speed If we use the listening bucket technology to
achieve this requirement, which of the following methods is optimal.
A. cir 10000 pir 12000
B. cir 10o00 cbs 12000 pbd 12000
C. cir 8000 pir 12000
D. cir 10000 cbs 10000 pbs 12000
Answer: A
Explanation:
Question: 175
If you need to use the delault-route importd command if no default route exists in the local IP
routing table , a default route is issued to the BGP peer (group).
A. True
B. False
Answer: B
Explanation:
Question: 176
Regarding the sliding window of TCP, what are the following descriptions that are enough to be
wrong? ( Multiple choice question)
A. The sender declares the initial window size
B. The sender does not need to transmit messages of full window size
C. The TCP sliding window allows multiple packets to be sent before an acknowledgment is received
D. After the retransmission timer times out, the sender has not received an acknowledgment and
will retransmit unacknowledged data
E. The receiver needs to acknowledge the sender's packet
F. Sliding window size can only be increased or remain unchanged
Answer: AF
Explanation:
Question: 177
Questions & Answers PDF
P-55
/R1Jospf1lRL-osp- jarea.2[RLospf-1-arca-0002]network1001310000 As shown in the configuration,
the administrator configured OSPF but RI on R1 You cannot learn routes for other routing rings. Then
the possible cause is the question).
A. This router does not have an OSPF process number configured
B. This router is configured with a different zone ID than its neighbor router's zone ID
C. This router does not have authentication features configured, but neighbor routers configure
authentication features
D. The declared network address of this router does not match the interface mask
Answer: BC
Explanation:
Question: 178
The Next Header field information exists only in the header of an IPv6 message and is used to
indicate whether an extended header exists for IPv6
A. True
B. False
Answer: B
Explanation:
Question: 179
What is the following description of MPLS BGPVPN incorrect?
A. The TTL field in the label has the effect of preventing loops.
B. IBGP PEes generally use the Loopback interface address to establish a stable BGP neighbor
relationship
C. BGP So0, which is used to prevent routes issued from a VPN site from passing through the MPLS
backbone and back to that site. So0 is an extended group attribute that MP-BGP automatically
generates.
D. The routing exchange between D. PE-CE can be static routing, OSPF multi-instance, IS-IS multiinstance, EBGP
Answer: C
Explanation:
Question: 180
The following information about MPLS tags describes the error as ?( Single choice questions).
A. By default, devices support php features, and the ERAS node that supports PHP assigns a tag
value of 3 to the penultimate hop node
Questions & Answers PDF
P-56
B. When the tag value is 0, the tag must be ejected and the message must be forwarded based on
IPv4
C. The MPLS tag is 4 bytes long and encapsulated between the link layer and the network layer.
D. If the bottom of the label identifies S=0, it indicates that the label is the bottom label and is
directly forwarded to the IP.
Answer: D
Explanation:
Question: 181
Run the SSM across the entire HW IP multicast network. The following about SSM understands
correctly?( Multiple choice question)
A. No RP is required
B. SSM uses only shared trees
C. SSM uses only the SPT tree
D. Ideal for 1-to-many applications
E. SSM is recommended when you have multiple sources and expect to minimize the state of mroute
in your network Ideal for many-to-many applications
Answer: ACD
Explanation:
Question: 182
The HTTP protocol is based on TCP, so http Flood attacks can be defended against HTTP Flood attacks
using the TCP Flood attack prevention method.
A. True
B. False
Answer: B
Explanation:
Question: 183
The following statement about IPSG technology is correct (single choice).
A. The ip source checkuser-bind check-item command is used to configure VLAN- or interface-based
IP packet checks, which take effect for both dynamic and static table entries.
B. If an interface is configured as the OKCP Scooing Tust interface, the interface can normally receive
DHCP ACK and DHCPNAK responded to by the OHHNP server and DHCPOffer packets, other
untrusted ports cannot receive these packets properly.
C. On Huawei routers, ipSG functions can be configured in Vlanif.
D. The IPSG can perform binding table match checks on IP packets entering and leaving the
Questions & Answers PDF
P-57
interface.
Answer: B
Explanation:
Question: 184
Underneath, what doesn't belong to EVPN Type2 routing is ?( Multiple choice question)
A. Host ARP advertisement
B. BUM message forwarding
C. Host MAC address advertisement
D. Host IP Route Advertisement
Answer: B
Explanation:
Question: 185
The following description of the PPPoE data frame is correct?( Multiple choice questions).
A. Once a PPPoE session is established, all Ethernet packets are unicast
B. The Ethernet_Type domain is fixed to Ox8863
C. When PPPoE passes session data, Code must be set to Ox0
D. The Session_ID of the PPP session is not allowed to change and must be the specified in the
Discovery phase
Answer: CD
Explanation:
Question: 186
Regarding BGP route filtering, the following description is wrong?
A. The filtering relationship between Route-Policy's noodes is "or." ", that is, as long as a node filter
is passed, it can pass through the Route-policyo
B. For routes published locally, configure a routing policy that takes effect before the route is added
to the BGP route table.
C. In the same node of Route-Policy, multiple if-match clauses for different attributes are "or"
relationships.
D. When a route to a BGP peer is received, a routing policy is enforced to filter unwanted BGP routes
that are not added to the local BGP routing table.
Answer: C
Explanation:
Questions & Answers PDF
P-58
Question: 187
Regarding route introduction, the following description is correctly ?( Multiple choice questions).
A. OSPF introduces two types of external routes, with the first type of external route taking
precedence over the second type of external route.
B. Use the default-route imported command in BGP only to introduce default routes that already
exist in the local IP routing table.
C. When ISIS introduces an external route, if you do not specify the route type that is introduced, the
Level-1 route is introduced by default on the L1/2 router
D. When ISIS introduces an external route, if you do not specify the type of route that is introduced,
the Leve1-1 route is introduced by default on the L1 router .
Answer: A, B
Explanation:
Question: 188
Two routers connected through a firewall cannot establish a BGP neighbor relationship. What causes
it?
A. EBGP Multi-hop is not configured
B. The firewall did not release IP protocol number 89
C. Firewalls that do not have an open UDP port number of 179
D. BGP neighbors must form a Layer 2 adjacency
Answer: C
Explanation:
Question: 189
When a Layer 3 switch sends IP packets originating from one VLAN to another LAN, which field in the
following options is overridden?( Single choice questions).
A. Three layers of TTL
B. Layer 3 destination address
C. Layer 3 source address
D. Layer 3 Transport Protocol
E. Two-tier TTL
Answer: A
Explanation:
Question: 190
The following statement about the NSSA area is correct (multiple choice).
Questions & Answers PDF
P-59
A. In the NSSA area where the OSPF neighbor sends hello packets, the N position 0, E within the
option field Position 1
B. The NSSA zone must automatically generate a default LSA to access the external network
C. The NSSA zone generates a Category VII LSA to advertise external routing, and the FA address in
the Category VII LSA acts to prevent loops
D. In the OSPF neighbor in the NSSA region sends hello packets, position 1 within the option field ,
position E
Answer: D
Explanation:
Question: 191
An existing router running OSPF is connected to zone 0 and zone l. You configured zone l as the Stub
domain. What classes does an LSA that operates only inside zone l contain?
A. 1LSA,2 3LSA
B. 3LSA 4LSA1 2
C. 1 ?LSA ? 2 ?LSA
D. 1 ??LSA,2 ??LSA 5 ??LSA
E. 7 ?LSA
Answer: A
Explanation:
Question: 192
A company network runs the OSPF protocol, an engineer in order to understand the OSPF
mechanism in the network to perform packet capture operations, the following ospf message
description is correct?
A. LSUpdate message is sent only when an adjacency relationship is established
B. LSUpdate messages synchronize the link state database by sending detailed LSA information
C. The interface sends Hello packets as soon as it joins the OSPF area
D. When an LS Update packet is received, the router must send an LSAck to acknowledge
Answer: BC
Explanation:
Question: 193
There is no routing protocol running on the router HW and only one default route reaches the
remote network. On the router job with the extension Ping remote file server address 105401. The
Questions & Answers PDF
P-60
result of Ping on the router job is presented as "Request time." out”? Based on the above
description, the error in the following analysis is ?
A. Router HW's next hop router does not have a path to the destination address
B. Ping is successful, but congestion occurs on the path to the destination address
C. ICMP packets can reach the destination address But the destination device failed to reply
D. Router HW does not have a legitimate route to the destination address
E. There is a firewall in the remote destination network, and no ICMP traffic is allowed
Answer: A
Explanation:
Question: 194
If the OSPF protocol is running in the network, after configuring the non-osseous thousand region in
the OSPF region as the Totally Stub region, the ABR router sends a message to Totally The Stub area
issues an LSA with an LSID of 0000, which category the LSA belongs to LSA?( Single choice questions).
A. LSA3
B. LSA1
C. LSA5
D. LSA2
Answer: A
Explanation:
Question: 195
What are the following techniques for improving MPLS BGP VPN reliability?( Multiple choice
question)
A. dual home networking is configured at the access layer
B. VPN FRR
C. VPN GR Private IP routing between
D. PE-CE FRR
Answer: ABCD
Explanation:
Question: 196
Router HW1 exists in the carrier HW's network as an MPLSLSR router. The router receives a packet
carrying a label, but the label entry does not exist in its LFIB. So how does the router handle that
message?
A. Router HW1 strips off the label and looks for the FIB using the P destination address
Questions & Answers PDF
P-61
B. Router HW1 uses LDP to create an LSP and creates a new path in LFIB for the label carried in the
message
C. Router HW1 drops the message
D. Router HW1 will forward the message with the default label
Answer: C
Explanation:
Question: 197
Which of the following scenarios does not require RPF checking?( Single choice questions).
A. When a router in PIM SM receives multicast traffic when a shared tree is established to an RP in
PIM SM
C. When a pruning message is received in PIM SM
D. When the RP in PIM SM establishes the source tree to the multicast source
Answer: C
Explanation:
Question: 198
If multiple candidate RPs are configured in a multicast group, which of the following parameters does
the RP that elect the group from multiple candidate RPs need to be compared?
A. The mask length of the group range for the C-RP service that matches the group address that the
user joined
B. C-RP priority
C. The IP address of the C. C-RP interface Number of
D. C-RP interface
Answer: ABC
Explanation:
Question: 199
You expect to deploy multicast video applications on your private, on-premises network. To achieve
this, you need to have a private multicast IP address in your network . So which range of IP
addresses can be used?( Single choice questions).
A. 239000-239255255255
B. 241.000-241.255255255
C. 224000-224255255255
D. 240000-254255255255 E. 226000-226255255255
Answer: A
Questions & Answers PDF
P-62
Explanation:
Question: 200
Which of the following statements about RADIUS is correct?( Single choice questions).
A. MAC authentication does not require a username password, so you cannot use RADIUS to
authenticate the user.
B. RADIUS supports both wired and wireless access modes.
C. SEPARATION OF RADIUS PROTOCOL AUTHENTICATION, AUTHORIZATION, AND AUDIT.
D. RADIUS authentication and Portal authentication cannot be used together because the Portal
server can typically be used to authenticate users when portal authentication is deployed.
Answer: B
Explanation:
Question: 201
What are some of the following misrepresentations about URPF, IPSG, and DAI technologies? (
Multiple choice questions).
A. DAI does not support manual configuration of binding tables.
B. IPSG checks the source IP address and source MAC address of the IP packet , and DAI only checks
the correspondence between the IP and the MAC.
C. URPF can be used to protect against DDoS spoofed source attacks.
D. IPSG technology checks IP packets for source IP spoofing attack prevention, while DAI checks ARP
packets to filter attack sources.
Answer: AB
Explanation:
Question: 202
In order to configure M4, you first need to define a RADIUS server, which is defined as follows:
Huawei]radius-server template EXAM
[Huawei-radius-EXAM]radius-servershared-key cipher HUAwei123(Huawei-radius-EXAM]radusserver authentication 10766661812(Huawei-radiusEXAM]radius-server authorization 1076666
1812[Huawei-radius-EXAM]radius-server accounting 10766661813 (Huawei-radius EXAM]radiusserver retransmit 2
A. True
B. False
Answer: B
Explanation:
Questions & Answers PDF
P-63
Question: 203
Router A has an IP route entry with a purposeful CIDR block of 10001/32 and an outgoing interface
of GigabitEthernetO/0/1. Now add the following configuration: acd number 2000 rule 10 permit
source1001.10#traffic classifier test if-match acl 2000 # traffic behavior test remarkdscp cs3#traffic
policy test classifier test behavior test#
interfaceGigabitftherneto/0/1 ip address 1001212552552550 traffic-policy test outbound#assuming
router A received a destination IP of 10001 Of packets, the following statements are correct:
A. If the data packet source lIP address is 1001.2, it can be forwarded with the DSCP field marked CS3
B. If the packet source IP address is 1001.1, it can be forwarded while the DSCP field is marked as CS3
C. If the packet source IP address is 1001.2, it cannot be forwarded
D. If the packet source IP address is 1001.2, it can be forwarded while the DSCP field remains
unchanged
Answer: BD
Explanation:
Question: 204
MSTP switches treat RSTP switches as MSTP domains, MSTP, which are formed by a single switch The
interchange resolves the RSTBPDU to MSTBPDU, where IRPC is 0
A. True
B. False
Answer: A
Explanation:
Question: 205
If you have a Huawei switch running the STP protocol, and now connect the GO/O/17 interface and
the GO/O/18 interface of the switch through a cable, then the scenario described below is correct ?(
Single choice questions).
A. Both the G0/0/17 interface and the GO/0/18 interface enter the Forwarding state
B. Both the Go/0/17 interface and the G0/0/18 interface enter the Disccarding state
C. The Go/0/17 interface enters the Blocking state
D. The GO/0/18 interface will continuously change back and forth between the Listening state and
the Learning state
E. GO/0/18 interface will enter the Disking state
Answer: E
Explanation:
Questions & Answers PDF
P-64
Question: 206
Huawei's two switches SWA and SWB are connected together by 7 Ethernet cables, and static link
clustering is configured, and the corresponding port on the switch SWA is Ethernet 1/0/1
?Ethernet1/0/2?Ethernet 1/0/3?Ethernet 1/0/4?Ethernet 1/0/5, Ethernet1/0/6, Ethernet 1/0/7,
configured in order of port if the switch SWA, SWB supports only 6 ports per aggregation group
A. In the case of consistent configuration of each port, Ethernet 1/0/6 port is an aggregate group
Unselected port
B. In the case of consistent configuration of each port, the Ethernet1/0/1 port is an aggregate group
Unselected port
C. With the same configuration of each port, the Ethernet 1/0/7 port is the aggregate group
Unselecte port
D. With the same configuration of each port, SWA randomly selects one of the 7 ports as the
aggregate group Unselecte port
Answer: C
Explanation:
Question: 207
??? aggregate ipv4-address { mask/masklength }[as-set lattribute-policy route-policy-namel ldetailsuppressedlorigin-policy routein policy-name2[suppress3policy route-policy-name3], multiple parameters can be used to influence
summary routes and their results. The correct description about the command is ?( Multiple choice
questions).
A. If As-set is configured, the A S_PATH of the aggregate route contains ass path information for all
specific routes in case the route loop is blocked
B. If Suppress-policy is configured, aggregate routes are also generated, and the if-match clause in
Route-policy is used to pick suppressed detail routes. Detail routes that match Route-policy are still
advertised to other BGP neighbors
C. If Origin-policy is configured, only detail routes that match Route-policy can participate in
aggregation
D. If You configure The Interface-policy, you can change the properties of the aggregate route
Answer: ACD
Explanation:
Question: 208
Communityflter h as t wo t ypes o f b asic group n ature fi lters an d ad vanced group pr operty filters.
Which of the following filters makes t he Advanced Group Genus Filter more flexible th an th e Basic
Group Attribute Filter to match group attributes?
A. IP-pref i x
Questions & Answers PDF
P-65
B. AS-path-filter
C. Regular-expression
D. ACL
Answer: C
Explanation:
Question: 209
In a shared network, what mechanism does PIM-SM use to prevent duplicate traffic?( Single choice
questions).
A. Register mechanism
B. BSR/RP mechanism
C. Assert mechanism
D. Join/Prune mechanism
Answer: C
Explanation:
Question: 210
What are the following statements about 8021x, RADIUS, and HWTACACS certification? ( Multiple
choice questions).
A. Users can use 8021x authentication to access the network and complete identity authentication
through RADIUS
B. RADIUS authentication and WTACACS authentication are mutually exclusive and cannot be twofactor authentication for the same user at the same time.
C. RADIUS authentication and HWTACACS authentication can perform two-factor authentication for
the same user at the same time, which is more secure.
D. RADIUS authentication is mutually exclusive with 8021x authentication.
Answer: AB
Explanation:
Question: 211
The following statement about IPv6 Over VXLAN is wrong as ?( Single choice questions).
A. The tunnel between VXLAN Layer 2 and Layer 3 gateways is an IPv4 network.
B. IPv6 over VXLAN solves the problem of insufficient IP address resources for end tenants.
C. IPv6 Over VLANs do not generate ND table entries.
D. IPv6 over VXLAN means that the Overlay network of the VXLAN is an IPv6 network.
Questions & Answers PDF
P-66
Answer: C
Explanation:
Question: 212
What are the following correct statements about MUX VLANs?( Multiple select).
A. The Principal VLAN can communicate with all VLANs within the MUX VLAN
B. Each Separate VLAN must be bound to a Principal VLAN
C. Separate VLANs can communicate with all VLANs within a MUX VLAN
D. Each Group VLAN must be bound to a Principal VLAN
Answer: ABD
Explanation:
Question: 213
There is an existing switch running the RSTP protocol. If the network topology changes, what
happens to the Layer 2 forwarding table that is automatically learned by the switch?
A. All table entries are dropped
B. Except for the table entry related to the edge port that is not deleted, all other table entries are
deleted
C. Only table entries related to the port that received the TC message are dropped
D. If the aging time is set to 15 seconds, entries that exceed the aging time are deleted
E. Table entries are dropped except for table entries related to edge ports and table entries related to
ports that receive TC messages
Answer: E
Explanation:
Question: 214
The advantages of building a campus network using stacking, clustering technology include which of
the following?( Multi-select)
A. Improved network equipment and link utilization
B. It can effectively reduce network power consumption
C. Business disruption time is greatly reduced
D. Simplifies network management and reduces the complexity of network deployment planning
Answer: ACD
Explanation:
Question: 215
Questions & Answers PDF
P-67
Which of the following messages does the BGP protocol support?
A. Update
B. Open
C. Hello
D. Keepalive
Answer: ABD
Explanation:
Question: 216
The correct description of the extended features of ISIS is ?
A. When the amount of information in the Link State Protocol data packet PDU to be released by ISIS
is too large, the ISIS router will generate multiple LSP shards to carry more ISIS information.
B. ISIS can choose whether to authenticate incoming SNP and LSP packets
C. If there are other vendors' devices on the network and do not support the LSP sharding function,
the sharding expansion mode must be configured as Model-1, otherwise the message will not be
recognized by other vendors' devices.
D. After you enable the LSP shard extension feature of your router, you can use it without restarting
the ISIS process.
Answer: ABC
Explanation:
Question: 217
Regarding the difference between NSR and NSF, the correct one is?
A. The NSR must rely on a neighbor router to complete
B. Both NSR and NSF require a neighbor router to complete
C. NSF must rely on neighbor routers to complete
D. NSF does not require a neighbor router to complete
Answer: C
Explanation:
Question: 218
Which of the following default routing delivery methods does OSPF support?( Multi-select)
A. It can be issued without force
B. Can be issued on ABR
C. Issuance can only be enforced
D. Answer can be issued on ASBR
Questions & Answers PDF
P-68
Answer: ABD
Explanation:
Question: 219
Configuration under a certain interface: isis timer hello 5 level-2, the following statement is correct?
A. The hello packets sent at level-1 and Leve1-2 are both 5s
B. The hello packets sent at level-1 are sent at 5s interval
C. The level-2 hello packet send interval is 5s
D. The CSNP packet sending interval for this interface Level-2 is 5S
Answer: C
Explanation:
Question: 220
The flood range in OSPFv3 is the LSA within the entire autonomous system?
A. Intra-Area-prefix-LSA
B. AS-external-LSA
C. Link-LSA
D. Inter-Area-Prefix-LSA
Answer: B
Explanation:
Question: 221
Regarding the Stub region in the OSPF protocol, the following statement is correct.
A. Virtual connections cannot traverse the Stub region
B. Backbone zones cannot be configured as Stub zones
C. ASBR cannot exist in the Stub zone
D. Type7 LSA injection is not allowed in the Stub zone
Answer: ABCD
Explanation:
Question: 222
Because BGP is an EGP routing protocol, BGP routing policies can only be deployed between EBGP
neighbors, and routing policies between IBGP neighbors are not valid.
A. TRUE
Questions & Answers PDF
P-69
B. FALSE
Answer: B
Explanation:
Question: 223
An advanced access control list is a sequence of rules consisting of permit |deny statements that
can match IP messages based on which attributes ?(). Multiple select).
A. Destination port number
B. Source address
C. Destination address
D. Source port number
Answer: ABCD
Explanation:
Question: 224
The basic header length of an IPv6 message is a fixed value.
A. TRUE
B. FALSE
Answer: A
Explanation:
Question: 225
Regarding the site in the BGP/MPLSIP VPN network architecture, the following description is
correct?
A. Under no circumstances can different sites that belong to the same VPN use overlapping address
spaces
B. Two geographically separated networks must belong to different sites
C. Terminals connected to the carrier network through the same CE may belong to different sites
D. A site is a set of IP systems, and a network of hosts cannot be called site
Answer: ABCD
Explanation:
Question: 226
In MPLSVPN, in order to distinguish between IPv4 prefixes that use the same address space, the RD
value is added to the IPv4 address, and the following options are described correctly as ?
Questions & Answers PDF
P-70
A. RD can be used to control the publication of VPN routing information
B. On a PE device, each VPN instance corresponds to an RD value, and the RD value must be unique
on the same PE device
C. RD is encapsulated in the Update message as an extended community attribute of BGP during
delivery
D. After the PE receives an IPv4 route from CE, it adds an RD to the route to IPv4 that translates to a
globally unique VPN-IPv4 route and publishes it on the public network
Answer: B
Explanation:
Question: 227
Which of the following VPN technologies may have two IP message headers in one message?
A. GOES
B. SSL VPN
C. IPsec VPN
D. L2TP
Answer: ACD
Explanation:
Question: 228
The following statement about the application of BFD is correct?
A. The one-arm echo function refers to the detection of the connectivity of the forwarding link
through the loopback operation of the BFD packet
B. BFD multi-hop detection means that BFD can detect arbitrary paths between two systems that
may span many hops or overlap in some parts
C. BFD and OSPF linkage is to associate BFD and OSPF, and notify OSPF through BFD's rapid sensing
of link failures, thereby speeding up OSPF Response to changes in network topology
D. BFD single-hop detection refers to the IP connectivity detection of two direct-connected systems
Answer: ABCD
Explanation:
Question: 229
BGP EVPN Type2 routes are used to pass IRB type routes with information including ?( Multi-select)
A Layer 2 VNI
B. Host IP address
C. Host MAC address
D. Three layers of VNI
Questions & Answers PDF
P-71
Answer: ABCD
Explanation:
Question: 230
Use ping-ax-cY-sZ-vpn-instance M 105162, which has the meaning of
A. IcMP request for the ping, message size Z (without IP and ICMP headers)
B. The source IP address of the ping packet is X
C. The ping belongs to the VPN instance M
D. The ping sends Y ICMP requests
Answer: ABCD
Explanation:
Question: 231
The rules for RR to publish routes break the rules for horizontal segmentation of IBGP, so it is possible
to cause loops within the AS. What routing attributes does RR use to prevent loops?
A. Nexthop
B. Originator ID
C. AS-PATH
D. Cluster List
Answer: BD
Explanation:
Question: 232
The address resolution feature for NDP in the following description is incorrect?
A. When sending a neighbor request packet, the source address—is set as the link-local address
B. of the local interface Two types of ICMPv6 messages,
C. are used in the address resolution process, neighbor request and neighbor advertisement Address
resolution implements the ability to resolve from IPv6 addresses to link-layer addresses
D. When sending a neighbor request packet, the destination address must be the multicast address
of the neighbor's requested node
Answer: A
Explanation:
Question: 233
How many bits are there in the label field of MPLS ?
A. 3
Questions & Answers PDF
P-72
B. 8
C. 1
D. 20
Answer: D
Explanation:
Question: 234
There is a concept of FEC-Forwarding Equivalence Class in MPLS, so what criteria can FEC not
allocate based on?
A. Application Protocol
B. Class of Service
C. Destination Address
D. Fragment offset
Answer: D
Explanation:
Question: 235
The following description of the TTL in the MPLS Header is correct:
A. A TTL that acts like an IP header and is used to prevent message loops
B. To control label distribution
C. Limit LSR
D. Control of upstream devices for label distribution
Answer: A
Explanation:
Question: 236
For the description of firewall security zones, the following statement is correct?
A. The same interface of a firewall can belong to different security zones
B. Different security zones of the firewall, the priority can be the same
C. The built-in security zone of the Firewall can be deleted
D. Different interfaces of the firewall can belong to the same security zone
Answer: D
Explanation:
Question: 237
Questions & Answers PDF
P-73
The MAC address of a PC is 5489-98FB-65D8 The administrator wants this PC to get the specified P
address 1921681.11/24 from the DHCP server So the administrator-configured command should be,
A. dhcp static-bind ip address 1921681.11 mac- address 5489-98FB-65D8
B. dhcp static-bind ip address 1921681.11 24 mac- address 5489-98FB-65D8
C. dhcp server static -bind ip address 1921681.112552552550 mac-address 5489-98FB-65D8
D. dhcp server static-bind ip-address 1921681. 11 mac- address 5489-98FB-65D8
Answer: D
Explanation:
Question: 238
What's wrong about vrrp timers is ?
A. MASTER DOWN = (3*ADVER_ INTERVAL) + Skew_ time
B. Skew Time= (255-Priority)/255
C. By default, the time period for VRRP advertisement messages is 2 seconds
D. By default, the VRRP preemption delay is I seconds
Answer: BCD
Explanation:
Question: 239
In the VXLAN implementation, the mapping relationship between VNI and BD is
A. 1:N
B. N:1
C. 1:1
D. N: M
Answer: C
Explanation:
Question: 240
Although the STP protocol can solve the loop problem, it affects the quality of user communication
due to the slow convergence of the network topology. RSTP has made many improvements to STP,
which of the following is not an improvement of RSTP to STP?
A. In addition to the 3 port states, RSTP vice adds 2 new port roles
B. Non-root switches running RSTP send configuration BPDUs at intervals specified by Hello Timer, a
behavior that is entirely autonomous for each device
C. RSTP port state specification is divided according to whether the port forwards user traffic and
learns the MAC address, reducing the original 5 port states to 3
Questions & Answers PDF
P-74
D. If a port does not receive a configuration BPDU sent by the upstream device for 4 consecutive
Hello Time, the device considers the negotiation with this neighbor to fail
Answer: D
Explanation:
Question: 241
Regarding BGP4+, the following statement is correct?
A. BGP4+ carries the next hop address of the route through the Network Address of Next Hop in the
NLRI properties MP_REACH
B. BGP4+ carries the next hop address of the IPv6 route through the NEXT_HOP attribute
C. The NEXT_HOP attribute does not exist in BGP4+
D. BGP4+ carries the prefix and mask length of the IPv6 route through the NLRI attribute
Answer: AD
Explanation:
Question: 242
What categories can ACLs be divided into?
A. Advanced ACLs
B. Two-layer ACL
C. User-defined ACLs
D. Basic ACL
Answer: ABCD
Explanation:
Question: 243
What descriptions of the OSPF protocol are correct?
A. AS-External-LSA describes the router's path to ASBR
B.
The cost value of the second type of external route is only the AS external cost value,
ignoring the AS internal cost value
C.
AS-External-LSA does not belong in any region
D.
AS-External-LSA describes the path to the as outside of the route, and the scope of the flood
is the AS outside
Answer: BC
Explanation:
Question: 244
Questions & Answers PDF
P-75
Which of the following LSAs propagate in a single region only?
A. Router LSA
B. Summary LSA
C. Network LSA
D. AS External LSA
Answer: ABC
Explanation:
Question: 245
What parameters can the DHCPv6 server assign to DHCPv6 clients?
A. SNTP server address
B. IPv6 address/prefix
C. Gateway address
D. DNS server address
Answer: ABCD
Explanation:
Question: 246
What are the three ways to send IPv4 messages?
A. broadcast
B. Unicast
C. Multicast
D. Any broadcast
Answer: ABC
Explanation:
Question: 247
In inter-domain packet filtering, which of the following options belongs to the outbound direction?
A. trust -->Local
B. untrust--> dmz
C. trust--> untrust
D. untrust--> trust
Answer: C
Explanation:
Questions & Answers PDF
P-76
Question: 248
Which of the following parameters should be modified to re-establish the is-IS neighbor relationship?
A. Modify the Cost value of the IS-IS interface
B. Modify the send interval for the IlH of the IS-IS interface
C. Modify the Level of the IS-IS interface
D. Modify the IP address of the IS-IS interface
Answer: CD
Explanation:
Question: 249
Which of the following sequences can be matched by the regular expression [^100|200]$?
A. 300200 100
B. 200 100 300
C. 100 200 300
D. 100,300,200
Answer: BCD
Explanation:
Question: 250
Regarding BGP's recognized arbitrary attributes, which of the following descriptions is correct?
A. must be passed between BGP neighbors
B. All BGP routers must be recognized
C. There is no requirement to be present in the Update message, and you can decide whether to add
it to the Update message on a case-by-case basis
D. The BGP router cannot recognize the
Answer: BC
Explanation:
Question: 251
The main routing policy tools that BGP can use are Filter-policy and Route-policy, where Fate-policy
can only filter routes and Route-policy can only modify routes
A. TRUE
B. FALSE
Answer: B
Questions & Answers PDF
P-77
Explanation:
Question: 252
Which of the following BGP attributes is not required in the Update message for a BGP route?
A. WITH
B. Local-Preference
C. AS_PATH
D. Origin
Answer: AB
Explanation:
Question: 253
The following link-LSA for OSPFv3 is correct?
A. Contains both the link-local address of this interface and all IPV6 prefixes of the same area on this
router.
B. Contains both the link-local address of the interface and all IPv6 prefixes on the interface.
C. ?Link-LSA ???Prefix ?Prefixoptions ???Ox00,?? Prefix ????IPv6??????
D. The Option field exists in the header of the LSA, not in the data area of the Link-LSA
Answer: B
Explanation:
Question: 254
ICMPv6 has two types: Error Messages and Information Messages.
A. TRUE
B. FALSE
Answer: A
Explanation:
Question: 255
The duplicate address detection feature for NDP in the following description is incorrect?
A. IPv6 unicast address is called a tentative address after it is assigned to an interface and before it is
detected by duplicate addresses
B. Duplicate address detection is implemented via RS and RA messages
C. IPv6 duplicate address detection technology is similar to free ARP in IPv4
D. The interface needs to perform duplicate address detection before enabling any of the unicast
Questions & Answers PDF
P-78
IPv6 addresses
Answer: B
Explanation:
Question: 256
In PIM-SM, the description of RP is incorrectly ?
A. All members of the group and the multicast sources that send multicast data to the group
converge to the unique RP
B. The initial multicast streams for all groups in the shared tree are forwarded to the receiver via RP
C. An RP can serve multiple multicast groups at the same time, a multicast group can correspond to
multiple RPs
D. RPs can be responsible for the forwarding of several or all multicast groups, and there can be an
RP in the network
Answer: C
Explanation:
Question: 257
Regarding the description of the security level of the configured firewall security zone, the error is ?
A. Two security zones are not allowed to configure the same security level in the same system
B. Once the security level is set, it is not allowed to change
C. You can only set the security level for a custom security zone
D. For newly created security zones, the system defaults to a security level of 1
Answer: D
Explanation:
Question: 258
DHCP Relay is responsible for forwarding DHCP packets between the DHCP server and the DHCP
client, assisting the DHCP server in dynamically assigning network parameters to the DHCP client.
A. TRUE
B. FALSE
Answer: A
Explanation:
Question: 259
Regarding the description of VRRP Fast Switching, the error is ?
Questions & Answers PDF
P-79
A. Use VRRP to monitor BFD sessions or EFM features, either in BPD sessions or EFM session states
After the change, the VRRP module is notified to achieve fast VRRP switching
B. A VRRP backup group cannot monitor Peer BFD, Link BFD, and Normal BFD
C. at the same time If you configure to monitor multiple BFDs at the same time Then the various
configurations are interrelated and may have an impact
D. When a VRRP backup group monitors normal BFD, when the BFD state changes, the activestandby state is changed by modifying the backup group priority
Answer: B, C
Explanation:
Question: 260
There are many ways to establish a cluster on a box switch, what methods does Huawei frame switch
support to establish a cluster?
A. Set up via a cluster card on the motherboard
B. Establish
C. through the cluster daughter card on the interface board. Establish
D. through the service interface on the interface board Established by switching the cluster card on
the network board
Answer: ACD
Explanation:
Question: 261
When there are multiple redundant links in an IS-IS network, multiple equivalent routes may occur.
Regarding equivalent routing within an IS-IS network, which of the following descriptions is wrong?
A. When the number of equivalent routes present in the networking is greater than the number
configured by the command, and these routes have the same priority, the next hop device System IlD
large routes are preferred for load sharing
B. After you configure the equivalent routing priority, when the IS-S device forwards traffic to the
destination segment, it will not use load sharing, but forward the traffic to the next hop with the
highest priority
C. For each of the equivalent routes, you can assign a priority, with the highest priority routes
preferred and the rest as backup routes
D. If load sharing is configured, traffic is evenly distributed across each link
Answer: D
Explanation:
Question: 262
Questions & Answers PDF
P-80
MQC, like PBR—can only be called under the device's Layer 3 interface.
A. TRUE
B. FALSE
Answer: B
Explanation:
Question: 263
IsIS IPv6 cost 50 is configured under the interface, and the meaning of the command is ?
A. The LEVEL-1 and Level-2 costs of the interface's IS-IS IPv6 are 50
B. The LEVEL-1 and Leve1-2 costs of the INTERFACE's IS-IS IPv6 are both 60
C. The LEVEL-2 cost of the interface's IS-IS IPv6 is 50
D. The LEVEL-1 cost of the interface's IS-IS IPv6 is 50
Answer: A
Explanation:
Question: 264
Regarding the description of the BGP neighbor, the error is:
A. BGP routers that support autodiscovery neighbors
B. BGP establishing neighbors must be configured with MD5 authentication
C. BGP needs to establish a UDP connection before establishing a neighbor
D. BGP to establish a neighbor relationship needs to first interact with the link state information
Answer: ABCD
Explanation:
Question: 265
The following statement about IS-IS (IPv6) is correct?
A. In order to support the processing and calculation of IPv6 routes, IS-IS has added TLV232 and 236
B. By default, IS-IS has the multi-topology feature turned on
C. IS-IS works at the data link layer and only needs to add a new TLV to support IPv6
D. In order to support the processing and calculation of IPv6 routes, IS-IS has added NLPID to the
129 TLV
Answer: ACD
Explanation:
Question: 266
Questions & Answers PDF
P-81
In the evolution from IPv4 networks to IPv6, some transition technologies have emerged, which of
the following are common types of transition technologies?
A. Dual-stack technology
B. Tunneling Technology
C. Compatible with Technology
D. Conversion Technology
Answer: ABCD
Explanation:
Question: 267
Regarding the description of the encapsulation format of the labels in MPLS, the correct one is ?
A. The TTL field in the label has a similar meaning to the TTL (Time To Live) in the IP packet, and also
has the effect of preventing loops
B. The total length of an MPLS single tag is 4 bytes (32 bits).
C. For Ethernet, PPP packets, the tag stack is like a "cushion layer", located between the layer 2
header and the data, and when there is a VLAN tag, the MPLS header is placed on the Ether head and
VLANtag between
D. label in the S field, lbit Used to identify whether the label is a bottom label, and a value of 1
indicates that it is the penultimate label
Answer: AB
Explanation:
Question: 268
In an MPLS domain, depending on how the LSR handles the data, the LSR can be divided into Ingress
LSR, Transit LSR, and Transit LSR Egress LSR? For the same FEC An LSR can be an Iningress LSR for
that EC or a Transit for that FEC LSR.
A. TRUE
B. FALSE
Answer: A
Explanation:
Question: 269
The following statement about the VPNv4 address is wrongly described as ?
A. By default, PE does not perform VPN-target filtering on received VPNv4 routes.
Questions & Answers PDF
P-82
B. Local PE sets up An Export Target for these routes before releasing VPNv4 routes learned from
sites that are directly connected to them to other PEEs attributes, and are published with routes as
extended community attributes for BGP.
C. Carries the RD attribute when BGP publishes both reachable and unreachable VPNv4 routes.
D. The VPNv4 address has a total of 12 bytes, including an 8-byte route identifier RD (Route
Distingulisher) and a 4-byte IPv4 Address prefix.
Answer: A
Explanation:
Question: 270
What about the description of IGMP Snooping, is it correct?
A. IGMP Snooping solves the problem of multicast messages broadcasting in layer 3
B. IGMP Snooping does not consume the CPU of the switch
C. IGMP Snooping establishes a MAC multicast address table by listening for IGMP packets sent by
the host
D. IGMP Snooping runs at the link layer and is a multicast constraint mechanism on Layer 2 Ethernet
switches that manages and controls multicast groups
Answer: CD
Explanation:
Question: 271
In SSM, what version of IGMP is required?
A. IGMPV3
B. IGMPV4
C. IGMPV2
D. IGMPV1
Answer: A
Explanation:
Question: 272
After configuring the VLAN-based MAC address drift detection function, if the MAC address drifts,
you can configure the actions of the interface according to your needs. Which of the following is not
a configurable action?
A. Send an alert
B. The MAC address blocks
C. Interface blocking
D. Traffic filtering
Questions & Answers PDF
P-83
Answer: D
Explanation:
Question: 273
Comparisons for primary switch elections in the stack include ?
A. MAC address
B. Health status
C. Stack priority
D. Stack ID
Answer: ABC
Explanation:
Question: 274
Port isolation technology deployed in Ethernet can realize Layer 2 interoperability and Layer 3
isolation, making networking more flexible.
A. TRUE
B. FALSE
Answer: B
Explanation:
Question: 275
What are the wrong statements about OSTPF's Router LSA and Network LSA?
A. There must be both Router LSA and Network LSA in the OSPF network
B. Network LSA carries both topology and routing information
C. A router running OSPF must produce a Network LSA
D. A router running OSPF must produce a Router LSA
Answer: AC
Explanation:
Question: 276
The following description of MED, correct:
A. MED default value is 100
B. MED can only be passed within this AS
C. MED is an optional non-transitional attribute
Questions & Answers PDF
P-84
D. MED The default value is 0
Answer: CD
Explanation:
Question: 277
Which of the following scenarios is not suitable for deploying interface policy routing?
A. In the scenario of multiple ISP egresses of enterprise networks, different network segments of the
intranet access the Internet through different ISP egresses
B. The traffic accessed by the intranet and the extranet to the side-mounted security detection
device is pulled on the core switch
C. Modify the next hop of locally originating traffic
D. Pull the traffic of the intranet and the Internet accessing each other on the core switch to the AC
device attached to the side
Answer: C
Explanation:
Question: 278
For a non-directly connected EBGP neighbor to establish properly, what configurations must be
included as follows?
A. peer ebgp-max-hop
B. peer ignore
C. peer as-number
D. peer connect-interface
Answer: AC
Explanation:
Question: 279
LDP messages are exchanged between LDLRs running the LDP protocol, and LDP messages can be
divided into four types according to function, which of the following is not an LDP message type ?
A. Advertisement message
B. Discover message
C. Conversation message
D. Label Exchange Information
Answer: D
Explanation:
Questions & Answers PDF
P-85
Question: 280
Regarding MP-BGP, the following description is wrong?
A. Radio A. MP-BGP needs to assign a private label to the VPNv4 route
B. PE and CE are routed through BGP interaction, you need to create a BGP process on ce for each
VPN instance
C. The message type and VPNv4 routing publishing policy for MP-BGP are the same as for BGP-4
D. MP-BGP advertises VPNv4 through two attributes, MP_REACH_NLRI and MP_UNREACH_NLRI
Route
Answer: B
Explanation:
Question: 281
Regarding BGP/MPLS IP VPN routing interactions, the following description is incorrect?
A. The ingress PE changes the IPv4 route received by the CE to the VPNv4 route, and the storage
B. PE is carried out according to different VPN instances What interacts with the CE is IPv 4 routing
information
C. After receiving the VPNv4 route issued by the ingress PE, the egress PE filters the VPNv4 route
according to the RT attribute carried by the route
D. The egress PE can send an IPv4 route to the remote CE via BGP, IGP, or static routing
Answer: D
Explanation:
Question: 282
Regarding the BGP/MPLS IP VPN network architecture, what is the error described below?
A. sites can be accessed each other through vPNs, and a site can only belong to a VPN
B. P devices only need basic MPLS forwarding capabilities and do not maintain VPN-related
information
C. BGP/MPLSIPVPN network architecture consists of CE (Customer Edge), PE (Provider Edge) and P
(Provider), of which PE and P Is a carrier device, CE is BGP/MPLSIPVPN with
Household equipment
D. Under normal circumstances, CE devices are not aware of the presence of VPN, and CE devices do
not need to support MPLS MP-BGP, etc
Answer: A
Explanation:
Question: 283
Questions & Answers PDF
P-86
RTA is the source DR router, RTB is the RP router, and the multicast source sends multicast data to the
RTA, but the PIM is not visible on the RTB Register the multicast source to which the message is
registered, then the possible causes are ?
A. Multicast network statically configures RP, while RTA router does not statically configure RP
B. The RP elected by RTA is not an RTB
C. RTB to RTA has no unicast routing, causing the RTB to fail RPF checks for the source
D. The multicast network dynamically elects the RP instead RTA failed RPF check for BSR
Answer: ABCD
Explanation:
Question: 284
Regarding the description of the permanent multicast address, the error is ?
A. All routers running the PIM protocol listen on 22400100
B. All routers listen on 224002
C. All hosts and routers in the network segment listen on 224001
D. All routers running the OSPF protocol listen to 224005
Answer: A
Explanation:
Question: 285
If all the public IP addresses are used by a company's intranet users to access the Internet using
NAT's No-pat method, what will happen to subsequent intranet users who access the Internet?
A. automatically switch NAT to PAT after the Internet
B. Subsequent intranet users will not be able to access the Internet
C. Synchronize messages to other NAT conversion devices for NAT conversion
D. Squeeze out the previous user and force NAT conversion to go online
Answer: B
Explanation:
Question: 286
The correct statement about the VRRP protocol version is ?
A. VRRPv2 is only available for IPv4
B. VRRPv3 does not support authentication
C. VRRPv2 supports authentication
D. VRRPv3 is only available for IPv6
Questions & Answers PDF
P-87
Answer: ABC
Explanation:
Question: 287
The Layer 3 logical interface on XLAN L3 Gateway that enables communication between different
VXLAN virtual networks is ?
A. Layer 2 sub-interface
B. NVE interface
C. VBDIF interface
D. VLANIF interface
Answer: C
Explanation:
Question: 288
The RSTP protocol provides a variety of protection functions, such as when the edge port is
configured as a protection state, the edge port receives the BPDU packet processing method;
A. Directly discard the BPDU packet
B. Close the port
C. After parsing the BPDU message, the relevant information is obtained
D. Forward BPDU packets as required
Answer: B
Explanation:
Question: 289
The role of Link-LSA in OSPFv3 does not include ?
A. Advertise to other routers on the link optional that is set in the Network LSA from which this link
originates
B. Advertise the per-port ID of this router to other routers on the link
C. Advertise the link-local address
D. of this interface to other routers on the link Advertise this IPv6 prefix list to other routers on the
link
Answer: A
Explanation:
Question: 290
Regarding BGP MED, which of the following descriptions is correct?
Questions & Answers PDF
P-88
A. In the BGP routing rules, MED has a lower priority than AS Path, Praferred-value, Local-Preference,
etc Origin
B. The default value for the B. BGP routing MED is 0
C. By default, if there is no MED value in the route attribute, it is processed by 0 If the bestroute
med-none-as-maximum command is configured, MED is processed as the maximum 4294967295
D. By default, BGP routing rules can MED comparison of routes from different autonomous systems
Answer: ABC
Explanation:
Question: 291
What does IPV6 enable topology ipv6 mean under IS-IS protocol view?
A. Does not have any meaning
B. SPF calculation for IPv6 is not supported
C. SPF calculation is performed separately in the topology of IPv4 and IPv6,
D. IPv4, IPv6 using the same topology for SPF calculation
Answer: C
Explanation:
Question: 292
The value of OSPF and BFD linkage is ? Radio
A. Any change in BFD status is realized by detecting the BFD at the millisecond level, which correlates
the OSPF state and realizes the purpose of OSPF rapid sensing link state
B. Does not affect OSPF neighbor status
C. BFD packet transmission interval can reach the 100-second level, which is slower than the OSPF
induction link state
D. OSPF's hello send interval is seconds, which is faster than BFD inductive link state
Answer: A
Explanation:
Question: 293
A campus deployed both IPv4 and IPv6 networks for service testing, and ran IS-S to interconnect the
networks. (The S-S routing protocol has good scalability and is widely used in the live network.)
Regarding IS-IS extensibility, which of the following statements is true?
A. In order to support IPv6, IS-IS needs to add TLV to carry IPv6 address information
B. IS-IS uses the TLV structure to build messages, making lS-IS more flexible and extensible
C. NLPID is a new type of TLV added by IS-IS to support IPv6
Questions & Answers PDF
P-89
D. For IS-IS, adding new features simply adds a new TLV to
Answer: ABD
Explanation:
Question: 294
When configuring AS-Path-Filter, ip as-path-filter 10 permit_100$ indicates a matching route
received from the A5100 but not from the AS100
A. TRUE
B. FALSE
Answer: B
Explanation:
Question: 295
Regarding the domain-authentication-mode md5 hello command in the ISIS process, the correct
explanation is ?
A. ISIS authentication cannot be applied in IPv6 environments.
B. This command is mainly used to make is the ISIS Hello message carry authentication information
during the transmission process.
C. All router domain authentication methods of the same routing domain are MD5, the password is
hello, and lS-IS SNP and LSP will spread normally.
D.
outing domain authentication is primarily used to allow level-1 and Level-2 SNP and LSP
messages to carry authentication information during delivery.
Answer: C
Explanation:
Question: 296
Which of the following configurations is the correct OSPFv3 route aggregation configuration:
A. [Huawei]ospfv3 1 [Huawei-ospfv3-1J]area 1
[Huawel-ospfv3-1-area-0001]abr-summary fc00:0-0:48 cost 400
B. [Huawei] interface gigabitethernet 1/0/0
[Huawei-GigabitEthernet1/0/0]asbr-surmary fcO0-0:0:48 cost 20
C. [Huawei]ospfv3 1 [Huawei-ospfv3-1]asbr-surmary fcO0-0:0::48 3 cost 20 tag 100
D. [Huawei]ospfv3 1 [Huawei-ospfv3-1]abr-surmary fcO0:0:0:48 cost 400
E.
(Huaweijospf3 1 Huawei-ospfv3-1Jarea 1
Huawei-ospfv3-1-area-0001]asbr-sumary fcO0:0:0: 48 cost 20 tag 100
Answer: AC
Questions & Answers PDF
P-90
Explanation:
Question: 297
In order for routers at both ends of the IPv6 over lPv4 manual tunnel to exchange routing
information, OSPV3 can be enabled on the tunnel, osPFv3 will be able to form a normal neighbor
relationship, and the tunnel interface will be treated as a P2P link interface.
A. TRUE
B. FALSE
Answer: A
Explanation:
Question: 298
If we have a VPN instance configured on a router, if we need to view the VPN route on a Huawei
router, which of the following commands should we use?
A. display ip routing-table vpn-instance vpn-instance-name
B. display ip routing-table
C. display vpn routing-table
D. display ip vpn-instance
Answer: A
Explanation:
Question: 299
Is the following statement about VLAN aggregation correct?
A. Sub-VLAN is used to isolate broadcast domains
B. A Super VLAN can contain one or more Sub-VLANs
C. The super Sub-VLAN contains a physical interface that can establish a Layer 3 VLANIF interface
D. Sub-VLAN contains a physical interface that can establish a Layer 3 VLANIF interface
Answer: AB
Explanation:
Question: 300
Regarding the characteristics of CE double attribution, the description is wrong with ?
A. CE accesses the backbone through two links that can be used as both load sharing and primary
and standby links.
B. CE and PE form a CE dual-home network, which can ensure high network availability.
Questions & Answers PDF
P-91
C. VRFs of two PEs connected to the same CE can belong to different VPNs.
D. In the CE dual home network, it is possible to generate loops, and you can use route-tag to solve
the loop problem.
Answer: C
Explanation:
Question: 301
There is a new HW office that needs to use their router as a DHCP server. When configuring the
DHCP server to provide DHCP services to the current office, what of the following items need to be
configured?
A. Exclude unused IP addresses from the DHCP server
B. Configure the timeout period for ping packets
C. Configure the startup file for the DHCP server
D. Configure manual binding
E. Configure dhcp address pool
Answer: AE
Explanation:
Question: 302
BGP EVPN advertises external routes, which of the following routes?
A. Type1
B. Type2
C. Type3
D. Type4
E. Type5
Answer: E
Explanation:
Question: 303
A routing tool can define multiple entries. Which tool will automatically add a deni-any entry at the
end of the configuration?
A. Route policy
B. Community-tilter
C. IP-prefix
D. AS-path-filter
Answer: ABCD
Questions & Answers PDF
P-92
Explanation:
Question: 304
The following statement about a cross-domain MPLS VPN is mischaracteristic?
A. When the public network tag is LDP only , for cross-domain VPN-optionC scenario 2, a three-layer
tag is required in the packet forwarding process.
B. For the cross-domain VPN-OptionB approach, an MP-eBGP neighbor relationship needs to be
established between the two ASBRs.
C. For the cross-domain VPN-OptionA mode, the route passed between the two ASBRs is a normal
IPv4 route.
D. For the cross-domain VPN-OptionB approach, two ASBR-PEs are interconnected with multiple
interfaces (including sub-interfaces), each associated with a VPN, each ASBR PE treats the peer as a
CE.
Answer: AD
Explanation:
Question: 305
Network managers can use CAR technology in traffic policing. What of the following technologies
can be applied in CAR?
A. Double barrel two-speed
B. Double barrel single speed
C. Single barrel single speed
D. Three barrels of single quick
Answer: AB
Explanation:
Question: 306
In an MPLS BGPVPN networking that does not enable MPLS penultimate hop pop-up technology.
When the message reaches the last hop PE, the message has two layers of labels, and the two layers
of label values can be the same.
A. TRUE
B. FALSE
Answer: A
Explanation:
Question: 307
Questions & Answers PDF
P-93
Regarding the MPLS basic forwarding process, the following description is incorrect? Radio
A. By default, the PHP-enabled Erass node assigns a label value of 3 to the inverted second-hop
node.
B. When an IP message enters the MPLS domain, the MPLS boundary device inserts a new label
between the layer 2 header and the IP header.
C. When the P message enters the MPLS domain, check whether the Tunel lD value corresponding to
the destination IP address is Ox0O If the Tunel IlD value is Ox0 Then enter the MPLS forwarding
process.
D. The transport node device replaces the existing top-of-stack label (outermost label) with the label
assigned by the next hop device.
Answer: C
Explanation:
Question: 308
In EPIM-SM, the following description of the PIM Join message is correct?
APIM Join messages are sent every 3 minutes, and status B. PIM Join messages for the multicast
tree are only sent when the multicast tree is first established
C. The PIM Join message is sent every 60 seconds to refresh the status of the upstream router
mroute for the multicast tree
D. The upstream router sends a PIM Join acknowledgment in response to each PIM Join message
received from the downstream router
Answer: C
Explanation:
Question: 309
Which field in the IPv6 basic header has a similar effect to which field in the IPv4 header does?
A. Flags
B. Protocol
C. Time to Live
D. Ldentification
Answer: C
Explanation:
Question: 310
Four routers R1, R2, R3, and R4 run IS, and the I5S router type is noted in the diagram. All four
routers have an area address of 49001, and looking at the routing table on R1l shows the following
results, the reason why R did not reach the route of 1034344
Questions & Answers PDF
P-94
A. The routing policy configured on the ARO filters the System-ID of the default route
B. R2 from conflicting with R3
C. R and R4 Zone Planning Errors The System-ID of
D. R2 conflicts with R1
Answer: C
Explanation:
Question: 311
A router Router LSA is shown in the figure, and the error in the following statement is ?
Questions & Answers PDF
P-95
A This router supports external routing ingestion
B. This router is a DR
C. The Router ID of this router is 100121
D. This router has established an adjacency relationship
Answer: B
Explanation:
Question: 312
The correct statement about the difference between OSPFv2 and OSPFv3 is ? Multi-select
A. BOTH OSPFv2 and OSPFv3 support interface authentication. And OSPFv3 authentication is still
based on the fields in the ospf message header
B. OSPFv3 is similar to OSPFv2 in that it uses a multicast address as the OSPF message destination
address
C. The same type of message exists in OSPFv2, OSPFv3: Hello, DD, LSR, LSU, LSAack, Their message
format is the same
D. OSPFv2 has the protocol number 89 in the IPv4 packet header, OSPFv 3 The next number in the
IPv6 message header is 89
Answer: BCD
Explanation:
Question: 313
Four
routers running IS-4S and an adjacency relationship has been established, the area number
Questions & Answers PDF
P-96
and the level of the router are noted in the figure, and the R4 reaches 10022/32 on the RI device
Cost for how much?
A. 50
B. 80
C. 40
D. 30
Answer: B
Explanation:
Question: 314
Regarding the Stub region and the NSSA region of the OSPF protocol , the following statement is
incorrect with a single choice
A. Neither the Stub region nor the NSSA region allows injection of Type4 LSA
B. Type5 LSA injection is not allowed in the Stub region, while Type5LSA injection is allowed in the
NSSA region
C. Type7LSA injection is not allowed in the Stub region, while Type7LSA injection is allowed in the
NSSA region
D. Both the Stub region and the NSSA region allow injection of Type3 LSA
Answer: B
Explanation:
Question: 315
If the Interface Sticky MAC function is enabled, what is the number of MAC addresses that the
interface learns by default?
A. 15
B. 10
Questions & Answers PDF
P-97
C. 5
D. 1
Answer: D
Explanation:
Question: 316
As shown in the figure, SWA, SWB runs the PSTP protocol, and Cost of Path remains the default
without modification, so the following statement is correct
A. GEO/0/1 on ASWB is Alternative port
B. GE0/0/2 on SWB is Alternative port
C. SWA On GEO/0/1 for backup port
D. SWB will become the root bridge
Answer: B
Explanation:
Questions & Answers PDF
P-98
Question: 317
Which of the following is the benefit of VLAN aggregation?
A. Implements isolation of broadcast domains between Sub-VLANs
B. Reduce the waste of IP addresses
C. Increased number of available VLANs
D. Increased flexibility in addressing
Answer: ABD
Explanation:
Question: 318
The correct description about the prefix list is:
A. The prefix list is used to filter P prefixes and can match both prefix numbers and prefix lengths
B. The prefix list is used to filter IP prefixes, and cannot match both the prefix number and the prefix
length
C. The prefix list cannot be used for packet filtering
D. The prefix list can be used to filter packets
Answer: AC
Explanation:
Question: 319
IS-IS supports the processing and computation of IPv6 routes by adding ATLPs to carry IPv6 addresses
and reachability information.
A. TRUE
B. FALSE
Answer: A
Explanation:
Question: 320
There can be multiple nodes under a route -policy, different node numbers are identified by nodes,
and each node can have multiple if-match and apply clauses, which of the following descriptions are
wrong ?
A. The relationship between the if-match clauses under each node is "and"
B. The relationship between different nodes is an "and" relationship
C. There is an "or" relationship between different nodes
Questions & Answers PDF
P-99
D. The relationship between the if-match clauses under each node is "or"
Answer: BD
Explanation:
Question: 321
What information does the BGP Open message carry as follows?
A. BGP Router ID
B. Route attributes
C. Local Autonomous System (AS) number
D. Hold time
Answer: ACD
Explanation:
Question: 322
The following description of BGP loop protection is correct: multi-select
A. Any routing information from an IBGP peer is advertised to the other IBGP peers
B. Any update information received from the EBGP peer that contains its own AS number in the ASPATH attribute is discarded via the AS-PATH attribute
C. Non-RR BGP routers do not announce any updates from IBGP peers to other IBGP peers
D. BGP routers do not announce any slaves The EBGP peer comes to update the information to its
EBGP peer
Answer: BC
Explanation:
Question: 323
In route-policy, what are the BGP attributes that can be used for the apply clause?
A. AS-Path
B. MED
C. Local-Preference
D. Day
Answer: ABC
Explanation:
Question: 324
BGP EVPN does MAC address advertisement, ARP message advertisement, and IRB route
Questions & Answers PDF
P-100
advertisement for which BGP EVPN route is advertised?
A. Type3
B. Type2
C. Type4
D. Type1
Answer: B
Explanation:
Question: 325
The command to configure VRRP preemption delay is ?
A. vrrp vrid 1 preempt-mode timer delay 20
B. vrrp vrid 1 preempt-delay 20
C. vrrp vrid 1 preempt-timer 20
D. vrrp vrid 1 timer delay 20
Answer: A
Explanation:
Question: 326
By default, huawei firewalls provide the following security areas:
A. Trust zone
B. Security zone
C. Local zone
D. Untrust Zone
Answer: ACD
Explanation:
Question: 327
If a DR needs to be elected between multicast routers running PIM-SM to be responsible for the
sending and receiving of source or member multicast data, which one is described correctly below
for the DR election rule?
A. PIM routers with long interface masks are elected dr.
B. Compare the DR priority first; With the same priority, you need to compare the interface IP
addresses of the PIM routers to elect dr
C. PIM routers with small IP addresses are elected DR. PIM routers with low D. DR priority values are
elected DR.
Questions & Answers PDF
P-101
Answer: B
Explanation:
Question: 328
In an intra-domain MPLSVPN network, when a packet enters the public network and is forwarded, it
is encapsulated with two layers of MPLS tags, and the description of the two layers of tags in the
following options is incorrect
A. The outer label of mpls VPN is assigned by the LDP protocol or statically, and the inner label is
assigned by the MP-BGP neighbor of the peer
B. The outer label of MPLS VPN is called a private network label, and the inner label is called a public
network label
C. The outer label is used to correctly send packets to the appropriate VPN in
D. on the PE device By default, the outer label is ejected before the packet is forwarded to the last
hop device
Answer: BC
Explanation:
Question: 329
DHCPv6 servers support additional configuration information such as DNS server addresses for hosts.
A. TRUE
B. FALSE
Answer: A
Explanation:
Question: 330
Which of the following does the digital certificate not contain?
A. Digital envelopes
B. Issued by
C. Digital signature
D. Public key information
Answer: A
Explanation:
Question: 331
The following statement about the security alliance SA in IPSec is incorrect
Questions & Answers PDF
P-102
A. SA is uniquely identified by a triple that includes the security parametric reference SPI (Security
Parameter Inder), the source IP address, and the security protocol number (AH or ESP)
B. Use the display ipsec command to view the encryption algorithm used with another IPSec peer,
the traffic of interest, and so on.
C. IPSec only supports encrypting data using symmetric encryption algorithms.
D. A two-way SA must exist between IPSec peers to establish an IPSec VPN connection
Answer: A
Explanation:
Question: 332
The following statement about RSTP root protection is correct?
A. Turning on root protection on the root port takes effect
B. The port that turns on the root protection receives the RST BDPU with a higher priority and will
enter the error-down state
C. It is recommended that you turn it on on a switch that is at the edge of the network
D. After opening the root-protected port and receiving the RSTBPDU with a higher priority, if it does
not continue to receive the RSTBPDU with a higher priority for a period of time, it will return to the
normal forwarding state
Answer: CD
Explanation:
Question: 333
Unlike STP, RSTP has only one BPDU type, its value is 2, and there is no TCN BPDU.
A. TRUE
B. FALSE
Answer: A
Explanation:
Question: 334
As shown in figure, Clent1, C lent2 and Clent3 are simultaneously clients of RR1. Ri introduces 10
routes. It is assumed that the RGP is configured correctly. The neighbor relationship has been
established, how many route entries exist in the BGP routing table of the most clIient3?
Questions & Answers PDF
P-103
A15
B. 10
C. 20
D. 1
Answer: B
Explanation:
Question: 335
OSPFv3 uses the same route advertisement method as OSPFv2: advertising is done through the
network command in the OSPFv3 area view.
A. TRUE
B. False
Answer: B
Explanation:
Question: 336
In the topology shown in the figure. Running the OSPFv3 protocol over the entire network does not
produce what type of LSA on R1 without external route introduction?
Questions & Answers PDF
P-104
A. Intra-Area-Prefix-LSA
B. Inter-Area-RouterLSA
C. Link-LSA
D. Inter-Area-Prefix-LSA
Answer: B
Explanation:
Question: 337
IS-IS is a link-state routing protocol that uses the SPF algorithm for route calculations. As shown in
the figure, at the same time, a certain area has IPV4 and IPV6 and runs IS-IS to achieve network
interconnection, of which R2 only supports IPV4 Regarding the topology calculation of the network,
which of the following statements is correct?
A. By default, IPv6 is not supported because R2 Therefore, in the shortest path tree formed by the
JPv6 network computation, the path where R1 accesses R4 is: R1-R3-R4
B. If you want the IPv4 and IPv6 networks to compute the same shortest path tree. The IPv6-enable
Questions & Answers PDF
P-105
topology lpv6 command is required to enable the Russian force of IPv6 under the IS-IS process
C. By default, in the shortest path tree formed by the IPv6 network calculation, R1 accesses R4 as R1R2-R4, since R2 does not support IPv6 Therefore, R2 will directly drop the IPv6 packet after receiving
it, and select the traffic loss
D. By default, IPv4 and IIPV6 networks are computed separately to form different shortest path trees
Answer: C
Explanation:
Question: 338
Which of the following parameters are not required when configuring BGP Peers?
A. as-number
B. password
C. peer IP Address
D. Description
Answer: BD
Explanation:
Question: 339
Link state information is isolated by default between different IS-IS processes on the same router.
A. TRUE
B. FALSE
Answer: A
Explanation:
Question: 340
Is the following statement about the multicast address used by 0SPFv3 correct?
A. RD routers use FF02: :6
B. The DR router uses FF08::6
C. All OSPF routers use FF02::5
Answer: AC
Explanation:
Question: 341
As shown in the figure, private network routing information is exchanged between PEl and PE2 and
their respective CE via OSPF, and the same is configured on PEI and PE2 Domain D. When routing is
Questions & Answers PDF
P-106
introduced from BGP to OS9PF on PE2, the following limited types of LSAs may be passed to E2?
A. Type7 LSA
B. Type5 LSA
C. Type3 LSA
D. Type1 LSA
Answer: CD
Explanation:
Question: 342
Is the following description of the differences between IGMP name versions correct?
A. IGMPv1/v2 cannot elect the queryer itself, while IGMPv3 can
B. IGMPv1 does not support specific group queries, while IGMPv2 does
C. IGMPv1/2/v3 cannot support the SSM model
D. For members to leave, IGMPv2/v3 can actively leave, while IGMPvl cannot
Answer: BD
Explanation:
Question: 343
A medium-sized campus network manages the network through the SNMP protocol, and the campus
is highly network-safe, so which version of SNMP is recommended for management?
A. SNMPv1 B. SNMPv2C
C. SNMPV3
D. All versions are available to implement
Answer: C
Explanation:
Question: 344
In a VXLAN network, traffic is connected to the VXLAN network, and it can also be used to
communicate with the same subnet within the same XLAN network
Questions & Answers PDF
P-107
A. NVE interface
B. VXVAN L2 Gateway
C. VXLAN L3 Gateway
D. VLANIF interface
Answer: B
Explanation:
Question: 345
What are the problems with manually creating static VXLAN tunnels in campus networks? Multiselect
A. Although the static VXLAN tunnel mode can support distributed gateway application scenarios, the
configuration workload is large and the configuration adjustment is complex
B. N devices to establish static VXLAN tunnels, you need to manually configure up to N(N-1)/2
tunnels, the amount of configuration is large
C. VTEP can only learn remote MAC addresses in a way that relies on data flooding
D. Static VLAN tunnel also uses related protocols on the control plane, which will cause equipment
resource loss
Answer: ABC
Explanation:
Question: 346
In the description of the MAC address spoofing attack, the error is ? Radio
A. Mac address spoofing attacks cause the switch to learn the wrong mapping of Mac addresses to IP
addresses
B. A MAC address spoofing attack causes the data that the switch is sending to the correct
destination to be sent to the attacker
C. MAC address spoofing attacks primarily exploit the switch Mac address learning mechanism
D. An attacker can perform a MAC address spoofing attack by sending a forged source Mac address
data frame to the switch
Answer: A
Explanation:
Question: 347
The following is a description of how BFD sessions are established, which is the wrong one
A. The system distinguishes between static BFD sessions and dynamic BPD sessions by dividing the
identifier area Dynamically assign this landmark identifier
Questions & Answers PDF
P-108
B. BFD sessions can only be established dynamically
C. Static configuration of BFD session refers to manual configuration of BFD session parameters
through the command line, including local identifiers and remote identifiers
Answer: C
Explanation:
Question: 348
The DHCP protocol assigns to clients—some TCPIP-related parameter information—in the process
DHCP defines a variety of messages that are encapsulated at the transport layer :(sortic).
A. PPP package
B. IP encapsulation
C. TCP Encapsulation
D. UDP Encapsulation
Answer: D
Explanation:
Question: 349
A switch joins a running stacking system after powering up, a behavior known as heap overlay.
A. TRUE
B. FALSE
Answer: A
Explanation:
Question: 350
In the multi-level RR scenario, the first-level RR will be connected to a large number of second-level
R, which may cause the BGP circuit of the first-level RR to overflow from the table Risk of R BGP
routing table overflow?( Radio).
A. ORF
B. Route Control C. Route Aggregation
D. Set the same Cluster-ID
Answer: C
Explanation:
Question: 351
?BGP4+?,Update ????M IP_R EACH_NLRI ?????next hop network address ????? ?
Questions & Answers PDF
P-109
A. It can be just link-local address
B. Can only be a link-local address
C. You can carry a link-local address and a global unicast address
D. at the same time Can only be a global unicast address
Answer: C
Explanation:
Question: 352
The following description of Link ID, Data, Type, and Metirc in Router-LSA is correct :( Multiple
select).
A. Metric describes the overhead of this connection
B. The Link ID represents the local identity of this connection, and the different connection types The
Link ID represents different meanings
C. Data is used to describe additional information for this connection, and different connection types
describe different information
D. Type indicates the type of connection
Answer: ABCD
Explanation:
Question: 353
The following statement about the IS-IS protocol is incorrect?
A. The IS-IS protocol is a link-state protocol that runs between AS
B. The IS-IS protocol supports CLNP networks
C. Messages for the IS-IS protocol are encapsulated directly by the data link layer
D. The IS-IS protocol supports IP network ad
Answer: A
Explanation:
Question: 354
The following statement about the OSPFv3 message format is correct?( Multiple select).
A. There is no change in the option field of the Hello message
B. Remove the Authentication, Auth Type fields
C. Hello messages no longer contain address information, carrying Interface lD
D. The OSPF version number changed from 2 to 3
Answer: BCD
Questions & Answers PDF
P-110
Explanation:
Question: 355
BGP authentication can prevent illegal routers from establishing neighbors with BGP routers, BGP
authentication can be divided into MD5 authentication and Keychain authentication, please ask
which BGP messages will be carried below BGPKeychain authentication information?( Multiple
select).
A. Update
B. Notification
C. Keeplive
D. Open
Answer: ABCD
Explanation:
Question: 356
MPLS is called multiprotocol label switching, and with respect to label descriptions in MPLS, the
correct one is ?( Multiple select).
A. The MPLS system has a variety of label publishing protocols, such as LDP is a label publishing
protocol
B. The label is carried by the head of the MPLS message and has a global significance, that is, the
label value of all routers cannot repeat
C. A tag is a fixed-length, locally only meaningful identifier that uniquely identifies the FEC to which a
group belongs
D. MPLS supports single-layer tags as well as multi-tier tags
Answer: ACD
Explanation:
Question: 357
During the LDPsession setup process, the active party first sends the Illitalization information to
negotiate the parameters, and if the passive party does not accept the negotiation parameters,
which of the following messages will be sent? <(Single select).)
A. Hello Message
B. Error Notification Message
C. Keepalive Message
D. Initialization Message
Answer: B
Explanation:
Questions & Answers PDF
P-111
Question: 358
The following description of IGMPv1 and IGMPv2 is correct?( Multiple select).
A. IGMPv2 message types include member departure packets
B. IGMPv2 does not support specific group queries
C. IGMPv1 supports universal group queries
D. The IGMPv1 message type does not contain members leaving the packet AD
Answer: ACD
Explanation:
Question: 359
When configuring the source NAT and having no pat configuration parameters, which of the
following statements is true?( Radio) A Perform destination IP address and destination port
translation
B. Only source P address translation occurs
C. Only destination IP address translation occurs
D. Simultaneous source P address and source port translation
Answer: B
Explanation:
Question: 360
After you divide an interface of the firewall into the Untrust security domain, the interface belongs to
the Untrust zone and no longer belongs to the Local zone.
A. TRUE
B. FALSE
Answer: B
Explanation:
Question: 361
The firewall has created some security zones by default, which of the following security zones does
not exist by default on the firewall?( Radio).
A. Internet
B. Local
C. Trust
D. DMZ
Answer: A
Questions & Answers PDF
P-112
Explanation:
Question: 362
Which is the correct description of optimal routing election for each protocol in the following
options?( Radio).
A. Route entries in BGP that are unreachable for the next hop are also placed in the IP routing table.
In the
B. BGP protocol, the best route to reach the same destination circumference is selected by
comparing the cost values of the route entries.
C. The OSPF protocol puts all the routing information in the LSDB into the IP routing table.
D. From BGP and OSPF, different route entries to reach the same destination segment are learned,
and the optimal route is selected to join the IP route table by comparing the protocol's preference
value .
Answer: D
Explanation:
Question: 363
In VXLAN scenarios, what features can be turned on to reduce flooding of ARP messages between
VTEPs?( Multiple select).
A. Host Information Collection
B. Local ARP agent
C. port isolation
D. ARP broadcast suppression
Answer: BD
Explanation:
Question: 364
The following description of ISIS's routed infiltration is correct?( Multi-select)
A. ISIS routing penetrates | Can be used in Pv6 environments.
B. Route penetration for ISIS can be deployed on Level-1 routers.
C. Route penetration for ISIS does not include aggregated routes.
D. Route penetration of ISIS does not cause neighbor concussions.
E. Route infiltration of ISIS is used to prevent routing loops.
Answer: AD
Explanation:
Question: 365
Questions & Answers PDF
P-113
The following statement about the BFD one-arm echo function is correct (multiple choice).
A. The BFD one-arm echo function must be configured with local identifiers and carrier identifiers
B. The default destination IP address for the protocol message for BFD one-arm echo is 22400184
C. After the BFD one-arm echo function is turned on, the destination IP and source IP of the BFD
message are inducted
D. BFD One-Arm Echo function is suitable for scenarios where one device supports BDD and the other
device does not support
Answer: CD
Explanation:
Question: 366
The following statements about the VRRP protocol are correct (multiple choice).
A. Both VRRPv2 and VRRPv3 support authentication
B. VRRPv3 does not support authentication, while VRRPV2 does
C. VRRPv2 only applies to IPv4 networks, and VRRPv3 only applies to IPv6 networks
D.
The owner of the Master IP address has a VRP priority of 255, and all configurable priorities
range from 0 to 254
Answer: B
Explanation:
Question: 367
HW users are transferring a very large number of files via TFTP. What protocol does TFTP rely on for
transmission?
A. ICMP and UDP
B. IP ?TCP
C. UDP
D. NFS E. FTP
Answer: C
Explanation:
Question: 368
When you deploy LLQ, you need to configure bandwidth parameters, what is the significance of
bandwidth parameters?( Single choice questions).
A. Provides a built-in policer to limit the maximum available bandwidth of a low-latency queue
during congestion
Questions & Answers PDF
P-114
B. The parameter should be as small as possible. It means that the bandwidth is always preserved,
and even if the LLQ is set, changing the parameters will reduce the available bandwidth of the
interface
C. It represents a reference CIR to calculate the burst size D of the built-in tactician token bucket
Changing parameters is an option because LLQ always takes precedence over other queues
Answer: A
Explanation:
Question: 369
Assuming that the shaping rate of a port is 10OMbps, the input loans and RIP of P configurations of
each service of the interface are as follows: Then after the first round of scheduling, EF How many
loans are allocated by the queue?( Single choice questions).
A. A. 30M
B. 15M
C. 90M
D. 25M
Answer: D
Explanation:
Question: 370
As shown in the figure, there are two IP6 networks that can access the IPv4 network, and the IPsec
tunnel needs to be established between the two IPv6 networks to communicate, which of the
following requirements?(). Single choice questions).
Questions & Answers PDF
P-115
A. ESP + tunnel mode
B. AH + transmission mode
C. AH + tunnel mode
D. None of the above options are correct
Answer: A
Explanation:
Question: 371
Router HW1 and Router HW2 connect Network A and Network B, respectively. As shown in the figure
below, if you want to set up an IPsec VPN between router HWI and router HW. (single selection).
A. rule permit ip source 1921681.10 destination 1921681.20
B. rule permit ip source 101.1.0000255 destination 1921681.20
C. rule permit ip source 101.1.0000255 destination 101.20000255
D. rule permit ip source 1921681.10 destination 101. 20000255
E. rule permit ip source 101.20 000255 destination 101.1.0000255
Answer: C
Explanation:
Question: 372
Which of the following options is described correctly for the assertion mechanism?( Radio).
A. Winner's election process does not make IP address size a condition of the election
B. In the assertion mechanism, the winner is responsible for forwarding multicast data to the
broadcast segment
C. The assertion mechanism is used for the election of DR
D. In the assertion mechanism, the loser will shut down the interface with the broadcast network
necklace
Answer: B
Explanation:
Question: 373
Questions & Answers PDF
P-116
The BSR/RP mechanism described below describes the correct determination ?( Multiple choice
questions).
There can be multiple C-BSRs in the
A. PIM-SM domain, but only one BSR can be elected.
B. BSR collects C-RP information by receiving packets of C-RP
C. BSR advertises BSR and C-RP information to all routers in the PIM-SM domain via flood bootstrap
messages
D. A C-BSR can also collect C-RP information by receiving C-RP packets
Answer: ABC
Explanation:
Question: 374
The following description of LDP reliability is incorrectly ?( Radio).
A. LGP GR takes advantage of the high difference between the LS forwarding plane and the control
plane to realize that the device forwards without interruption when the protocol is restarted or the
master-standby is reversed
B. Manually configured LDP FRR policies default to 32-bit backup routes that trigger LDP to establish
backup LSPs
C. LLDPFRR also allows LSPs to be generated for tag mappings from non-optimal next hops, and as a
live LSP backup, supervising forwarding table entries
D. LDP and IGP linkage, the need for IGP has been routed to release, to ensure that LDP and LGP path
consistent
Answer: B
Explanation:
Question: 375
Regarding the LDP protocol session establishment process, the description is correct?
A. When both parties receive a keepalive message from the peer, the LDP session is successfully
established
B. Hello messages discovered by LDP neighbors use TCP messages with a destination address of
multicast address 224002
C. After the TCP connection is successfully established, the active party sends an initialization
message to negotiate the relevant parameters of the LDP session,
D. The party with the larger transmission address initiates the establishment of a TCP connection as
the active party
Answer: ACD
Explanation:
Questions & Answers PDF
P-117
Question: 376
RD is used to distinguish between the same IP address in different VPNs, and how many bits (radio)
the RD contains
A. 64
B. 32
C. 16
D,128
Answer: A
Explanation:
Question: 377
LDP and IGP linkage refers to the release of IGP and TD routes to ensure that LDP and IGP linkage
complete network efficiency, so that KGP and LDP maintains a consistent path, minimizing traffic
loss, thereby improving the reliability of the entire network.
A. True
B. False
Answer: A
Explanation:
Question: 378
Regarding the MPLS handling mode of TTL, the following description is correct?
A. Pipe mode. When an IP message passes through an MPLS network, the IPTTL minus l at the entry
point is mapped to the MPLS TTL field
B. MPLS tags in the TTL, which mean the same as the TTL domain in the IP header. TTL prevents
mpLS networks from creating routing loops
C. In Unifor mode, when an IP message passes through an MPLS network, the inbound IPTTL is minus
1. The MPLSTTL field is a fixed value
D. In MMLSVPI, if you need to hide the structure of the MPLS backbone network, you can use the
Uniform mode on Ingress for private network messages
Answer: B
Explanation:
Question: 379
In a network in MPLSVPN, different CE devices can exchange routing information with the same PE
device using different routing protocols, and different CE devices can exchange routing information
with the same PE The routing protocols used between devices are independent of each other
Questions & Answers PDF
P-118
A. True
B. False
Answer: A
Explanation:
Question: 380
In OSPFv3, Router-LSA is generated by each router, which describes the interface address and cost of
the router's links, as well as the RouteriD of the neighbor router.
A. True
B. False
Answer: B
Explanation:
Question: 381
What is the relationship between CIR, BC, and TC?
A. CIR=TC/BC
B. CIR=BE/TC
C. TC=CIR/BC
D. TC=BC/CIR
Answer: D
Explanation:
Question: 382
WRED is configured on the newly deployed router HW The following description of the WRED feature
is correct as ?( Multiple select).
A. WRED can set different drop thresholds and packet loss rates for packets of different priority
B. When traffic exceeds the minimum threshold, WRED starts dropping all ingress traffic (tail drops).
C. Avoid global synchronization by selectively dropping multiple TCP streams Low-bandwidth traffic is
easier to drop than high-bandwidth traffic
Answer: AC
Explanation:
Question: 383
Questions & Answers PDF
P-119
Regarding the FTP protocol, which of the descriptions below is correct?
A. In FTP Passive mode, the client completes the initialization of the TCP session for control and data
B.
In FTP Active mode, the server tells the client which port it expects to send data on by
commanding "PORT"
C.
FTP always uses a TCP session to transmit control information and data information
D. FTP always uses TCP port 20 to establish a data session, and ICP port 21 to establish control will
always use E. FTP TCP port 21 to establish a data session, TCP port 20 to establish a control session
Answer: A
Explanation:
Question: 384
As shown in the figure,
RI, R2 establishes an EBGP neighbor and turns on the BFD detection function, the following
statement is correct
A. Detection time for BFD packets for AR2 800ms
B. R1 Detection time for BFD packets for 1280ms
C. R1 Detection time for BFD packets The detection time for BFD packets for 660ms
D. R2 is 600ms
Answer: C
Explanation:
Question: 385
Questions & Answers PDF
P-120
In the use of the LACP protocol, the following description is correct ?( Multiple select).
A. You can avoid the Eth-Trunk interface from frequently shaking interface eth-trunk 1l lacp preempt
enable lacp preempt delay delay-time with the following command
B.
Source IP address load sharing, interface eth-trunk1Load-balance src-dst-ip, can be
configured in an enabled link aggregation group with the following command
C. The member interface can be removed from an enabled link aggregation group with the following
command: interface GigabitEthemeto/0/1 Shutdown nterface Gigabithemet/O/1undo ethtrunklinterface GigabitEthemet0/0/1 undo shutdown
D. A chain cluster that can be initiated through an order Join the member interface :interface
GigabitEthemeto/0/1 shutdown interface igabitEthemetO/0/1 tunkportGigabitEthermet0/0/1
interface GigabitEthermet0/0/1 Undo shutdown
Answer: AC
Explanation:
Question: 386
The following statement about is the ISIS protocol LSP message is correct
A. LSP fast diffusion feature, first diffuse less than the specified number of LSPs, to speed up the
synchronization process of LSDB
B. By configuring an LSP-generated smart timer, the timer automatically adjusts the delay time based
on the frequency of changes in routing information
C. When the link status information increases, the message length of the LSP can be increased so that
each LSP can carry more information.
D. Reducing the minimum time interval for sending LSPs per port can speed up the diffusion of LSPs.
Answer: ABCD
Explanation:
Question: 387
Router RL and Router R2 run BGP both routers are in the AS65234 The router R2 route is present in
the BGP routing table of router RI, but not in the P of router R1 road
A. With BGP, both routers are in the AS65234 Route cry PD is done by the right big worker
B. By the table, so what causes the problem to occur? A, synchronization is turned off
C. The B. BGP neighbor relationship is Down
C. Router R1 does not enable BGPMulti-hop D Routing is not optimal
Answer: D
Explanation:
Question: 388
Questions & Answers PDF
P-121
As shown in the following figure, R1 and R2 establish a neighbor relationship for Level2, which is
critical: placed as follows, then the following about The route entry for R2 is correct
A. The 0:/64 router appears in the IP routing table
B. 2022:/64 Routers appear in the IP routing table c.2019::/64 Routers appear in the P routing table
D. 2021:-/64 Router will appear in the P routing table
Answer: ABC
Explanation:
Question: 389
Regarding the OSPFv3 protocol, the following description is incorrect?
A. In the case of sharing a single router, each OSPFV3 process runs independently
B. In the same OSPFv3 process under the same interface, you can run multiple instances of
C. You can support running multiple instances on a single link
D. OSPFv3 message header will contain the Instance ID field
Answer: B
Explanation:
Question: 390
The following is correct about the LSA of OSPFv3
Questions & Answers PDF
P-122
A. The Link State ID of inter-area prefix-SA, which contains prefix information
B. Router-LSA and Network-LSA do not contain routing information
C. When the Referenced Link State Type-2 of the Intra-AreaPrefixLSA, referenced Link State ID
Contains the interface ID of the DR
D. Inter-Area PrefirLSA also contains LinkLocal Information
Answer: BC
Explanation:
Question: 391
Router HW enables OSPF and router HW has the role of ABR and is configured with abr-summary, so
which class LSA Will it be aggregated?( Multi-select) (confirmed).
A. 1 ?LSA
B. 2 ?LSA
C. 3 ?LSA
D. 4 ?LSA
E. 5 ?LSA
Answer: AB
Explanation:
Question: 392
As shown in the figure, a company sets up an OSPF network. The links in the figure all form OSPF
adjacencies, and all OSFP devices declare their own loopback addresses. One day SIR2 The two links
of the S2AR1 suddenly failed, and in order to detect if the network was operating properly, the
engineers performed a device status check, which is correct as described below
A. R5 can normally learn the loopback route to R2
B. R3 can not learn the loopback route to R2
C. R1 can normally learn the loopback route
D. R3 of R2 The loopback route of R2 can be learned normally
Questions & Answers PDF
P-123
Answer: AB
Explanation:
Question: 393
The interface Serial0 of an existing router is in OSPF area 1, and the interface Serial0 is set to Silent
interface. So what kind of impact will this setting have
A. OSPF establishes available adjacencies through this interface
B. OSPF does not add routes learned from the interface to the local routing table
C. OSPF does not establish any neighboring relationships through this interface D. OSPF receives
routing updates from neighbors
Answer: C
Explanation:
Question: 394
The Option field in OSPEv3 appears in all LSAs
A. True
B. False
Answer: B
Explanation:
Question: 395
As shown in the following topology, EBGP is running between ASI0O0, AS.203, AS.30, AS8400, and
the neighbor relationship has been established as RECEIVed by AS4O0 When AS1OO issues a 1..11/2
CIDR segment BGP route, the path order recorded in the ASPath attribute is correct
Questions & Answers PDF
P-124
A. 10,200,3
B. 400,300,200,100
C. 100,200,300,400
D. 300,200,100
Answer: D
Explanation:
Question: 396
What kind of scenario can use AS-path-filter?( Multiple select).
A. A Filters routes received from BGP neighbors based on the AS PATH attribute carried by the route,
such as the command peer X.x.x.x as path-filter import
B. The apply clause in Route policy
C. Filter routes sent to BGP neighbors based on the AS PATH attribute that the route carries. For
example, the command peer x.x.x.x as path-filter export
D. The if-match clause in Route-policy
Answer: ACD
Explanation:
Question: 397
In the following topology diagram,
R1 can be established between R2 and R3 fetches the Internet, RI and R2, R1 and R3 EGP
connections, R2, R3 belong to the same AS The default routes are issued through BGP separately,
requiring R2 to be preferred for traffic accessed by RI to the Internet, and the following practices can
be achieved
A. R1 specifies that peer R3 sets the MED property to 150 in the import direction
B. R2 specifies that peer R1 is in export The direction setting local priority is 150
C. R2 specifies peer R1 in the export direction setting MED property to 150
Questions & Answers PDF
P-125
D. R1 specifies the peer R2 sets the local priority in the import direction to 150
Answer: AD
Explanation:
Question: 398
The existing router HWl running BGP is configured with both IBGP neighbors and EBGP tenants. The
following descriptions about IBGP Neighbors and EBGP Neighbors are correct?
A. The router will have an EBGP BGP neighbor from it must be connected directly, otherwise, IBGPMulti-hop must be configured
B. The router sends BGP updates learned from its EBGP neighbors to its other IBGP neighbors and
EBGP neighbors
C. IBGP neighbors can establish neighbor relationships through the Loopback interface
D. The router sends BGP updates learned from its IBGP neighbors to its other IBGP neighbors and
EPGP neighbors
E. EBGP neighbors must be directly connected, otherwise, EBGP-Multi-hop must be configured with
Answer: BCE
Explanation:
Question: 399
As shown in the figure,
in the context of IPv4 and IPv6, the SEL field in the NET address of the ISIS is always valued as 00?
A. True
B. False
Answer: A
Explanation:
Question: 400
In an IPv6 network, two nodes A and B are neighbors to each other if node A sends to node B NS
message, if Node B receives the message and then replies to the NA message, then on Node A On
the view, the neighbor status will be marked as What?
Questions & Answers PDF
P-126
A. Reachable
B. Incomplete
C. Constant
D. Probe Answer
Answer: A
Explanation:
Question: 401
In an MPLS BGPVPN environment, if tags are distributed only through BGP and LDP, the MPLS tags of
the message can be up to two layers of tags
A. True
B. False
Answer: A
Explanation:
Question: 402
Off-stem cross-domain VPN-Option B scenario, the following description is incorrect?
A. During the packet forwarding process, it is necessary to exchange the VPN's private network LSP
on the
B. two ASBRs IP-EBGP neighbor relationships.
C. The cross-domain VPN-Option B scheme is not limited by the number of interconnection links
between ASBRs
D. The outer layer tag is exchanged between two ASBRs to vpnV4 routes.
Answer: D
Explanation:
Question: 403
Huawei's two switch SWA, SWB is connected together through 7 Ethernets, and static route
aggregation is configured, and the corresponding ports on the switch SWA are E1/0/1, E1/02, E1/0/3,
E1/0/4, E1/ 0/5, E1/0/6, E1/0/7, configured sequentially as if switch SWA, SWB Each aggregation
group supports only 6 ports.
A. With the same configuration across ports, the Ethemet 1/0/7 port is the aggregate group
Unselected port
B. With the same configuration of each port, the Ethemet 1/0/6 port is the aggregate group
Unselected port
C. With the same configuration of each port, SWA randomly selects one of the 7 ports as the
Questions & Answers PDF
P-127
aggregate group Unselected port
D. With the same configuration of each port, the Ethemet1/0/1 port is the aggregation group
Unselected port
Answer: A
Explanation:
Question: 404
What command can be used to prevent users from accessing multiple devices through the HUB on
the switch's access port?( Radio).
A. [Huawe interface Gigabithemeto/0/1[Huawei-GigabiEthermeto/O/lport linktypetrunk [HuawelGigabithemetO/1]port trunk allow pass vlan 10
B. [Huawei interface GigabiEthemet/0/1[Huawe-GigablEthemetO/0/1Jpor ink type acess(Huawei
GigabitEthemet/O/Tipsg enable
C. Huawei interface GigabiEthemetO/0/1Huawei-GigabiEthemetO/OJport link-type acces Huawei
GigabilEthemet/0/1port-secunty enable0
D.
[Huawei iterface Gigabithemeto/0/1 (Huawei-GigabitEthemeto//1)pot ink type
access(Huawel-CigabiEthemeto/1]portisolate enable
Answer: C
Explanation:
Question: 405
Router RL runs the OSPF protocol and uses the display ip routing-tabe command to view the router
RL's routing table , the following information about OSPF in the routing table is described correctly as
?
A. In the routing table, the routing table entries identified by the OSPF identifier can only be learned
through the 3 types of LSAs to
B. In the routing table, used The 'OSPF' identifier identifies a route table entry that can only pass a
Type 1 LSA
C. In the routing table, the routing table entries identified with the 'OSPF identifier' can be learned
through the 1/2/3/5 LSA to
D. In the routing table, Route table entries identified with the "O_ASE identifier can only be learned
through routing introduction
Answer: D
Explanation:
Question: 406
Regarding the BGP ring protection mechanism, the following description is correct?
Questions & Answers PDF
P-128
A. A AS_PATH attribute is used between autonomous systems to prevent ring cats.
B. The Cluster List property is used for reflector cluster inner ring defense, and the router finds that
the Cluster List of route entries contains its own Client lD The route is rejected
C. Routes learned from IBGP are not advertised to IBGP neighbors and are used to prevent routing
loops inside the AS
D. You can use the AS_CONFED_SET attribute to prevent loops within a consortium:
Answer: ACD
Explanation:
Question: 407
Regarding route Policy, the following description is correct as ?( Multiple selection) Multiple selection
A. Advanced ACLs can be applied in route-policy to filter routes
B. The table entry exceed::0 less-equal 128 indicates that all IPv6 routes are allowed through
C. If more than one node is defined in Route-policy, at least one node in each node should have a
matching pattern of permit
D.
Route-Policy can filter only the default route
Answer: BCD
Explanation:
Question: 408
The correct description of the scene shown in the following figure is:
A. LSDB
B. R1, which exists in both Level-1 and Leve-2, can ping the interface address of R2 loopback0
C. R there is a route to R2 loopback0 10022/32
D. No neighbor relationship can be established between R1 and R2
Questions & Answers PDF
P-129
Answer: ACD
Explanation:
Question: 409
The following is the correct description of the aggregation of BGP (radio).
A. After you configure the Aggregate ipv4-address mask, only aggregate routes are published, not
detail routes.
B. For IPv6 routing, BGP supports manual aggregation and automatic aggregation.
C. BGP enables automatic aggregation by default.
D. Routes in the BGP local route table can be manually aggregated.
Answer: D
Explanation:
Question: 410
The following about BGP routing, describing the error, is ?
A, non-aggregate routes take precedence over aggregate routes
B. In PrefVal, Local_ Preference is equal to the case if the route is generated locally, IBGP Routing,
the BGP preference for EBGP routing, is generated effectively referring to route priority.
C. See the following entry in the BGP routing table:* 172161.11/32 000010 0? Indicates that the
route is available non-optimal
D. For next_hop unreachable routes when invalid routes, do not participate in the preferred.
Answer: A
Explanation:
Question: 411
The following description of Filter-Policy is correct?( Radio).
A With Filter-Policy, on ASBR in OSPF, type5LSA and type7LSA can be applied The build is filtered.
B. Prefix lists can be used to filter both routes and packets.
C. Filter-policy filters the link state information received or published, and can modify the properties
of route entries.
D. When filtering routes using the pre-slow list, the table entry ip-prefxldeny0000 0 lese-qual 32
indicates that only the default route matches
Answer: C
Explanation:
Question: 412
Deploying the ISIS protocol in an IPv6 environment is true in the following statement (radio).
A. By default, the DIS priority of broadcast network interfaces at Level-1 and Level-2 is 1 B In
Questions & Answers PDF
P-130
broadcast networks, the DIS priority for IPV4 and IPV6 can be set separately
C. In the same broadcast network. If each router supports both IPV4 and Pv6, the DISC of JPV4 and
Pv6 must be the same device
D. IS-IS sient is configured under the finger port, this interface will not send ISIS packets, but will
receive ISIS packet
Answer: C
Explanation:
Question: 413
When the IPv6 address of a host is configured with a stateless address configuration, and other
parameters other than the address are obtained through DHCPv6, how to set the M and 0 bits in
the RA message ?
A. M=10=1
B. M=10=0
C. M=1 0=0
D. M=00=1
Answer: D
Explanation:
Question: 414
As shown in the figure, in the HUB & Spoke networking mode of MPLS BGPVPN, in order to achieve
the division can only communicate with the headquarters, the division can not communicate with
each other When setting up RT, which of the following scenarios is this?( Radio).
A???:import Target:12:3EpodTarget:12:3
B. Headquarters: importTarget:1:1EpodTarget:3:3
C. Headquarters: Impot Target:2:2; Expor Target:3:3 D. Headquarters: importTarget: 12:3EpodTarget:
3:12
Answer: D
Explanation:
Question: 415
Questions & Answers PDF
P-131
The following statement about IPSec VPN is correct
A. Brutal mode can support NAT traversal, while main mode does not support NAT traversal.
B. The two routers establish IPSecVPN in main mode, and from the 5th message (included), the
payload's data is often encrypted.
C. Two routers establish an IPSec VPN in brutal mode, so that the tunnel is built with a minimum of 4
messages interacting between the two devices.
D. The two routers can establish an OSPF neighbor relationship through the IPSec VPN (19) channel
and exchange intranet devices by
Answer: BD
Explanation:
Question: 416
For Layer 2 VPN technology, the following statement is correct? Multi-select
A. VPLS is a widely used technology in the live network, which can provide transparent transmission
of three-layer messages and achieve multi-point access.
B. The VPLS configuration is complex and the Layer 2 network transmits BUM packets.
C. BGPEVPN supports features such as tenant isolation, Multi-homing, and broadcast suppression. D.
BGPEVPN addresses mac address drift and multi-tenancy that VPLS cannot support.
Answer: BC
Explanation:
Question: 417
How do 8021w and 8021D handle BPDUs?( Confirmed) The
A. 8021D bridge only forwards BPDU packets received from the root bridge
B. The 8021D bridge does not forward BPDU messages
C. The 8021w bridge forwards only BPDU packets received from the root bridge
D. 8021w Bridge does not forward BPDU packet
Answer: A
Explanation:
Question: 418
In a network, the same gigabit running S and OSPF anti-tampering and fluttering as shown in the
figure, on the two border routers RTB and RTC are introduced into the wine route, the device
question is to use gigabit one port strobe, , 222 The network is introduced into the OSE via
impotrote direct on the RTD, assuming that all other configurations are dead default configurations,
then the description of this network is wrong ?
Questions & Answers PDF
P-132
A. Adjusting the ISIS priority to 160 on the RTB avoids suboptimal routing problems in the network.
B. On the RTC, the following configuration is adopted, only the routes of the 2222/32 cinder
segment can be filtered out when routing is introduced, IRTClip ip-prefix 10 index 1 deny2000 8 lessequal 32
C. RTB learns that the routing next hop for the 2222/32 network segment is RTA
D. The following configuration can filter out the routes of the 2222/32 CIDR block of the white RTD
when RTC introduces OSPF routes.
Answer: B
Explanation:
Question: 419
There is an As-path-filter.ip as-path-filter 1 permit*(100l400) $, which As-path-filter can match which
of the following AS_PATH Attribute?( Confirmed).
A. 300 4200
B. 1234 1400
C. 3100
D. 100
Answer: BCD
Explanation:
Question: 420
Is the following description of the OSPFv3 message correct?
A. The interface ID of the sending interface must be included in the A Hello packet
B. The LSACK message contains LSA header information to confirm the receipt of LSU packets
C. The LSR message contains the complete LSA header information for requesting an update to the
Questions & Answers PDF
P-133
LSA
D. Hello messages and the Option field for DD messages extends to 24-bit
Answer: ABD
Explanation:
Question: 421
As shown in the figure, all routers declare the loopback address in OSPF where the R storage does
not return address is 1022 [2 declares 10033[ at the Ael.R3 ring E port[ 92101102A External routing
in order to win light R win L away from the negative cut.
The
noodle command is as follows: (multi-select) [BIppprefixt permlt 1001.1.024 [R1] ospf1
A. router RI of the IP routing table, there is no external route to 1001.1.0/24 of
B. router R1 In the IP route table, there is an external route to 1001.1.0/24
C. In the IP routing table of Router R1, there is no loopback route to
D. In the IP routing table of Router R1, there is no loopback route to R3
Answer: ACD
Explanation:
Question: 422
The following description is correct regarding route control
A. IBGP routes can be introduced using the impot-route BGP command
B. AS-path-fiter is for AS-path, which affects the routing of paths.
C. OSPF, ISIS, and BGP can issue default routes.
D. In Node 10, if-match community-fiter1 and f-match as-pah-fiter1 are "and the relationship
Answer: BCD
Explanation:
Question: 423
The following statement about VXLAN gateways is incorrect
Questions & Answers PDF
P-134
A. Layer 2 gateway: Used to solve the problem of tenant access to the VXLAN virtual network, it can
also be used for subnet communication of the same VXLAN virtual network.
B. Layer 3 gateway: Used for cross-subnet communication of VXLAN virtual networks and access to
external networks.
C. VXLAN Layer 3 gateways can be divided into centralized gateways and distributed gateways.
D. Layer 2 gateway and VPN instance binding.
Answer: D
Explanation:
Question: 424
The following description of the attributes of BGP is correct? Radio
A. The AS number of the adjacent AS, ranked to the far right of the list of AS_Path in the BGP route
entry.
B. When a BGP Speaker publishes a route learned from an EBCP peer to an IBGP peer, it does not
change the next hop attribute of that routing information.
C. Local_Pref is valid only between EBGP peers and is not advertised to third-party AS
D. A route can have only one community attribute value.
Answer: B
Explanation:
Question: 425
Regarding the BGP alliance, the following description is wrong? Radio
A. The consortium divides an AS into sub-AS, and the alliance external AS still considers the
consortium to be an AS
B. Subsystems within a consortium can use private AS numbers. Huawei NE/AR routers, a consortium
can be configured with up to 32 subsystems.
C. Consortium can easily detect the routing loop within the AS because EBGP is running between the
subAS
D.
The subas number of the federation, which by default is advertised to the BGP peer outside
the federation
Answer: D
Explanation:
Question: 426
When the ABR is a type 5/7 LSA switch router for the NSSA zone, then the ABR can be paired to
Category 7 LSA is a derivative of 5 LSAs for aggregation.
Questions & Answers PDF
A.
B.
P-135
True
False
Answer: A
Explanation:
Question: 427
What messages does an NMS (Network Management Station) running SNMPV1 send to the agent?
A. Trap,Get ? Set
B. Get, Set ?Getnext
C. Get,Set,Getnext ? GetBulk
D. Get,Set ? GetBulk
E. ? Trap
Answer: B
Explanation:
Question: 428
As shown in the figure, three switches SI, SN2, and SN3, where SN1 is the root bridge between S1
and SN2 Now that link support SN2 cannot receive the configuration BPDU sent by the root car, the
administrator needs to configure which spanning tree protection mechanism to prevent the problem
of link congestion?
A. root protection
B. Anti-TC-BPDU attack
C. BPD protection
D. Loop protection
Questions & Answers PDF
P-136
Answer: D
Explanation:
Question: 429
In order to reduce the number of OSPF routes in certain areas, the OSPf protocol has developed
special area functions, and the following description of the characteristics of OSPF special areas is
correct
A. ASBR-Sunmary-LSA is allowed to be published to the NSSA region
B. AS-External-LSA is allowed to be published to the Stub region
C. Any OSPF zone can be configured as a special zone
D. Zone can be equipped with zhiyi
Answer: D
Explanation:
Question: 430
When the ACL in the VRP has multiple matching rules (rules), the matching order is about Which of
the following statements is true?( Confirmed).
A. By default, matching is based on the principle of "depth first"
B. By default: Match in the order in which the perfect is matched first, then deny is matched.
C. By default, rule-ID is followed Match from small to large
D. There is only one matching order and cannot be modified
Answer: C
Explanation:
Question: 431
Regarding how the device handles messages in the MPLS network model, what is the following
description of the error?
A. The label forwarding path LSP is determined and established by various protocols during the
forwarding of messages. There is certainly no stripping of the label on the B. LSR.
Both C. LER and LSR are labeled.
D. For IP packets entering the MPLS domain, the device discards them.
Answer: A
Explanation:
Question: 432
The topology diagram and configuration are as follows, and now we hope that there is no buttoned
route entry of 10033/32 in the Rl route table
Questions & Answers PDF
P-137
A. Configure route summarization on R3 to summarize the routes to 10000/16
B. Configure route rollup on R2 to summarize the route as 10000/16
C. Configure filter-pollcy on top of R1 with 10033/32 via ACLL. Also applied in the Import direction
D. Configure flter-policy on the above, match 10033/32 through ACL, and apply the answer in the
expo direction
Answer: A, C
Explanation:
Question: 433
What check frames can IPSG set?
A. Out of the interface
B. MAC address
C. IP address
D. VLAN ID
Answer: BCD
Explanation:
Question: 434
By default, which of the following security MAC address types lose table entries after the device
restarts?
Questions & Answers PDF
P-138
A. Sticty MAC address
B. Black hole MAC address
C. Secure static MAC address
D. Secure dynamic MAC address
Answer: D
Explanation:
Question: 435
BGP routing policies can control the publication and acceptance of routes
A. TRUE
B. FLASE
Answer: A
Explanation:
Question: 436
A router Router LSA is shown in the figure below, and the following statement is incorrect?
A. This router is a DR
B. This router has established an adjacency relationship
C. This router supports external route ingestion
D. The Router ID of this router is 100121
Answer: A
Explanation:
Question: 437
The command to adjust the LINK cost value for the IS-IS interface is ?( Radio)
A. ISIS cost
B. ISIS timer hello
C. lSIS circuit type
Questions & Answers PDF
P-139
D. ISIS circuit level
Answer: A
Explanation:
Question: 438
Configure the ipv6 preference under the IS-IS protocol view, the role of this command is to configure
the priority of the Ipv6 protocol generated by the IS-IS protocol
A. TRUE
B. FALSE
Answer: A
Explanation:
Question: 439
Between two directly attached devices that have established an IBGP neighbor, execute the
shutdown command to close the interface of one of the devices. The BGP connection is not
immediately disconnected.
A. TRUE
B. FALSE
Answer: A
Explanation:
Question: 440
ipv6 link-local addresses can be generated through stateless autoconfiguration
A. TRUE
B. FALSE
Answer: B
Explanation:
Question: 441
IGMP SSMMapping is bound to multicast through a static multicast source, so that members of
IGMPv1 and IGMP2 can also access the SSM multicast network. The following statement about
IGMPSSMMapping is wrong?( Radio).
A. The multicast address of the SSM is 232000~232255255255
B. IGMP SSM Mapping does not process reporting messages from IGMPv3 In order to ensure that the
Questions & Answers PDF
P-140
same network segment runs any version
C. IGMP hosts can make SSM services run IGMPv3 on the multicast router socket connected to the
network segment where the member host is located
D. If the IGMP SSM Mapping feature is not enabled, neither IGMPv1 nor IGMPv2 supports multicast
for deploying SSM modules
Answer: B
Explanation:
Question: 442
SSH uses asymmetric encryption algorithms AES and DES to achieve security for data transmission,
and uses HMAC to ensure the complete integrity of integer data
A. TRUE
B. FALSE
Answer: A
Explanation:
Question: 443
What is the security level for untrust zones in the USG Series firewalls? ( Radio).
A. 50
B. 5
C. 10
D. 15
Answer: B
Explanation:
Question: 444
Firewall security policies have the condition for traffic matching to be ?( Multi-select)
A. apply
B. Source item security zone
C. Source item IP address
D. Message length
Answer: ABC
Explanation:
Question: 445
Questions & Answers PDF
P-141
When an administrator configures VRRP, which of the following is not required?
A. Preemption mode
B. Priority of the virtual router
C. Preemption delay
D. Virtual IP address
Answer: ABC
Explanation:
Question: 446
In different scenarios, RSTP provides different protection functions, and the wrong statement about
this statement is
A. The root protection feature is enabled for the specified port, and its port role can only remain as
the specified port
B. When the anti-TC-BPDU packet attack feature is enabled, the number of times the switching
device processes IC BPDU packets per unit time is configurable
C. after the BPDU protection function is enabled on the switching device, if the edge port receives
RST BPDU, the edge port will be set to a non-remote port and the spanning tree calculation will be
re-performed
D. Start the specified port of root protection, when the port receives a better RSTBPDU, the port will
enter the Discarding state and is no longer forwarding packets. If the port does not receive a better
RSTBPD for a period of time then automatically revert to the normal Forwarding state
Answer: C
Explanation:
Question: 447
An engineer used 2 routers to test IPv6 services and simulated the interconnection between
headquarters and branches by running BGP4+. The network logic topology is shown in the figure,
regarding the delivery of IPv6 routes between two devices, which of the following statements is
wrong?
A. When a route is passed, it carries a recognized mandatory attribute such as AS_Path
B. BGP4+ passes routing information between peers via Update packet C. When routing is passed,
Questions & Answers PDF
P-142
the Next_Hop attribute must be an IPv6 global unicast address
D. If the Update message carries the MP_REACH_NLRI attribute, it means that the advertisement is
reachable route
Answer: C
Explanation:
Question: 448
When you deploy BGP/MPLSIPVPN, when two VPNs have a common site, the common site must not
use overlapping address spaces with the other sites of the two VPNs.
A. TRUE
B. FALSE ?:B
The series description for configuring static lSPs in MPLS networks is correct?
499
A. When an LSR is Ingress LSR, only configure Out Label, which ranges from 16-1048575
B. When an LSR is a Transit LSR, you need to configure both In Label and Out label, both in the range
of 16-1023
C. When an LSR is TransitLSR, you need to configure both ln Label and Out Label, both of which are
161023 The Out Label ranges from 16 to 1048575
D. When an LSR is An Egyptian LSR, only in Label needs to be configured, ranging from 16-1023
Answer: BD
Explanation:
Question: 449
S-4S supports multi-instance and multi-process, that is, on an IS-IS router, multiple VPN instances can
be configured to associate with multiple IS-S processes, the following description of IS-IS multiinstance and multi-process, which are correct ?
A. If an IS-IS router creates multiple IS-IS processes, each process is independent of each other
B. 1 IS-IS processes can only be associated with 1 VPN instance
C. 1 IS-IS processes can be associated with several different VPN instances
D. 1 VPN instances can be associated with several different IS-IS processes
Answer: ABD
Explanation:
Question: 450
Which of the following descriptions of MPLS header TTL are correct?
A. Copy IPTIL value is handled in such a way that the LSR of the MPLS domain is hidden, which plays
a certain security role
B. Can prevent wireless circular forwarding of messages
Questions & Answers PDF
P-143
C. MPLS has two ways of handling TTL, one is that the IP packet copies the PTTL of the MPLS header
hen it enters the MPLS network Value; Another is to set the TTL of the MPLS header to 255 at the
entrance LER
D. When copying TTL is disabled, tracert can see the LSR of the passing MPLS domain
Answer: BC
Explanation:
Question: 451
Regarding the tag space for MPLS, the description is incorrect
A When the penultimate hop LSR performs a label swap, if the swapped tag value is found to be
B. the tag is popped up by default and the message is sent to the last hop
C. Above 1024 is the tag space shared by dynamic signaling protocols such as LDP, RSVP-TE, MP-BGP,
etc
D. 16-1023 is a label control shared by static LSPs and static CR-LSPs
Answer: B
Explanation:
Question: 452
The following statement about ISIS (IPv6) is correct?
A. In order to support the processing and calculation of IPV6 routes, IS-IS has added TLV232, 236
B. By default, IS-IS has the multi-topology feature turned on
C. IS-IS works at the data link layer and only needs to add a new TLV to support IPv6
D. To support the processing and computation of IPv6 routes, IS-IS has added NLPID to the 129TLV
Answer: ACD
Explanation:
Question: 453
When the load is an ICMPv6 message, what is the numeric value of the Next Header field in the
IPv6 header if the presence of an extended header is not taken into account?
A. 58
B. 78
C. 55
D. 68
Answer: ACD
Explanation:
Question: 454
Questions & Answers PDF
P-144
QinQ technology is a technology that extends the VLAN space by adding a layer of 8021Q tag
messages to the extended VLAN. The function of space, the following statement about QInQ is
mispronounced?
A. basic QinQ is implemented based on the interface orientation
B. QinQ increases the number of VLANs to 4095*4095
C. Flexible QinQ can be based on different inner layerS Tag and different outer layers of Tag, for user
VL The division of AN is more granular
D. QinQ technology enables private VLANs to pass through the public Network
Answer: B
Explanation:
Question: 455
Traditional BGP-4 can only manage IP4 unicast routing information, and MP-BGP extends BGP-4 to
provide support for multiple network layer protocols. Among them, MP-BGP's support feature for
IPv6 unicast networks is called BGP4+, BGP4+ via NextHop The route next hop address information is
carried by the attribute.
A. TRUE
B. FALSE
Answer: A
Explanation:
Question: 456
OSPF fast convergence is an extended feature to improve the convergence speed of routing, in which
PRC works by speeding up routing computation by performing path calculations only on the affected
nodes when the network topology changes.
A. TRUE
B. FALSE
Answer: B
Explanation:
Question: 457
The router port to which the policy is applied has been idle for about 10 seconds, and there is a huge
burst of c1 type coming in an instant, so how many bytes will the packets that are colored green?
A. 256K bytes
B. 48128 bytes
C. 32K bytes
Questions & Answers PDF
P-145
D. 80128 bytes
Answer: C
Explanation:
Question: 458
In ospf broadcast networks, there are 4 routers RTA, RTB, RTC, and RTDs within the same network
segment The DR priorities are 2, 1, 1, and O, and the Router ID is respective 1921681.1, 19216821,
19216831, and 19216841 If the OSPF protocol is enabled on both of these four routers, ospf selects
the BDR as
A. RTB
B. RTC
C. RTD
D. RTA
Answer: B
Explanation:
Question: 459
In an MPLSVPN network, when a packet enters the Internet and is forwarded, it is encapsulated with
two layers of MPLS tags, and the processing of the packet in the following options is described
correctly?
A. The penultimate hop device receives packets with an outer label of 3
B. The Egress PE appliance receives an UNlabeled IP packet
C. The Egress PE device correctly sends packets to the appropriate VPN
D. based on the inner tag The packet pops up the outer label on the penultimate hop device and
forwards it to the Egress PE device
Answer: ACD
Explanation:
Question: 460
There are three port roles defined in RSTP, with alternative ports and backup ports flags in STP
messages The port role values within the fields are consistent, all of which are 01
A. TRUE
B. FALSE
Answer: A
Explanation:
Questions & Answers PDF
P-146
Question: 461
If four routers run ISIS and have established an adjacency relationship, and the area code and router
rank are marked as shown in the figure, what is the cost value of R4 reaching 10022/32?
A. 10
B. 20
C. 30
D. 40
Answer: C
Explanation:
Question: 462
OSPFv2 is an IGP running on an IPV4 network; OSPFV3 is an IGP running in an IPV6 network
IGP, OSPFv3 in the network has a similar LSA type compared to OSPFV2, but the functionality is
slightly different, osPFv3LSA type does not include which of the following?
A. Router-LSA
B. Network-LSA
C. Asbr-summary-LSA
D. AS-external-LSA
Answer: C
Explanation:
Question: 463
Questions & Answers PDF
P-147
In order to study the working mechanism of the OSPFv3 protocol, a project to build a network
topology is as follows, the configuration of R1 and R2 is as follows, please ask the LSA switched
between R1 and R2 What are the types?
A. network-LSA
B. Router-LSA
C. Link-LSA
D. Inter-area-prefix-LSA
Answer: ABC
Explanation:
Question: 464
0SPFV2 is running on the IPV4 network IGP: OSPF3 is running in the IPV6 network, OSPF35 OSPFV2
has the same message type. Includes hello messages, DOD messages, LSR messages, LAU messages,
and SAX messages about OSPP The following statement is correct?
A. The hello packet of OSPFv3 carries the IPV6 address prefix of the router interface
B. OSPFv3 uses the authentication field of the packet header to complete the packet authentication
C. OSPFv3 uses the link-local address as the source address for sending packets, which can be
forwarded outside the range of the originating link
D. OSPFv3 sends OSPFv3 packet using the IPV6 multicast addresses FF02::5 and FF02
Answer: D
Explanation:
Question: 465
Among the routing policy tools commonly used by BGP, which ones can be used to filter routes?
A. filter-policy
B. Route-policy
C. lp extecommunity-filter
D. Traffic-policy
Answer: ABC
Explanation:
Question: 466
With an existing network running OSPF, what types of LSAs cause ISPF operations?
A. 2 ?LSA
B. 3 ?LSA
C. 1 ?LSA
Questions & Answers PDF
P-148
D. 5 ?LSA
E. 4 ?LSA
Answer: AC
Explanation:
Question: 467
The multicast protocol that can generate multicast distribution trees is ?
A. IGMPv2
B. BGP
C. OSPF
D. PIMV2
Answer: D
Explanation:
Question: 468
What is correct about the multicast message forwarding?
A. RPF check failure indicates that the multicast data packets are received from a suboptimal
interface, but the interface still receives multicast traffic and forwards it downstream
B. IGMP snooping function can not control the range of multicast traffic in the Ethernet flood
C. In the multicast transmission mode, the destination address of the message can specify the
location of the receiver
D. The source address of the multicast message is the unicast address
Answer: D
Explanation:
Question: 469
When two devices with the same priority compete for the master role at the same time, the device
on which the interface with the smaller IP address resides should be selected as the master device
A. True
B. False
Answer: B
Explanation:
Question: 470
Man-in-the-middle attacks or IP/MAC spoofing attacks can lead to information leakage and other
Questions & Answers PDF
P-149
hazards, and are more common in the intranet, in order to prevent man-in-the-middle attacks or
IP/MAC spoofing attacks, you can take the configuration method
A. Enable DHCP snooping to check the chaddr field in a DHCP request message
B. Configure the trusted/untrusted interface
C. Configure DHCP snooping on the switch to interbolde with DAI or IPSG
D. Limit the maximum number of MAC addresses allowed to be learned on the switch interface
Answer: C
Explanation:
Question: 471
The switch role in the stacking system does not include ?
A From the switch
B. Candidate Switch
C. Standby Switch
D. Primary Switch
Answer: B
Explanation:
Question: 472
A VRRP virtual router configuration VRID is 3 and the virtual IP address is 100 1. 1. 10, so what is the
virtual MAC address?
A. O0-00-5E-00-01-64
B. 01-00-5E-00-01-03
C. 01-00-5E-00-01-54
D. 00-00-5E-00-01-03
Answer: D
Explanation:
Question: 473
When the BFD detection intervals on both ends are 30ms and 40ms, are the following options
described correctly? An
A. BFD session can be established, which takes 40ms after negotiation
A B. BFD session can be established, which takes 30ms after negotiation
C. BFD sessions can be established, each occurring at its own interval
l D. BFD sessions cannot be established
Answer: C
Explanation:
Question: 474
Questions & Answers PDF
P-150
The most effective way to view device warnings through the CLI is ?
A. Display alarm
B. Display current-configuration
C. Display interface brief
D. Display clock
Answer: A
Explanation:
Question: 475
Regarding the description of the hello message in the PIM-SM message, the error is ?
A. Hello messages are sent to multicast address 224005
B. Elect dr in multiple router segments with hello messages
C. Routers periodically use hello messages to stay in touch
D. In a PIM-SM network, a newly started multicast router needs to use hello messages to discover
neighbors and maintain neighbor relationships
Answer: A
Explanation:
Question: 476
The correct statement about the IGMP proxy is ? Multi-select
A. The downstream interface of the IGMP proxy device generates multicast relay table items
B. IGMP proxy can detect the link status with the linkage through the information of the member
host joining/leaving the multicast group, and realize the rapid switching of the primary and standby
device links
C. IGMP proxy is typically deployed on devices between hosts that are members of the access device
The
D. IGMP proxy device cannot send query messages to downstream member hosts in place of the
IGMP queryer to maintain group membership
Answer: ABC
Explanation:
Question: 477
When deploying BGP/MPLS IPVPN, OSPF's VPN route tag is not present
The extended properties of MP-BGP are passed only locally, only locally, and only meaningful on
routers that receive MP-BGP routes and generate OSPF LSAs.
Questions & Answers PDF
P-151
A. TRUE
B. FALSE
Answer: A
Explanation:
Question: 478
: :1/128 is the IPV6 loopback address
A. TRUE
B. False
Answer: A
Explanation:
Question: 479
What are the types of link types included in OSPF's route LSA?
A. Stubnet
B. P-2-P
C. VLINK
D. Fransnet
Answer: ABCD
Explanation:
Question: 480
The following description of BGP ring protection is correct
A. The BGP router does not announce any updates from the EBGP peer to other EBGP peers
B. BGP routers that are not RR do not announce any updates from the IBGP peer to other IBGP
peers
C. Any routing information from the IBGP peer is advertised to the other IBGP peers
D. , through the AS-path attribute, discard any update information received from the EBGP peer that
contains its own AS number in the AS-path attribute
Answer: BD
Explanation:
Question: 481
Vxlan is based on UDP encapsulation, which encapsulates Ethernet data frames on top of UDP in IP
Questions & Answers PDF
P-152
packets, so it is called MAC in UDP encapsulation
A. True
B. False
Answer: A
Explanation:
Question: 482
MPLS does not enable the secondary unsubject pop-up, the penultimate hop label can be the same
as
A. TRUE
B. FALSE
Answer: B
Explanation:
Question: 483
The message types of ISIS mainly include SNP, IIH, and LSP
A. True
B. False
Answer: A
Explanation:
Question: 484
The Serial Number field of LS is used to detect expired and duplicate LSAs. The field is a 32bt signed
integer, so the small serial number is Ox8000000
A. True
B. False
Answer: B
Explanation:
Question: 485
The link quality of a company's network is poor, often failures lead to route oscillation, and even
occasionally there are routing loops, in order to prevent the recurrence of these phenomena, the
network administrator decided to deploy URPF in the whole network to improve the stability of the
network
Questions & Answers PDF
P-153
A. True
B. False
Answer: A
Explanation:
Question: 486
D Class IP address range 239000-239255255,What does 255 do? Radio
A. SSM multicast address, the multicast address segment is valid for the whole network
B. Any legitimate multicast traffic and multicast application can adopt this address C. Locally
managed multicast address, which is valid only locally
D. Link-local multicast address, where traffic that uses that address includes network control
messages and that address range is only the multicast address segment used by the E. routing
protocol
Answer: C
Explanation:
Question: 487
What are the benefits of using WRED?( Multi-select)
A. Provides some low latency
B. Avoid TCP global synchronization
C. Avoid congestion completely
D. Provides a small bandwidth guarantee
E. Can avoid UDP occupying most of the bandwidth when congested
Answer: C
Explanation:
Question: 488
In an Hw IP multicast network—which of the following multicast features are associated with (*, G)
table entries? ( Multiple select)
A. Dense mode
B. Source tree
C. Sparse mode
D. PIM bidirectional E. Share the tree
F. Dense Tree
Answer: CDE
Questions & Answers PDF
P-154
Explanation:
Question: 489
If the receive cache of a switch's gigabit Ethernet interface is full, what protocol does the switch use
to know that the remote interface delays sending data frames for a period of time?
A. 8023af
B. 8021U
C. 8021D
D. 8023
E. 8023Z
Answer: E
Explanation:
Question: 490
There is an existing router running OSPF HWL, HW1 interface serial0 is published in zone 1,
configure commands under the OSPF process nssa default-route-advertise, based on the previous
description, infers which of the following options are correct?
A. When HW1 injects a default route into Zone 1, HW1's local route table can not contain a single
default route
B. HW1 injects a Type 7 default route into Zone 0
C. HW1 injects a type 7 default route into zone 1
D. HW1 injects a Type 3 default route into Zone 1
E. When HW1 injects a default route into zone 1, HW1's local route table needs to answer the
default route
Answer: CE
Explanation:
Question: 491
The following description of CBWFQ is correct?
A. CBwFQ can be configured with MQC and service-policy is applied to the exit direction
B. CBwFQ can be used for both egress and inbound interfaces
C. CBwFQ is delayed, jittered and bandwidth guaranteed for traffic catch
D. CBWFQ can only be configured in hierarchical policies-maps. The parent policy-map performs
supervision and the child policy-map performs
Answer: A
Explanation:
Questions & Answers PDF
P-155
Question: 492
In an HW MPLS network, what parameters are used to define a forwarding equivalent class??
A. BGP MED ?
B. IP prefix
C. RSVP requests resource reservation
D. from CE Layer 2 links
Answer: BD
Explanation:
Question: 493
In which of the following cases, RSTP refreshes the MAC address table?( Multi-select)
A. When the port state transitions from Forwarding to Disking
B. Only when the port state transitions from Listening to Disccarding
C. When a topology change notification is received
D. When the status of a port changes
E. CE when the port state transitions from Disking to Forwarding
Answer: C, E
Explanation:
Question: 494
In a data communication session between two hosts, which level does the session layer of the oSI
model of the host on one end communicate with the osl mode of the host on the other end?
A. Communicate with the conversation layer on the other end B Communicate with the application
layer at the other end
C. Communicate with the data link layer at the other end
D. Communicate with the physical layer at the other end
E. Communicate with the presentation layer at the other end
Answer: A
Explanation:
Question: 495
The switch uses IPSG technology to verify the source address of the IP packet, and the verification
matrix used by the IPSG is obtained through the ARP resolution process in the listening network
A. True
Questions & Answers PDF
P-156
B. False
Answer: B
Explanation:
Question: 496
Router HW cannot access hosts in the remote network, router HW runs routing protocols and only
pings the remote file server address 105401 on router HW with extensions through a default route
remote network , the result of ping on the router HW is rendered as 'requ.' est time out', according
to the above description, the error in the following analysis is ?
A. The next hop router for router HW did not reach the destination address
B. Router HW does not have a legitimate router to reach the destination address
C. Ping is successful, but congestion occurs on the path to the destination address
D. There is a firewall in the remote destination network, and the destination address can be reached
without releasing ICMP traffic E. ICMP packets, but the destination device fails to reply
Answer: B
Explanation:
Question: 497
Regarding IPv6 over IP4(19) road, the following statement is correct
A. The 6to4 automatic tunnel requires the use of a specific IP6 address segment, and the assigned
address segment is preceded by 3ffe::/16
B. When configuring manual tunneling on the VRP platform, a Tunnel interface is generally created;
When configuring automatic tunneling, a Vrua-Template interface is usually created
C. The ISATAP tunnel determines the destination IPV4 address of the tunnel based on the destination
IP6 address.
D. All automatic tunnels encapsulate data in the same way.
E. Automatic tunneling has great advantages over manual tunneling, and manual tunneling will be
phased out
Answer: CD
Explanation:
Question: 498
The following description of the link state protocol is plausible?
A. CPU utilization is high and loops are easy to generate
B. Slow convergence and low CPU utilization
C. Fast convergence and low CPU utilization
D. Fast convergence and high CPU utilization
Questions & Answers PDF
P-157
Answer: D
Explanation:
Question: 499
You try to trace a remote Internet address on your PC, but the traceroute stops after it reaches a
router, and currently, the router should be in the incoming direction of the serial interface
With an ACL "rule5 permit tcp source any destination any", you need to add which of the following
ACLs to the router for traceoute to work
A. Rule 10 permit icmp source any destination any icmp-typettl-exceeded rule 15 permit source any
destination any icmp-type echo-reply
B. Rule 10 permit icmp source any destination any icmp-type echo rule 15 permiticmp source any
destination any icmp-type net-unreachable
C. Rule 10 permit tcp source any destination any
D. Rule 10 permit icmp source any destination any icmp tti-exceeded rule permit icmp source any
icmp-type port-unreachableE. Rule 10 permit udp source any destination any rule 15 permit icmp
source any destination any icmp-type protocolunreachable
Answer: D
Explanation:
Question: 500
If there is a switch running RSTP, which interface on that switch sends the BPDU with the Proposal
logo??
A. The specified port
B. in the forwarding state. The specified port in a non-forwarding state
C. Alternate port
D. The root port in the Blocking state
Answer: B
Explanation:
Question: 501
What are the common ways to learn routing in BGP? ( Multi-select)
A. receives neighbor routing information
B. Introduce static routes
C. BGP routing for other AS is introduced
D. Introduced Direct Route
Answer: ABD
Questions & Answers PDF
P-158
Explanation:
Question: 502
If you need to configure routing policies on one router. Which of the following parameters does an
administrator use to route when deploying a routing policy?( Multiple select).
A Protocol B. Application
C. Size of the packet D. Throughput
E. Identification of a specific terminal system
Answer: ABCE
Explanation:
Question: 503
A company deployed SSM multicast, in order to save the bandwidth consumption of multicast data in
the LAN, the network administrator made the following configuration on the switch
A. True
B. False
Answer: B
Explanation:
Question: 504
In the IS-IS broadcast network type, when establishing an adjacency relationship, if the router
interface priority is set to 0, it will not participate in the dis election
A. True
B. False
Answer: B
Explanation:
Question: 505
In Huawei switches, the hybird port can select vlan1 as an untagged vlan
A. True
B. False
Answer: A
Explanation:
Question: 506
The following statement about isis a route leak of ISIS is correct?
Questions & Answers PDF
P-159
A. Route leaks for ISIS must be deployed on Level-1 routers
B. Route disclosure for ISIS is turned on by default.
C. Route disclosure for ISIS avoids suboptimal paths.
D. Route leaks for ISIS can only be applied to IPv4 environments.
Answer: C
Explanation:
Question: 507
Mainstream Layer 2 technologies such as VXLAN, TRILL, NVGRE and MPLS
A. True
B. False
Answer: A
Explanation:
Question: 508
What is correct below about LDP synchronization in ISIS?
A. LDP synchronization can be turned on globally.
B. LDP establishes neighbors faster than ISIS, so LDP synchronization is turned off by default
C. LDP synchronization avoids traffic loss when the active-standby link is switched.
D. LDP synchronization can be deployed on the Loopback interface.
Answer: C
Explanation:
Question: 509
What are the characteristics of Syslog information?
A. The transmission of Syslog messages is not secure
B. The transmission of Sysiog messages is reliable
C. The transmission of Syslog messages is confirmable
D. The transmission of Syslog messages is secure
E. The transmission of Syslog messages is not acknowledgable
F. The transmission of Syslog messages is unreliable
Answer: AEF
Explanation:
Question: 510
Questions & Answers PDF
P-160
You need to access the subnets of different VPNs in the VXLAN network , such as information about
one subnet
Bottom: RT=10:1ORT.100:1000 Export 1000 in EVPN instance and RT-100-100 in VPN instance.
Which of the following can be basketed for another subnet?
A. All EVPN instances are 1000:1000
B. In VPN instances, it is 10:10
C. 1000:1000 appears in VPN instances
D. EVPN implements 1000:1000 export
Answer: CD
Explanation:
Question: 511
What commands are related to BGP route reflectors?( Multiple select).
A. reflect between-clients
B. group 1 internal
C. peer reflect-client
D. reflector cluster-id
Answer: ACD
Explanation:
Question: 512
What are the ways to divide VLANs in Huawei switches? ( Multi-select) A Subnetting based on IP.
B. Division based on QoS
C. Partitioning based on port
D. Division based on protocol
E. Division based on MAC address.
Answer: ACDE
Explanation:
Question: 513
Regarding the DSCP field, the following statement is incorrect: single selection
A. The DSCP value can be 0, and packets use the default forwarding mechanism when 0
B. When the value of DSCP is EF, it indicates that the data belongs to the accelerated forwarding
class.
C. In addition to indicating the priority of the data, DSCP can also indicate the probability of data
being discarded. The CS class in D. DSCP divides data into 8 priorities.
Answer: B
Questions & Answers PDF
P-161
Explanation:
Question: 514
The following description of VLANs in Ethernet is correct?
A. VLANs do not support bulk creation on devices
B. The range of VLANs is 0 to 4096
C. The default reserved VLANs for Huawei devices are 4000~4010
D. VLANs can be extended through QinQ technology.
Answer: D
Explanation:
Question: 515
Which IPV6 address would you ping to confirm that OSPFv3 is capable of pastoring unicast messages
over the link?
A. Site local Multicast
B. Anycast Address
C. Global Address of the link
D. Unique Local Add
E. Link Local Address
Answer: CDE
Explanation:
Question: 516
In a multicast network running PIM-SM mode, how does the router choose the upstream interface?
A. looks up the outgoing interface corresponding to the RP address in the unicast routing table
B. Interfaces to which multicast group members are directly connected
C. Find the outbound interface corresponding to the mapping proxy in the unicast routing table
D. The interface that is fast to the PIlM Join message
E. Interface for sending PIM Heilo messages.
Answer: A
Explanation:
Question: 517
Auto-negotiate mode is to obtain the maximum interface rate and operating mode, the network
administrator configures all Ethernet interface rates of a working switch to 10OMbps, and the
operating mode is configured as Full-duplex, when a network card is configured After the auto-
Questions & Answers PDF
P-162
negotiate workstation is connected to the switch, the negotiation result is that the interface rate is
10OMbps and the working mode is half-duplex, which of the following explanations is the most
reasonable for this phenomenon?
A. The problem is on the workstation's NIC, mostly due to the aging of the NIC driver on the
workstation , which causes the workstation NIC to learn the interface rate and operating mode
configured on the switch
B. Port rate negotiation is negotiated through the initial port sending FLP , and the operating mode is
not negotiated through FLP
C. STP initializes the port into the blocking state, causing auto-negotiation to fail, so the port should
be configured as an edge port
D. At higher port rates and operating modes, the workstation's network interface card cannot be
configured as auto-negotiate
E. Auto-negotiation is not configured on the switch, resulting in the switch not being able to send
FLP messages to the workstation, causing the workstation to set its own operating mode to Halfduple
Answer: E
Explanation:
Question: 518
IPV6 multicast introduces the concept of multicast scope, which of the following ways is the multicast
scope concept implemented? Multi-select
A. When the group shake source sends IP6 multicast data, the TTL value of the packet is set to limit
the transmission range of the group shake
B. There is a special field in the IPv6 multicast address that specifies the propagation range of
multicast.
C. Multicast scope is just a concept of spreading scope, and there is no specific technical
implementation.
D. During network configuration, the administrator uses the configuration command at the edge of
the network to limit the multicast scope.
Answer: BD
Explanation:
Question: 519
What is the field that the IPv6 header has similar to the IPv4 header "Type of Service" field?
A. Version
B. Flow Label
C. Next Header
D. Traffic Class
Answer: D
Questions & Answers PDF
P-163
Explanation:
Question: 520
The switch can suppress traffic by suppressing traffic and extremely other failures can affect
operations, which of the following traffic suppression configurations is the wrong configuration
A. [Quidway] wan 10 [Quidway-wan10] multicast-suppression 1000 [Quidway-van10] quit
B. [Qudway ineface gigabtethemnet /0'1
[Quidway-GigabitEfthemetO0/O/1]multicast-suppression 80TQuidway-GigabitEthernet0/0/1]quit
C. Quidway inteface gigabiethenet ou0/1
[Quidway-GigabtEthernet/0/1J,broadcast-suppression 80 IQuidway-GigabitEthernet//1]Jqut
D. [Quidway] icmp rate-limit enable [Quidway] icmp rate-limit total threshold 20
E. [Quidway ] wan 10 [Quidway-wani0] broadcast-suppression 1000 [Quidway-van10] quit
Answer: A
Explanation:
Question: 521
The following description of the Layer 6 functionality in the OSI reference model is correct?
A. Synchronous communication
B. Establishing, maintaining, and terminating communication sessions
C. Provides a common data compression and encryption scheme
D. Determines the availability of resources
Answer: C
Explanation:
Question: 522
Questions & Answers PDF
P-164
The Path Selection tool can define multiple entries, which of the following tools will automatically
generate a rejection of any entries at the end of the slot
A. Community -filter
B. IP-prefix
C. Route policy
D. AS-Path- filter
Answer: ABCD
Explanation:
Question: 523
CMPv6 uses the Type field to identify the message type, and according to the value of the type field,
we can divide the ICMPv6 message into two categories, one is the error message and the other is the
information message
A. True
B. False
Answer: A
Explanation:
Question: 524
The CPU was attacked by malicious traffic. Here are some of the following ways to prevent an attack:
Multi-select
A. USE CPCAR to rate limit messages sent up to the CPU according to the protocol type
B. Speed limiting of messages sent to the CPu on the soil.
C. Filter packets with AcL on the compromised router port
D. Turn off the remote login function of the router.
E. Analyze and count the packets sent to the CPU to find out the user of the attack source or the
interface of the attack source.
Answer: CD
Explanation:
Question: 525
In an HWIP multicast network, where multiple sources exist and each source has several receivers,
which protocol allows source-to-RP traffic and RP-to-receiver traffic to share the same tree 2?
A. MOSPF
B. PIM SM
C. DVMRP
Questions & Answers PDF
P-165
D. 56768GZliuji
F. PIM-DM
Answer: D
Explanation:
Question: 526
Which of the following DNS resource records are legitimate?
A. FQDN
B. NS
C. PTR
D. MX
E. A
Answer: BCDE
Explanation:
Question: 527
A workstation is connected to an Ethernet switch in the work through a super-class 5 wire, the
workstation can access the entire network (that is, full connection) through the switch, but the
access rate is much lower than expected, when viewing the switch interface statistics, you can detect
that there are many ultra-small frames, with software to read the statistics of the workstation
network card, found that there are Many FCS and frame alignment errors, what causes the machine
to cause these errors?
A. The rate mismatch between the workstation and the switch
B. Interface mismatched to an 8021Qtrunk interface
C. The line between the workstation and the switch has been completely damaged
D. The operating mode between the workstation and the switch does not match
E. The network interface card on the workstation is damaged
Answer: D
Explanation:
Question: 528
The authentication types of ISIS include interface authentication, zone authentication, and routed
domain authentication
A. True
B. False
Answer: A
Questions & Answers PDF
P-166
Explanation:
Question: 529
If the topology of the entire network does not change, but the allocation of IP segments in the
router changes, ISIS only uses PRC to calculate the changed routing information, and does not
recalculate all SPT
A. True
B. False
Answer: A
Explanation:
Question: 530
Which of the following configurations for OSPFv3 route aggregation is correct?
A. [Huawei]ospf3 1 [Huawei-ospv3-1]area 1 [Huawei-ospf3-1-area-0001] abr-summary fo0:0 0:48
cost 400
B. [Huaweijinterface gigabitethernet 1/0/0[Huawei-GigabilEthemnet1 / 0/0] asbr-summany
fcOO:0048 cost 20
C. [Huawei] ospfs 1 [Huawei-ospf3-1] asbr-summary fcO0:O:0:.48 cost 20 tag 10o
D. Huawei]ospv3 1 [Huawe-ospt/3-1]area 1 Huawei-osph3-1-area-0001]asbr-summary fc000:048
cost 20 tag 100E. [Huawei] ospfv3 1 [Huawei-ospfv3-1] abr-summary fc000:0;. 48 cost 400
Answer: A
Explanation:
Question: 531
Each DD message has a sequence number for data confirmation, and a DD sequence number is 2
bytes long
A. True
B. False
Answer: B
Explanation:
Question: 532
SNMPv3 defines which security features
A. Privacy
B. Authentication
Questions & Answers PDF
P-167
C. Domain checking
D. Accounting
Answer: AB
Explanation:
Question: 533
Which timer for spanning tree protocol dictates how often to see the root bridge send configuration
BPDUs?
A. forwarding delay timer
B. STP timer
C. HOLD timer
D. Maxage timer
E. Hello timer
Answer: E
Explanation:
Question: 534
Users hope to be able to make the router forward and select messages according to their own
defined policies on the basis of traditional route forwarding, and can adopt policy routing, and the
following description of policy routing is incorrect
A. Policy Routing can set the next hop IP address
B. Policy Routing cannot be set in the next statement DSCP
C. Policy Routing cannot be used to set IP precedence
D. Policy-based routing can be used to match message lengths
Answer: C
Explanation:
Question: 535
The command ip as-path-fiter as-path-fiter-number (denylpermit) regular-expression to configure aspath-ilter, in this command , multiple sentences can form an as-path-filter statement, what is the
relationship between so many statements?
A. Routes match in order When a route matches to a clause, the relationship between
B. and is no longer matched downwards
C. or relationships
D. Routes match in order and routes need to match all sub-directions
Questions & Answers PDF
P-168
Answer: A
Explanation:
Question: 536
The following description of the characteristics of Huawei device Eth-trunk link aggregation is
correct?
A. Link aggregation enables load balancing based on data TCP or UDP ports
B. Link aggregation cannot be deployed across devices
C. Link aggregation can be applied to Both Layer 2 and Layer 3 devices
D. Link aggregation can only be applied to Layer 2 devices.
Answer: C
Explanation:
Question: 537
The following description of the GVRP interface registration mode in Huawei switches is correct?
A. When fixed registration mode is selected, the interface cannot propagate dynamic VLANs
B. When the normal registration mode is selected, allow the interface to dynamically register and
unregister the VLAN. Logout here includes deleting dynamically learned VLANs and VLANs created
natively by the administrator
C. When the interface layer two operating mode must be hybird
D. GVRP when the register mode with forbidden is selected, there are four types of interface
registration mode
Answer: A
Explanation:
Question: 538
When troubleshooting a local area network, you notice a large number of frame alignment errors,
FCS errors and LAG conflicts, and the possible cause of these problems is ?
A. Switches and terminals are interconnected over 10/100/1000base-T Ethernet links, and switches
and terminals operate in half-duplex mode
B. There is a mode mismatch on the 1000base-LX/LH link
C. The operating mode does not match
D. on a 10/1000/1000base-T Ether link This type of error occurs in most environments
Answer: C
Explanation:
Questions & Answers PDF
P-169
Question: 539
Protocols with TCP ports 443, 179, 137, 110, and 23 are, in order: radio
A. Finger,DHCP Server,NetBios Name Server,POP3,TelnetB
B. LDAP,SNMP,TFTP,POP3,Telnet
C. HTTPS,SNMP,POP3,DNS ,Telnet
D. HiPS,BGP, NetBios Name Server ,POP3,TelnetE. BGP,POP3,SNMP,TFTP,Teinet
Answer: D
Explanation:
Question: 540
What designs in the router can improve the reliability of the router?
A. Dual power supply design
B. Module hot-swappable design
C. Issu Design
D. Dual-engine design
Answer: AD
Explanation:
Question: 541
Compared to IPV4 multicast, which of the following descriptions is the characteristic of
multicast?
IP6
A. IPv6 multicast does not contain MSDP and dense mode
B. The first 8bit IPV6 multicast address is always FF(11111111).
C. IPv6 multicast clients use IGMPv3 to join multicast groups
D. IPv6 multicast load sharing extends the multicast routing rules and is completely independent of
RPF check
Answer: B
Explanation:
Question: 542
VPN instances are also known as VPN routing forwarding tables (PN Routing and Forwarding table),
and there are multiple route forwarding tables on the PE, including a public route forwarding table,
one or more VPN route forwarding tables, and VPNv4 Route forwarding table.
A. False
B. TRUE
Questions & Answers PDF
P-170
Answer: B
Explanation:
Question: 543
If you want to advertise 19072270/27 to an EBGP neighbor, is the following command correct?
A. network 19072270 mask 255255255224
B. network 1907227000031
C. network 19072270255255255224
D. network 19072270
E. network 19072270255255255240
Answer: C
Explanation:
Question: 544
What is the significance of reserved multicast address 224000~22400255?
A. The multicast address range is reserved for the management of multicast addresses, and is valid
locally
B. The address identifies Global lnternet, and the address range is valid for the entire network
C. This multicast address range is reserved for the management of multicast addresses, which cannot
transmit multicast traffic to the Internet
D. Any legitimate multicast traffic and multicast application Junhui adopts an address change
E. The multicast address range is reserved for link-local multicast traffic, including network control
messages, and the address range is only valid locally
Answer: E
Explanation:
Question: 545
Regarding the WRR (Weight Round Robin) description of the error is ?( Multiple select).
A. WRR avoids congestion in the network
B. WRR guarantees that various queues are allocated to a certain amount of bandwidth
C. WRR is a congestion management technique
D. WRR can no longer use
E. WRR on GE interfaces to ensure that critical services are prioritized for
Answer: A, E
Explanation:
Questions & Answers PDF
P-171
Question: 546
Why is BGP an enhanced distance vector routing protocol?
A. According to the routing rules of BGP routing, the route with lower MED is preferred
B. BGP uses the ASPATH attribute to record all autonomous system numbers that a route passes
through into an AS list, and based on that attribute, routes with shorter AS-PATH are preferred
C. NEXT_HOP is a recognized mandatory attribute
D. BGP cannot accept routes that carry a local AS number in the AS_PATH
Answer: B
Explanation:
Question: 547
Which of the following options is correct?
A. Unicast and broadcasting cannot effectively achieve data transmission between one source and
multiple destinations on P2MP, but multicast technology can
B. Multicast technology is able to reduce redundant traffic, so network bandwidth can be saved C.
Multicast technology is used for "-to-many" applications
D. Since multicast is based on TCP to establish a connection, multicast technology can ensure the
reliable transmission of data
Answer: B, C
Explanation:
Question: 548
What is the exact description of the SSM features?
A. Using SSM, the receiver can use INCLUDE in IGMPv3 to indicate that the source
B. SSM he wishes to join is an extension of the DVMP protocol. to efficiently transmit one-to-many
communication traffic
C. SSM requires MSDP to discover active sources in other PIM domains
D. Routing multicast traffic in the SSM is done by relying on the number of sources, and the RP is
used for the receiver to answer the corresponding number of sources
Answer: A
Explanation:
Question: 549
Configuring filter-policy 2000 export in the IS-IS process, the wrong statement about the function of
the command is ?
Questions & Answers PDF
P-172
A. which needs to be used in conjunction with route ingestion, acts as an external route sender
neighbor that only partially introduces.
B. If you do not configure this command, the device will by default introduce the external routing
protocol to the IS-IS route all outgoing
C. Restricts the external publication of route entries generated by the device itself
D. This command will filter the link status information released to the outside world
Answer: D
Explanation:
Question: 550
When running OSPFv3 on a Huawei router, the OSPFv3 process automatically selects an interface
address as the process router id
A. True
B. False
Answer: B
Explanation:
Question: 551
Mainstream Layer 2 tunneling technologies include VXLAN TRILL, NVGB and MPLS.
A. FALSE
B. TRUE
Answer: A
Explanation:
Question: 552
Which of the following options enables encapsulation and unencapsulation of VXLAN messages?
A. VBDIF
B. VLANIF
C. BD
D. VTEP
Answer: D
Explanation:
Question: 553
Questions & Answers PDF
P-173
An engineer uses 2 routers to test Pv6 services and runs OSPFV3 to achieve interconnection and
interoperability of IPV6 networks The RI has access to the loopback address of R2 The engineer looks
at ri's OSPF3 routing table entry and finds that there is no route reaching the R2 loopback address It
can't be caused by which of the following?
A. R2 does not enable OSPFv3 on the loopback port
B. R2 does not advertise the loopback address
C. R2 in area 0 to advertise the loopback into a different OSPFv3 process
D. R2 does not configure the Router ID used in the OSPFv3 process
Answer: B
Explanation:
Question: 554
MACsec provides users with secure MAC layer data sending and receiving services. Which of the
following is not a service available by ACsec?
A. User data encryption
B. Data source authenticity verification
C. Integrity check
D. Controllability check
Answer: D
Explanation:
Question: 555
The following statement about the concept of multicast is wrong?
A. Multicast Source: The sender of the message needs to join the multicast group to provide
forwarding of multicast group messages
B. Multicast router: A router or layer-three switch that supports layer-3 multicast functionality
C. Multicast Group Members: Multicast group members can be widely distributed anywhere in the
network
D. Multicast Groups: A collection identified by ip multicast addresses
Answer: A
Explanation:
Question: 556
To implement the traffic filtering function, you can use trapp-filter or MQC, which can be called in
more views than traffic-filter
A. FALSE
Questions & Answers PDF
P-174
B. TRUE
Answer: B
Explanation:
Question: 557
By default, routers running IS-IS in broadcast networks have a period of seconds for DIS to send
CSNP packets?
A. 33
B. 40
C. 30
D. 10
Answer: D
Explanation:
Question: 558
About multi-instance CE (Multi-VPN-Instance CE, MCE). What is the error described below?
A. Users who connect to the same MCE but are not part of a VPN instance cannot access each other
B. The MCE vs. PE direction must have multiple physical links to achieve isolation between different
VPN instances
C. MCE-enabled devices can access multiple VPI instances in BGP/RPLS IPVPN applications, reducing
user network equipment investment
D. On the MCE device, you need to create their own routing tables for different VPNs and bind to the
corresponding interface
Answer: B
Explanation:
Question: 559
All interfaces of the router have OSPF enabled, the Cost value of the link is identified in the figure,
and the Loopback0 socket for R2 is advertised in area 1 , then Rl reaches 10022/32 with a Cost value
of ?
Questions & Answers PDF
P-175
A. 50
B. 150
C. 200
D. 100
Answer: C
Explanation:
Question: 560
As a network administrator, which of the following protocols can I use for network device
configuration?
A. SSH
B. NETCONF
C. LLDP
D. SNMP
Answer: BD
Explanation:
Question: 561
What messages can Huawei equipment suppress traffic for?
A. Multicast
B. Known unicast
C. Broadcast
D. Unknown unicast
Answer: BCD
Explanation:
Questions & Answers PDF
P-176
Question: 562
What mechanisms or techniques can VRRP combine with to monitor uplink connectivity?
A. IP-link
B. BFD
C. NQA
D. Interface trace
Answer: BCD
Explanation:
Question: 563
The following statement about static VXLAN tunnel configuration is correct?
A. A BD needs to create an NVE country, and when there are multiple BDs, multiple NVE interfaces
must be created
B. An NVE interface can be associated with multiple VNls, so you can create only one NVE interface
when there are multiple BDs
C. For a VXLAN tunnel, you need to create a corresponding NVE interface, in which you explicitly
specify the source IP address and the destination IP address , so there are multiple VXLAN tunnels on
the VTEP that must be vE interfaces
The destination address of the VXLAN tunnel is specified in the
D. NVE interface, and multiple VXLAN tunnels can create only one NVE interface
Answer: D
Explanation:
Question: 564
How do IGMPv2 routers maintain cinderband group membership? Multi-select
A. The router queries a specific group
B. The router maintains a timeout timer for each group membership, refreshes the timer if the
receiver host is received, and deletes the group membership if the timer times out
C. The router periodically sends a Query message, and after the receiver host receives the Query
message, it reports a Report message
D. As soon as the leave message is received, the router immediately deletes the group membership
Answer: BC
Explanation:
Question: 565
Questions & Answers PDF
P-177
As shown in the figure,
all interfaces of the router have OSPF turned on, and the COST value of the link is identified in the
figure. R2's loop backO interface advertises a cost in region l, then R1 reaches 10022/32 The value is
Answer: 200
Explanation:
Question: 566
The following statement about IPSec VPN is correct ?qo
A. Two routers establish an IPSec VPN in brutal mode, so that the two devices can interact with a
minimum of 4 messages to establish a tunnel.
B. Brutal mode can support NAT traversal, while main mode does not support NAT traversal.
C. The two routers can establish OSPF neighbor relations and exchange intranet routes through the
IPSec VPN tunnel
D. The two routers establish IPSecVPN in main mode, and from the 5th packet (included), the
payload's data will be encrypted.
Answer: D
Explanation:
Question: 567
During isis ' broadcast network database synchronization, is the following statement correct?
A. R2, as DIS, sends CSNP periodically.
B. R2 As DIS, Hello time is 3 times that of a normal router . C. R2 as DIS does not receive PSNP
nouns for other routes.
D. RI and R3 maintain database consistency by periodically sending PSNP requests.
Questions & Answers PDF
P-178
Answer: A
Explanation:
Question: 568
Two routers, connected together through the serial port, but can not ping between each other , now
check the port status as follows: Can the following information determine what the cause is?
A. Insufficient link bandwidth
B. The IP addresses on both ends are not on the same network segment
C. The link layer protocols on both ends are inconsistent
D. Subnet mask does not match the
Answer: C
Explanation:
Question: 569
As shown in the topology diagram, all interfaces of the router in the figure are enabled with the ISIS
protocol, and the following statement is correct.
A. If the RI's Ethernet0/0/0 interface goes down, R2 becomes the master device
B. If the Ri's Ethernet0/0/1 interface goes down, R2 becomes the master device
C.
If R3's G E0/0/0 interface goes down, R2 becomes the master device
D.
If R3's Ethernet0/0/0 interface goes down, then R2 becomes the master device
Answer: ABC
Explanation:
Question: 570
Questions & Answers PDF
P-179
As shown below, RI, R2 establish EBGP neighbors, and once turned on, the BFD detection function,
the following statement is correct?
A. R
Detection time for BFD packets for 2 Detection time for BFD messages 800m5
B. RI Detection time for BFD messages for 1280ms
C. RI The detection time for bFD messages for 660ms
D. R2 is 600ms
Answer: C
Explanation:
Question: 571
In the laboratory network, the network is built according to the following topology diagram, SWI is
the default configuration, and SW2 disables the switch STP function.
A. SG0/0/2 for WI enters the Discarding state
B. SW2 and G0/0/1 enters the Discarding state
C. SW2 G0/0/2 enters discarding state
D. No interface is backed up for blocking
E. SWI's G0/0/1 enters the Discarding state
Answer: D
Explanation:
Question: 572
As shown in the following figure, R1 and R2 establish a neighbor relationship with LeveL2, and the
key configuration is as follows, so is the following route entry for R2 correct?
Questions & Answers PDF
P-180
A. 0::/64 The router will appear in the IP routing table
B. 2022::/64 Routers appear in the IP routing table
C. 2019::/64 Routers appear in the IP routing table
D. 2021::/64 Routers appear in the IP routing table
Answer: ABC
Explanation:
Question: 573
As shown in the following topology, EBGP is running between AS100, AS200, AS300, AS400, and the
neighbor relationship is established S400 When you receive a BGP route from ASI00 for a 1.1.1.1/32
network segment, is the path order recorded in the ASPath properties correct?
A. 10,200,3
B. 400,300,200,100
C. 100, 200,300, 400
D. 300, 200,100
Answer: D
Explanation:
Question: 574
Questions & Answers PDF
P-181
As shown in the figure, R1, R2, and R3 run OSPP at the same time and declare their respective ring
ports, as described below is the error.
A. R2, you can use the filter po y export command to filter R3's loopback route
B. R2 you can make Ëfilter in Area 0 The import command to filter the loopback route for R3 on
C. RI can make Ëfilter-policy import filter the loopback route for R3
D. RI, you can use the Make Ëfilter export command in Area 1 to filter loopback routes for R3
Answer: A
Explanation:
Question: 575
In the following topology diagram, R1 can access the Internet through R2 and R3, R1 and R2, R1 and
R1 An EGP connection is established between R3 , and R2R3 belongs to the same AS, each via BGP
Publishing a default route that requires R1 to visit lnternet's traffic preference R2, can the following
practices be achieved?
A. R1 specifies that the peer R3 sets the MED property to 150 in the import direction
B. R2 specifies that the peer R1 sets the local priority to 150 in the export direction
C. R2 specifies that the peer R1 sets the MED property to 150 in the export direction
D. R1 specifies that the peer R2 beats the local priority in the import direction to 150
Answer: AD
Explanation:
Question: 576
As shown in the figure, in the context of IPv4 and IPv6, the SEL field in the NET address of isis
always takes a value of 00 ?
A. Right
B. Wrong
Answer: A
Explanation:
Questions & Answers PDF
P-182
Question: 577
As shown in the figure, the neighbor relationship between R1 and R2 has just been established, and
the database synchronization process between R1 and R2 is correct.
A. The message sent by R1 to R2 is a PSNP message
B. R1 sends the packet of R2 as the CSNP packet. The message sent by
C. R1 to R2 is an LSP packet. The message sent by
D. R1 to R2 is the Hello message.
Answer: B
Explanation:
Question: 578
As shown in the figure, the PPP link between R1 and R2 is not in the same network segment, but
the R1 and R2 direct connectors can communicate, and the Ethernet link cannot communicate under
the same planning, why?
A. The interconnect POS ports of R1 and R2 learn the 24-bit subnet route of each other's direct
connection ports through IPCP
B. The interconnect POS ports of R1 and R2 learn the 32-bit host route for each other's direct
Questions & Answers PDF
P-183
connections through IPCP
C. The interconnect POS port of RI and R2, through LCP learns the MAC address of the opposite
termination , does not need to use ARP to request the MAC address
D. The data packets of the interconnect POS ports of R1 and R2 do not need to encapsulate ethernet
headers and do not need to use ARP to request MAC addresses
Answer: BD
Explanation:
Question: 579
There are routers as follows, according to which the compromise conclusion is wrong?
A. R3 must be the DIS of some Level-1 link
B. The R3 router is a Level-1-2 router
C. R3 must be the DIS of some Level-2 link
D. The system ID of the R3 router is 000300000000
Answer: A
Explanation:
Question: 580
What is the correct description of the scene shown in the following figure?
A. R1 simultaneously exists level-1 and Level-2 LSDB
B. R1 can ping the interface address of R2 loopback 0
C. R1 has a route to R2 loopback 010022/32
D. There is no neighbor relationship between R1 and R2
Answer: AC
Explanation:
Question: 581
As shown in the FIGURE, in the HUB & Spoke networking mode of MPLS BGPVPN, in order to
achieve the division, it can only communicate with the headquarters. Divisions cannot communicate
with each other, and the settings for RT can be which of the following scenarios? (Multiple choice
questions).
Questions & Answers PDF
P-184
A. ??:Import Target: 123; Export Target:123 ?? 1: lmport Target:123; Export Target:123 ?? 2:lmport
Target: 12: 3; Export Target: 123
B. ??: Ilmport Target: 1:1l; Export Target: 3:3 ?? 1: Import Target: 33; Export Target: 1.1 ?? 2:lmport
Target: 3:3; ExportTarget: 2
C. ??: lmport Target: 22; Export Target: 33 ?? 1: lmport Target: 33; Export Target: 1:1 ?? 2:lImport
Target: 33; Export Target: 2
D. ??: lmport Target:123; Export Target: 3:12 ?? 1:Import Target: 312; Export Target:123 ?? 2:Import
Target: 3:12; Export Target: 12:3
Answer: D
Explanation:
Question: 582
As shown in the following figure, a part of the LSDB LSDB of a router LSDB is shown in the first one in
the following figure. A new LSP has been received, the second one in the figure below, and the
following statement is incorrect (single choice).
A. this router will put the newly received LSP into the LSDB
B. In the case of a broadcast network, DIS will include summary information for this LSP in the next
CSNP message.
C. This router ignores LSPs received from neighbors
D. If it is a point-to-point network, the router will send PSNP
Answer: C
Explanation:
Question: 583
As shown in the figure, all routing diagrams declare the loopback address in OSPF, where R2 does not
return the address is 10022/32, it is advisable to tell AraD. The R3 loopback address is
Questions & Answers PDF
P-185
10033/321001.1.0/24 external routing, in order to reduce the burden on the RI router, the
configuration command is as follows:( Multiple choice questions)[Rlip ip-prefix 1 permit 001.1.024
[RLIJospfl [RL-ospf-1]filter-policy ip-prefix l import please ask the following description is correct?
A. In the P route table of router R1, there is no external route to 1001.1.0/24
B. In the IP routing table of router R1, there is an external route to 1001.1.0/24
C. In the IP routing table of router R1, there is no loopback route to R2
D. In the IP routing table of router RI, there is no loopback route to R3
Answer: ACD
Explanation:
Question: 584
The following topology diagram is available, and it is correct to analyze the following statement
accordingly
A. There are route entries for 10022/32 and 10000/16 in the IP routing table for AR1
B. R1's IP routing table has both 10033/32 and 10000/16-bit route entries
C. Because R does the route aggregation, R1 Only route entries of 10000/16 exist in the IP routing
table
D. There are route entries for 10022/32 and 10033/32 in the IP routing table for R1
Answer: B
Explanation:
Question: 585
As shown in the figure, Department A of Branch 1 has access to the Internet, but Department B can
only use an encrypted VP to access headquarters resources, and NAT can be configured on the egress
device The policy enables Department A to access the Internet, while the PSecVPN (ESP Protocol) +
Tunnel mode method configured for Department B gives it access to headquarters.
B. Right
C. Wrong
Answer: A
Questions & Answers PDF
P-186
Explanation:
Question: 586
A company's two-layer phase network architecture as shown in the figure, when the engineer is
configured to find that the business between departments can not communicate, through the
command to view the status of the equipment as follows, please determine the possible causes?
A. The BPDU interval between switches is not configured
B. The Transition VLAN mapping between the handover machines is not configured to be caused
C. The Revislon Level configuration is inconsistent between switches
D. Inconsistent Registry Name configuration between text exchange machines
Answer: BCD
Explanation:
Question: 587
As shown in the following figure, R1, R2, R3 establish a neighbor relationship of Level2 The IP routing
table for R3 is correct (multiple choice).
Questions & Answers PDF
P-187
A. The 2::/64 route appears in the P route table
B. The 2019:/64 route appears in the IP routing table
C. 2020::/64 The route appears in the IP routing table
D. The 2021/64 route will appear in the IP routing table
Answer: ABCD
Explanation:
Question: 588
The data results of a router are as follows, and the analysis conclusion is correct (single choice).
A. The GEO/0/0 port of the A. R3 is in a different region than the neighbor
B. The B. R3 router's Eth0/0/1 enables both IPv4 and IPv6 ISIS
C. R3 is on the link where Eth0/0/0 is Eth0/ 1 of the LEVEL-1 and Level-2 DISC
D. R3 routers Circuit-level is Level-1-2
Answer: D
Questions & Answers PDF
P-188
Explanation:
Question: 589
As shown in the figure, a company wants to achieve secure mutual access between the head office
and branches through MPLSVPN, and at the same time requires that the IPN traffic of the branch
bank must be forwarded through the head office to achieve traffic monitoring
A. VPN routing information can be exchanged between A. CE and PE using BGP messages
B. When Hub-CE passes routing information with Hub-PE, you need to configure a route on Hub-PE
that allows receiving AS numbers to be repeated 1 time to receive routes published by Hub-CE
C. Between Hub-CE and Hub-PE, and between Spoke-PE and Plan-CE, routing information can be
exchanged using the OSPF protocol
D. An MP-IBGP peer relationship is established between Spoke-PE and THE VPN routing information
is exchanged.
Answer: D
Explanation:
Question: 590
As shown in the figure, three switches S1, SW, and SN3, where SWI is the root bridge, and link
congestion occurs between SI and SW2, SWD cannot receive the configuration BPDU sent by the
root bridge, which spanning tree protection mechanism does the administrator need to configure to
prevent the problem caused by link congestion?( Single choice questions).
A. root protection
B. PreventS TC-BPDU attacks
C. BPDU Protection
D. Loop Protection
Answer: D
Explanation:
Questions & Answers PDF
P-189
Question: 591
As shown below, what routes will R2 learn?( Single choice questions).
A. R2 can learn the 101.20/24 and 101.30/24 routes.
B. R2 can learn the 101.1.0/24 route.
C. R2 can receive an LSP for R1, but cannot join to the routing table.
D. R2 can learn all routes to R1.
Answer: D
Explanation:
Question: 592
View the details of all VPN instances on a network device and the results are as follows, which of the
following statements is wrong?( Multiple choice questions).
A. The total number of instances that enable the IPv6 address family in the VPN configured on this
side is 1 .
B. VPN-Instance vpna does not receive VPN routes with an RT of 2:1.
C. The GigabitEthernet 1/0/0 interface is tied to the VPN-Instance vpna
D. The device assigns a label to each route of the VPN-Instance vpna.
Answer: AD
Questions & Answers PDF
P-190
Explanation:
Question: 593
As shown in the figure, the use of redundant links between the branch and the headquarters to
establish IPsecVPN, while turning on URLPF on the Router_B for traffic from branch l, which of the
following options is correct?
A. When using IPsec active-standby link redundant backups to enable the URPF function under the
physical interface , it is recommended to use URPF loose mode.
B. When using IPsec multilink redundant backup, the URPF function can be used under the physical
interface, and URPF strict mode can be used
C. When using IPsec multilink redundant backups, urPF can be enabled under the tunnel interface,
and URPF strict mode can be used
D. When using lPsec active-standby link redundancy backup, the URPF function is enabled under the
physical interface, and URPF strict mode can be used.
Answer: AC
Explanation:
Question: 594
As shown in the figure, which of the following options satisfies two routers to establish an ISIS
neighbor?( Single choice questions).
A. Both routers are of The Level-1 type. B. Both routers remain of the default type.
C. One of the two routers can be of the Level-1-2 type and the other of the Leve1-1 type. D. The ISIS
process numbers of the two routers must be consistent.
Answer: B
Explanation:
Questions & Answers PDF
P-191
Question: 595
The switch SWA and SWB are connected together by 2 Ethernet links, where the switch SWA has the
following interface configuration:
A. Without changing the current configuration, GigabitEthernet1/0/1 and GigabitEthernet1/0/2 can
join the same aggregation group
B. Because of the different VLANs allowed, GigabitEthernet1/0/1 and GigabitEthernet1/0/2 cannot
join the same aggregation group
C. After link clustering is configured on both SWA and SWB, if MSTP is enabled on the switches SWA
and SWB Both GigabitEthernetl1/0/1 and GigabitEthernetl/O/2 are the forwarding status of MSTP
D. Only if the configuration of GigabitEthernet 1/0/2 is changed to match GigabitEthernet 1/0/1 can
the two join the same aggregation group
Answer: BD
Explanation:
Question: 596
As shown in the figure, as shown, as the AS10 has two paths to access THEA1, the optimal route
passed from the 4S23 by default is now sprinkled with S00 to ass4O The odds belt wins even more
worrying. Therefore, in the R2 configuration as follows, after the completion of the coordination, it is
found that the most worrying route has not changed, and some operations can be adjusted to make
the configuration
??[ R2]jpas-path-fiter l permit "4D0& [2]pouteplicy med permit node 10[R2-routepolicyli- match
aspath-ilterl[R2-oute-policylapplycoast.20
Questions & Answers PDF
P-192
A. Configure compare-di fferent-as-med under the BGP process for R2
B. Configure destiny-med under the BGP process for R1
C. Configure compare-di fferent-as-med under the BGP process of Rl
D. Configure the targeted-med under the BGP process for R2
Answer: BC
Explanation:
Question: 597
A multi-protocol network, the topology is shown in the figure. Take a closer look at the topology,
router R4 (in Areal) is introduced into the OSPF process via the routes learned by BGP. So what
categories of LS4 will R3 advertise to zone 0?( Multiple choice questions).
A. 5 ?LSA
B. 7 ?LSA
C. 1 ?LSA
D. 4 ?LSA
E. 2 ?? ??
Answer: ACE
Explanation:
Question: 598
Is the following figure correct about NDP's process of resolving link-layer addresses?
Questions & Answers PDF
P-193
A. Right
B. Wrong
Answer: A
Explanation:
Question: 599
result :(moloteric question).
A. When sending a packet with a destination address of 4444, it is sent without labeling.
B. When the router receives a packet with the label 1024, it replaces the label with 1027 and sends
it.
C. When a packet with a destination address of 2222 is sent , it is sent without labeling.
D. When sending a packet with a destination address of 3333, label 1026 and send it.
Answer: C
Explanation:
Question: 600
Questions & Answers PDF
P-194
As shown in the figure, SWA, SWB, SWC all run RSTP, GED/O/2 on SWB Ports and GEO/0/1 ports on
SWC have a port role of ? Radio
A. Alternative port, Backup port
B. Backup port, root port
C. Root port, Designated port
D. Backup port, Alternative port
Answer: D
Explanation:
Question: 601
OSPFV is the GP running on the P4 network) OSPF3 is the KGP running on the IP6 network. OsPFV
works the same basic way as OSPF2, such as elections for DR and BDR. As shown in the figure, an
engineer uses three routers for IP6 service testing, and he wants to interconnect the IPv6 network by
running OSPFv3 Which of the following statements is correct regarding the election of the network
DR?
A. After the network converges, R1 is DR
B. After the network converges, the engineer modifies the priority of R1 to 100, the priority of R2 to
10, and R3 to the default value. When the network converges again, Rl is DR and R2 is BDR
C. After the network converges, the broadcast link adds a device, R4, with a priority of 150 When the
network converges again, R4 is DR
D. After the network converges, R1 is powered off and restarted, and when the network converges
again, R3 is DR
Answer: BCD
Explanation:
Question: 602
View the IGMP configuration of the interface on the router RTA as follows, and the information
about the operation of the RTA is incorrect
Questions & Answers PDF
P-195
A. The packet interval for a particular group query is 60 seconds
B. The interface IP address is 1921681.1
C. The maximum response time for query messages is 10 seconds
D. The IGMP protocol version is 2
Answer: A
Explanation:
Question: 603
Based on the configuration shown in the figure below, it can be known that R4 has () interfaces
advertised into IS-IS?
A. 2
B. 3
C. 1
D. 0
Answer: B
Explanation:
Question: 604
Questions & Answers PDF
P-196
As shown in the figure, all routers run OSPF, which is correct in the following statement:
A. Both R2 and Zone 0 generate Router LSA
B. R2 generates Router LSA only in Zone 0
C. R2 forwards the R1-generated Router LSA to R3
D. R2 Forwards the R3-generated Router LSA to R1
Answer: A
Explanation:
Question: 605
R3 is not established with the RI's IS-IS neighbor, and according to the information in this figure, the
possible cause is ?
A. R3 duplicates the System ID of R1
B. R3 does not match the IS-Level of R1
C. R3 and R1 interconnection ports circuit-type do not match the lH authentication of
D. R3 and R1
Answer: C
Explanation:
Question: 606
Questions & Answers PDF
P-197
As shown in the figure, an engineer uses four routers to test the interoperability of branch networks,
where R1, R2, and R3 in branch 1 deploy OSPF Network interoperability is implemented, and R, R3,
R4 in Branch 2 is deployed is-IS to achieve network interoperability. Now that the engineer wants to
implement R1 access to R4's loopback address, which of the following actions will meet this
requirement?
A. No configuration is required
B. Publish default routes only in the OSPF process for R2
C. In the OSPF process of R2 and the IS-IS process, the default routes are published separately
D. Publish the default route only in the IS-IS process of R2
Answer: B, C
Explanation:
Question: 607
A campus deploys OSPF to achieve network interoperability, and an engineer configures R2 as shown
in the figure, then the following description of the LSA in the OSPF network is wrong
A. There is no Type3 LsA flooding within Areal
B. There is no Type3 LSA flooding in Area2
C. There is Type5 LSA flooding within Areal
D. Area2 contains Type5 LSA generic adverb
Answer: A
Explanation:
Questions & Answers PDF
P-198
Question: 608
As shown in the figure, PC1 and PC2 are hosts that belong to the same network segment, below
about between PC1 and PC2 What are the correct descriptions of IPv6 neighbor states?
A. If the MAC address information of PC2 can be queried on PC1, the neighbor relationship may be
Stale
B. If pc2's MAC address information can be queried on PC1, the neighbor relationship may be Probe
C. There are five possible neighbor states between PC1 and PC2: Incomplete, Reachable, and Stale ,
Delay, Probe
D. If the MAC address information of PC2 can be queried on PC1, the neighbor relationship must be
Reachable
Answer: AC
Explanation:
Question: 609
As shown in the figure, the overload bit of ISIS is set in the configuration of router R3, and the
following statement is correct
A R3's direct route will be ignored by R1 and R2 because of the setting of the overload bit .
B. When the router runs out of memory, the system automatically sets the overload flag bit in the
sent LSP packets. Irrelevant to whether the user has a set-overload command configured.
Questions & Answers PDF
P-199
Routes introduced by C. R3 through import-route will not be published. The LSP of D. R3 will not be
able to spread to R1 and R2
E. R3 initiates the load state, and R1 and RZ will not calculate the LSP of R3 cattle in the SP tree.
Answer: BC
Explanation:
Question: 610
The network administrator defines a traffic policing policy as follows:
A. 256K bytes
B. 48128 bytes
C. 32K bytes
D. 80128 bytes
Answer: C
Explanation:
Download