Question: 1 What are the following advanced features supported by BGP EVPN? A. ARP broadcast suppression B. VRRP overVXLAN C. Multi-active gateway D. WI-AN Qos Answer: ABCD Explanation: Question: 2 Is the following correct statement for the VXLAN message? A. The outer destination IP address is the IP address of the VTEP at the far end of the VXLAN tunnel B. The source UDP port number is 4789 C. The destination UDP port number is 4789 D. VNI has 24 T bits to distinguish the VIAN segment Answer: ACD Explanation: Question: 3 To achieve an on-machine migration in the BGP EVPN distributed gateway scenario, which of the following messages is required? A. Type5 B. Type4 C. Typel D. Type2 E. Type3 Questions & Answers PDF P-3 Answer: D Explanation: Question: 4 The means of the LAND attack is that the attacker sends an SVN packet message with the same source and destination addresses to the target host, the source port and the destination port are the same, and the receiver waits for the final ACK packet to be sent , the connection is always in a semiconnected state, resulting in a full limited TCP reception Waste of resources A. True B. False Answer: A Explanation: Question: 5 The following statement about the Security Alliance SA in IPSec is wrong with ? A. SA is uniquely identified by a triple that includes the Security Parameter Inder ,Security Parameter Inder), the source IP address, and the Security Protocol Number (ASESP) used B. Use the display ipsec command to view information such as the encryption method used with another IPSEC peer, the traffic of interest, and so on. C. IPSec only supports encrypting data using the pair encryption algorithm. D. IpSec peers must be at a two-way SA to establish an IPSec VPN connection to close Answer: A Explanation: Question: 6 If there are multiple recipients in a multicast group, the administrator enables the IGMP-Snooping function on the switch connecting the recipient, and when the receiver receives the universal group query packet of the queryer from the switch, how should multiple recipients respond? A. The first recipient whose response time time expires sends the Report message, the other receivers do not. B. All recipients will respond to Report messages only if ICMPV2 is running. C. All recipients will respond to the Report message only if IGMPvl is running. D. All recipients will respond to the Report message Answer: D Explanation: Questions & Answers PDF P-4 Question: 7 If you run PIM-SM in a multicast network, you need to build a multicast forwarding tree between the multicast source and the receiver to enable the receiver to receive the multicast effect, so what are the following options for the correct tree sketch for the build? A. What is built between the multicast source and the RP is the SPT tree B. RP and the receiver is built between the RPT tree C. Built between the RPT tree D. RP and the swap is the SPT tree Answer: AB Explanation: Question: 8 Is the following description of the BSR/RP mechanism correct? A. PIM-SM domain can have more than one C-BSR, but only one BSR can be elected by the C-BSR that receives the C-RP Packets are collected C-one RP information B. BSR advertises BSR and C-RP information to all routers in the PIM-SM domain by flooding Bootstrap packets C. A C-BSR can also collect C-RP information by receiving C-RP packets Answer: ABC Explanation: Question: 9 What is the following description of LDP reliability? A. LGP GR (Graceful Restart) takes advantage of the high difference between the LS forwarding plane and the control plane to realize that the device forwards without interruption when the protocol is restarted or the master-standby is reversed B. Manually configured LDP FRR policy defaults to a 32-bit backup route that triggers LDP to establish a backup ISP C. The LDP ERR can also generate an ISP for a tag map from a non-optimal next hop, and create a forwarding table entry as a backup of the primary LSP D. LDP and LGP linkage, the need for IGP to suppress the release of routes, to ensure that LDP and LGP paths are consistent Answer: B Explanation: Question: 10 Questions & Answers PDF P-5 RD is used to distinguish the same IP address in different VPNs, how many bits does RD contain ? (Single choice) A. 64 B. 32 C. 16 D. 128 Answer: A Explanation: Question: 11 Regarding the mpLS handling mode of TTL, is the following description correct? A. Pipe mode. When an IP message passes through the MPLS network, the IPTTL minus 1 is mapped to the WLSTTL field at the incoming node. B. The TTL in the B. MPLS label has the same meaning as the TTL field in the head. TTL prevents mpLS networks from developing bad routing. C. Unifore style, when an IP packet passes through the MPLS network, the IPTTL of the incoming node is minus l. The MPLS TTL field is a fixed value. D. In MPLSVPI, if you need to hide the structure of the MPLS backbone network, you can use Uniform mode on Ingress for private network messages . Answer: B Explanation: Question: 12 In an MPLS VPN network, different CE devices exchange routing information with the same PE device using different routing protocols, and different CE devices use routing protocols that are independent of each other A. True B. False Answer: A Explanation: Question: 13 Which of the following options uses an alternate channel to enable communication between IPV6 addresses? A. DualStack B. 6to4 Questions & Answers PDF P-6 C. ISATAP D. NAT64 Answer: BC Explanation: Question: 14 If a router only needs to forward iPv6 packets, you do not need to configure any IPV4 agreements and addresses on that router. A. True B. False Answer: A Explanation: Question: 15 BGP4+ is running between two routers, and the neighbor relationship is normal, but the BGP routing table of the router on this side does not have a neighbor route entry. A. The route entry in the peer BGP route table is non-optimal. B. The next hop address of the C. BGP route entry is unreachable D. Peer ignore is configured on the peer E. The peer is configured with active-route-advertise Answer: ABD Explanation: Question: 16 Which of the following options can affect the establishment of IBGP neighbors? A. iBGP-Multi-hop is not configured B. Authentication is unsuccessful C. IGP routing is not passable D. BGP protocol version inconsistencies Answer: BCD Explanation: Question: 17 Which of the following tools cannot be referenced directly by the If-match clause in Route-policy? Questions & Answers PDF P-7 A. Regular expression B. IP-prefix C. AS-path-filter D. Community-filt Answer: A Explanation: Question: 18 What information does this contain in a basic layer packet? (Multiple choice) A Data link layer header B. Upper-level data C. The network layer header D. path records E. Network Layer Tail Answer: BC Explanation: Question: 19 The correct description of configuring BGP4+ is that A. BGP4+ does not support route reflectors. B. The next hop of a B. BGP4 route can use the Link-Local address. C. BGP4 configures the reflector, the role positioning of the reflector and the client needs to be consistent with the configuration of BGP4 D. BGP4 specifies p E. BGP4+? Router-ID ? BGP4 ? Router-ID—?? Answer: BE Explanation: Question: 20 A company network runs the OSPF protocol, a project in order to understand the OSPF mechanism in the network to perform packet transfer operations, the following description of ospf messages is correct? A. The interface sends a Hello packet immediately after joining the OSPF region B. LS update packet is sent only when the adjacency relationship is established C. When an LsUpdate packet is received, the router must send an LsAck acknowledgment D. LS update packet synchronizes the link state database by sending detailed LSA information 2 Answer: AD Explanation: Questions & Answers PDF P-8 Question: 21 Regarding the Stub region in the OSPF protocol , the following statement is correct. A. ASBR cannot exist in the Stub zone B. Virtual connections cannot traverse the Stub region. C. Injecting typeT LSA D. backbone areas that are not allowed in Stub regions cannot be configured as Stub regions. Answer: ABCD Explanation: Question: 22 The LSA of type certainly does not exist in the 220SPF Stub zone A. Type7 B. Type5 C. Type4 D. Type3 Answer: ABC Explanation: Question: 23 There is an existing router running OSPF connected to Zone 0 and Zone 1 You configured Zone 1 as a stub zone, what classes does LSA that only operates inside Zone 1 include? A. 7 ? LSA B. 1 ? LSA ? 2 ? LSA C. I LSA,2 LSA 5 LSA D. 3 ? LSA ? 4 ? LSA E. 1 LSA,2 LSA 3 LSA Answer: E Explanation: Question: 24 An engineer performed the ingestion operation on an OSPF router in a network of the company, is the following statement about the introduction of the routing LSA correct? Questions & Answers PDF P-9 A. The A. Advertising Router report is set to as the Router ID of ASBR B. Net Mask is set to all 0 C. Link State lD is set as the destination network segment address D. Using the Link State ID and Advertising Router, you can uniquely identify an LSA Answer: AC Explanation: Question: 25 In broadcast networks, elections to DIS begin only after a neighbor relationship has been established A. True B. False Answer: A Explanation: Question: 26 Which of the following statement about isis protocol route aggregation is correct? A. Route aggregation can be configured and takes effect on all types of routers B. Route aggregation can only take effect if configured on Leve-1 port routers C. Route aggregation can only be configured on Leve-2 routers to take effect D. Route aggregation can only be configured on Leve-1-2 routers to take effect with Answer: A Explanation: Question: 27 ISIS does not send CSNP packets under the P2P network type during the neighbor establishment process. A. True B. False Answer: B Explanation: Question: 28 In 0SPFv3 , Router-LSA is generated by each router, which describes the interface address and cost of each link of the router, and also includes the RouterlD of the neighbor router Questions & Answers PDF P-10 A. True B. False Answer: B Explanation: Question: 29 Is the following GR description of ISIS correct? A. The GR feature of AISIS is turned on by default. B. ISIS's GR has a total of four timers. C. ISIS's GR notifies of events and maintains neighbor relationships through CSNP messages. D. ISIS's GR defines a new TLV structure to support this feature. Answer: D Explanation: Question: 30 Both the CSNP packet of ISlS and the DD packet of OSPF have a role in the MA network, describing the role of the link state database summary, which is correct compared to the following statements of these two types of messages A. Both packets need to be confirmed to the terminal router after being sent, otherwise they need to be retransmitted B. Once the adjacency relationship is established, the CSRP packet and the D message will stop sending C. The two packets do not need to be confirmed to the router after they are sent the master-slave relationship in the DD message interaction of D. OSPF is not identity bound to dr/BDR; the CSN message is generated only by DIS Answer: D Explanation: Question: 31 Regarding route introduction, what is the following description of the error? A. BGP supports both import and network when generating routes, and the network mode is more precise. B. By default, OSPF introduces an external route with a default metric of 1, and the level-2 network of the ingested external route type type, Type2 C. ISIS, routes to Level After the 1 makes a route ingestion, if you do not manually configure the ingestion policy, a bad route will be formed. Questions & Answers PDF P-11 D. Introducing IBGP routing in OSPF may cause routing loops Answer: C Explanation: Question: 32 The following description of the RD attribute filter for BGP is correct? A. If RD-filter is not configured, but the RD-filter is referenced for filtering, the matching result is deny. B. If RD-filter is configured, but the routed RD is not matched with any of the RDs defined in the rule, the default match result is permit. C. Multiple rules are matched in the order in which they are configured. D. There is always an "or" relationship between the rules configured by RD-filter. Answer: CD Explanation: Question: 33 The following description of the Lsp shard extension for ISIS is correct? A. Enables is routers to generate more LSP shards to carry more ISIS information. B. Isis' shard extension is equally valid for Hello packets. C. Shard scaling for ISIS is achieved by adding virtual systems, up to 1000 virtual systems. D. The isis router can produce a maximum of 1024 shards. Answer: A Explanation: Question: 34 ?? Route ? Policy ??:ip community-filter Ipermit 100: 1 ip as-path-filter 2 permit ^I00$ route-policy test permit node 10 if-match communityfilter 1 if-match as-path-filter 2 apply as-path 200 Is the above configuration description correct? A. The BGP route matches the above only if the BGP route carries a community attribute value of 100:1 or if the AS PATH is 100 route one policy. The AS-one PATH attribute that matches the route is changed to 200 B. The BGP route matches the above only if the BGP route carries a community attribute value of 100:1 and the AS-One PATH is 100 route policy? The AS-PATH nature of the matching route is changed to 200 C. Only if the BGP route carries an AS-PATH of 100, the BGP route matches the route one policy Questions & Answers PDF P-12 above. The AS-one PATH attribute that matches the route is changed to 200 D. As long as the BGP route carries a community attribute value of 100:1, the BGP route matches the route-policy above The AS-PATH attribute of the matching route is changed to 200 Answer: B Explanation: Question: 35 When DLDP detects the presence of a one-way link in the fiber, the default actions of Huawei equipment include: the DLDP state machine migrates to the Disable state, outputs Trap information, and automatically sets the interface to a blocked state. A. True B. False Answer: A Explanation: Question: 36 What are the main reasons why RSTP converges faster than STP? A. RSTP increases the variety of port states B. RSTP has a smaller overhead C. RSTP does not converge based on timer D. RSTP has a smaller timer Answer: C Explanation: Question: 37 The following description of the characteristics of cross-domain VN-Optionc is correct? A. A maximum of two layers of tags need to be used in the message forwarding process. B. VPMV4 routes are not saved on the ASBR, and VPNv routes are not advertised to each other. C. VPN routes are exchanged directly between the ingress PE and egress PE and do not require an intermediate device to secure a circular VPN route. D. Cross-domain VN-Optionc, which is not suitable for use when spanning multiple AS. Answer: BC Explanation: Question: 38 Questions & Answers PDF P-13 What is the following description of MPLS incorrect? A. The length of the MPLS tag is 20 to 20 for packet forwarding. B. The tag space range of dynamic signaling protocols such as LDP, M P-BGP is 16 to 1023 C. When using the TTL processing method of Pipe mode, the IP packet transmits the TTL of the IP packet over the IPLS network. The value is only minus 1 for the MPLS in and out nodes. D. MPLS supports multi-layer label nesting, and the S bit value of the innermost label is 1. Answer: B Explanation: Question: 39 What of the following actions can enable fast failure detection on multicast networks? A. Shorten the Holdtime of Join/Prune messages B. Reduce the interval at which the interface sends Hello messages C. A PIM BFD session is established between neighbors D. Reduce the interval between sending Join/Prune messages Answer: B Explanation: Question: 40 If the PIM-SM protocol is running in a multicast network , you need to configure RP, and the configuration equation of RP is divided into dynamic RP and static RP. The following configuration description of the RP is correct (radio). A. When you configure Dynamic RP , you need to configure BSR as a backup of the RP. B. When you configure a static RP , you need to configure the BSR to advertise the RP information. C. When configuring a static RP, you need to specify the information for the RP on all PIM routers. D. When you configure Dynamic RP, you do not need to configure BSR. Answer: C Explanation: Question: 41 What is the following correct for the process of registering the source-side DR with RP in PIM-SM? A. Encapsulated in the registered message is multicast service data B. RP sends a registration stop message as soon as it receives the registration message. C. Registered messages are used to build the RPT tree between source DR and RP D. Registered packets are multicast packets. Questions & Answers PDF P-14 Answer: A Explanation: Question: 42 In a multicast network, what causes multicast traffic to not forward properly? A. The router does not have an RPF route B. PIM is not enabled on the RPF interface C. The upstream router will receive the PIM Join message dropped D. Multi-router egress network, this router is not DR Answer: ABC Explanation: Question: 43 IPSGs can statically configure binding tables or form binding tables by using them with DHCPSnooping A. True B. False Answer: A Explanation: Question: 44 Which of the following are single-packet attacks? A. Special control message attacks B. Scan Probe Attack C. DDos Attack D. Malformed Message Attack Answer: ABD Explanation: Question: 45 What is wrong with the following statement about digital certificates? A. Digital signatures guarantee the integrity of digital certificates. B. Digital certificates contain public key information. C. Authentication fails when the peer certificate is received within the validity period, but the device Questions & Answers PDF P-15 itself is in the wrong time if it is not within the validity period of the certificate. D. Even if two PRI entities are not in the same CA system, authentication can be completed as long as both parties can recognize each other's CA. Answer: D Explanation: Question: 46 What is the relationship between CIR, BC and TC? (single select) A. CIR=TC/BC B. CIR=BE/TC C. TC=CIR/BC D. TC=BC/CIR Answer: D Explanation: Question: 47 WRED is configured on the newly deployed router HW. What is the correct description of the WRED features below? (Multiple choice questions). A. WRED can set different drop thresholds and packet loss rates for packets of different priority B. When the flow exceeds the minimum threshold, WRED begins to discard all inlet flow (tail drop) C. Avoid global synchronization by selectively dropping multiple TCP streams D. Low-bandwidth traffic is easier to drop than high-bandwidth traffic Answer: AC Explanation: Question: 48 Regarding the FTP protocol, is it correct in the description below? A. In ftP-style, the client completes the initialization of the TCP session for control and data B. In ftP Activee, the server side tells the client which port it expects to send data on by commanding "PORT" C. FTP always uses a TCP session to transmit control information and data information D. FTP always uses the TCP port to establish a data session and ICP port 21 to establish a control session E. FTP always uses TCP port 21 to establish a data session and TCP port 20 to establish a control session Questions & Answers PDF P-16 Answer: A Explanation: Question: 49 If a Huawei switch runs the RSTP protocol, when will the BPDUs on a port on the switch be aged? A. On the interface, RSTP does not age BPDU B. After more than 6 seconds C. After Ma ge times out D. After Hello time times out E. after the Forward Delay timeout Answer: C Explanation: Question: 50 In the use of the CP protocol, the following description is correct? by frequent oscillation interfaceethA. The Eth-Trunk interface can be avoided trunkllacppreemptenablelacppreemptdelaydelay-time by following command B. Source A address can be configured for load sharing in an enabled link aggregation group with the following command: interface eth-trunk 110ad-balance src-dst-ip C. A member interface can be removed from an enabled link aggregation group with the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 undo eth-trunk 1 interfaceGigabitEthernet0/0/1undoshutdown D. The member interface can be joined in the link aggregation group by enabling the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 trunkport Answer: A Explanation: Question: 51 Which of the following are used in Ethernet? A. A MAC address in a non-canonical format B. CSMA/CD in multiplexed interviews C. Mac address in canonical format D. 8025 encapsulated frames E. 8023 Encapsulated Frame Answer: BCE Explanation: Questions & Answers PDF P-17 Question: 52 In RSTP , which port provides a backup path to reach the root node of the spanning tree? What state is the port in? A. Root Port and Listening Status B. Alternate Port and Forwarding Status C. Alternate Port and Learning Status D. Designated port and Listening status E. Alternate port and Discarding status Answer: E Explanation: Question: 53 ISlS protocol In broadcast networks and P2P networks, when the router receives LSP, it needs to use PSNP to confirm and ensure the synchronization of LSDB A. True B. False Answer: B Explanation: Question: 54 The following statement about isis protocol LSP messages is correct A. The isP rapid diffusion feature, which first diffuses out LSPs that are smaller than a specified number , speeding up the synchronization process of LSDB B. By configuring an LSP-generated smart timer, the timer automatically adjusts the delay time based on the frequency at which the routing information changes C. As link status information increases, the packet length of the LSP can be increased so that each ISP can carry more information. D. Reducing the minimum interval at which LSPs are sent per port can speed up the diffusion of LSPs. Answer: ABCD Explanation: Question: 55 Questions & Answers PDF P-18 Router RI and Router R2 run BGP. Both routers are in the AS65234 The route for router R2 exists in the BGP routing table of the router RI, but not in the IP routing table of the router RI . So what causes the problem to occur? (Single Choice Questions). A. Synchronization is turned off B. The B. BGP neighbor relationship is Down C. Router R1 does not enable BGP Multi-hop D. Routing is not optimal Answer: D Explanation: Question: 56 Regarding the OSPFv3 protocol, what is the error described below? A. Under the sukugan of a shared router, each OSPFv3 process runs independently B. Multiple instances can be run in the same OSPFv3 under the same interface C. Can support running multiple instances on a single link D. OSPFv3 message header will contain instance IDFu Duan flogging Answer: B Explanation: Question: 57 The following is the correct statement about the LSA of OSPFv3? A. Inter-AreaPrefix-SA's LinkStatelD contains the prefix B. Router-LSA and Network-LSA does not contain routing information C. When the Intra-AreaPrefixLSA's ReferencedLinkStateType-2, referencedLinkStatelD contains the interface to DR ID D. Inter-AreaPrefirLSA also contains LinkLocal information file Answer: B, C Explanation: Question: 58 Router HW enables OSPF and router HW has the role of ABR and is configured with abr-summary, then which class LSA Will it be aggregated? A. 1 Class LSA B. 2 kind LSA C. 3 kind LSA Questions & Answers PDF P-19 D. 4 kind LSA E. 5 Class LSA Answer: AB Explanation: Question: 59 In Huawei devices, when SIS introduces external routes and sets external route tags for route information, the Metric type of ISIS does not need to be modified and remains default. A. True B. False Answer: B Explanation: Question: 60 There is an existing router interface serial 0 in OSPF area 1 , well will interface Serial 0 is set to silent interface. So what is the impact of this setting? A. OSPF establishes usable adjacencies through this junction B. OSPF does not join the routes learned from the connector to the local routing table C. OSPF does not establish any adjacency relationships through the junction D. OSPF receives a route update answer from the neighbor. Answer: C Explanation: Question: 61 The Option field in OSPFv3 appears in all LSAs A. True B. False Answer: B Explanation: Question: 62 Is the following information about BGP4+ described correctly? A. BGP4 can use dampening commands to suppress oscillations on IBGP routes. B. Modifying the RouterID of BGP causes the BGP connection between routers to be re-established. Questions & Answers PDF P-20 C. The Next Hop attribute in BGP4+ is represented by an IPv6 address, which can be the link-local address of the next hop. D. BGP4+ does not support route auto-aggregate Answer: AB Explanation: Question: 63 Is the following description of ospf virtual links correct? A. A virtual connection can be established in any area, after which it itself belongs to the region B. The virtual connection ip is used as the link address C. Virtual links can be used to solve the problem of zone 0 being segmented D. The cost of a virtual connection is zero and is the optimal link Answer: C Explanation: Question: 64 What kind of scenario can use AS one path and one filter? A. Filter routes received from BGP neighbors based on the AS PATH attribute that the route carries. For example, the command peer x.X.x.x as path-filter import B. The apply clause in Routepolicy C. Filter routes sent to BGP neighbors based on the AS PATH attribute that the route carries. For example, the command peerx. X.x.x as path-filter export D. If-natch clause answer in Route-policy. Answer: ACD Explanation: Question: 65 Without dividing the zone, is the following description of the link state routing protocol correct? A. Each router establishes a topology for the entire floodplain B. Each router learns route entries directly from the route update and adds them to the routing table C. Routers in the flood domain may receive the same link state information repeatedly D. Routers throughout the flood domain have the same database of wrong-state states E. The router will send all the mis-routing status information from one neighbor to all other neighbors to ensure the synchronization of the database Answer: ACD Questions & Answers PDF P-21 Explanation: Question: 66 If the OSPP protocol is running in the network , after configuring the non-backbone area in the OSPP area as the Totally Stub region, the ABR router sends a message to Totally. The Stub region issues an LSA with an LS ID of 0000, and what type of LSA is the LAS to? A. LSA5 B. LSA2 C. LSA1 D. LSA3 Answer: D Explanation: Question: 67 If an administrator wants to manage certain routes on the router during operations, the following tools are listed below. These routes can be flagged so that administrators can configure policies A. If the BGP protocol is running, the route is marked with the community attribute B. Use ACLs to tag routes on the router. C. Use the Tag value to mark the route on the router. D. Use ipprefix to tag routes on the router. Answer: AC Explanation: Question: 68 An existing router running BGP, HW1, has both IBGP neighbors and EBGP neighbors configured on the router. Are the IP Neighbors and EBGP Neighbors described below correctly? A. The router will be connected directly from its EBGP IBGP neighbor, otherwise, IBGP-Multi-hop must be configured B. The router sends BGP updates learned from its EBGP neighbors to its other IBGP neighbors and EBGP neighbors C. IBGP neighbors can establish neighbor relationships through Loopback engagements D. The router sends BGP updates learned from its IBGP neighbors to its other IBGP neighbors and EPGP neighbors E. EBGP neighbors must be directly connected, otherwise, EBGP-Multi-hop must configure Answer: BCE Explanation: Questions & Answers PDF P-22 Question: 69 After BGP introduces routes for other protocols, the next hop in the BGP routing table is consistent with the next hop of the introduced routing protocol A. True B. False Answer: B Explanation: Question: 70 In addition to stateless address autoconfiguration, IPV6 devices can also obtain addresses, gateways, DNS, and other information through DHCPv6 A. True B. False Answer: B Explanation: Question: 71 In an IPv6 network, two nodes A and B are neighbors to each other if Node A sends NS messages to Node B if node B is B After receiving the message, reply to the NA message, then view it on node A, what will the neighbor status be marked? (Single Choice Questions). A. Reachable B. Incomplete C. Stale D. Probe Answer: A Explanation: Question: 72 In an MPLS IBGP VPN environment, if tags are distributed only through BGP, LDP, the MPLS tags for a message can be up to two layers of tags. A. True B. False Answer: A Explanation: Questions & Answers PDF P-23 Question: 73 Regarding the cross-domain VPN-OptionB scenario, what is the following description incorrect? A. In the process of packet forwarding, the private network LSP of the VPN should be exchanged once on the two ASBRs An EBGP neighbor relationship. C. Cross-domain VPN An Option B. scheme is not limited by the number of interconnection links between ASBRs D. The outer layer label is exchanged between two ASBRs to VPNv4 routes. Answer: D Explanation: Question: 74 Command IP as-path-filter1 permit^12,*74$ can match to which AS_PSTH? A. AS_PATH(321122374) B. AS PATH Q236217 ? 2374) C. AS_PATH(125 328 74 23) D. AS_PATH(32127423) Answer: B Explanation: Question: 75 You need to configure smart policy routing on the router to specify that specific traffic is forwarded through an interface. When policy-based routing is applied, what are the two most typical types of information that can be used to forward traffic along a particular path? A. The TTL and source IP address of the packet B. Source A address and the Layer 2 source address C. Source IP address and specific protocol (such as FTP, HTTP, etc.) D. Service type header and message length Answer: C Explanation: Question: 76 Cross-device link aggregation realizes the back-to-back transmission of data traffic and the mutual Questions & Answers PDF P-24 spare of the heap member switches, but due to the limited bandwidth of the heap cable between the heap devices, the forwarding efficiency can be improved in the following ways? A. Enable traffic to be forwarded locally first B. Connect the stacking device via a stacking card C. Configure the stacking system MAC address switching D. Enables the stacking multi-master check function Answer: A Explanation: Question: 77 s the following description of THE MUX VLA N in huawei switches correct? A. MUX VLAN ??Principal VI-AN ?Subordinate VI-AN ???Separate VLAN ? Isolate VLAN B. Each Separate VLAN can bind multiple Principal VLANs C. Under the same VLAN, muX VLANs can be mixed with SuperVLANs D. The Principal port can pass the answer to all ends within the MUX VLAN Answer: D Explanation: Question: 78 The fields that represent priority in the VLAN (8021Q) data encapsulation are a total of 6 bits. A. True B. False Answer: B Explanation: Question: 79 Router R1 runs the OSPF protocol, use the "display ip routing-table" command to view the routing table of the router R1, the following about the OSPF in the routing table Is the information described correctly? A. In the routing table, route table entries identified by the "OSPF" identifier can only be learned through LSAs of Type 3 B. In the routing table, the routing table entries identified by the "OSPF" identifier can only pass Class 1 LSA C. In the routing table, the routing table entries identified by the "OSPF" identifier can be learned through the 1/2/3/5 LSA D. In the routing table, the routing table entry identified with the "O_ASE" identifier can only be Questions & Answers PDF P-25 learned by routing introduction Answer: D Explanation: Question: 80 The following statement about the five types of LSAs in OSPF is used to pass external routes, and the following statement about the five types of LSAs is incorrect and flooding in A. OSPF networks in non-Stub/NSSA regions B. Routers in the same zone as ASBR can calculate external routes by chanting the LSA and the five types of ISAs in the region C. The FA address is included in the five types of LSAs, and the FA address is 000 only as reserved for no practical purpose D. Configuring the appropriate filtering policy on the ABR or ASBR can filter five types of LSAs Answer: C Explanation: Question: 81 Regarding the certification of the ISIS protocol, there is a correct statement A. Connection authentication can realize the authentication of the hello messages of Leve-1 and Leve-2 B. After configuring the connection authentication, the IIH issued by the router must carry the authentication TLV C. After configuring zone authentication, the router issues an IIH, SNP, LSP—strap-to-tape authentication TLV D. The two routers are configured for area authentication and interface authentication, and the passwords are the same, so the two can establish an isocopied relationship Answer: AB Explanation: Question: 82 If the Option field value in the 0SPFv3 Hello message issued by the router's GIgabit Ethermet0/0 interface is 0x000013, the following description is correct A. The Gigabit/thernetO/0/0 interface of Router A adds IPv6 routing to compute B. Router A's Gigabit/thernetO/0/0 interface belongs to the NSSA zone C. Router A supports AS-An External-LSA flood D. Router A is an OSPFv3 device with forwarding capability Questions & Answers PDF P-26 Answer: ACD Explanation: Question: 83 Regarding the BGP ring protection mechanism, is the following description correct? A. The AS_ PATH attribute is used between autonomous systems to prevent ring cats B. The Cluster List property is used for loop guard within the reflector cluster, and the router rejects the route when it finds that the Cluster List of the route entry contains its own Cluster ID. C. Routes learned from IBGP are not advertised to IBGP neighbors and are used to prevent routing loops inside the AS. D. You can use the AS_ CONFED_SET attribute to prevent loops within a consortium. Answer: ACD Explanation: Question: 84 Regarding Route Policy, is the following description correct? A. Advanced ACLs can be applied in route-policy to filter routes B. The table entries pernit::0 Less an equal 128 indicate that all IPV6 routes are allowed through C. If more than one node is defined in Route one policy, there should be at least one node in each node that matches permit D. Route one policy filters only the default route Answer: BCD Explanation: Question: 85 Which of the following routing tools is unique to BGP? A. Route-policy B. ACL C. IP-prefix D. AS-path-filter Answer: D Explanation: Question: 86 Questions & Answers PDF P-27 The following is the correct description of the aggregation of BGP? (Single Choice Questions). A. After you configure aggregate ipv4-address mask , only aggregate routes are published, not detail routes. B. For IPv6 routing, BGP supports manual coalescing and automatic aggregation C. By default, BGP enables automatic aggregation D. You can manually aggregate the routes in the BGP local routing table with a profile Answer: D Explanation: Question: 87 The following about BGP routing, what is the wrong description? A. Non-aggregate routes take precedence over aggregate routes. B. In the case of PrefVal, Local_Preference equality, if the BGP preference of the locally generated route, IBGP route, EBGP route is equal, the valid reference of this generation is preceded by priority. C. See the following entry in the BGP routing table: • *172 16 1. 11/32 0 00010 0? Indicates that the route is available non-optimal. D. For next_hop unreachable routes are invalid cat by and do not participate in the preference. Flogging case Answer: A Explanation: Question: 88 The following description of Filter-Policy is correct?( Radio neck). A. With Filter-Policy, on ASBR in OSPF, you can filter the generation of type5 LSA and type7LSA. B. Prefix lists can be used to filter both routes and packets. C. Filter-policy filters the link state information received or published, and can modify the properties of route entries. D. When using a prefix list to filter routes, the table entry ip-prefix 1 deny 0000 0 less-equal 32 matches only the default route. Answer: A Explanation: Question: 89 When deploying the ISIS protocol in an IPv6 environment , the following statement is correct (single choice). A. By default, the DIS priority for broadcast network interfaces at Level-1 and Level-2 is 1 Questions & Answers PDF P-28 B. In broadcast networks, IPv4 and The DIS priority for IPv6 can be set separately C. In the same broadcast network. If each router supports both IPv4 and IPv6 The DIS for IPv4 and IPv6 must be the same device D. IS-IS is configured under the finger port is ISIS silent, this interface will not send ISIS packets, but will receive ISIS packets Answer: C Explanation: Question: 90 A lot of overwave techniques have emerged in the process of replacing the IPV4 addresses used in the network with lP6 addresses. These technologies are divided into two categories, one is IP4IPV6 coexistence technology, the other is PA/IP>6 interoperability technology, which of the following options sleep in IPv4/IPv6 coexistence technology? A. NAT64 B. IPv6 over IPv4 C. Dual Stack D. ISATAP Answer: BCD Explanation: Question: 91 In cross-domain VPN-OptionB packet forwarding, two ASBRs exchange the same LSP tags once. A. True B. False Answer: B Explanation: Question: 92 In the city, that is, mpLS BGPVPN network, when the packet enters the public network forwarding, it will be encapsulated with two layers of MPLS tags, the following description of the two layers of tags, the error is ? A. Private network tags are carried and distributed by MP-BGP when routing, and public network tags are distributed by the LDP protocol. B. MPLS BGPVPN uses two layers of tags: public labels (also known as outer labels) and private network labels (also known as inner labels). C. By default, the router assigns the same tag value to all VPNv4 routes destined for the peer D. The egress PE uses the inner tag when determining which egress CE the message should be sent Questions & Answers PDF P-29 to. Answer: C Explanation: Question: 93 The following description of the LDPLSP establishment process is correct? A. By default, LSRs are for the same FEC, and the received tag mappings can only come from the optimal next hop, not from the non-optimal next hop. B. When a network topology change causes the next hop neighbor to change, the free label keep method is used. LSR can quickly rebuild the LSP by directly using the labels sent by the original nonoptimal next-hop neighbor. Liberal needs more memory and tag space. C. In the DoD mode of label publishing, for a specific FEC, the LSR does not need to obtain a label request message from upstream to distribute the label. D. The process of establishing a D. LSP is actually to bind the FEC to the tag and advertise this binding to the LSP upstream LSR process. Answer: BD Explanation: Question: 94 What improvements have been made to the IGMPv2 protocol compared to IGMPv1? ( Multiple Choice) A. Added maximum response time field B. Added high group messages C. Added specific group query message D. Added a specific source group query packet Answer: ABC Explanation: Question: 95 Which of the following attacks are DoS (Denial of servioe) attacks?( Multiple choice question) A. Single packet attack B. Source P address spoofing attack C. Man-in-the-middle attack D. Flood Attack Answer: AD Explanation: Questions & Answers PDF P-30 Question: 96 Configure queue-based traffic shaping, which defaults to tailing if the queue length exceeds the cache size A. True B. False Answer: A Explanation: Question: 97 For Layer 2 VPN technology, the following statement is correct?( Multiple choice questions). A. VPLS is a widely used technology in the live network, which can provide transparent transmission of three-layer messages and achieve multi-point access. B. The VPLS configuration is complex and the Layer 2 network transmits BUM packets. C. BGP EVPN supports features such as tenant isolation, Multi-homing , and broadcast suppression. D. BGP EVPN addresses issues such as MAC address drift and multi-tenancy that VPLS cannot support. Answer: BC Explanation: Question: 98 In the forwarding table of the switch, a MAC address can correspond to only one outlet at a time A. True B. False Answer: B Explanation: Question: 99 How do.8021w and 8021D handle BPDUs?( Single choice questions). A. The 8021D bridge only forwards BPDU packets received from the root bridge B. 8021D bridges do not forward BPDU packets C. The 8021w bridge only forwards BPDU packets received from the root bridge D. 8021w Bridge does not forward BPDU packets Questions & Answers PDF P-31 Answer: A Explanation: Question: 100 Which of the following scenarios send free ARP messages?( Multiple choice questions). A. After the VRRP protocol master and standby role election is completed B. The DHCP client receives an acknowledgment message from the server after it sends it C. When a new host configured with an IP address is connected to the network D. When a host connected to the switch issues a Ping message. Answer: ABC Explanation: Question: 101 When you troubleshoot a local area network with Huawei equipment deployed, you find that there are a large number of unicast frames with unknown source AC addresses in the local area network . A large number of unknown source MAC addresses single-plug frames can cause the switch the biggest danger is ? A. Memory that occupies the cache ton B. Increases the power consumption of the power supply C. Consumes a TCAM table entry D. Consume the available bandwidth E. Consume the MAC address table entry available in the system Answer: E Explanation: Question: 102 Which of the following IEEE standards is specific to Gigabit Ethernet? A. 8023z B. 8023ab C. 8023ad D. 8023af Answer: A, B Explanation: Question: 103 Questions & Answers PDF P-32 What are the reasons why the BGP connection is down after it is successfully established ? ( Single choice questions) Single choice A. The wrong BGP packet was received. B. The mandatory attribute in the route update packet is missing. C. Open message negotiation failed. D. After the BGP connection is established, the keepalive message is not received within the negotiated holdtime time. Answer: C Explanation: Question: 104 BGP can only automatically aggregate routes whose source is Incomplete. A. True B. False Answer: A Explanation: Question: 105 There are two Communily filters: ip comimuniy-lite lpemit 101201 ip community fiter 2permit101 ip commmuriyfilter 2pemit21 Regarding the above ommuniyfiter, the correct description is ?( Multiple choice questions). A. As long as the group attribute value carried in the BGP route contains 100:1 or 200:1, or both, the BGP route matches the community-filterl B. As long as the group attribute value carried in the BGP route contains 100:1 or 200:1, or both, the BGP route matches community-filter2 C. The BGP route matches community-filter 1 only if the community attribute values carried in the BGP route contain 100:1 and 200:1 D. A BGP route matches community-filter2 only if the group attribute values carried in the BGP route include 100:1 and 200:1 Answer: B, C Explanation: Question: 106 Regarding Policy Routing, the following description error is ?( Single choice questions). A. When configuring local policy routing, if two next hop and two outbound interfaces are set in the policy at the same time, packet forwarding only distributes the load between the two outbound Questions & Answers PDF P-33 interfaces. B. Interface policy routing is only supported for application in the inbound direction of an interface. C. Interface policy routing only takes effect for forwarded packets, but has no effect on packets sent locally. D. If the message matches the permit table entry in the interface policy route , the message must be forwarded according to the next hop specified by the interface policy route Answer: D Explanation: Question: 107 Regular expressions can be used for Community-filter and AS-path-filter definition attribute types for route filtering. A. True B. False Answer: A Explanation: Question: 108 What type of prefix does a router running BGP advertise to its IBGP neighbor (assuming the router is not configured as a route reflector)? (radio). A. Prefixes are learned through other IBGP neighbors, or prefixes are learned from EBGP neighbors, or prefixes are learned through routing introduction B. A prefix that exists in the routing table C. Prefixes are learned through other BGP neighbors, or prefixes are learned locally through network or routing introduction D. Prefixes are learned through EBGP neighbors, or prefixes are learned locally through network or routing introduction E. The prefix is learned through an EBGP neighbor, or the prefix is learned from an from RR Answer: D Explanation: Question: 109 One of the things you're doing is compressing the length of ip6 addresses as much as possible . The existingIP6 address is 2013xX0C130F006009cO87641308, to be able to make this P6 address more concise, you can compress the IP6 address into which of the following?( Single choice questions). A. 2013:0:130F:0:0:09CO:876 Questions & Answers PDF P-34 Answer: 130B Explanation: B. 2013:130F::9CO:876Answer: 130B Explanation: C. 2013:0:130F:0:0:9CO:876Answer: 130B Explanation: D. 213::13F::9C:876Answer: 13B Explanation: E. 2013:0:130F::9CO:876Answer: 130B Explanation: Answer: E Explanation: Question: 110 The router is running both OSPFv3 and ISIS, and the OSPFv3 route needs to be introduced to ISIS, which of the following ingestion configurations is correct:( Multiple choice questions). A. Huawel ias 1 ltuawei-i- isHeveleve!. l Huave-s-1 networkenity 47001.0000020 Hawe -sis-1 ipv6enabletopolog standard Htuawer is-] pob impot. B. (Huawei isis l Huawei-si-1 s-levelve!-l Huavei- ti.-1] networkentiy 4 .001.00001. Huawei sis pob enable topogy s andard Hhuawelitis ]l p6 importroute ospfv3 1 [Hu C. [Huawei] sis 1 [Huawel-isis-1] networkentity47001.000000200 Huawe-ss 1 ipb6enable topologist standard Huawei is l p6 importroue esgp.31lese! [Huaweisis-1] quit [Huawei D. HuaweJ IsIS [Huaweij isis 1 Huavei-isis-1]networkentity470001.000000020Huawei-sis- 1limpotroueosph31 ltuowe.is- ut tuawl sph 1 fhuwf spol Jronea d2222 [Huawei) isis 1 Huawe-sis-1] is level level-1 [Huavei-sis-1 etworkentity 47001.0000020 Huawel-d.-1[impotroteosph-1 le e. [tuawelts a ut ltunweospfv3 1 [Huawei Answer: AC Explanation: Question: 111 Which address prefix in the following options indicates that the address is globally unique and globally routable among unicast addresses in IPv6, similar to a public address in IPv4?(). Single choice questions). A. ::1/128 B. FE80:/10 C. FE80::/10 D. 2000:;/3 Answer: D Explanation: Questions & Answers PDF P-35 Question: 112 The following description of the characteristics of multi-instance CE is ? A. Since the MCE device is already bound to the VPN, there is no need to bind the VPN on the PE connected to the MCE device B. The MCE device can determine the source of the routing information according to the interface that receives the routing information, and maintain it in the route forwarding table of the corresponding VP. C. MCE is implemented by creating their own routing forwarding tables for different VPNs on the MCE device and binding to the corresponding interface o D. Configuring MCE enables a CE to connect to multiple VPNs at the same time, which can not only completely isolate the service between different VPN users, but also reduce the input cost of network equipment. Answer: A Explanation: Question: 113 Users within a typical VPN can only communicate with each other, not with Internet users, and with Internet. But VPN individual sites may have access to internet's needs. The correct description of the implementation of VPN interconnection with internet is ?( Multiple choice questions). A. is implemented on the user side, and the CE is directly connected to the Internet. Each user site can be connected to the Internet separately, that is, the CE of each site is configured with a default route to the Internet. B. Implementing a complex implementation on PE and having security implications, PE devices may be subject to Dos attacks on the Internet. C. Implemented on PE, the PE device issues a default route to the CE to the Internet and adds a default route to the VPN instance routing table pointing to the Internet Gateway o D. Implemented on the user side, the implementation method is simple, and the public network and private network routes are isolated, safe and reliable. Answer: ABCD Explanation: Question: 114 The following message about the Register in PIM-SM describes the correct ?( Multiple choice questions). A. The Register message enables the RP to learn the multicast source information B. The Register message is sent by the receiver router C. Register messages are sent to RPv via unicast instead of multicast D. The Register message is sent by the source DR Questions & Answers PDF P-36 Answer: ACD Explanation: Question: 115 Host HW1 in the HW device network Wants to join a video conference, so what does that host do? A. Sends an IGMPv2 membership report to the default router unicast of the local network B. Sends a unicast IGMPv2 membership report to the RP C. The IGMPv2 membership report is sent over multicast in the local network, and the multicast address carried in the IGMPv2 membership report is the multicast address that you want to join D. The IGMPV2 membership report is sent over multicast in the local network, and the destination multicast address of the IGMPv2 membership report is "All PIM Routers" 224002 Multicast address Answer: C Explanation: Question: 116 A bookstore provides a wired network for customers to learn online. However, one day, it was found that some users could not access the network, and after inspection, it was found that the IP resources of the DHCP address pool had been exhausted. Which of the following is the best way to solve the problem of the moment? ( Single choice questions). A. Configure the static ARP binding table B. Configure the IPSG C. Limits the maximum number of DHCP Snooping binding table entries that the interface allows to learn D. Configuration DAI Answer: C Explanation: Question: 117 You want only his telnet stream to be able to access the server (address 1011.100). Then, you add the following ACL to the routing ring: nule5pemit cp source ny destination 1011.100000destinationporteq 23 rule 1l0 deny ip source any destination any Then you apply that ACL to the ingress direction of the router's seial interface. What type of message is allowed to pass through the router?( Multiple choice questions). A. A non-sharded, port 21-accessing packet B. Non-first-sharded messages that use port 23 to access the server's message C. Non-first-of-sharded messages to access other hosts D. Non-first-of-its-kind packets that use port 21 to access the server E. Packet answer for the first sharded or non-sharded, using port 23 to access the server Questions & Answers PDF P-37 Answer: BDE Explanation: Question: 118 Dual-bucket, two-speed is used in traffic governance, where the number of tokens in a C bucket is TC and the number of tokens in a P bucket is TP. When a message of length B enters, which of the following sentences is correctly described? (Multiple choice questions). A. If TP-B~O and TC-B < 0, the message is marked green B. If TP-B<0 and TC-B-0, the message is marked in red C. If TP-B>0 and TC-B < 0, the message is marked yellow D. If TP-B >O and TC-B > 0, the message is marked as a green Answer: BCD Explanation: Question: 119 Which SNMP message type sent to NMS reports events that are reliable? ( Single choice questions). A. Inform B. Get C. Response D. Trap E. Get Bulk Answer: A Explanation: Question: 120 NSF (Non-StoppingForwarding ) and non-stop circuits are transmitted NSR (Non-Stopping Routing) are two highly reliable solutions, and the following statement is correct A. After NSR enablement, if the business batch backup has not yet ended, a master board failure occurs, the NSR cannot be completed B. NSR backers require the ability to support NSR through specific message negotiation C. After NSF is enabled, the router is switched back, and the routing table and forwarding table remain unchanged, so traffic is not lost during grf time D. NSF routers do not need to negotiate the ability to support NSF through specific messages Answer: A Explanation: Questions & Answers PDF P-38 Question: 121 Assume that BGP/MPLSIPVVPN, OSPF, LDP, and static routing protocols are already enabled on the PE router . Which of the following protocols need to enable GR on PE in order to get NSF functionality? (Multiple choice questions). A. BGP B. Static circuit C. OSPF D. MPLS LDP Answer: ACD Explanation: Question: 122 Huawei's SDN controller using VXLAN technology is fixed? A. Agile Controller-Campus B. Agile Controller-WAN C. Agile Controller-DCN Answer: C Explanation: Question: 123 Two VTEPs in an XLAN can identify a VXLAN tunnel, and this VXLAN tunnel between the VTEPs will be covered by two NDEs is common to all VNI. A. True B. False Answer: A Explanation: Question: 124 The following statement about the VXLAN gateway is incorrect?( Single choice questions). A. Layer 2 gateway: Used to solve the problem of tenant access to the VXLAN virtual network, and can also be used for subnet communication of the same VXLAN virtual network. B. Layer 3 gateway: Used for cross-subnet communication of the VXLAN virtual network and access to external networks. Questions & Answers PDF P-39 C. VXLAN Layer 3 gateways can be divided into centralized gateways and distributed gateways. D. Layer 2 gateway and VPN instance binding. Answer: D Explanation: Question: 125 To build a loopless Layer 2 network, which of the following schemes is optimal?( Single Choice) A. Stacking + Link Aggregation B. TRILL+MSTP C. ??+MSTP D. Link Collection + MSTP Answer: A Explanation: Question: 126 The default configured switch has an empty MAC address table at this time , and Host A connected to the switch issues the first unicast data frame, so what will the switch do after receiving the teaching system?( Single choice questions). A. The switch will drop the data frame B. The switch records the source MAC address of the data frame and floods the data frame C. The switch will forward data to interface D. based on the mesh MAC address of the data frame The switch caches the data frame and waits for the destination host to send the effect frame before forwarding it Answer: B Explanation: Question: 127 If a Huawei S series switch needs to designate a member switch as the primary switch of the stack, it can power on this switch first, and then power on other member switches after 20s. A. True B. False Answer: A Explanation: Question: 128 Questions & Answers PDF P-40 The following description of 8021S deployment characteristics is correct?( Multiple choice question) A. All VLANs share a spanning tree instance B. Multiple bridges share a spanning tree instance C. Each VLAN has one spanning tree instance D. Multiple VLANs share a spanning tree instance Answer: D Explanation: Question: 129 The following description of the attributes of BGP is correct?( Single choice questions). A. The AS deficit of the adjacent AS is ranked at the far right of the list of AS_Path in the BGP route entry. B. When the B. BGP Speaker publishes a route learned from an EBGP peer to an IBGP peer, it does not change the next hop attribute of that routing information. C. Local_Pref is valid only between EBGP peers and is not advertised to third-party AS. D. A route can have only one community attribute value. Answer: B Explanation: Question: 130 The following statement about the alliance is correct?( Single choice questions). A. The consortium divides an AS into sub-AS, and the alliance external AS still considers the consortium to be an AS B. Subsystems within a consortium can use private AS numbers. Huawei NE/AR routers, a consortium can be configured with up to 32 subsystems C. Consortium can easily detect the routing loop within the AS because EBGP is running between the subAS. D. The subas number of the consortium, which by default notifies BGP peers outside the consortium Answer: D Explanation: Question: 131 When the ABR is a Type 5/7 LSA Switch router in the NSSA zone, then the ABR can be used against the Type 7 LSA The converted type 5 LSA is aggregated. A. True B. False Questions & Answers PDF P-41 Answer: A Explanation: Question: 132 The following about the Router-LSA of OSPFv3 is correct?( Single choice questions). A. The router-LSA data area contains the Link-Local address B. The router-LSA data area contains the Interface ID of the neighbor on this side C. Similar to OSPFv2, the Option field exists in the header of LSA, not in the data area of Router-LSA D. When LS type= Ox0001 in the head of LSA, the data area representing LSA is Router-LSA Answer: B Explanation: Question: 133 When judging the old and new LSA, the serial number parameter and the age parameter are used , and the following two parameters are correct for ?( Multiple choice questions). A When the router receives two LSAs, where the sequence number is the same and the checksum is the same, the smaller the age, the better B. When the router receives—The age of the LSA is set to 3600S, the LSA is unavailable C. If the serial number of the LSA reaches the end value of Ox7FFFFFFF, the current router advertises an LSA with an age of 3600S D. Both the serial number and age parameters can determine whether the LSA is old or new, and the router prioritizes the sequence to participate in the teaching, and the larger the better Answer: CD Explanation: Question: 134 ?? ipIp- prefoi p prefierame lndeindeoxrunmber)( pemit demy)ip+4adrssmasklengh gratrequa gratercqual abel]lescqualesequl ole) for • Pprefofiier? If a pre-list of tooequal has been specified, but the greater-equal has not been specified, then how much of the prefix's range is sufficient?(). Radio neck). A. [0, less-equal-value] B. [mask-length, less-equal-value] C. [less-equal-value,32] B. No limit Answer: B Explanation: Question: 135 Questions & Answers PDF P-42 Which nationality meets the following two conditions: 1] BGP Router A can choose whether the Ulpdate message is based on the nationality. ( ) If Router B receives a Updae message containing a cross-hatch, run-by B does not have an identified solidity, but will also contain a multifaceted] Ulpdate retracts the advertisement to Router C. Router C may recognize and apply this attribute. (Multiple choice questions). A. Aggregator B. Local_Pref C. Multi_Exit_Disc D. Community Answer: AD Explanation: Question: 136 The following description of MP-BGP is incorrect?( Single choice questions). A. The MP_UNREACH_NLRl of the update message, excluding the path nationality. B. MP-BGP can be used to assign tags. C. MP_REACH_NLRI and MP_UNREACIH_NLRI are optional transition properties. D. A complete MP_REACH_NLRI attribute structure contains address family, next hop, and prefix information. Answer: C Explanation: Question: 137 The following description of the BGP route reflector is ?( Multiple choice questions). A. Cluster_List is an optional non-staging property for ring protection within the cluster. B. The route learned from the client, all non-clients and clients published to this RR. C. A network of bones is divided into multiple reflection clusters, each of which configures the other RRs as non-clients, and establishes an IBGP full connection between the RRs. D. The Originator_ID attribute is generated by the Route Reflector (RR) for inter-cluster ring protection. Answer: BC Explanation: Question: 138 The router connects two EBGP neighbors through two parallel Serial cables, what do you do to Questions & Answers PDF P-43 achieve bidirectional negative sharing between two EBGP neighbors connected by these two parallel Serial cables? ( Single choice questions). A. Without any method, BGP automatically implements load sharing of traffic across different autonomous systems on the available links B. Use the Loopback interface to establish an EBGP neighbor relationship, configure EBGP Muti-hop, configure the Loopback interface as the update source, and then use IGP to implement Equivalent path load sharing between Loopback addresses C. Configure the EBGP neighbor relationship with the Loopback interface as the update source, and the IGP in each AS needs to introduce two equivalent paths to the loopback address of the EBGP neighbor; And you need to use the command "next-hop?local" D. Use the command "ebgp-load-balance" at both ends E. To configure an EBGP neighbor relationship with the Loopback interface as the update source, the IGP in each AS needs to introduce two equivalent paths to the EBGP neighbor loopback address ; And the commands "ebgp maxhop" and "next-hop-local" are used Answer: B Explanation: Question: 139 IPv6 introduces the Solicited-Node address, which is described correctly below (multiple choice) A. This is a specific address that is used for resolution in ARPv6 The MAC address. B. The Solicited-Node address on the router interface is automatically generated and can have multiple. C. If the Solicited-Node address is not configured , the router automatically generates one on each interface. D. IPv6 introduced the Solicited-Node address to support IPv6 multicast. Answer: B Explanation: Question: 140 What messages does an NMS (Network Management Station) running SNMPv1 send to the agent? A. Trap,Get ? Set B. Get,Set ? Getnext C. Get,Set,Getnext ? GetBulk D. Get,Set ? GetBulk E. Get Trap Answer: B Explanation: Questions & Answers PDF P-44 Question: 141 NXLAN under different VPNs need to be accessed, one of the subnets is as follows, EVPN under RT 10: 10 both, RT 1000: 1000 export, VPN RT 100: 100 The other subnet can be configured as ? A. Vpn configure 1000:1000 both evpn B. EVPN configures 1000:1000 both C. Configure 1000:1000 export under EVPN D. Configure 10:10 both under VPN. Answer: AB Explanation: Question: 142 If you have a LOCAL AREA NETWORK running 8021D Spanning Tree Protocol, the non-root switch does not receive which parameter under the root switch? A. MaxAge B. Root cost C. Forward delay D. Hold time E. Hello time Answer: D Explanation: Question: 143 The following description of the CHAP authentication function in the PPP protocol is correct?( Multiple choice questions). A. The user name must be configured under the authenticated party interface for CHAP authentication B. If the authenticator does not have a username configured, password C. can also be configured without the authenticated party interface Using the authentication sequence ID, random number, and key, a Hash value D. is calculated using the MD5 algorithm Three message interactions are required for authentication, and only the user name is transmitted on the network without the password Answer: ACD Explanation: Question: 144 The following message about OSPFV3 is correct? Questions & Answers PDF P-45 A. The Option field of the Hello and DD packets extends to 24-bit B. LSR packets containing the full LSA header information for requesting an update to the LSA C. The LSACK message contains LSA header information to confirm receipt of the LSU message D. The Hello message must contain the interface ID of the sending interface Answer: ACD Explanation: Question: 145 When configuring ISIS zone authentication, which ISIS message will carry the authentication letter? ( Single choice questions). A. ISIS ?Level-1 ?SNP ?LSP? B. ISIS ?Level-2 ?SNP ?LSP? C. Hello message of ISIS's Level-1. D. Hello message of ISIS's Level-2 Answer: A Explanation: Question: 146 ISIS elects DIS in broadcast multiplexed access networks, and the following statement about DIS is correct?( Multiple choice) A. ISIS elects dis by comparing priorities, and mac addresses if the priorities are consistent B. In a broadcast multiple access network, DIS sends Hello PDUs at three times the frequency C. DIS guarantees database synchronization by periodically sending CSNP messages D. DIS supports preemption function, after the new DIS preemption is successful, there is no need to flood any LSP packet Answer: ABC Explanation: Question: 147 The following is an error in the OSPF routing calculation (single choice). A. Compared to the PRC algorithm, the ISPF algorithm only calculates the changed leaf nodes when the route changes PRC algorithm to recalculate routes B. When the first and second class LSAs on the network change, OSPF uses the ISPF algorithm to recalculate the routes The C. OSPF router uses the FULL SPF algorithm to calculate all nodes in the network when initially calculating routes Questions & Answers PDF P-46 Answer: A Explanation: Question: 148 Level-1-2IS transmits Level-2LSP to the Level-1 area if the AT location 1 in Level-2LSP is delivered It means that the Level-1lS in the area can be accessed to the outer area through Level-1-2IlS A. True B. False Answer: B Explanation: Question: 149 The correct description about the BGP reflector is ?( Multiple choice questions). A. IBGP neighbor relationships need to be fully interconnected without a route reflector. The introduction of route reflectors can reduce the need for full interconnection B. The route reflector can advertise routes learned from non-clients to all clients C. The route reflector can advertise routes learned from one client to other clients and non-clients D. The route reflector can advertise routes learned from IBGP neighbors to all clients and non-client Answer: ABC Explanation: Question: 150 A router receives a BGP route with the community attribute NO-Export , how will the router handle the BGP route? A. Drop the route directly. B. No more advertising to other BGP routers. C. Advertise only to IBGP neighbors. D. The route is advertised normally, but the route is not used to forward data. Answer: C Explanation: Question: 151 You want to set the DSCP value of VolP traffic in HW network devices to EF. According to the differentiated service model RFC, traffic token EF should be set to: Questions & Answers PDF P-47 A. DSCP is set to decimal 36 B. IP ToS is set to OXEF C. IP Experimental ECN D. DSCP is set to decimal 5 E. Bitstream 101110 Answer: E Explanation: Question: 152 You are now troubleshooting a LAN, and you suspect that the error is due to a mismatch in the work mode. Which switch interface error indicates that the 10/100/100O IEE gigabit interface operating mode does not match?( Multiple choice questions). A. Alignment error B. FCS error C. Super Small Frame D. Excess Conflict E. Lag conflicts Answer: ABCDE Explanation: Question: 153 The HW appliance network administrator plans to migrate IGMPv2 in the multicast network to IGMPV3 Where does IGMPV3 improve over IGMPv2? A. IGMPv3 adds the ability for hosts to specify multicast groups that do not join a specific multicast source B. IGMPv3 adds the ability for hosts to specify multicast groups that are joined to a specific multicast source C. IGMPv3 adds Request-to-send and Clear-to-send between source and local IGMP queries D. IGMPv3 removes the Report-suppression feature for membership reporting E. IGMPv3 removes the ability to include all sources in a wildcard group Answer: ABD Explanation: Question: 154 The multicast IP address is 2291301301, and its corresponding MAC address is :(Multilist) Questions & Answers PDF P-48 A. 01-00-5E-O2-82-01 B. 01-00-5E-82-82-01 C. 00-00-5E-02-82-01 D. 00-00-5E-82-82-01 Answer: A Explanation: Question: 155 What does RT do in MPLS VPN? Multiple choice questions). A. Allows the peer PE to decide which VPNv4 routes to import into a particular VRF B. Allows peer PE to decide which VPNv4 routes not to import into a particular VRF C. Allows the peer CE to decide which VPNv4 routes to import into a particular VRF D. Allows the peer CE to decide which VPNv4 routes not to import into a particular VRF Answer: AB Explanation: Question: 156 The network administrator is ready to use the 6to4 automatic tunnel to carry IPv6 data on the IPv4 network, and the IPv4 address of the router interface is 1381485210, so the corresponding tunnel address is 2001:8a0e:55d2:1:230:65ff:fe2:9a6? A. True B. False Answer: B Explanation: Question: 157 The following description of the process of sending and receiving data frames in switch interface Access mode is correct? ( Single choice questions). A. In Access mode, labeled data frames are discarded directly when they are received. B. Access mode strips off the VLAN tag of the dataton when sending . C. Access mode receives only unlabeled data frames. D. When a data frame enters the switch interface, the switch learns the destination MAC address in the data frame. Answer: B Explanation: Questions & Answers PDF P-49 Question: 158 What is the wrong description of the function of OSPFv3 protocol authentication? A. OSPFv3 can only establish a security alliance SA using manual mode B. Huawei router OSPFv3 IPSec authentication can not only support transmission mode, but also support tunnel mode C. OSPFv3 authentication relies on IPv6 packet authentication headers and encapsulation security net load headers D. The OSPFv3 protocol header removes the Type and Automation fields Answer: B Explanation: Question: 159 The OSPF3 protocol is a separately developed protocol that differs somewhat from OSPF2 in that OSPFv3 is link-based rather than network segmented, and the following statement is incorrect?(). Single choice questions). A. Two OSPF routers connected to the link can establish a neighbor relationship even if their IPv6 address prefixes are different B. The routing information obtained by the B. OSPFv3 router from the neighbor uses the neighbor's Link-Local address as the next hop in the forwarded packet C. For two OSPF routers connected to the link, you can establish a neighbor relationship even if you do not configure a unicast IPv6 address D. All OSPFv3 interfaces use the Link-Local address as the destination address of the message Answer: D Explanation: Question: 160 In order to reduce the number of OSPF routes in some unscheduled areas, the OSPF protocol has developed special area functions, and the following characteristic description of ospf special areas is correct?( Single choice questions). A. ASBR-Sunmary-LSA is allowed to be published to NSSA regions B. AS-External-LSA is allowed to be published to Stub regions C. Any OSPF zone can be configured as a special zone D. Special area routers cannot establish OSPF neighbor relationships with regular area routers Answer: D Explanation: Questions & Answers PDF P-50 Question: 161 There is an existing network of router RI, router R, router R3, and router R4 The 4 routers are interconnected via an LN network. All 4 routers are equipped with basic oSPF. When you execute the command "displayosp" on router R2 f peer", router R2 and router R3 are discovered The status between is "2-way". So what conclusions can you draw from this output? Multiple choice questions). A. Router R2 is not a DR B. Router R3 is not a DR, nor is it a BDR C. There is no full adjacency between router R2 and router R3 D. Router R4 is destined for DR E. Router R2 is DR or BDR Answer: ABC Explanation: Question: 162 The following description of BGP load sharing is wrong with ?( Multiple choice question) A. The AS_Path properties of the equivalent routes that form load sharing must be different. B. The destination CIDR blocks are the same, and load sharing can be formed between BGP routes with different sources. C. If BGP load sharing is implemented , the local device needs to configure the peer next-hop-local command to change the next hop address to its own address when issuing a route to an IBGP peer group . D. IBGP routes and EBGP routes that reach the same destination in the public network can form a load sharing Answer: ABCD Explanation: Question: 163 If you delete a declared route entry on a BGP router, the BGP routing ring is triggered to send an Update message for route scattering, which carries the accepted mandatory attribute of the route entry that was discarded. A. True B. False Answer: B Explanation: Question: 164 Questions & Answers PDF P-51 The following statement about OSPF route filtering is incorrect.( Single choice questions). A. In the NSSA area, filtering for external route ingestion and advertisement can be configured on ASBR or ABR B. Filtering for the three types of LSAs needs to be configured on the ABR across OSPF regions C. Interface-based filtering of LSAs allows all LSAs in the inbound and outbound directions except grace LSAs D. Based on the link state database, when calculating routes, the fiter-policy import command is used, which only affects the route addition in the route table, and has no effect on the OSPF link state database Answer: C Explanation: Question: 165 Regarding the Stub region and the Totally Stub region of the OSPF protocol, the following statement is correct (multiple choice) A. After modifying the original Stub area to a Totally Stub area, the number of LSAs in the LSDB of each router in the region will definitely be reduced B. ASBR cannot be present in either the Stub zone or the Totally Stub zone C. When you modify the original Stub area to a Totally Stub region, the number of LSAs propagating within the region will definitely decrease D. If there are two ABR in the Totally Stub zone, each ABR sends an LS ID of 0000 to the router in the zone LSA Answer: BD Explanation: Question: 166 When there are multiple rule rules for ACLs in VRP, which of the following statements is true regarding the order of matching? Single choice questions). A. By default, matching is based on the principle of "depth first" B. By default, matching occurs in the order in which the permit is matched first and denim later. C. By default, matching is made from smallest to largest according to the Rule-ID. D. There is only one matching order and cannot be modified. Answer: C Explanation: Question: 167 Which of the following is incorrect about HTTPS?( Multiple Choice) Questions & Answers PDF P-52 A. HTTPS secures access to data by using SSLVPN. B. If the HTTPS traffic contains a virus, the router cannot detect the virus directly using IPS technology C. When using HTTPS to access a website, the website cannot be accessed if the user's browser does not recognize the website's digital certificate. D. HTTPS protocol uses TCP port 443 by default Answer: C Explanation: Question: 168 What are the differences between traffic policing and traffic shaping? A. Traffic shaping is applied in the inlet direction and traffic supervision is applied in the outlet direction B. For traffic shaping, the router caches excess packets until bandwidth is available again C. The token bucket algorithm is used for traffic supervision, and the SPD algorithm is used for traffic shaping D. For traffic policing, the usage of the buffer can be adjusted for traffic exceeding the CIR E. For traffic shaping, it can be over-CIR Traffic adjustment for the usage of the buffer Answer: BE Explanation: Question: 169 The following description of VRRP load sharing is correct?( Multiple choice questions). A. When configuring priority, make sure that the same router acts as a master in the three VRRP backup groups B. You can create multiple VRRP backup groups on one interface of a router . The router can act as a master for one VRRP backup group and as a backup for other VRRP backup groups C. When you deploy load sharing, hosts in the same LAN are required to configure the IP addresses of different virtual routers as gateway addresses for missing provinces D. VRRP load sharing requires at least two virtual routers to provide forwarding services at the same time Answer: BCD Explanation: Question: 170 VrRP priority is not configured as O, devices that issue VRRP priority of 0 stop participating in the VRRP backup group, notifying the backup device to become a laster device as soon as possible Questions & Answers PDF P-53 without having to wait until the Master_Down_Interval timer times out A. True B. False Answer: A Explanation: Question: 171 The following statement about EVPN Type5 routing is wrong?( Single choice questions). A. Type5 routes carry Layer 3 VNI. B. Type5 routing carries both Layer 2 VWI and Layer 3 VNI C. The IP Prefix field can carry both host and network segment addresses. D. Type5 is an IP prefix route. Answer: B Explanation: Question: 172 XLAN uses BGP EVPN to establish a tunnel, what type of message is used? ( Single choice questions). A. Typel B. Type2 C. Type3 D. Type4E. Type5 Answer: C Explanation: Question: 173 Which levels are common in the OSI reference model and the ICP/IP model? ( Multiple choice question) A. Session layer B. Data link layer C. Transmission layer D. Presentation Layer E. F. Application Layer Physical Layer Answer: CF Explanation: Questions & Answers PDF P-54 Question: 174 A home user has opened a 1Mb/s bandwidth, and in order to improve the user experience, the operator can stabilize 2Mb/s when measuring speed If we use the listening bucket technology to achieve this requirement, which of the following methods is optimal. A. cir 10000 pir 12000 B. cir 10o00 cbs 12000 pbd 12000 C. cir 8000 pir 12000 D. cir 10000 cbs 10000 pbs 12000 Answer: A Explanation: Question: 175 If you need to use the delault-route importd command if no default route exists in the local IP routing table , a default route is issued to the BGP peer (group). A. True B. False Answer: B Explanation: Question: 176 Regarding the sliding window of TCP, what are the following descriptions that are enough to be wrong? ( Multiple choice question) A. The sender declares the initial window size B. The sender does not need to transmit messages of full window size C. The TCP sliding window allows multiple packets to be sent before an acknowledgment is received D. After the retransmission timer times out, the sender has not received an acknowledgment and will retransmit unacknowledged data E. The receiver needs to acknowledge the sender's packet F. Sliding window size can only be increased or remain unchanged Answer: AF Explanation: Question: 177 Questions & Answers PDF P-55 /R1Jospf1lRL-osp- jarea.2[RLospf-1-arca-0002]network1001310000 As shown in the configuration, the administrator configured OSPF but RI on R1 You cannot learn routes for other routing rings. Then the possible cause is the question). A. This router does not have an OSPF process number configured B. This router is configured with a different zone ID than its neighbor router's zone ID C. This router does not have authentication features configured, but neighbor routers configure authentication features D. The declared network address of this router does not match the interface mask Answer: BC Explanation: Question: 178 The Next Header field information exists only in the header of an IPv6 message and is used to indicate whether an extended header exists for IPv6 A. True B. False Answer: B Explanation: Question: 179 What is the following description of MPLS BGPVPN incorrect? A. The TTL field in the label has the effect of preventing loops. B. IBGP PEes generally use the Loopback interface address to establish a stable BGP neighbor relationship C. BGP So0, which is used to prevent routes issued from a VPN site from passing through the MPLS backbone and back to that site. So0 is an extended group attribute that MP-BGP automatically generates. D. The routing exchange between D. PE-CE can be static routing, OSPF multi-instance, IS-IS multiinstance, EBGP Answer: C Explanation: Question: 180 The following information about MPLS tags describes the error as ?( Single choice questions). A. By default, devices support php features, and the ERAS node that supports PHP assigns a tag value of 3 to the penultimate hop node Questions & Answers PDF P-56 B. When the tag value is 0, the tag must be ejected and the message must be forwarded based on IPv4 C. The MPLS tag is 4 bytes long and encapsulated between the link layer and the network layer. D. If the bottom of the label identifies S=0, it indicates that the label is the bottom label and is directly forwarded to the IP. Answer: D Explanation: Question: 181 Run the SSM across the entire HW IP multicast network. The following about SSM understands correctly?( Multiple choice question) A. No RP is required B. SSM uses only shared trees C. SSM uses only the SPT tree D. Ideal for 1-to-many applications E. SSM is recommended when you have multiple sources and expect to minimize the state of mroute in your network Ideal for many-to-many applications Answer: ACD Explanation: Question: 182 The HTTP protocol is based on TCP, so http Flood attacks can be defended against HTTP Flood attacks using the TCP Flood attack prevention method. A. True B. False Answer: B Explanation: Question: 183 The following statement about IPSG technology is correct (single choice). A. The ip source checkuser-bind check-item command is used to configure VLAN- or interface-based IP packet checks, which take effect for both dynamic and static table entries. B. If an interface is configured as the OKCP Scooing Tust interface, the interface can normally receive DHCP ACK and DHCPNAK responded to by the OHHNP server and DHCPOffer packets, other untrusted ports cannot receive these packets properly. C. On Huawei routers, ipSG functions can be configured in Vlanif. D. The IPSG can perform binding table match checks on IP packets entering and leaving the Questions & Answers PDF P-57 interface. Answer: B Explanation: Question: 184 Underneath, what doesn't belong to EVPN Type2 routing is ?( Multiple choice question) A. Host ARP advertisement B. BUM message forwarding C. Host MAC address advertisement D. Host IP Route Advertisement Answer: B Explanation: Question: 185 The following description of the PPPoE data frame is correct?( Multiple choice questions). A. Once a PPPoE session is established, all Ethernet packets are unicast B. The Ethernet_Type domain is fixed to Ox8863 C. When PPPoE passes session data, Code must be set to Ox0 D. The Session_ID of the PPP session is not allowed to change and must be the specified in the Discovery phase Answer: CD Explanation: Question: 186 Regarding BGP route filtering, the following description is wrong? A. The filtering relationship between Route-Policy's noodes is "or." ", that is, as long as a node filter is passed, it can pass through the Route-policyo B. For routes published locally, configure a routing policy that takes effect before the route is added to the BGP route table. C. In the same node of Route-Policy, multiple if-match clauses for different attributes are "or" relationships. D. When a route to a BGP peer is received, a routing policy is enforced to filter unwanted BGP routes that are not added to the local BGP routing table. Answer: C Explanation: Questions & Answers PDF P-58 Question: 187 Regarding route introduction, the following description is correctly ?( Multiple choice questions). A. OSPF introduces two types of external routes, with the first type of external route taking precedence over the second type of external route. B. Use the default-route imported command in BGP only to introduce default routes that already exist in the local IP routing table. C. When ISIS introduces an external route, if you do not specify the route type that is introduced, the Level-1 route is introduced by default on the L1/2 router D. When ISIS introduces an external route, if you do not specify the type of route that is introduced, the Leve1-1 route is introduced by default on the L1 router . Answer: A, B Explanation: Question: 188 Two routers connected through a firewall cannot establish a BGP neighbor relationship. What causes it? A. EBGP Multi-hop is not configured B. The firewall did not release IP protocol number 89 C. Firewalls that do not have an open UDP port number of 179 D. BGP neighbors must form a Layer 2 adjacency Answer: C Explanation: Question: 189 When a Layer 3 switch sends IP packets originating from one VLAN to another LAN, which field in the following options is overridden?( Single choice questions). A. Three layers of TTL B. Layer 3 destination address C. Layer 3 source address D. Layer 3 Transport Protocol E. Two-tier TTL Answer: A Explanation: Question: 190 The following statement about the NSSA area is correct (multiple choice). Questions & Answers PDF P-59 A. In the NSSA area where the OSPF neighbor sends hello packets, the N position 0, E within the option field Position 1 B. The NSSA zone must automatically generate a default LSA to access the external network C. The NSSA zone generates a Category VII LSA to advertise external routing, and the FA address in the Category VII LSA acts to prevent loops D. In the OSPF neighbor in the NSSA region sends hello packets, position 1 within the option field , position E Answer: D Explanation: Question: 191 An existing router running OSPF is connected to zone 0 and zone l. You configured zone l as the Stub domain. What classes does an LSA that operates only inside zone l contain? A. 1LSA,2 3LSA B. 3LSA 4LSA1 2 C. 1 ?LSA ? 2 ?LSA D. 1 ??LSA,2 ??LSA 5 ??LSA E. 7 ?LSA Answer: A Explanation: Question: 192 A company network runs the OSPF protocol, an engineer in order to understand the OSPF mechanism in the network to perform packet capture operations, the following ospf message description is correct? A. LSUpdate message is sent only when an adjacency relationship is established B. LSUpdate messages synchronize the link state database by sending detailed LSA information C. The interface sends Hello packets as soon as it joins the OSPF area D. When an LS Update packet is received, the router must send an LSAck to acknowledge Answer: BC Explanation: Question: 193 There is no routing protocol running on the router HW and only one default route reaches the remote network. On the router job with the extension Ping remote file server address 105401. The Questions & Answers PDF P-60 result of Ping on the router job is presented as "Request time." out”? Based on the above description, the error in the following analysis is ? A. Router HW's next hop router does not have a path to the destination address B. Ping is successful, but congestion occurs on the path to the destination address C. ICMP packets can reach the destination address But the destination device failed to reply D. Router HW does not have a legitimate route to the destination address E. There is a firewall in the remote destination network, and no ICMP traffic is allowed Answer: A Explanation: Question: 194 If the OSPF protocol is running in the network, after configuring the non-osseous thousand region in the OSPF region as the Totally Stub region, the ABR router sends a message to Totally The Stub area issues an LSA with an LSID of 0000, which category the LSA belongs to LSA?( Single choice questions). A. LSA3 B. LSA1 C. LSA5 D. LSA2 Answer: A Explanation: Question: 195 What are the following techniques for improving MPLS BGP VPN reliability?( Multiple choice question) A. dual home networking is configured at the access layer B. VPN FRR C. VPN GR Private IP routing between D. PE-CE FRR Answer: ABCD Explanation: Question: 196 Router HW1 exists in the carrier HW's network as an MPLSLSR router. The router receives a packet carrying a label, but the label entry does not exist in its LFIB. So how does the router handle that message? A. Router HW1 strips off the label and looks for the FIB using the P destination address Questions & Answers PDF P-61 B. Router HW1 uses LDP to create an LSP and creates a new path in LFIB for the label carried in the message C. Router HW1 drops the message D. Router HW1 will forward the message with the default label Answer: C Explanation: Question: 197 Which of the following scenarios does not require RPF checking?( Single choice questions). A. When a router in PIM SM receives multicast traffic when a shared tree is established to an RP in PIM SM C. When a pruning message is received in PIM SM D. When the RP in PIM SM establishes the source tree to the multicast source Answer: C Explanation: Question: 198 If multiple candidate RPs are configured in a multicast group, which of the following parameters does the RP that elect the group from multiple candidate RPs need to be compared? A. The mask length of the group range for the C-RP service that matches the group address that the user joined B. C-RP priority C. The IP address of the C. C-RP interface Number of D. C-RP interface Answer: ABC Explanation: Question: 199 You expect to deploy multicast video applications on your private, on-premises network. To achieve this, you need to have a private multicast IP address in your network . So which range of IP addresses can be used?( Single choice questions). A. 239000-239255255255 B. 241.000-241.255255255 C. 224000-224255255255 D. 240000-254255255255 E. 226000-226255255255 Answer: A Questions & Answers PDF P-62 Explanation: Question: 200 Which of the following statements about RADIUS is correct?( Single choice questions). A. MAC authentication does not require a username password, so you cannot use RADIUS to authenticate the user. B. RADIUS supports both wired and wireless access modes. C. SEPARATION OF RADIUS PROTOCOL AUTHENTICATION, AUTHORIZATION, AND AUDIT. D. RADIUS authentication and Portal authentication cannot be used together because the Portal server can typically be used to authenticate users when portal authentication is deployed. Answer: B Explanation: Question: 201 What are some of the following misrepresentations about URPF, IPSG, and DAI technologies? ( Multiple choice questions). A. DAI does not support manual configuration of binding tables. B. IPSG checks the source IP address and source MAC address of the IP packet , and DAI only checks the correspondence between the IP and the MAC. C. URPF can be used to protect against DDoS spoofed source attacks. D. IPSG technology checks IP packets for source IP spoofing attack prevention, while DAI checks ARP packets to filter attack sources. Answer: AB Explanation: Question: 202 In order to configure M4, you first need to define a RADIUS server, which is defined as follows: Huawei]radius-server template EXAM [Huawei-radius-EXAM]radius-servershared-key cipher HUAwei123(Huawei-radius-EXAM]radusserver authentication 10766661812(Huawei-radiusEXAM]radius-server authorization 1076666 1812[Huawei-radius-EXAM]radius-server accounting 10766661813 (Huawei-radius EXAM]radiusserver retransmit 2 A. True B. False Answer: B Explanation: Questions & Answers PDF P-63 Question: 203 Router A has an IP route entry with a purposeful CIDR block of 10001/32 and an outgoing interface of GigabitEthernetO/0/1. Now add the following configuration: acd number 2000 rule 10 permit source1001.10#traffic classifier test if-match acl 2000 # traffic behavior test remarkdscp cs3#traffic policy test classifier test behavior test# interfaceGigabitftherneto/0/1 ip address 1001212552552550 traffic-policy test outbound#assuming router A received a destination IP of 10001 Of packets, the following statements are correct: A. If the data packet source lIP address is 1001.2, it can be forwarded with the DSCP field marked CS3 B. If the packet source IP address is 1001.1, it can be forwarded while the DSCP field is marked as CS3 C. If the packet source IP address is 1001.2, it cannot be forwarded D. If the packet source IP address is 1001.2, it can be forwarded while the DSCP field remains unchanged Answer: BD Explanation: Question: 204 MSTP switches treat RSTP switches as MSTP domains, MSTP, which are formed by a single switch The interchange resolves the RSTBPDU to MSTBPDU, where IRPC is 0 A. True B. False Answer: A Explanation: Question: 205 If you have a Huawei switch running the STP protocol, and now connect the GO/O/17 interface and the GO/O/18 interface of the switch through a cable, then the scenario described below is correct ?( Single choice questions). A. Both the G0/0/17 interface and the GO/0/18 interface enter the Forwarding state B. Both the Go/0/17 interface and the G0/0/18 interface enter the Disccarding state C. The Go/0/17 interface enters the Blocking state D. The GO/0/18 interface will continuously change back and forth between the Listening state and the Learning state E. GO/0/18 interface will enter the Disking state Answer: E Explanation: Questions & Answers PDF P-64 Question: 206 Huawei's two switches SWA and SWB are connected together by 7 Ethernet cables, and static link clustering is configured, and the corresponding port on the switch SWA is Ethernet 1/0/1 ?Ethernet1/0/2?Ethernet 1/0/3?Ethernet 1/0/4?Ethernet 1/0/5, Ethernet1/0/6, Ethernet 1/0/7, configured in order of port if the switch SWA, SWB supports only 6 ports per aggregation group A. In the case of consistent configuration of each port, Ethernet 1/0/6 port is an aggregate group Unselected port B. In the case of consistent configuration of each port, the Ethernet1/0/1 port is an aggregate group Unselected port C. With the same configuration of each port, the Ethernet 1/0/7 port is the aggregate group Unselecte port D. With the same configuration of each port, SWA randomly selects one of the 7 ports as the aggregate group Unselecte port Answer: C Explanation: Question: 207 ??? aggregate ipv4-address { mask/masklength }[as-set lattribute-policy route-policy-namel ldetailsuppressedlorigin-policy routein policy-name2[suppress3policy route-policy-name3], multiple parameters can be used to influence summary routes and their results. The correct description about the command is ?( Multiple choice questions). A. If As-set is configured, the A S_PATH of the aggregate route contains ass path information for all specific routes in case the route loop is blocked B. If Suppress-policy is configured, aggregate routes are also generated, and the if-match clause in Route-policy is used to pick suppressed detail routes. Detail routes that match Route-policy are still advertised to other BGP neighbors C. If Origin-policy is configured, only detail routes that match Route-policy can participate in aggregation D. If You configure The Interface-policy, you can change the properties of the aggregate route Answer: ACD Explanation: Question: 208 Communityflter h as t wo t ypes o f b asic group n ature fi lters an d ad vanced group pr operty filters. Which of the following filters makes t he Advanced Group Genus Filter more flexible th an th e Basic Group Attribute Filter to match group attributes? A. IP-pref i x Questions & Answers PDF P-65 B. AS-path-filter C. Regular-expression D. ACL Answer: C Explanation: Question: 209 In a shared network, what mechanism does PIM-SM use to prevent duplicate traffic?( Single choice questions). A. Register mechanism B. BSR/RP mechanism C. Assert mechanism D. Join/Prune mechanism Answer: C Explanation: Question: 210 What are the following statements about 8021x, RADIUS, and HWTACACS certification? ( Multiple choice questions). A. Users can use 8021x authentication to access the network and complete identity authentication through RADIUS B. RADIUS authentication and WTACACS authentication are mutually exclusive and cannot be twofactor authentication for the same user at the same time. C. RADIUS authentication and HWTACACS authentication can perform two-factor authentication for the same user at the same time, which is more secure. D. RADIUS authentication is mutually exclusive with 8021x authentication. Answer: AB Explanation: Question: 211 The following statement about IPv6 Over VXLAN is wrong as ?( Single choice questions). A. The tunnel between VXLAN Layer 2 and Layer 3 gateways is an IPv4 network. B. IPv6 over VXLAN solves the problem of insufficient IP address resources for end tenants. C. IPv6 Over VLANs do not generate ND table entries. D. IPv6 over VXLAN means that the Overlay network of the VXLAN is an IPv6 network. Questions & Answers PDF P-66 Answer: C Explanation: Question: 212 What are the following correct statements about MUX VLANs?( Multiple select). A. The Principal VLAN can communicate with all VLANs within the MUX VLAN B. Each Separate VLAN must be bound to a Principal VLAN C. Separate VLANs can communicate with all VLANs within a MUX VLAN D. Each Group VLAN must be bound to a Principal VLAN Answer: ABD Explanation: Question: 213 There is an existing switch running the RSTP protocol. If the network topology changes, what happens to the Layer 2 forwarding table that is automatically learned by the switch? A. All table entries are dropped B. Except for the table entry related to the edge port that is not deleted, all other table entries are deleted C. Only table entries related to the port that received the TC message are dropped D. If the aging time is set to 15 seconds, entries that exceed the aging time are deleted E. Table entries are dropped except for table entries related to edge ports and table entries related to ports that receive TC messages Answer: E Explanation: Question: 214 The advantages of building a campus network using stacking, clustering technology include which of the following?( Multi-select) A. Improved network equipment and link utilization B. It can effectively reduce network power consumption C. Business disruption time is greatly reduced D. Simplifies network management and reduces the complexity of network deployment planning Answer: ACD Explanation: Question: 215 Questions & Answers PDF P-67 Which of the following messages does the BGP protocol support? A. Update B. Open C. Hello D. Keepalive Answer: ABD Explanation: Question: 216 The correct description of the extended features of ISIS is ? A. When the amount of information in the Link State Protocol data packet PDU to be released by ISIS is too large, the ISIS router will generate multiple LSP shards to carry more ISIS information. B. ISIS can choose whether to authenticate incoming SNP and LSP packets C. If there are other vendors' devices on the network and do not support the LSP sharding function, the sharding expansion mode must be configured as Model-1, otherwise the message will not be recognized by other vendors' devices. D. After you enable the LSP shard extension feature of your router, you can use it without restarting the ISIS process. Answer: ABC Explanation: Question: 217 Regarding the difference between NSR and NSF, the correct one is? A. The NSR must rely on a neighbor router to complete B. Both NSR and NSF require a neighbor router to complete C. NSF must rely on neighbor routers to complete D. NSF does not require a neighbor router to complete Answer: C Explanation: Question: 218 Which of the following default routing delivery methods does OSPF support?( Multi-select) A. It can be issued without force B. Can be issued on ABR C. Issuance can only be enforced D. Answer can be issued on ASBR Questions & Answers PDF P-68 Answer: ABD Explanation: Question: 219 Configuration under a certain interface: isis timer hello 5 level-2, the following statement is correct? A. The hello packets sent at level-1 and Leve1-2 are both 5s B. The hello packets sent at level-1 are sent at 5s interval C. The level-2 hello packet send interval is 5s D. The CSNP packet sending interval for this interface Level-2 is 5S Answer: C Explanation: Question: 220 The flood range in OSPFv3 is the LSA within the entire autonomous system? A. Intra-Area-prefix-LSA B. AS-external-LSA C. Link-LSA D. Inter-Area-Prefix-LSA Answer: B Explanation: Question: 221 Regarding the Stub region in the OSPF protocol, the following statement is correct. A. Virtual connections cannot traverse the Stub region B. Backbone zones cannot be configured as Stub zones C. ASBR cannot exist in the Stub zone D. Type7 LSA injection is not allowed in the Stub zone Answer: ABCD Explanation: Question: 222 Because BGP is an EGP routing protocol, BGP routing policies can only be deployed between EBGP neighbors, and routing policies between IBGP neighbors are not valid. A. TRUE Questions & Answers PDF P-69 B. FALSE Answer: B Explanation: Question: 223 An advanced access control list is a sequence of rules consisting of permit |deny statements that can match IP messages based on which attributes ?(). Multiple select). A. Destination port number B. Source address C. Destination address D. Source port number Answer: ABCD Explanation: Question: 224 The basic header length of an IPv6 message is a fixed value. A. TRUE B. FALSE Answer: A Explanation: Question: 225 Regarding the site in the BGP/MPLSIP VPN network architecture, the following description is correct? A. Under no circumstances can different sites that belong to the same VPN use overlapping address spaces B. Two geographically separated networks must belong to different sites C. Terminals connected to the carrier network through the same CE may belong to different sites D. A site is a set of IP systems, and a network of hosts cannot be called site Answer: ABCD Explanation: Question: 226 In MPLSVPN, in order to distinguish between IPv4 prefixes that use the same address space, the RD value is added to the IPv4 address, and the following options are described correctly as ? Questions & Answers PDF P-70 A. RD can be used to control the publication of VPN routing information B. On a PE device, each VPN instance corresponds to an RD value, and the RD value must be unique on the same PE device C. RD is encapsulated in the Update message as an extended community attribute of BGP during delivery D. After the PE receives an IPv4 route from CE, it adds an RD to the route to IPv4 that translates to a globally unique VPN-IPv4 route and publishes it on the public network Answer: B Explanation: Question: 227 Which of the following VPN technologies may have two IP message headers in one message? A. GOES B. SSL VPN C. IPsec VPN D. L2TP Answer: ACD Explanation: Question: 228 The following statement about the application of BFD is correct? A. The one-arm echo function refers to the detection of the connectivity of the forwarding link through the loopback operation of the BFD packet B. BFD multi-hop detection means that BFD can detect arbitrary paths between two systems that may span many hops or overlap in some parts C. BFD and OSPF linkage is to associate BFD and OSPF, and notify OSPF through BFD's rapid sensing of link failures, thereby speeding up OSPF Response to changes in network topology D. BFD single-hop detection refers to the IP connectivity detection of two direct-connected systems Answer: ABCD Explanation: Question: 229 BGP EVPN Type2 routes are used to pass IRB type routes with information including ?( Multi-select) A Layer 2 VNI B. Host IP address C. Host MAC address D. Three layers of VNI Questions & Answers PDF P-71 Answer: ABCD Explanation: Question: 230 Use ping-ax-cY-sZ-vpn-instance M 105162, which has the meaning of A. IcMP request for the ping, message size Z (without IP and ICMP headers) B. The source IP address of the ping packet is X C. The ping belongs to the VPN instance M D. The ping sends Y ICMP requests Answer: ABCD Explanation: Question: 231 The rules for RR to publish routes break the rules for horizontal segmentation of IBGP, so it is possible to cause loops within the AS. What routing attributes does RR use to prevent loops? A. Nexthop B. Originator ID C. AS-PATH D. Cluster List Answer: BD Explanation: Question: 232 The address resolution feature for NDP in the following description is incorrect? A. When sending a neighbor request packet, the source address—is set as the link-local address B. of the local interface Two types of ICMPv6 messages, C. are used in the address resolution process, neighbor request and neighbor advertisement Address resolution implements the ability to resolve from IPv6 addresses to link-layer addresses D. When sending a neighbor request packet, the destination address must be the multicast address of the neighbor's requested node Answer: A Explanation: Question: 233 How many bits are there in the label field of MPLS ? A. 3 Questions & Answers PDF P-72 B. 8 C. 1 D. 20 Answer: D Explanation: Question: 234 There is a concept of FEC-Forwarding Equivalence Class in MPLS, so what criteria can FEC not allocate based on? A. Application Protocol B. Class of Service C. Destination Address D. Fragment offset Answer: D Explanation: Question: 235 The following description of the TTL in the MPLS Header is correct: A. A TTL that acts like an IP header and is used to prevent message loops B. To control label distribution C. Limit LSR D. Control of upstream devices for label distribution Answer: A Explanation: Question: 236 For the description of firewall security zones, the following statement is correct? A. The same interface of a firewall can belong to different security zones B. Different security zones of the firewall, the priority can be the same C. The built-in security zone of the Firewall can be deleted D. Different interfaces of the firewall can belong to the same security zone Answer: D Explanation: Question: 237 Questions & Answers PDF P-73 The MAC address of a PC is 5489-98FB-65D8 The administrator wants this PC to get the specified P address 1921681.11/24 from the DHCP server So the administrator-configured command should be, A. dhcp static-bind ip address 1921681.11 mac- address 5489-98FB-65D8 B. dhcp static-bind ip address 1921681.11 24 mac- address 5489-98FB-65D8 C. dhcp server static -bind ip address 1921681.112552552550 mac-address 5489-98FB-65D8 D. dhcp server static-bind ip-address 1921681. 11 mac- address 5489-98FB-65D8 Answer: D Explanation: Question: 238 What's wrong about vrrp timers is ? A. MASTER DOWN = (3*ADVER_ INTERVAL) + Skew_ time B. Skew Time= (255-Priority)/255 C. By default, the time period for VRRP advertisement messages is 2 seconds D. By default, the VRRP preemption delay is I seconds Answer: BCD Explanation: Question: 239 In the VXLAN implementation, the mapping relationship between VNI and BD is A. 1:N B. N:1 C. 1:1 D. N: M Answer: C Explanation: Question: 240 Although the STP protocol can solve the loop problem, it affects the quality of user communication due to the slow convergence of the network topology. RSTP has made many improvements to STP, which of the following is not an improvement of RSTP to STP? A. In addition to the 3 port states, RSTP vice adds 2 new port roles B. Non-root switches running RSTP send configuration BPDUs at intervals specified by Hello Timer, a behavior that is entirely autonomous for each device C. RSTP port state specification is divided according to whether the port forwards user traffic and learns the MAC address, reducing the original 5 port states to 3 Questions & Answers PDF P-74 D. If a port does not receive a configuration BPDU sent by the upstream device for 4 consecutive Hello Time, the device considers the negotiation with this neighbor to fail Answer: D Explanation: Question: 241 Regarding BGP4+, the following statement is correct? A. BGP4+ carries the next hop address of the route through the Network Address of Next Hop in the NLRI properties MP_REACH B. BGP4+ carries the next hop address of the IPv6 route through the NEXT_HOP attribute C. The NEXT_HOP attribute does not exist in BGP4+ D. BGP4+ carries the prefix and mask length of the IPv6 route through the NLRI attribute Answer: AD Explanation: Question: 242 What categories can ACLs be divided into? A. Advanced ACLs B. Two-layer ACL C. User-defined ACLs D. Basic ACL Answer: ABCD Explanation: Question: 243 What descriptions of the OSPF protocol are correct? A. AS-External-LSA describes the router's path to ASBR B. The cost value of the second type of external route is only the AS external cost value, ignoring the AS internal cost value C. AS-External-LSA does not belong in any region D. AS-External-LSA describes the path to the as outside of the route, and the scope of the flood is the AS outside Answer: BC Explanation: Question: 244 Questions & Answers PDF P-75 Which of the following LSAs propagate in a single region only? A. Router LSA B. Summary LSA C. Network LSA D. AS External LSA Answer: ABC Explanation: Question: 245 What parameters can the DHCPv6 server assign to DHCPv6 clients? A. SNTP server address B. IPv6 address/prefix C. Gateway address D. DNS server address Answer: ABCD Explanation: Question: 246 What are the three ways to send IPv4 messages? A. broadcast B. Unicast C. Multicast D. Any broadcast Answer: ABC Explanation: Question: 247 In inter-domain packet filtering, which of the following options belongs to the outbound direction? A. trust -->Local B. untrust--> dmz C. trust--> untrust D. untrust--> trust Answer: C Explanation: Questions & Answers PDF P-76 Question: 248 Which of the following parameters should be modified to re-establish the is-IS neighbor relationship? A. Modify the Cost value of the IS-IS interface B. Modify the send interval for the IlH of the IS-IS interface C. Modify the Level of the IS-IS interface D. Modify the IP address of the IS-IS interface Answer: CD Explanation: Question: 249 Which of the following sequences can be matched by the regular expression [^100|200]$? A. 300200 100 B. 200 100 300 C. 100 200 300 D. 100,300,200 Answer: BCD Explanation: Question: 250 Regarding BGP's recognized arbitrary attributes, which of the following descriptions is correct? A. must be passed between BGP neighbors B. All BGP routers must be recognized C. There is no requirement to be present in the Update message, and you can decide whether to add it to the Update message on a case-by-case basis D. The BGP router cannot recognize the Answer: BC Explanation: Question: 251 The main routing policy tools that BGP can use are Filter-policy and Route-policy, where Fate-policy can only filter routes and Route-policy can only modify routes A. TRUE B. FALSE Answer: B Questions & Answers PDF P-77 Explanation: Question: 252 Which of the following BGP attributes is not required in the Update message for a BGP route? A. WITH B. Local-Preference C. AS_PATH D. Origin Answer: AB Explanation: Question: 253 The following link-LSA for OSPFv3 is correct? A. Contains both the link-local address of this interface and all IPV6 prefixes of the same area on this router. B. Contains both the link-local address of the interface and all IPv6 prefixes on the interface. C. ?Link-LSA ???Prefix ?Prefixoptions ???Ox00,?? Prefix ????IPv6?????? D. The Option field exists in the header of the LSA, not in the data area of the Link-LSA Answer: B Explanation: Question: 254 ICMPv6 has two types: Error Messages and Information Messages. A. TRUE B. FALSE Answer: A Explanation: Question: 255 The duplicate address detection feature for NDP in the following description is incorrect? A. IPv6 unicast address is called a tentative address after it is assigned to an interface and before it is detected by duplicate addresses B. Duplicate address detection is implemented via RS and RA messages C. IPv6 duplicate address detection technology is similar to free ARP in IPv4 D. The interface needs to perform duplicate address detection before enabling any of the unicast Questions & Answers PDF P-78 IPv6 addresses Answer: B Explanation: Question: 256 In PIM-SM, the description of RP is incorrectly ? A. All members of the group and the multicast sources that send multicast data to the group converge to the unique RP B. The initial multicast streams for all groups in the shared tree are forwarded to the receiver via RP C. An RP can serve multiple multicast groups at the same time, a multicast group can correspond to multiple RPs D. RPs can be responsible for the forwarding of several or all multicast groups, and there can be an RP in the network Answer: C Explanation: Question: 257 Regarding the description of the security level of the configured firewall security zone, the error is ? A. Two security zones are not allowed to configure the same security level in the same system B. Once the security level is set, it is not allowed to change C. You can only set the security level for a custom security zone D. For newly created security zones, the system defaults to a security level of 1 Answer: D Explanation: Question: 258 DHCP Relay is responsible for forwarding DHCP packets between the DHCP server and the DHCP client, assisting the DHCP server in dynamically assigning network parameters to the DHCP client. A. TRUE B. FALSE Answer: A Explanation: Question: 259 Regarding the description of VRRP Fast Switching, the error is ? Questions & Answers PDF P-79 A. Use VRRP to monitor BFD sessions or EFM features, either in BPD sessions or EFM session states After the change, the VRRP module is notified to achieve fast VRRP switching B. A VRRP backup group cannot monitor Peer BFD, Link BFD, and Normal BFD C. at the same time If you configure to monitor multiple BFDs at the same time Then the various configurations are interrelated and may have an impact D. When a VRRP backup group monitors normal BFD, when the BFD state changes, the activestandby state is changed by modifying the backup group priority Answer: B, C Explanation: Question: 260 There are many ways to establish a cluster on a box switch, what methods does Huawei frame switch support to establish a cluster? A. Set up via a cluster card on the motherboard B. Establish C. through the cluster daughter card on the interface board. Establish D. through the service interface on the interface board Established by switching the cluster card on the network board Answer: ACD Explanation: Question: 261 When there are multiple redundant links in an IS-IS network, multiple equivalent routes may occur. Regarding equivalent routing within an IS-IS network, which of the following descriptions is wrong? A. When the number of equivalent routes present in the networking is greater than the number configured by the command, and these routes have the same priority, the next hop device System IlD large routes are preferred for load sharing B. After you configure the equivalent routing priority, when the IS-S device forwards traffic to the destination segment, it will not use load sharing, but forward the traffic to the next hop with the highest priority C. For each of the equivalent routes, you can assign a priority, with the highest priority routes preferred and the rest as backup routes D. If load sharing is configured, traffic is evenly distributed across each link Answer: D Explanation: Question: 262 Questions & Answers PDF P-80 MQC, like PBR—can only be called under the device's Layer 3 interface. A. TRUE B. FALSE Answer: B Explanation: Question: 263 IsIS IPv6 cost 50 is configured under the interface, and the meaning of the command is ? A. The LEVEL-1 and Level-2 costs of the interface's IS-IS IPv6 are 50 B. The LEVEL-1 and Leve1-2 costs of the INTERFACE's IS-IS IPv6 are both 60 C. The LEVEL-2 cost of the interface's IS-IS IPv6 is 50 D. The LEVEL-1 cost of the interface's IS-IS IPv6 is 50 Answer: A Explanation: Question: 264 Regarding the description of the BGP neighbor, the error is: A. BGP routers that support autodiscovery neighbors B. BGP establishing neighbors must be configured with MD5 authentication C. BGP needs to establish a UDP connection before establishing a neighbor D. BGP to establish a neighbor relationship needs to first interact with the link state information Answer: ABCD Explanation: Question: 265 The following statement about IS-IS (IPv6) is correct? A. In order to support the processing and calculation of IPv6 routes, IS-IS has added TLV232 and 236 B. By default, IS-IS has the multi-topology feature turned on C. IS-IS works at the data link layer and only needs to add a new TLV to support IPv6 D. In order to support the processing and calculation of IPv6 routes, IS-IS has added NLPID to the 129 TLV Answer: ACD Explanation: Question: 266 Questions & Answers PDF P-81 In the evolution from IPv4 networks to IPv6, some transition technologies have emerged, which of the following are common types of transition technologies? A. Dual-stack technology B. Tunneling Technology C. Compatible with Technology D. Conversion Technology Answer: ABCD Explanation: Question: 267 Regarding the description of the encapsulation format of the labels in MPLS, the correct one is ? A. The TTL field in the label has a similar meaning to the TTL (Time To Live) in the IP packet, and also has the effect of preventing loops B. The total length of an MPLS single tag is 4 bytes (32 bits). C. For Ethernet, PPP packets, the tag stack is like a "cushion layer", located between the layer 2 header and the data, and when there is a VLAN tag, the MPLS header is placed on the Ether head and VLANtag between D. label in the S field, lbit Used to identify whether the label is a bottom label, and a value of 1 indicates that it is the penultimate label Answer: AB Explanation: Question: 268 In an MPLS domain, depending on how the LSR handles the data, the LSR can be divided into Ingress LSR, Transit LSR, and Transit LSR Egress LSR? For the same FEC An LSR can be an Iningress LSR for that EC or a Transit for that FEC LSR. A. TRUE B. FALSE Answer: A Explanation: Question: 269 The following statement about the VPNv4 address is wrongly described as ? A. By default, PE does not perform VPN-target filtering on received VPNv4 routes. Questions & Answers PDF P-82 B. Local PE sets up An Export Target for these routes before releasing VPNv4 routes learned from sites that are directly connected to them to other PEEs attributes, and are published with routes as extended community attributes for BGP. C. Carries the RD attribute when BGP publishes both reachable and unreachable VPNv4 routes. D. The VPNv4 address has a total of 12 bytes, including an 8-byte route identifier RD (Route Distingulisher) and a 4-byte IPv4 Address prefix. Answer: A Explanation: Question: 270 What about the description of IGMP Snooping, is it correct? A. IGMP Snooping solves the problem of multicast messages broadcasting in layer 3 B. IGMP Snooping does not consume the CPU of the switch C. IGMP Snooping establishes a MAC multicast address table by listening for IGMP packets sent by the host D. IGMP Snooping runs at the link layer and is a multicast constraint mechanism on Layer 2 Ethernet switches that manages and controls multicast groups Answer: CD Explanation: Question: 271 In SSM, what version of IGMP is required? A. IGMPV3 B. IGMPV4 C. IGMPV2 D. IGMPV1 Answer: A Explanation: Question: 272 After configuring the VLAN-based MAC address drift detection function, if the MAC address drifts, you can configure the actions of the interface according to your needs. Which of the following is not a configurable action? A. Send an alert B. The MAC address blocks C. Interface blocking D. Traffic filtering Questions & Answers PDF P-83 Answer: D Explanation: Question: 273 Comparisons for primary switch elections in the stack include ? A. MAC address B. Health status C. Stack priority D. Stack ID Answer: ABC Explanation: Question: 274 Port isolation technology deployed in Ethernet can realize Layer 2 interoperability and Layer 3 isolation, making networking more flexible. A. TRUE B. FALSE Answer: B Explanation: Question: 275 What are the wrong statements about OSTPF's Router LSA and Network LSA? A. There must be both Router LSA and Network LSA in the OSPF network B. Network LSA carries both topology and routing information C. A router running OSPF must produce a Network LSA D. A router running OSPF must produce a Router LSA Answer: AC Explanation: Question: 276 The following description of MED, correct: A. MED default value is 100 B. MED can only be passed within this AS C. MED is an optional non-transitional attribute Questions & Answers PDF P-84 D. MED The default value is 0 Answer: CD Explanation: Question: 277 Which of the following scenarios is not suitable for deploying interface policy routing? A. In the scenario of multiple ISP egresses of enterprise networks, different network segments of the intranet access the Internet through different ISP egresses B. The traffic accessed by the intranet and the extranet to the side-mounted security detection device is pulled on the core switch C. Modify the next hop of locally originating traffic D. Pull the traffic of the intranet and the Internet accessing each other on the core switch to the AC device attached to the side Answer: C Explanation: Question: 278 For a non-directly connected EBGP neighbor to establish properly, what configurations must be included as follows? A. peer ebgp-max-hop B. peer ignore C. peer as-number D. peer connect-interface Answer: AC Explanation: Question: 279 LDP messages are exchanged between LDLRs running the LDP protocol, and LDP messages can be divided into four types according to function, which of the following is not an LDP message type ? A. Advertisement message B. Discover message C. Conversation message D. Label Exchange Information Answer: D Explanation: Questions & Answers PDF P-85 Question: 280 Regarding MP-BGP, the following description is wrong? A. Radio A. MP-BGP needs to assign a private label to the VPNv4 route B. PE and CE are routed through BGP interaction, you need to create a BGP process on ce for each VPN instance C. The message type and VPNv4 routing publishing policy for MP-BGP are the same as for BGP-4 D. MP-BGP advertises VPNv4 through two attributes, MP_REACH_NLRI and MP_UNREACH_NLRI Route Answer: B Explanation: Question: 281 Regarding BGP/MPLS IP VPN routing interactions, the following description is incorrect? A. The ingress PE changes the IPv4 route received by the CE to the VPNv4 route, and the storage B. PE is carried out according to different VPN instances What interacts with the CE is IPv 4 routing information C. After receiving the VPNv4 route issued by the ingress PE, the egress PE filters the VPNv4 route according to the RT attribute carried by the route D. The egress PE can send an IPv4 route to the remote CE via BGP, IGP, or static routing Answer: D Explanation: Question: 282 Regarding the BGP/MPLS IP VPN network architecture, what is the error described below? A. sites can be accessed each other through vPNs, and a site can only belong to a VPN B. P devices only need basic MPLS forwarding capabilities and do not maintain VPN-related information C. BGP/MPLSIPVPN network architecture consists of CE (Customer Edge), PE (Provider Edge) and P (Provider), of which PE and P Is a carrier device, CE is BGP/MPLSIPVPN with Household equipment D. Under normal circumstances, CE devices are not aware of the presence of VPN, and CE devices do not need to support MPLS MP-BGP, etc Answer: A Explanation: Question: 283 Questions & Answers PDF P-86 RTA is the source DR router, RTB is the RP router, and the multicast source sends multicast data to the RTA, but the PIM is not visible on the RTB Register the multicast source to which the message is registered, then the possible causes are ? A. Multicast network statically configures RP, while RTA router does not statically configure RP B. The RP elected by RTA is not an RTB C. RTB to RTA has no unicast routing, causing the RTB to fail RPF checks for the source D. The multicast network dynamically elects the RP instead RTA failed RPF check for BSR Answer: ABCD Explanation: Question: 284 Regarding the description of the permanent multicast address, the error is ? A. All routers running the PIM protocol listen on 22400100 B. All routers listen on 224002 C. All hosts and routers in the network segment listen on 224001 D. All routers running the OSPF protocol listen to 224005 Answer: A Explanation: Question: 285 If all the public IP addresses are used by a company's intranet users to access the Internet using NAT's No-pat method, what will happen to subsequent intranet users who access the Internet? A. automatically switch NAT to PAT after the Internet B. Subsequent intranet users will not be able to access the Internet C. Synchronize messages to other NAT conversion devices for NAT conversion D. Squeeze out the previous user and force NAT conversion to go online Answer: B Explanation: Question: 286 The correct statement about the VRRP protocol version is ? A. VRRPv2 is only available for IPv4 B. VRRPv3 does not support authentication C. VRRPv2 supports authentication D. VRRPv3 is only available for IPv6 Questions & Answers PDF P-87 Answer: ABC Explanation: Question: 287 The Layer 3 logical interface on XLAN L3 Gateway that enables communication between different VXLAN virtual networks is ? A. Layer 2 sub-interface B. NVE interface C. VBDIF interface D. VLANIF interface Answer: C Explanation: Question: 288 The RSTP protocol provides a variety of protection functions, such as when the edge port is configured as a protection state, the edge port receives the BPDU packet processing method; A. Directly discard the BPDU packet B. Close the port C. After parsing the BPDU message, the relevant information is obtained D. Forward BPDU packets as required Answer: B Explanation: Question: 289 The role of Link-LSA in OSPFv3 does not include ? A. Advertise to other routers on the link optional that is set in the Network LSA from which this link originates B. Advertise the per-port ID of this router to other routers on the link C. Advertise the link-local address D. of this interface to other routers on the link Advertise this IPv6 prefix list to other routers on the link Answer: A Explanation: Question: 290 Regarding BGP MED, which of the following descriptions is correct? Questions & Answers PDF P-88 A. In the BGP routing rules, MED has a lower priority than AS Path, Praferred-value, Local-Preference, etc Origin B. The default value for the B. BGP routing MED is 0 C. By default, if there is no MED value in the route attribute, it is processed by 0 If the bestroute med-none-as-maximum command is configured, MED is processed as the maximum 4294967295 D. By default, BGP routing rules can MED comparison of routes from different autonomous systems Answer: ABC Explanation: Question: 291 What does IPV6 enable topology ipv6 mean under IS-IS protocol view? A. Does not have any meaning B. SPF calculation for IPv6 is not supported C. SPF calculation is performed separately in the topology of IPv4 and IPv6, D. IPv4, IPv6 using the same topology for SPF calculation Answer: C Explanation: Question: 292 The value of OSPF and BFD linkage is ? Radio A. Any change in BFD status is realized by detecting the BFD at the millisecond level, which correlates the OSPF state and realizes the purpose of OSPF rapid sensing link state B. Does not affect OSPF neighbor status C. BFD packet transmission interval can reach the 100-second level, which is slower than the OSPF induction link state D. OSPF's hello send interval is seconds, which is faster than BFD inductive link state Answer: A Explanation: Question: 293 A campus deployed both IPv4 and IPv6 networks for service testing, and ran IS-S to interconnect the networks. (The S-S routing protocol has good scalability and is widely used in the live network.) Regarding IS-IS extensibility, which of the following statements is true? A. In order to support IPv6, IS-IS needs to add TLV to carry IPv6 address information B. IS-IS uses the TLV structure to build messages, making lS-IS more flexible and extensible C. NLPID is a new type of TLV added by IS-IS to support IPv6 Questions & Answers PDF P-89 D. For IS-IS, adding new features simply adds a new TLV to Answer: ABD Explanation: Question: 294 When configuring AS-Path-Filter, ip as-path-filter 10 permit_100$ indicates a matching route received from the A5100 but not from the AS100 A. TRUE B. FALSE Answer: B Explanation: Question: 295 Regarding the domain-authentication-mode md5 hello command in the ISIS process, the correct explanation is ? A. ISIS authentication cannot be applied in IPv6 environments. B. This command is mainly used to make is the ISIS Hello message carry authentication information during the transmission process. C. All router domain authentication methods of the same routing domain are MD5, the password is hello, and lS-IS SNP and LSP will spread normally. D. outing domain authentication is primarily used to allow level-1 and Level-2 SNP and LSP messages to carry authentication information during delivery. Answer: C Explanation: Question: 296 Which of the following configurations is the correct OSPFv3 route aggregation configuration: A. [Huawei]ospfv3 1 [Huawei-ospfv3-1J]area 1 [Huawel-ospfv3-1-area-0001]abr-summary fc00:0-0:48 cost 400 B. [Huawei] interface gigabitethernet 1/0/0 [Huawei-GigabitEthernet1/0/0]asbr-surmary fcO0-0:0:48 cost 20 C. [Huawei]ospfv3 1 [Huawei-ospfv3-1]asbr-surmary fcO0-0:0::48 3 cost 20 tag 100 D. [Huawei]ospfv3 1 [Huawei-ospfv3-1]abr-surmary fcO0:0:0:48 cost 400 E. (Huaweijospf3 1 Huawei-ospfv3-1Jarea 1 Huawei-ospfv3-1-area-0001]asbr-sumary fcO0:0:0: 48 cost 20 tag 100 Answer: AC Questions & Answers PDF P-90 Explanation: Question: 297 In order for routers at both ends of the IPv6 over lPv4 manual tunnel to exchange routing information, OSPV3 can be enabled on the tunnel, osPFv3 will be able to form a normal neighbor relationship, and the tunnel interface will be treated as a P2P link interface. A. TRUE B. FALSE Answer: A Explanation: Question: 298 If we have a VPN instance configured on a router, if we need to view the VPN route on a Huawei router, which of the following commands should we use? A. display ip routing-table vpn-instance vpn-instance-name B. display ip routing-table C. display vpn routing-table D. display ip vpn-instance Answer: A Explanation: Question: 299 Is the following statement about VLAN aggregation correct? A. Sub-VLAN is used to isolate broadcast domains B. A Super VLAN can contain one or more Sub-VLANs C. The super Sub-VLAN contains a physical interface that can establish a Layer 3 VLANIF interface D. Sub-VLAN contains a physical interface that can establish a Layer 3 VLANIF interface Answer: AB Explanation: Question: 300 Regarding the characteristics of CE double attribution, the description is wrong with ? A. CE accesses the backbone through two links that can be used as both load sharing and primary and standby links. B. CE and PE form a CE dual-home network, which can ensure high network availability. Questions & Answers PDF P-91 C. VRFs of two PEs connected to the same CE can belong to different VPNs. D. In the CE dual home network, it is possible to generate loops, and you can use route-tag to solve the loop problem. Answer: C Explanation: Question: 301 There is a new HW office that needs to use their router as a DHCP server. When configuring the DHCP server to provide DHCP services to the current office, what of the following items need to be configured? A. Exclude unused IP addresses from the DHCP server B. Configure the timeout period for ping packets C. Configure the startup file for the DHCP server D. Configure manual binding E. Configure dhcp address pool Answer: AE Explanation: Question: 302 BGP EVPN advertises external routes, which of the following routes? A. Type1 B. Type2 C. Type3 D. Type4 E. Type5 Answer: E Explanation: Question: 303 A routing tool can define multiple entries. Which tool will automatically add a deni-any entry at the end of the configuration? A. Route policy B. Community-tilter C. IP-prefix D. AS-path-filter Answer: ABCD Questions & Answers PDF P-92 Explanation: Question: 304 The following statement about a cross-domain MPLS VPN is mischaracteristic? A. When the public network tag is LDP only , for cross-domain VPN-optionC scenario 2, a three-layer tag is required in the packet forwarding process. B. For the cross-domain VPN-OptionB approach, an MP-eBGP neighbor relationship needs to be established between the two ASBRs. C. For the cross-domain VPN-OptionA mode, the route passed between the two ASBRs is a normal IPv4 route. D. For the cross-domain VPN-OptionB approach, two ASBR-PEs are interconnected with multiple interfaces (including sub-interfaces), each associated with a VPN, each ASBR PE treats the peer as a CE. Answer: AD Explanation: Question: 305 Network managers can use CAR technology in traffic policing. What of the following technologies can be applied in CAR? A. Double barrel two-speed B. Double barrel single speed C. Single barrel single speed D. Three barrels of single quick Answer: AB Explanation: Question: 306 In an MPLS BGPVPN networking that does not enable MPLS penultimate hop pop-up technology. When the message reaches the last hop PE, the message has two layers of labels, and the two layers of label values can be the same. A. TRUE B. FALSE Answer: A Explanation: Question: 307 Questions & Answers PDF P-93 Regarding the MPLS basic forwarding process, the following description is incorrect? Radio A. By default, the PHP-enabled Erass node assigns a label value of 3 to the inverted second-hop node. B. When an IP message enters the MPLS domain, the MPLS boundary device inserts a new label between the layer 2 header and the IP header. C. When the P message enters the MPLS domain, check whether the Tunel lD value corresponding to the destination IP address is Ox0O If the Tunel IlD value is Ox0 Then enter the MPLS forwarding process. D. The transport node device replaces the existing top-of-stack label (outermost label) with the label assigned by the next hop device. Answer: C Explanation: Question: 308 In EPIM-SM, the following description of the PIM Join message is correct? APIM Join messages are sent every 3 minutes, and status B. PIM Join messages for the multicast tree are only sent when the multicast tree is first established C. The PIM Join message is sent every 60 seconds to refresh the status of the upstream router mroute for the multicast tree D. The upstream router sends a PIM Join acknowledgment in response to each PIM Join message received from the downstream router Answer: C Explanation: Question: 309 Which field in the IPv6 basic header has a similar effect to which field in the IPv4 header does? A. Flags B. Protocol C. Time to Live D. Ldentification Answer: C Explanation: Question: 310 Four routers R1, R2, R3, and R4 run IS, and the I5S router type is noted in the diagram. All four routers have an area address of 49001, and looking at the routing table on R1l shows the following results, the reason why R did not reach the route of 1034344 Questions & Answers PDF P-94 A. The routing policy configured on the ARO filters the System-ID of the default route B. R2 from conflicting with R3 C. R and R4 Zone Planning Errors The System-ID of D. R2 conflicts with R1 Answer: C Explanation: Question: 311 A router Router LSA is shown in the figure, and the error in the following statement is ? Questions & Answers PDF P-95 A This router supports external routing ingestion B. This router is a DR C. The Router ID of this router is 100121 D. This router has established an adjacency relationship Answer: B Explanation: Question: 312 The correct statement about the difference between OSPFv2 and OSPFv3 is ? Multi-select A. BOTH OSPFv2 and OSPFv3 support interface authentication. And OSPFv3 authentication is still based on the fields in the ospf message header B. OSPFv3 is similar to OSPFv2 in that it uses a multicast address as the OSPF message destination address C. The same type of message exists in OSPFv2, OSPFv3: Hello, DD, LSR, LSU, LSAack, Their message format is the same D. OSPFv2 has the protocol number 89 in the IPv4 packet header, OSPFv 3 The next number in the IPv6 message header is 89 Answer: BCD Explanation: Question: 313 Four routers running IS-4S and an adjacency relationship has been established, the area number Questions & Answers PDF P-96 and the level of the router are noted in the figure, and the R4 reaches 10022/32 on the RI device Cost for how much? A. 50 B. 80 C. 40 D. 30 Answer: B Explanation: Question: 314 Regarding the Stub region and the NSSA region of the OSPF protocol , the following statement is incorrect with a single choice A. Neither the Stub region nor the NSSA region allows injection of Type4 LSA B. Type5 LSA injection is not allowed in the Stub region, while Type5LSA injection is allowed in the NSSA region C. Type7LSA injection is not allowed in the Stub region, while Type7LSA injection is allowed in the NSSA region D. Both the Stub region and the NSSA region allow injection of Type3 LSA Answer: B Explanation: Question: 315 If the Interface Sticky MAC function is enabled, what is the number of MAC addresses that the interface learns by default? A. 15 B. 10 Questions & Answers PDF P-97 C. 5 D. 1 Answer: D Explanation: Question: 316 As shown in the figure, SWA, SWB runs the PSTP protocol, and Cost of Path remains the default without modification, so the following statement is correct A. GEO/0/1 on ASWB is Alternative port B. GE0/0/2 on SWB is Alternative port C. SWA On GEO/0/1 for backup port D. SWB will become the root bridge Answer: B Explanation: Questions & Answers PDF P-98 Question: 317 Which of the following is the benefit of VLAN aggregation? A. Implements isolation of broadcast domains between Sub-VLANs B. Reduce the waste of IP addresses C. Increased number of available VLANs D. Increased flexibility in addressing Answer: ABD Explanation: Question: 318 The correct description about the prefix list is: A. The prefix list is used to filter P prefixes and can match both prefix numbers and prefix lengths B. The prefix list is used to filter IP prefixes, and cannot match both the prefix number and the prefix length C. The prefix list cannot be used for packet filtering D. The prefix list can be used to filter packets Answer: AC Explanation: Question: 319 IS-IS supports the processing and computation of IPv6 routes by adding ATLPs to carry IPv6 addresses and reachability information. A. TRUE B. FALSE Answer: A Explanation: Question: 320 There can be multiple nodes under a route -policy, different node numbers are identified by nodes, and each node can have multiple if-match and apply clauses, which of the following descriptions are wrong ? A. The relationship between the if-match clauses under each node is "and" B. The relationship between different nodes is an "and" relationship C. There is an "or" relationship between different nodes Questions & Answers PDF P-99 D. The relationship between the if-match clauses under each node is "or" Answer: BD Explanation: Question: 321 What information does the BGP Open message carry as follows? A. BGP Router ID B. Route attributes C. Local Autonomous System (AS) number D. Hold time Answer: ACD Explanation: Question: 322 The following description of BGP loop protection is correct: multi-select A. Any routing information from an IBGP peer is advertised to the other IBGP peers B. Any update information received from the EBGP peer that contains its own AS number in the ASPATH attribute is discarded via the AS-PATH attribute C. Non-RR BGP routers do not announce any updates from IBGP peers to other IBGP peers D. BGP routers do not announce any slaves The EBGP peer comes to update the information to its EBGP peer Answer: BC Explanation: Question: 323 In route-policy, what are the BGP attributes that can be used for the apply clause? A. AS-Path B. MED C. Local-Preference D. Day Answer: ABC Explanation: Question: 324 BGP EVPN does MAC address advertisement, ARP message advertisement, and IRB route Questions & Answers PDF P-100 advertisement for which BGP EVPN route is advertised? A. Type3 B. Type2 C. Type4 D. Type1 Answer: B Explanation: Question: 325 The command to configure VRRP preemption delay is ? A. vrrp vrid 1 preempt-mode timer delay 20 B. vrrp vrid 1 preempt-delay 20 C. vrrp vrid 1 preempt-timer 20 D. vrrp vrid 1 timer delay 20 Answer: A Explanation: Question: 326 By default, huawei firewalls provide the following security areas: A. Trust zone B. Security zone C. Local zone D. Untrust Zone Answer: ACD Explanation: Question: 327 If a DR needs to be elected between multicast routers running PIM-SM to be responsible for the sending and receiving of source or member multicast data, which one is described correctly below for the DR election rule? A. PIM routers with long interface masks are elected dr. B. Compare the DR priority first; With the same priority, you need to compare the interface IP addresses of the PIM routers to elect dr C. PIM routers with small IP addresses are elected DR. PIM routers with low D. DR priority values are elected DR. Questions & Answers PDF P-101 Answer: B Explanation: Question: 328 In an intra-domain MPLSVPN network, when a packet enters the public network and is forwarded, it is encapsulated with two layers of MPLS tags, and the description of the two layers of tags in the following options is incorrect A. The outer label of mpls VPN is assigned by the LDP protocol or statically, and the inner label is assigned by the MP-BGP neighbor of the peer B. The outer label of MPLS VPN is called a private network label, and the inner label is called a public network label C. The outer label is used to correctly send packets to the appropriate VPN in D. on the PE device By default, the outer label is ejected before the packet is forwarded to the last hop device Answer: BC Explanation: Question: 329 DHCPv6 servers support additional configuration information such as DNS server addresses for hosts. A. TRUE B. FALSE Answer: A Explanation: Question: 330 Which of the following does the digital certificate not contain? A. Digital envelopes B. Issued by C. Digital signature D. Public key information Answer: A Explanation: Question: 331 The following statement about the security alliance SA in IPSec is incorrect Questions & Answers PDF P-102 A. SA is uniquely identified by a triple that includes the security parametric reference SPI (Security Parameter Inder), the source IP address, and the security protocol number (AH or ESP) B. Use the display ipsec command to view the encryption algorithm used with another IPSec peer, the traffic of interest, and so on. C. IPSec only supports encrypting data using symmetric encryption algorithms. D. A two-way SA must exist between IPSec peers to establish an IPSec VPN connection Answer: A Explanation: Question: 332 The following statement about RSTP root protection is correct? A. Turning on root protection on the root port takes effect B. The port that turns on the root protection receives the RST BDPU with a higher priority and will enter the error-down state C. It is recommended that you turn it on on a switch that is at the edge of the network D. After opening the root-protected port and receiving the RSTBPDU with a higher priority, if it does not continue to receive the RSTBPDU with a higher priority for a period of time, it will return to the normal forwarding state Answer: CD Explanation: Question: 333 Unlike STP, RSTP has only one BPDU type, its value is 2, and there is no TCN BPDU. A. TRUE B. FALSE Answer: A Explanation: Question: 334 As shown in figure, Clent1, C lent2 and Clent3 are simultaneously clients of RR1. Ri introduces 10 routes. It is assumed that the RGP is configured correctly. The neighbor relationship has been established, how many route entries exist in the BGP routing table of the most clIient3? Questions & Answers PDF P-103 A15 B. 10 C. 20 D. 1 Answer: B Explanation: Question: 335 OSPFv3 uses the same route advertisement method as OSPFv2: advertising is done through the network command in the OSPFv3 area view. A. TRUE B. False Answer: B Explanation: Question: 336 In the topology shown in the figure. Running the OSPFv3 protocol over the entire network does not produce what type of LSA on R1 without external route introduction? Questions & Answers PDF P-104 A. Intra-Area-Prefix-LSA B. Inter-Area-RouterLSA C. Link-LSA D. Inter-Area-Prefix-LSA Answer: B Explanation: Question: 337 IS-IS is a link-state routing protocol that uses the SPF algorithm for route calculations. As shown in the figure, at the same time, a certain area has IPV4 and IPV6 and runs IS-IS to achieve network interconnection, of which R2 only supports IPV4 Regarding the topology calculation of the network, which of the following statements is correct? A. By default, IPv6 is not supported because R2 Therefore, in the shortest path tree formed by the JPv6 network computation, the path where R1 accesses R4 is: R1-R3-R4 B. If you want the IPv4 and IPv6 networks to compute the same shortest path tree. The IPv6-enable Questions & Answers PDF P-105 topology lpv6 command is required to enable the Russian force of IPv6 under the IS-IS process C. By default, in the shortest path tree formed by the IPv6 network calculation, R1 accesses R4 as R1R2-R4, since R2 does not support IPv6 Therefore, R2 will directly drop the IPv6 packet after receiving it, and select the traffic loss D. By default, IPv4 and IIPV6 networks are computed separately to form different shortest path trees Answer: C Explanation: Question: 338 Which of the following parameters are not required when configuring BGP Peers? A. as-number B. password C. peer IP Address D. Description Answer: BD Explanation: Question: 339 Link state information is isolated by default between different IS-IS processes on the same router. A. TRUE B. FALSE Answer: A Explanation: Question: 340 Is the following statement about the multicast address used by 0SPFv3 correct? A. RD routers use FF02: :6 B. The DR router uses FF08::6 C. All OSPF routers use FF02::5 Answer: AC Explanation: Question: 341 As shown in the figure, private network routing information is exchanged between PEl and PE2 and their respective CE via OSPF, and the same is configured on PEI and PE2 Domain D. When routing is Questions & Answers PDF P-106 introduced from BGP to OS9PF on PE2, the following limited types of LSAs may be passed to E2? A. Type7 LSA B. Type5 LSA C. Type3 LSA D. Type1 LSA Answer: CD Explanation: Question: 342 Is the following description of the differences between IGMP name versions correct? A. IGMPv1/v2 cannot elect the queryer itself, while IGMPv3 can B. IGMPv1 does not support specific group queries, while IGMPv2 does C. IGMPv1/2/v3 cannot support the SSM model D. For members to leave, IGMPv2/v3 can actively leave, while IGMPvl cannot Answer: BD Explanation: Question: 343 A medium-sized campus network manages the network through the SNMP protocol, and the campus is highly network-safe, so which version of SNMP is recommended for management? A. SNMPv1 B. SNMPv2C C. SNMPV3 D. All versions are available to implement Answer: C Explanation: Question: 344 In a VXLAN network, traffic is connected to the VXLAN network, and it can also be used to communicate with the same subnet within the same XLAN network Questions & Answers PDF P-107 A. NVE interface B. VXVAN L2 Gateway C. VXLAN L3 Gateway D. VLANIF interface Answer: B Explanation: Question: 345 What are the problems with manually creating static VXLAN tunnels in campus networks? Multiselect A. Although the static VXLAN tunnel mode can support distributed gateway application scenarios, the configuration workload is large and the configuration adjustment is complex B. N devices to establish static VXLAN tunnels, you need to manually configure up to N(N-1)/2 tunnels, the amount of configuration is large C. VTEP can only learn remote MAC addresses in a way that relies on data flooding D. Static VLAN tunnel also uses related protocols on the control plane, which will cause equipment resource loss Answer: ABC Explanation: Question: 346 In the description of the MAC address spoofing attack, the error is ? Radio A. Mac address spoofing attacks cause the switch to learn the wrong mapping of Mac addresses to IP addresses B. A MAC address spoofing attack causes the data that the switch is sending to the correct destination to be sent to the attacker C. MAC address spoofing attacks primarily exploit the switch Mac address learning mechanism D. An attacker can perform a MAC address spoofing attack by sending a forged source Mac address data frame to the switch Answer: A Explanation: Question: 347 The following is a description of how BFD sessions are established, which is the wrong one A. The system distinguishes between static BFD sessions and dynamic BPD sessions by dividing the identifier area Dynamically assign this landmark identifier Questions & Answers PDF P-108 B. BFD sessions can only be established dynamically C. Static configuration of BFD session refers to manual configuration of BFD session parameters through the command line, including local identifiers and remote identifiers Answer: C Explanation: Question: 348 The DHCP protocol assigns to clients—some TCPIP-related parameter information—in the process DHCP defines a variety of messages that are encapsulated at the transport layer :(sortic). A. PPP package B. IP encapsulation C. TCP Encapsulation D. UDP Encapsulation Answer: D Explanation: Question: 349 A switch joins a running stacking system after powering up, a behavior known as heap overlay. A. TRUE B. FALSE Answer: A Explanation: Question: 350 In the multi-level RR scenario, the first-level RR will be connected to a large number of second-level R, which may cause the BGP circuit of the first-level RR to overflow from the table Risk of R BGP routing table overflow?( Radio). A. ORF B. Route Control C. Route Aggregation D. Set the same Cluster-ID Answer: C Explanation: Question: 351 ?BGP4+?,Update ????M IP_R EACH_NLRI ?????next hop network address ????? ? Questions & Answers PDF P-109 A. It can be just link-local address B. Can only be a link-local address C. You can carry a link-local address and a global unicast address D. at the same time Can only be a global unicast address Answer: C Explanation: Question: 352 The following description of Link ID, Data, Type, and Metirc in Router-LSA is correct :( Multiple select). A. Metric describes the overhead of this connection B. The Link ID represents the local identity of this connection, and the different connection types The Link ID represents different meanings C. Data is used to describe additional information for this connection, and different connection types describe different information D. Type indicates the type of connection Answer: ABCD Explanation: Question: 353 The following statement about the IS-IS protocol is incorrect? A. The IS-IS protocol is a link-state protocol that runs between AS B. The IS-IS protocol supports CLNP networks C. Messages for the IS-IS protocol are encapsulated directly by the data link layer D. The IS-IS protocol supports IP network ad Answer: A Explanation: Question: 354 The following statement about the OSPFv3 message format is correct?( Multiple select). A. There is no change in the option field of the Hello message B. Remove the Authentication, Auth Type fields C. Hello messages no longer contain address information, carrying Interface lD D. The OSPF version number changed from 2 to 3 Answer: BCD Questions & Answers PDF P-110 Explanation: Question: 355 BGP authentication can prevent illegal routers from establishing neighbors with BGP routers, BGP authentication can be divided into MD5 authentication and Keychain authentication, please ask which BGP messages will be carried below BGPKeychain authentication information?( Multiple select). A. Update B. Notification C. Keeplive D. Open Answer: ABCD Explanation: Question: 356 MPLS is called multiprotocol label switching, and with respect to label descriptions in MPLS, the correct one is ?( Multiple select). A. The MPLS system has a variety of label publishing protocols, such as LDP is a label publishing protocol B. The label is carried by the head of the MPLS message and has a global significance, that is, the label value of all routers cannot repeat C. A tag is a fixed-length, locally only meaningful identifier that uniquely identifies the FEC to which a group belongs D. MPLS supports single-layer tags as well as multi-tier tags Answer: ACD Explanation: Question: 357 During the LDPsession setup process, the active party first sends the Illitalization information to negotiate the parameters, and if the passive party does not accept the negotiation parameters, which of the following messages will be sent? <(Single select).) A. Hello Message B. Error Notification Message C. Keepalive Message D. Initialization Message Answer: B Explanation: Questions & Answers PDF P-111 Question: 358 The following description of IGMPv1 and IGMPv2 is correct?( Multiple select). A. IGMPv2 message types include member departure packets B. IGMPv2 does not support specific group queries C. IGMPv1 supports universal group queries D. The IGMPv1 message type does not contain members leaving the packet AD Answer: ACD Explanation: Question: 359 When configuring the source NAT and having no pat configuration parameters, which of the following statements is true?( Radio) A Perform destination IP address and destination port translation B. Only source P address translation occurs C. Only destination IP address translation occurs D. Simultaneous source P address and source port translation Answer: B Explanation: Question: 360 After you divide an interface of the firewall into the Untrust security domain, the interface belongs to the Untrust zone and no longer belongs to the Local zone. A. TRUE B. FALSE Answer: B Explanation: Question: 361 The firewall has created some security zones by default, which of the following security zones does not exist by default on the firewall?( Radio). A. Internet B. Local C. Trust D. DMZ Answer: A Questions & Answers PDF P-112 Explanation: Question: 362 Which is the correct description of optimal routing election for each protocol in the following options?( Radio). A. Route entries in BGP that are unreachable for the next hop are also placed in the IP routing table. In the B. BGP protocol, the best route to reach the same destination circumference is selected by comparing the cost values of the route entries. C. The OSPF protocol puts all the routing information in the LSDB into the IP routing table. D. From BGP and OSPF, different route entries to reach the same destination segment are learned, and the optimal route is selected to join the IP route table by comparing the protocol's preference value . Answer: D Explanation: Question: 363 In VXLAN scenarios, what features can be turned on to reduce flooding of ARP messages between VTEPs?( Multiple select). A. Host Information Collection B. Local ARP agent C. port isolation D. ARP broadcast suppression Answer: BD Explanation: Question: 364 The following description of ISIS's routed infiltration is correct?( Multi-select) A. ISIS routing penetrates | Can be used in Pv6 environments. B. Route penetration for ISIS can be deployed on Level-1 routers. C. Route penetration for ISIS does not include aggregated routes. D. Route penetration of ISIS does not cause neighbor concussions. E. Route infiltration of ISIS is used to prevent routing loops. Answer: AD Explanation: Question: 365 Questions & Answers PDF P-113 The following statement about the BFD one-arm echo function is correct (multiple choice). A. The BFD one-arm echo function must be configured with local identifiers and carrier identifiers B. The default destination IP address for the protocol message for BFD one-arm echo is 22400184 C. After the BFD one-arm echo function is turned on, the destination IP and source IP of the BFD message are inducted D. BFD One-Arm Echo function is suitable for scenarios where one device supports BDD and the other device does not support Answer: CD Explanation: Question: 366 The following statements about the VRRP protocol are correct (multiple choice). A. Both VRRPv2 and VRRPv3 support authentication B. VRRPv3 does not support authentication, while VRRPV2 does C. VRRPv2 only applies to IPv4 networks, and VRRPv3 only applies to IPv6 networks D. The owner of the Master IP address has a VRP priority of 255, and all configurable priorities range from 0 to 254 Answer: B Explanation: Question: 367 HW users are transferring a very large number of files via TFTP. What protocol does TFTP rely on for transmission? A. ICMP and UDP B. IP ?TCP C. UDP D. NFS E. FTP Answer: C Explanation: Question: 368 When you deploy LLQ, you need to configure bandwidth parameters, what is the significance of bandwidth parameters?( Single choice questions). A. Provides a built-in policer to limit the maximum available bandwidth of a low-latency queue during congestion Questions & Answers PDF P-114 B. The parameter should be as small as possible. It means that the bandwidth is always preserved, and even if the LLQ is set, changing the parameters will reduce the available bandwidth of the interface C. It represents a reference CIR to calculate the burst size D of the built-in tactician token bucket Changing parameters is an option because LLQ always takes precedence over other queues Answer: A Explanation: Question: 369 Assuming that the shaping rate of a port is 10OMbps, the input loans and RIP of P configurations of each service of the interface are as follows: Then after the first round of scheduling, EF How many loans are allocated by the queue?( Single choice questions). A. A. 30M B. 15M C. 90M D. 25M Answer: D Explanation: Question: 370 As shown in the figure, there are two IP6 networks that can access the IPv4 network, and the IPsec tunnel needs to be established between the two IPv6 networks to communicate, which of the following requirements?(). Single choice questions). Questions & Answers PDF P-115 A. ESP + tunnel mode B. AH + transmission mode C. AH + tunnel mode D. None of the above options are correct Answer: A Explanation: Question: 371 Router HW1 and Router HW2 connect Network A and Network B, respectively. As shown in the figure below, if you want to set up an IPsec VPN between router HWI and router HW. (single selection). A. rule permit ip source 1921681.10 destination 1921681.20 B. rule permit ip source 101.1.0000255 destination 1921681.20 C. rule permit ip source 101.1.0000255 destination 101.20000255 D. rule permit ip source 1921681.10 destination 101. 20000255 E. rule permit ip source 101.20 000255 destination 101.1.0000255 Answer: C Explanation: Question: 372 Which of the following options is described correctly for the assertion mechanism?( Radio). A. Winner's election process does not make IP address size a condition of the election B. In the assertion mechanism, the winner is responsible for forwarding multicast data to the broadcast segment C. The assertion mechanism is used for the election of DR D. In the assertion mechanism, the loser will shut down the interface with the broadcast network necklace Answer: B Explanation: Question: 373 Questions & Answers PDF P-116 The BSR/RP mechanism described below describes the correct determination ?( Multiple choice questions). There can be multiple C-BSRs in the A. PIM-SM domain, but only one BSR can be elected. B. BSR collects C-RP information by receiving packets of C-RP C. BSR advertises BSR and C-RP information to all routers in the PIM-SM domain via flood bootstrap messages D. A C-BSR can also collect C-RP information by receiving C-RP packets Answer: ABC Explanation: Question: 374 The following description of LDP reliability is incorrectly ?( Radio). A. LGP GR takes advantage of the high difference between the LS forwarding plane and the control plane to realize that the device forwards without interruption when the protocol is restarted or the master-standby is reversed B. Manually configured LDP FRR policies default to 32-bit backup routes that trigger LDP to establish backup LSPs C. LLDPFRR also allows LSPs to be generated for tag mappings from non-optimal next hops, and as a live LSP backup, supervising forwarding table entries D. LDP and IGP linkage, the need for IGP has been routed to release, to ensure that LDP and LGP path consistent Answer: B Explanation: Question: 375 Regarding the LDP protocol session establishment process, the description is correct? A. When both parties receive a keepalive message from the peer, the LDP session is successfully established B. Hello messages discovered by LDP neighbors use TCP messages with a destination address of multicast address 224002 C. After the TCP connection is successfully established, the active party sends an initialization message to negotiate the relevant parameters of the LDP session, D. The party with the larger transmission address initiates the establishment of a TCP connection as the active party Answer: ACD Explanation: Questions & Answers PDF P-117 Question: 376 RD is used to distinguish between the same IP address in different VPNs, and how many bits (radio) the RD contains A. 64 B. 32 C. 16 D,128 Answer: A Explanation: Question: 377 LDP and IGP linkage refers to the release of IGP and TD routes to ensure that LDP and IGP linkage complete network efficiency, so that KGP and LDP maintains a consistent path, minimizing traffic loss, thereby improving the reliability of the entire network. A. True B. False Answer: A Explanation: Question: 378 Regarding the MPLS handling mode of TTL, the following description is correct? A. Pipe mode. When an IP message passes through an MPLS network, the IPTTL minus l at the entry point is mapped to the MPLS TTL field B. MPLS tags in the TTL, which mean the same as the TTL domain in the IP header. TTL prevents mpLS networks from creating routing loops C. In Unifor mode, when an IP message passes through an MPLS network, the inbound IPTTL is minus 1. The MPLSTTL field is a fixed value D. In MMLSVPI, if you need to hide the structure of the MPLS backbone network, you can use the Uniform mode on Ingress for private network messages Answer: B Explanation: Question: 379 In a network in MPLSVPN, different CE devices can exchange routing information with the same PE device using different routing protocols, and different CE devices can exchange routing information with the same PE The routing protocols used between devices are independent of each other Questions & Answers PDF P-118 A. True B. False Answer: A Explanation: Question: 380 In OSPFv3, Router-LSA is generated by each router, which describes the interface address and cost of the router's links, as well as the RouteriD of the neighbor router. A. True B. False Answer: B Explanation: Question: 381 What is the relationship between CIR, BC, and TC? A. CIR=TC/BC B. CIR=BE/TC C. TC=CIR/BC D. TC=BC/CIR Answer: D Explanation: Question: 382 WRED is configured on the newly deployed router HW The following description of the WRED feature is correct as ?( Multiple select). A. WRED can set different drop thresholds and packet loss rates for packets of different priority B. When traffic exceeds the minimum threshold, WRED starts dropping all ingress traffic (tail drops). C. Avoid global synchronization by selectively dropping multiple TCP streams Low-bandwidth traffic is easier to drop than high-bandwidth traffic Answer: AC Explanation: Question: 383 Questions & Answers PDF P-119 Regarding the FTP protocol, which of the descriptions below is correct? A. In FTP Passive mode, the client completes the initialization of the TCP session for control and data B. In FTP Active mode, the server tells the client which port it expects to send data on by commanding "PORT" C. FTP always uses a TCP session to transmit control information and data information D. FTP always uses TCP port 20 to establish a data session, and ICP port 21 to establish control will always use E. FTP TCP port 21 to establish a data session, TCP port 20 to establish a control session Answer: A Explanation: Question: 384 As shown in the figure, RI, R2 establishes an EBGP neighbor and turns on the BFD detection function, the following statement is correct A. Detection time for BFD packets for AR2 800ms B. R1 Detection time for BFD packets for 1280ms C. R1 Detection time for BFD packets The detection time for BFD packets for 660ms D. R2 is 600ms Answer: C Explanation: Question: 385 Questions & Answers PDF P-120 In the use of the LACP protocol, the following description is correct ?( Multiple select). A. You can avoid the Eth-Trunk interface from frequently shaking interface eth-trunk 1l lacp preempt enable lacp preempt delay delay-time with the following command B. Source IP address load sharing, interface eth-trunk1Load-balance src-dst-ip, can be configured in an enabled link aggregation group with the following command C. The member interface can be removed from an enabled link aggregation group with the following command: interface GigabitEthemeto/0/1 Shutdown nterface Gigabithemet/O/1undo ethtrunklinterface GigabitEthemet0/0/1 undo shutdown D. A chain cluster that can be initiated through an order Join the member interface :interface GigabitEthemeto/0/1 shutdown interface igabitEthemetO/0/1 tunkportGigabitEthermet0/0/1 interface GigabitEthermet0/0/1 Undo shutdown Answer: AC Explanation: Question: 386 The following statement about is the ISIS protocol LSP message is correct A. LSP fast diffusion feature, first diffuse less than the specified number of LSPs, to speed up the synchronization process of LSDB B. By configuring an LSP-generated smart timer, the timer automatically adjusts the delay time based on the frequency of changes in routing information C. When the link status information increases, the message length of the LSP can be increased so that each LSP can carry more information. D. Reducing the minimum time interval for sending LSPs per port can speed up the diffusion of LSPs. Answer: ABCD Explanation: Question: 387 Router RL and Router R2 run BGP both routers are in the AS65234 The router R2 route is present in the BGP routing table of router RI, but not in the P of router R1 road A. With BGP, both routers are in the AS65234 Route cry PD is done by the right big worker B. By the table, so what causes the problem to occur? A, synchronization is turned off C. The B. BGP neighbor relationship is Down C. Router R1 does not enable BGPMulti-hop D Routing is not optimal Answer: D Explanation: Question: 388 Questions & Answers PDF P-121 As shown in the following figure, R1 and R2 establish a neighbor relationship for Level2, which is critical: placed as follows, then the following about The route entry for R2 is correct A. The 0:/64 router appears in the IP routing table B. 2022:/64 Routers appear in the IP routing table c.2019::/64 Routers appear in the P routing table D. 2021:-/64 Router will appear in the P routing table Answer: ABC Explanation: Question: 389 Regarding the OSPFv3 protocol, the following description is incorrect? A. In the case of sharing a single router, each OSPFV3 process runs independently B. In the same OSPFv3 process under the same interface, you can run multiple instances of C. You can support running multiple instances on a single link D. OSPFv3 message header will contain the Instance ID field Answer: B Explanation: Question: 390 The following is correct about the LSA of OSPFv3 Questions & Answers PDF P-122 A. The Link State ID of inter-area prefix-SA, which contains prefix information B. Router-LSA and Network-LSA do not contain routing information C. When the Referenced Link State Type-2 of the Intra-AreaPrefixLSA, referenced Link State ID Contains the interface ID of the DR D. Inter-Area PrefirLSA also contains LinkLocal Information Answer: BC Explanation: Question: 391 Router HW enables OSPF and router HW has the role of ABR and is configured with abr-summary, so which class LSA Will it be aggregated?( Multi-select) (confirmed). A. 1 ?LSA B. 2 ?LSA C. 3 ?LSA D. 4 ?LSA E. 5 ?LSA Answer: AB Explanation: Question: 392 As shown in the figure, a company sets up an OSPF network. The links in the figure all form OSPF adjacencies, and all OSFP devices declare their own loopback addresses. One day SIR2 The two links of the S2AR1 suddenly failed, and in order to detect if the network was operating properly, the engineers performed a device status check, which is correct as described below A. R5 can normally learn the loopback route to R2 B. R3 can not learn the loopback route to R2 C. R1 can normally learn the loopback route D. R3 of R2 The loopback route of R2 can be learned normally Questions & Answers PDF P-123 Answer: AB Explanation: Question: 393 The interface Serial0 of an existing router is in OSPF area 1, and the interface Serial0 is set to Silent interface. So what kind of impact will this setting have A. OSPF establishes available adjacencies through this interface B. OSPF does not add routes learned from the interface to the local routing table C. OSPF does not establish any neighboring relationships through this interface D. OSPF receives routing updates from neighbors Answer: C Explanation: Question: 394 The Option field in OSPEv3 appears in all LSAs A. True B. False Answer: B Explanation: Question: 395 As shown in the following topology, EBGP is running between ASI0O0, AS.203, AS.30, AS8400, and the neighbor relationship has been established as RECEIVed by AS4O0 When AS1OO issues a 1..11/2 CIDR segment BGP route, the path order recorded in the ASPath attribute is correct Questions & Answers PDF P-124 A. 10,200,3 B. 400,300,200,100 C. 100,200,300,400 D. 300,200,100 Answer: D Explanation: Question: 396 What kind of scenario can use AS-path-filter?( Multiple select). A. A Filters routes received from BGP neighbors based on the AS PATH attribute carried by the route, such as the command peer X.x.x.x as path-filter import B. The apply clause in Route policy C. Filter routes sent to BGP neighbors based on the AS PATH attribute that the route carries. For example, the command peer x.x.x.x as path-filter export D. The if-match clause in Route-policy Answer: ACD Explanation: Question: 397 In the following topology diagram, R1 can be established between R2 and R3 fetches the Internet, RI and R2, R1 and R3 EGP connections, R2, R3 belong to the same AS The default routes are issued through BGP separately, requiring R2 to be preferred for traffic accessed by RI to the Internet, and the following practices can be achieved A. R1 specifies that peer R3 sets the MED property to 150 in the import direction B. R2 specifies that peer R1 is in export The direction setting local priority is 150 C. R2 specifies peer R1 in the export direction setting MED property to 150 Questions & Answers PDF P-125 D. R1 specifies the peer R2 sets the local priority in the import direction to 150 Answer: AD Explanation: Question: 398 The existing router HWl running BGP is configured with both IBGP neighbors and EBGP tenants. The following descriptions about IBGP Neighbors and EBGP Neighbors are correct? A. The router will have an EBGP BGP neighbor from it must be connected directly, otherwise, IBGPMulti-hop must be configured B. The router sends BGP updates learned from its EBGP neighbors to its other IBGP neighbors and EBGP neighbors C. IBGP neighbors can establish neighbor relationships through the Loopback interface D. The router sends BGP updates learned from its IBGP neighbors to its other IBGP neighbors and EPGP neighbors E. EBGP neighbors must be directly connected, otherwise, EBGP-Multi-hop must be configured with Answer: BCE Explanation: Question: 399 As shown in the figure, in the context of IPv4 and IPv6, the SEL field in the NET address of the ISIS is always valued as 00? A. True B. False Answer: A Explanation: Question: 400 In an IPv6 network, two nodes A and B are neighbors to each other if node A sends to node B NS message, if Node B receives the message and then replies to the NA message, then on Node A On the view, the neighbor status will be marked as What? Questions & Answers PDF P-126 A. Reachable B. Incomplete C. Constant D. Probe Answer Answer: A Explanation: Question: 401 In an MPLS BGPVPN environment, if tags are distributed only through BGP and LDP, the MPLS tags of the message can be up to two layers of tags A. True B. False Answer: A Explanation: Question: 402 Off-stem cross-domain VPN-Option B scenario, the following description is incorrect? A. During the packet forwarding process, it is necessary to exchange the VPN's private network LSP on the B. two ASBRs IP-EBGP neighbor relationships. C. The cross-domain VPN-Option B scheme is not limited by the number of interconnection links between ASBRs D. The outer layer tag is exchanged between two ASBRs to vpnV4 routes. Answer: D Explanation: Question: 403 Huawei's two switch SWA, SWB is connected together through 7 Ethernets, and static route aggregation is configured, and the corresponding ports on the switch SWA are E1/0/1, E1/02, E1/0/3, E1/0/4, E1/ 0/5, E1/0/6, E1/0/7, configured sequentially as if switch SWA, SWB Each aggregation group supports only 6 ports. A. With the same configuration across ports, the Ethemet 1/0/7 port is the aggregate group Unselected port B. With the same configuration of each port, the Ethemet 1/0/6 port is the aggregate group Unselected port C. With the same configuration of each port, SWA randomly selects one of the 7 ports as the Questions & Answers PDF P-127 aggregate group Unselected port D. With the same configuration of each port, the Ethemet1/0/1 port is the aggregation group Unselected port Answer: A Explanation: Question: 404 What command can be used to prevent users from accessing multiple devices through the HUB on the switch's access port?( Radio). A. [Huawe interface Gigabithemeto/0/1[Huawei-GigabiEthermeto/O/lport linktypetrunk [HuawelGigabithemetO/1]port trunk allow pass vlan 10 B. [Huawei interface GigabiEthemet/0/1[Huawe-GigablEthemetO/0/1Jpor ink type acess(Huawei GigabitEthemet/O/Tipsg enable C. Huawei interface GigabiEthemetO/0/1Huawei-GigabiEthemetO/OJport link-type acces Huawei GigabilEthemet/0/1port-secunty enable0 D. [Huawei iterface Gigabithemeto/0/1 (Huawei-GigabitEthemeto//1)pot ink type access(Huawel-CigabiEthemeto/1]portisolate enable Answer: C Explanation: Question: 405 Router RL runs the OSPF protocol and uses the display ip routing-tabe command to view the router RL's routing table , the following information about OSPF in the routing table is described correctly as ? A. In the routing table, the routing table entries identified by the OSPF identifier can only be learned through the 3 types of LSAs to B. In the routing table, used The 'OSPF' identifier identifies a route table entry that can only pass a Type 1 LSA C. In the routing table, the routing table entries identified with the 'OSPF identifier' can be learned through the 1/2/3/5 LSA to D. In the routing table, Route table entries identified with the "O_ASE identifier can only be learned through routing introduction Answer: D Explanation: Question: 406 Regarding the BGP ring protection mechanism, the following description is correct? Questions & Answers PDF P-128 A. A AS_PATH attribute is used between autonomous systems to prevent ring cats. B. The Cluster List property is used for reflector cluster inner ring defense, and the router finds that the Cluster List of route entries contains its own Client lD The route is rejected C. Routes learned from IBGP are not advertised to IBGP neighbors and are used to prevent routing loops inside the AS D. You can use the AS_CONFED_SET attribute to prevent loops within a consortium: Answer: ACD Explanation: Question: 407 Regarding route Policy, the following description is correct as ?( Multiple selection) Multiple selection A. Advanced ACLs can be applied in route-policy to filter routes B. The table entry exceed::0 less-equal 128 indicates that all IPv6 routes are allowed through C. If more than one node is defined in Route-policy, at least one node in each node should have a matching pattern of permit D. Route-Policy can filter only the default route Answer: BCD Explanation: Question: 408 The correct description of the scene shown in the following figure is: A. LSDB B. R1, which exists in both Level-1 and Leve-2, can ping the interface address of R2 loopback0 C. R there is a route to R2 loopback0 10022/32 D. No neighbor relationship can be established between R1 and R2 Questions & Answers PDF P-129 Answer: ACD Explanation: Question: 409 The following is the correct description of the aggregation of BGP (radio). A. After you configure the Aggregate ipv4-address mask, only aggregate routes are published, not detail routes. B. For IPv6 routing, BGP supports manual aggregation and automatic aggregation. C. BGP enables automatic aggregation by default. D. Routes in the BGP local route table can be manually aggregated. Answer: D Explanation: Question: 410 The following about BGP routing, describing the error, is ? A, non-aggregate routes take precedence over aggregate routes B. In PrefVal, Local_ Preference is equal to the case if the route is generated locally, IBGP Routing, the BGP preference for EBGP routing, is generated effectively referring to route priority. C. See the following entry in the BGP routing table:* 172161.11/32 000010 0? Indicates that the route is available non-optimal D. For next_hop unreachable routes when invalid routes, do not participate in the preferred. Answer: A Explanation: Question: 411 The following description of Filter-Policy is correct?( Radio). A With Filter-Policy, on ASBR in OSPF, type5LSA and type7LSA can be applied The build is filtered. B. Prefix lists can be used to filter both routes and packets. C. Filter-policy filters the link state information received or published, and can modify the properties of route entries. D. When filtering routes using the pre-slow list, the table entry ip-prefxldeny0000 0 lese-qual 32 indicates that only the default route matches Answer: C Explanation: Question: 412 Deploying the ISIS protocol in an IPv6 environment is true in the following statement (radio). A. By default, the DIS priority of broadcast network interfaces at Level-1 and Level-2 is 1 B In Questions & Answers PDF P-130 broadcast networks, the DIS priority for IPV4 and IPV6 can be set separately C. In the same broadcast network. If each router supports both IPV4 and Pv6, the DISC of JPV4 and Pv6 must be the same device D. IS-IS sient is configured under the finger port, this interface will not send ISIS packets, but will receive ISIS packet Answer: C Explanation: Question: 413 When the IPv6 address of a host is configured with a stateless address configuration, and other parameters other than the address are obtained through DHCPv6, how to set the M and 0 bits in the RA message ? A. M=10=1 B. M=10=0 C. M=1 0=0 D. M=00=1 Answer: D Explanation: Question: 414 As shown in the figure, in the HUB & Spoke networking mode of MPLS BGPVPN, in order to achieve the division can only communicate with the headquarters, the division can not communicate with each other When setting up RT, which of the following scenarios is this?( Radio). A???:import Target:12:3EpodTarget:12:3 B. Headquarters: importTarget:1:1EpodTarget:3:3 C. Headquarters: Impot Target:2:2; Expor Target:3:3 D. Headquarters: importTarget: 12:3EpodTarget: 3:12 Answer: D Explanation: Question: 415 Questions & Answers PDF P-131 The following statement about IPSec VPN is correct A. Brutal mode can support NAT traversal, while main mode does not support NAT traversal. B. The two routers establish IPSecVPN in main mode, and from the 5th message (included), the payload's data is often encrypted. C. Two routers establish an IPSec VPN in brutal mode, so that the tunnel is built with a minimum of 4 messages interacting between the two devices. D. The two routers can establish an OSPF neighbor relationship through the IPSec VPN (19) channel and exchange intranet devices by Answer: BD Explanation: Question: 416 For Layer 2 VPN technology, the following statement is correct? Multi-select A. VPLS is a widely used technology in the live network, which can provide transparent transmission of three-layer messages and achieve multi-point access. B. The VPLS configuration is complex and the Layer 2 network transmits BUM packets. C. BGPEVPN supports features such as tenant isolation, Multi-homing, and broadcast suppression. D. BGPEVPN addresses mac address drift and multi-tenancy that VPLS cannot support. Answer: BC Explanation: Question: 417 How do 8021w and 8021D handle BPDUs?( Confirmed) The A. 8021D bridge only forwards BPDU packets received from the root bridge B. The 8021D bridge does not forward BPDU messages C. The 8021w bridge forwards only BPDU packets received from the root bridge D. 8021w Bridge does not forward BPDU packet Answer: A Explanation: Question: 418 In a network, the same gigabit running S and OSPF anti-tampering and fluttering as shown in the figure, on the two border routers RTB and RTC are introduced into the wine route, the device question is to use gigabit one port strobe, , 222 The network is introduced into the OSE via impotrote direct on the RTD, assuming that all other configurations are dead default configurations, then the description of this network is wrong ? Questions & Answers PDF P-132 A. Adjusting the ISIS priority to 160 on the RTB avoids suboptimal routing problems in the network. B. On the RTC, the following configuration is adopted, only the routes of the 2222/32 cinder segment can be filtered out when routing is introduced, IRTClip ip-prefix 10 index 1 deny2000 8 lessequal 32 C. RTB learns that the routing next hop for the 2222/32 network segment is RTA D. The following configuration can filter out the routes of the 2222/32 CIDR block of the white RTD when RTC introduces OSPF routes. Answer: B Explanation: Question: 419 There is an As-path-filter.ip as-path-filter 1 permit*(100l400) $, which As-path-filter can match which of the following AS_PATH Attribute?( Confirmed). A. 300 4200 B. 1234 1400 C. 3100 D. 100 Answer: BCD Explanation: Question: 420 Is the following description of the OSPFv3 message correct? A. The interface ID of the sending interface must be included in the A Hello packet B. The LSACK message contains LSA header information to confirm the receipt of LSU packets C. The LSR message contains the complete LSA header information for requesting an update to the Questions & Answers PDF P-133 LSA D. Hello messages and the Option field for DD messages extends to 24-bit Answer: ABD Explanation: Question: 421 As shown in the figure, all routers declare the loopback address in OSPF where the R storage does not return address is 1022 [2 declares 10033[ at the Ael.R3 ring E port[ 92101102A External routing in order to win light R win L away from the negative cut. The noodle command is as follows: (multi-select) [BIppprefixt permlt 1001.1.024 [R1] ospf1 A. router RI of the IP routing table, there is no external route to 1001.1.0/24 of B. router R1 In the IP route table, there is an external route to 1001.1.0/24 C. In the IP routing table of Router R1, there is no loopback route to D. In the IP routing table of Router R1, there is no loopback route to R3 Answer: ACD Explanation: Question: 422 The following description is correct regarding route control A. IBGP routes can be introduced using the impot-route BGP command B. AS-path-fiter is for AS-path, which affects the routing of paths. C. OSPF, ISIS, and BGP can issue default routes. D. In Node 10, if-match community-fiter1 and f-match as-pah-fiter1 are "and the relationship Answer: BCD Explanation: Question: 423 The following statement about VXLAN gateways is incorrect Questions & Answers PDF P-134 A. Layer 2 gateway: Used to solve the problem of tenant access to the VXLAN virtual network, it can also be used for subnet communication of the same VXLAN virtual network. B. Layer 3 gateway: Used for cross-subnet communication of VXLAN virtual networks and access to external networks. C. VXLAN Layer 3 gateways can be divided into centralized gateways and distributed gateways. D. Layer 2 gateway and VPN instance binding. Answer: D Explanation: Question: 424 The following description of the attributes of BGP is correct? Radio A. The AS number of the adjacent AS, ranked to the far right of the list of AS_Path in the BGP route entry. B. When a BGP Speaker publishes a route learned from an EBCP peer to an IBGP peer, it does not change the next hop attribute of that routing information. C. Local_Pref is valid only between EBGP peers and is not advertised to third-party AS D. A route can have only one community attribute value. Answer: B Explanation: Question: 425 Regarding the BGP alliance, the following description is wrong? Radio A. The consortium divides an AS into sub-AS, and the alliance external AS still considers the consortium to be an AS B. Subsystems within a consortium can use private AS numbers. Huawei NE/AR routers, a consortium can be configured with up to 32 subsystems. C. Consortium can easily detect the routing loop within the AS because EBGP is running between the subAS D. The subas number of the federation, which by default is advertised to the BGP peer outside the federation Answer: D Explanation: Question: 426 When the ABR is a type 5/7 LSA switch router for the NSSA zone, then the ABR can be paired to Category 7 LSA is a derivative of 5 LSAs for aggregation. Questions & Answers PDF A. B. P-135 True False Answer: A Explanation: Question: 427 What messages does an NMS (Network Management Station) running SNMPV1 send to the agent? A. Trap,Get ? Set B. Get, Set ?Getnext C. Get,Set,Getnext ? GetBulk D. Get,Set ? GetBulk E. ? Trap Answer: B Explanation: Question: 428 As shown in the figure, three switches SI, SN2, and SN3, where SN1 is the root bridge between S1 and SN2 Now that link support SN2 cannot receive the configuration BPDU sent by the root car, the administrator needs to configure which spanning tree protection mechanism to prevent the problem of link congestion? A. root protection B. Anti-TC-BPDU attack C. BPD protection D. Loop protection Questions & Answers PDF P-136 Answer: D Explanation: Question: 429 In order to reduce the number of OSPF routes in certain areas, the OSPf protocol has developed special area functions, and the following description of the characteristics of OSPF special areas is correct A. ASBR-Sunmary-LSA is allowed to be published to the NSSA region B. AS-External-LSA is allowed to be published to the Stub region C. Any OSPF zone can be configured as a special zone D. Zone can be equipped with zhiyi Answer: D Explanation: Question: 430 When the ACL in the VRP has multiple matching rules (rules), the matching order is about Which of the following statements is true?( Confirmed). A. By default, matching is based on the principle of "depth first" B. By default: Match in the order in which the perfect is matched first, then deny is matched. C. By default, rule-ID is followed Match from small to large D. There is only one matching order and cannot be modified Answer: C Explanation: Question: 431 Regarding how the device handles messages in the MPLS network model, what is the following description of the error? A. The label forwarding path LSP is determined and established by various protocols during the forwarding of messages. There is certainly no stripping of the label on the B. LSR. Both C. LER and LSR are labeled. D. For IP packets entering the MPLS domain, the device discards them. Answer: A Explanation: Question: 432 The topology diagram and configuration are as follows, and now we hope that there is no buttoned route entry of 10033/32 in the Rl route table Questions & Answers PDF P-137 A. Configure route summarization on R3 to summarize the routes to 10000/16 B. Configure route rollup on R2 to summarize the route as 10000/16 C. Configure filter-pollcy on top of R1 with 10033/32 via ACLL. Also applied in the Import direction D. Configure flter-policy on the above, match 10033/32 through ACL, and apply the answer in the expo direction Answer: A, C Explanation: Question: 433 What check frames can IPSG set? A. Out of the interface B. MAC address C. IP address D. VLAN ID Answer: BCD Explanation: Question: 434 By default, which of the following security MAC address types lose table entries after the device restarts? Questions & Answers PDF P-138 A. Sticty MAC address B. Black hole MAC address C. Secure static MAC address D. Secure dynamic MAC address Answer: D Explanation: Question: 435 BGP routing policies can control the publication and acceptance of routes A. TRUE B. FLASE Answer: A Explanation: Question: 436 A router Router LSA is shown in the figure below, and the following statement is incorrect? A. This router is a DR B. This router has established an adjacency relationship C. This router supports external route ingestion D. The Router ID of this router is 100121 Answer: A Explanation: Question: 437 The command to adjust the LINK cost value for the IS-IS interface is ?( Radio) A. ISIS cost B. ISIS timer hello C. lSIS circuit type Questions & Answers PDF P-139 D. ISIS circuit level Answer: A Explanation: Question: 438 Configure the ipv6 preference under the IS-IS protocol view, the role of this command is to configure the priority of the Ipv6 protocol generated by the IS-IS protocol A. TRUE B. FALSE Answer: A Explanation: Question: 439 Between two directly attached devices that have established an IBGP neighbor, execute the shutdown command to close the interface of one of the devices. The BGP connection is not immediately disconnected. A. TRUE B. FALSE Answer: A Explanation: Question: 440 ipv6 link-local addresses can be generated through stateless autoconfiguration A. TRUE B. FALSE Answer: B Explanation: Question: 441 IGMP SSMMapping is bound to multicast through a static multicast source, so that members of IGMPv1 and IGMP2 can also access the SSM multicast network. The following statement about IGMPSSMMapping is wrong?( Radio). A. The multicast address of the SSM is 232000~232255255255 B. IGMP SSM Mapping does not process reporting messages from IGMPv3 In order to ensure that the Questions & Answers PDF P-140 same network segment runs any version C. IGMP hosts can make SSM services run IGMPv3 on the multicast router socket connected to the network segment where the member host is located D. If the IGMP SSM Mapping feature is not enabled, neither IGMPv1 nor IGMPv2 supports multicast for deploying SSM modules Answer: B Explanation: Question: 442 SSH uses asymmetric encryption algorithms AES and DES to achieve security for data transmission, and uses HMAC to ensure the complete integrity of integer data A. TRUE B. FALSE Answer: A Explanation: Question: 443 What is the security level for untrust zones in the USG Series firewalls? ( Radio). A. 50 B. 5 C. 10 D. 15 Answer: B Explanation: Question: 444 Firewall security policies have the condition for traffic matching to be ?( Multi-select) A. apply B. Source item security zone C. Source item IP address D. Message length Answer: ABC Explanation: Question: 445 Questions & Answers PDF P-141 When an administrator configures VRRP, which of the following is not required? A. Preemption mode B. Priority of the virtual router C. Preemption delay D. Virtual IP address Answer: ABC Explanation: Question: 446 In different scenarios, RSTP provides different protection functions, and the wrong statement about this statement is A. The root protection feature is enabled for the specified port, and its port role can only remain as the specified port B. When the anti-TC-BPDU packet attack feature is enabled, the number of times the switching device processes IC BPDU packets per unit time is configurable C. after the BPDU protection function is enabled on the switching device, if the edge port receives RST BPDU, the edge port will be set to a non-remote port and the spanning tree calculation will be re-performed D. Start the specified port of root protection, when the port receives a better RSTBPDU, the port will enter the Discarding state and is no longer forwarding packets. If the port does not receive a better RSTBPD for a period of time then automatically revert to the normal Forwarding state Answer: C Explanation: Question: 447 An engineer used 2 routers to test IPv6 services and simulated the interconnection between headquarters and branches by running BGP4+. The network logic topology is shown in the figure, regarding the delivery of IPv6 routes between two devices, which of the following statements is wrong? A. When a route is passed, it carries a recognized mandatory attribute such as AS_Path B. BGP4+ passes routing information between peers via Update packet C. When routing is passed, Questions & Answers PDF P-142 the Next_Hop attribute must be an IPv6 global unicast address D. If the Update message carries the MP_REACH_NLRI attribute, it means that the advertisement is reachable route Answer: C Explanation: Question: 448 When you deploy BGP/MPLSIPVPN, when two VPNs have a common site, the common site must not use overlapping address spaces with the other sites of the two VPNs. A. TRUE B. FALSE ?:B The series description for configuring static lSPs in MPLS networks is correct? 499 A. When an LSR is Ingress LSR, only configure Out Label, which ranges from 16-1048575 B. When an LSR is a Transit LSR, you need to configure both In Label and Out label, both in the range of 16-1023 C. When an LSR is TransitLSR, you need to configure both ln Label and Out Label, both of which are 161023 The Out Label ranges from 16 to 1048575 D. When an LSR is An Egyptian LSR, only in Label needs to be configured, ranging from 16-1023 Answer: BD Explanation: Question: 449 S-4S supports multi-instance and multi-process, that is, on an IS-IS router, multiple VPN instances can be configured to associate with multiple IS-S processes, the following description of IS-IS multiinstance and multi-process, which are correct ? A. If an IS-IS router creates multiple IS-IS processes, each process is independent of each other B. 1 IS-IS processes can only be associated with 1 VPN instance C. 1 IS-IS processes can be associated with several different VPN instances D. 1 VPN instances can be associated with several different IS-IS processes Answer: ABD Explanation: Question: 450 Which of the following descriptions of MPLS header TTL are correct? A. Copy IPTIL value is handled in such a way that the LSR of the MPLS domain is hidden, which plays a certain security role B. Can prevent wireless circular forwarding of messages Questions & Answers PDF P-143 C. MPLS has two ways of handling TTL, one is that the IP packet copies the PTTL of the MPLS header hen it enters the MPLS network Value; Another is to set the TTL of the MPLS header to 255 at the entrance LER D. When copying TTL is disabled, tracert can see the LSR of the passing MPLS domain Answer: BC Explanation: Question: 451 Regarding the tag space for MPLS, the description is incorrect A When the penultimate hop LSR performs a label swap, if the swapped tag value is found to be B. the tag is popped up by default and the message is sent to the last hop C. Above 1024 is the tag space shared by dynamic signaling protocols such as LDP, RSVP-TE, MP-BGP, etc D. 16-1023 is a label control shared by static LSPs and static CR-LSPs Answer: B Explanation: Question: 452 The following statement about ISIS (IPv6) is correct? A. In order to support the processing and calculation of IPV6 routes, IS-IS has added TLV232, 236 B. By default, IS-IS has the multi-topology feature turned on C. IS-IS works at the data link layer and only needs to add a new TLV to support IPv6 D. To support the processing and computation of IPv6 routes, IS-IS has added NLPID to the 129TLV Answer: ACD Explanation: Question: 453 When the load is an ICMPv6 message, what is the numeric value of the Next Header field in the IPv6 header if the presence of an extended header is not taken into account? A. 58 B. 78 C. 55 D. 68 Answer: ACD Explanation: Question: 454 Questions & Answers PDF P-144 QinQ technology is a technology that extends the VLAN space by adding a layer of 8021Q tag messages to the extended VLAN. The function of space, the following statement about QInQ is mispronounced? A. basic QinQ is implemented based on the interface orientation B. QinQ increases the number of VLANs to 4095*4095 C. Flexible QinQ can be based on different inner layerS Tag and different outer layers of Tag, for user VL The division of AN is more granular D. QinQ technology enables private VLANs to pass through the public Network Answer: B Explanation: Question: 455 Traditional BGP-4 can only manage IP4 unicast routing information, and MP-BGP extends BGP-4 to provide support for multiple network layer protocols. Among them, MP-BGP's support feature for IPv6 unicast networks is called BGP4+, BGP4+ via NextHop The route next hop address information is carried by the attribute. A. TRUE B. FALSE Answer: A Explanation: Question: 456 OSPF fast convergence is an extended feature to improve the convergence speed of routing, in which PRC works by speeding up routing computation by performing path calculations only on the affected nodes when the network topology changes. A. TRUE B. FALSE Answer: B Explanation: Question: 457 The router port to which the policy is applied has been idle for about 10 seconds, and there is a huge burst of c1 type coming in an instant, so how many bytes will the packets that are colored green? A. 256K bytes B. 48128 bytes C. 32K bytes Questions & Answers PDF P-145 D. 80128 bytes Answer: C Explanation: Question: 458 In ospf broadcast networks, there are 4 routers RTA, RTB, RTC, and RTDs within the same network segment The DR priorities are 2, 1, 1, and O, and the Router ID is respective 1921681.1, 19216821, 19216831, and 19216841 If the OSPF protocol is enabled on both of these four routers, ospf selects the BDR as A. RTB B. RTC C. RTD D. RTA Answer: B Explanation: Question: 459 In an MPLSVPN network, when a packet enters the Internet and is forwarded, it is encapsulated with two layers of MPLS tags, and the processing of the packet in the following options is described correctly? A. The penultimate hop device receives packets with an outer label of 3 B. The Egress PE appliance receives an UNlabeled IP packet C. The Egress PE device correctly sends packets to the appropriate VPN D. based on the inner tag The packet pops up the outer label on the penultimate hop device and forwards it to the Egress PE device Answer: ACD Explanation: Question: 460 There are three port roles defined in RSTP, with alternative ports and backup ports flags in STP messages The port role values within the fields are consistent, all of which are 01 A. TRUE B. FALSE Answer: A Explanation: Questions & Answers PDF P-146 Question: 461 If four routers run ISIS and have established an adjacency relationship, and the area code and router rank are marked as shown in the figure, what is the cost value of R4 reaching 10022/32? A. 10 B. 20 C. 30 D. 40 Answer: C Explanation: Question: 462 OSPFv2 is an IGP running on an IPV4 network; OSPFV3 is an IGP running in an IPV6 network IGP, OSPFv3 in the network has a similar LSA type compared to OSPFV2, but the functionality is slightly different, osPFv3LSA type does not include which of the following? A. Router-LSA B. Network-LSA C. Asbr-summary-LSA D. AS-external-LSA Answer: C Explanation: Question: 463 Questions & Answers PDF P-147 In order to study the working mechanism of the OSPFv3 protocol, a project to build a network topology is as follows, the configuration of R1 and R2 is as follows, please ask the LSA switched between R1 and R2 What are the types? A. network-LSA B. Router-LSA C. Link-LSA D. Inter-area-prefix-LSA Answer: ABC Explanation: Question: 464 0SPFV2 is running on the IPV4 network IGP: OSPF3 is running in the IPV6 network, OSPF35 OSPFV2 has the same message type. Includes hello messages, DOD messages, LSR messages, LAU messages, and SAX messages about OSPP The following statement is correct? A. The hello packet of OSPFv3 carries the IPV6 address prefix of the router interface B. OSPFv3 uses the authentication field of the packet header to complete the packet authentication C. OSPFv3 uses the link-local address as the source address for sending packets, which can be forwarded outside the range of the originating link D. OSPFv3 sends OSPFv3 packet using the IPV6 multicast addresses FF02::5 and FF02 Answer: D Explanation: Question: 465 Among the routing policy tools commonly used by BGP, which ones can be used to filter routes? A. filter-policy B. Route-policy C. lp extecommunity-filter D. Traffic-policy Answer: ABC Explanation: Question: 466 With an existing network running OSPF, what types of LSAs cause ISPF operations? A. 2 ?LSA B. 3 ?LSA C. 1 ?LSA Questions & Answers PDF P-148 D. 5 ?LSA E. 4 ?LSA Answer: AC Explanation: Question: 467 The multicast protocol that can generate multicast distribution trees is ? A. IGMPv2 B. BGP C. OSPF D. PIMV2 Answer: D Explanation: Question: 468 What is correct about the multicast message forwarding? A. RPF check failure indicates that the multicast data packets are received from a suboptimal interface, but the interface still receives multicast traffic and forwards it downstream B. IGMP snooping function can not control the range of multicast traffic in the Ethernet flood C. In the multicast transmission mode, the destination address of the message can specify the location of the receiver D. The source address of the multicast message is the unicast address Answer: D Explanation: Question: 469 When two devices with the same priority compete for the master role at the same time, the device on which the interface with the smaller IP address resides should be selected as the master device A. True B. False Answer: B Explanation: Question: 470 Man-in-the-middle attacks or IP/MAC spoofing attacks can lead to information leakage and other Questions & Answers PDF P-149 hazards, and are more common in the intranet, in order to prevent man-in-the-middle attacks or IP/MAC spoofing attacks, you can take the configuration method A. Enable DHCP snooping to check the chaddr field in a DHCP request message B. Configure the trusted/untrusted interface C. Configure DHCP snooping on the switch to interbolde with DAI or IPSG D. Limit the maximum number of MAC addresses allowed to be learned on the switch interface Answer: C Explanation: Question: 471 The switch role in the stacking system does not include ? A From the switch B. Candidate Switch C. Standby Switch D. Primary Switch Answer: B Explanation: Question: 472 A VRRP virtual router configuration VRID is 3 and the virtual IP address is 100 1. 1. 10, so what is the virtual MAC address? A. O0-00-5E-00-01-64 B. 01-00-5E-00-01-03 C. 01-00-5E-00-01-54 D. 00-00-5E-00-01-03 Answer: D Explanation: Question: 473 When the BFD detection intervals on both ends are 30ms and 40ms, are the following options described correctly? An A. BFD session can be established, which takes 40ms after negotiation A B. BFD session can be established, which takes 30ms after negotiation C. BFD sessions can be established, each occurring at its own interval l D. BFD sessions cannot be established Answer: C Explanation: Question: 474 Questions & Answers PDF P-150 The most effective way to view device warnings through the CLI is ? A. Display alarm B. Display current-configuration C. Display interface brief D. Display clock Answer: A Explanation: Question: 475 Regarding the description of the hello message in the PIM-SM message, the error is ? A. Hello messages are sent to multicast address 224005 B. Elect dr in multiple router segments with hello messages C. Routers periodically use hello messages to stay in touch D. In a PIM-SM network, a newly started multicast router needs to use hello messages to discover neighbors and maintain neighbor relationships Answer: A Explanation: Question: 476 The correct statement about the IGMP proxy is ? Multi-select A. The downstream interface of the IGMP proxy device generates multicast relay table items B. IGMP proxy can detect the link status with the linkage through the information of the member host joining/leaving the multicast group, and realize the rapid switching of the primary and standby device links C. IGMP proxy is typically deployed on devices between hosts that are members of the access device The D. IGMP proxy device cannot send query messages to downstream member hosts in place of the IGMP queryer to maintain group membership Answer: ABC Explanation: Question: 477 When deploying BGP/MPLS IPVPN, OSPF's VPN route tag is not present The extended properties of MP-BGP are passed only locally, only locally, and only meaningful on routers that receive MP-BGP routes and generate OSPF LSAs. Questions & Answers PDF P-151 A. TRUE B. FALSE Answer: A Explanation: Question: 478 : :1/128 is the IPV6 loopback address A. TRUE B. False Answer: A Explanation: Question: 479 What are the types of link types included in OSPF's route LSA? A. Stubnet B. P-2-P C. VLINK D. Fransnet Answer: ABCD Explanation: Question: 480 The following description of BGP ring protection is correct A. The BGP router does not announce any updates from the EBGP peer to other EBGP peers B. BGP routers that are not RR do not announce any updates from the IBGP peer to other IBGP peers C. Any routing information from the IBGP peer is advertised to the other IBGP peers D. , through the AS-path attribute, discard any update information received from the EBGP peer that contains its own AS number in the AS-path attribute Answer: BD Explanation: Question: 481 Vxlan is based on UDP encapsulation, which encapsulates Ethernet data frames on top of UDP in IP Questions & Answers PDF P-152 packets, so it is called MAC in UDP encapsulation A. True B. False Answer: A Explanation: Question: 482 MPLS does not enable the secondary unsubject pop-up, the penultimate hop label can be the same as A. TRUE B. FALSE Answer: B Explanation: Question: 483 The message types of ISIS mainly include SNP, IIH, and LSP A. True B. False Answer: A Explanation: Question: 484 The Serial Number field of LS is used to detect expired and duplicate LSAs. The field is a 32bt signed integer, so the small serial number is Ox8000000 A. True B. False Answer: B Explanation: Question: 485 The link quality of a company's network is poor, often failures lead to route oscillation, and even occasionally there are routing loops, in order to prevent the recurrence of these phenomena, the network administrator decided to deploy URPF in the whole network to improve the stability of the network Questions & Answers PDF P-153 A. True B. False Answer: A Explanation: Question: 486 D Class IP address range 239000-239255255,What does 255 do? Radio A. SSM multicast address, the multicast address segment is valid for the whole network B. Any legitimate multicast traffic and multicast application can adopt this address C. Locally managed multicast address, which is valid only locally D. Link-local multicast address, where traffic that uses that address includes network control messages and that address range is only the multicast address segment used by the E. routing protocol Answer: C Explanation: Question: 487 What are the benefits of using WRED?( Multi-select) A. Provides some low latency B. Avoid TCP global synchronization C. Avoid congestion completely D. Provides a small bandwidth guarantee E. Can avoid UDP occupying most of the bandwidth when congested Answer: C Explanation: Question: 488 In an Hw IP multicast network—which of the following multicast features are associated with (*, G) table entries? ( Multiple select) A. Dense mode B. Source tree C. Sparse mode D. PIM bidirectional E. Share the tree F. Dense Tree Answer: CDE Questions & Answers PDF P-154 Explanation: Question: 489 If the receive cache of a switch's gigabit Ethernet interface is full, what protocol does the switch use to know that the remote interface delays sending data frames for a period of time? A. 8023af B. 8021U C. 8021D D. 8023 E. 8023Z Answer: E Explanation: Question: 490 There is an existing router running OSPF HWL, HW1 interface serial0 is published in zone 1, configure commands under the OSPF process nssa default-route-advertise, based on the previous description, infers which of the following options are correct? A. When HW1 injects a default route into Zone 1, HW1's local route table can not contain a single default route B. HW1 injects a Type 7 default route into Zone 0 C. HW1 injects a type 7 default route into zone 1 D. HW1 injects a Type 3 default route into Zone 1 E. When HW1 injects a default route into zone 1, HW1's local route table needs to answer the default route Answer: CE Explanation: Question: 491 The following description of CBWFQ is correct? A. CBwFQ can be configured with MQC and service-policy is applied to the exit direction B. CBwFQ can be used for both egress and inbound interfaces C. CBwFQ is delayed, jittered and bandwidth guaranteed for traffic catch D. CBWFQ can only be configured in hierarchical policies-maps. The parent policy-map performs supervision and the child policy-map performs Answer: A Explanation: Questions & Answers PDF P-155 Question: 492 In an HW MPLS network, what parameters are used to define a forwarding equivalent class?? A. BGP MED ? B. IP prefix C. RSVP requests resource reservation D. from CE Layer 2 links Answer: BD Explanation: Question: 493 In which of the following cases, RSTP refreshes the MAC address table?( Multi-select) A. When the port state transitions from Forwarding to Disking B. Only when the port state transitions from Listening to Disccarding C. When a topology change notification is received D. When the status of a port changes E. CE when the port state transitions from Disking to Forwarding Answer: C, E Explanation: Question: 494 In a data communication session between two hosts, which level does the session layer of the oSI model of the host on one end communicate with the osl mode of the host on the other end? A. Communicate with the conversation layer on the other end B Communicate with the application layer at the other end C. Communicate with the data link layer at the other end D. Communicate with the physical layer at the other end E. Communicate with the presentation layer at the other end Answer: A Explanation: Question: 495 The switch uses IPSG technology to verify the source address of the IP packet, and the verification matrix used by the IPSG is obtained through the ARP resolution process in the listening network A. True Questions & Answers PDF P-156 B. False Answer: B Explanation: Question: 496 Router HW cannot access hosts in the remote network, router HW runs routing protocols and only pings the remote file server address 105401 on router HW with extensions through a default route remote network , the result of ping on the router HW is rendered as 'requ.' est time out', according to the above description, the error in the following analysis is ? A. The next hop router for router HW did not reach the destination address B. Router HW does not have a legitimate router to reach the destination address C. Ping is successful, but congestion occurs on the path to the destination address D. There is a firewall in the remote destination network, and the destination address can be reached without releasing ICMP traffic E. ICMP packets, but the destination device fails to reply Answer: B Explanation: Question: 497 Regarding IPv6 over IP4(19) road, the following statement is correct A. The 6to4 automatic tunnel requires the use of a specific IP6 address segment, and the assigned address segment is preceded by 3ffe::/16 B. When configuring manual tunneling on the VRP platform, a Tunnel interface is generally created; When configuring automatic tunneling, a Vrua-Template interface is usually created C. The ISATAP tunnel determines the destination IPV4 address of the tunnel based on the destination IP6 address. D. All automatic tunnels encapsulate data in the same way. E. Automatic tunneling has great advantages over manual tunneling, and manual tunneling will be phased out Answer: CD Explanation: Question: 498 The following description of the link state protocol is plausible? A. CPU utilization is high and loops are easy to generate B. Slow convergence and low CPU utilization C. Fast convergence and low CPU utilization D. Fast convergence and high CPU utilization Questions & Answers PDF P-157 Answer: D Explanation: Question: 499 You try to trace a remote Internet address on your PC, but the traceroute stops after it reaches a router, and currently, the router should be in the incoming direction of the serial interface With an ACL "rule5 permit tcp source any destination any", you need to add which of the following ACLs to the router for traceoute to work A. Rule 10 permit icmp source any destination any icmp-typettl-exceeded rule 15 permit source any destination any icmp-type echo-reply B. Rule 10 permit icmp source any destination any icmp-type echo rule 15 permiticmp source any destination any icmp-type net-unreachable C. Rule 10 permit tcp source any destination any D. Rule 10 permit icmp source any destination any icmp tti-exceeded rule permit icmp source any icmp-type port-unreachableE. Rule 10 permit udp source any destination any rule 15 permit icmp source any destination any icmp-type protocolunreachable Answer: D Explanation: Question: 500 If there is a switch running RSTP, which interface on that switch sends the BPDU with the Proposal logo?? A. The specified port B. in the forwarding state. The specified port in a non-forwarding state C. Alternate port D. The root port in the Blocking state Answer: B Explanation: Question: 501 What are the common ways to learn routing in BGP? ( Multi-select) A. receives neighbor routing information B. Introduce static routes C. BGP routing for other AS is introduced D. Introduced Direct Route Answer: ABD Questions & Answers PDF P-158 Explanation: Question: 502 If you need to configure routing policies on one router. Which of the following parameters does an administrator use to route when deploying a routing policy?( Multiple select). A Protocol B. Application C. Size of the packet D. Throughput E. Identification of a specific terminal system Answer: ABCE Explanation: Question: 503 A company deployed SSM multicast, in order to save the bandwidth consumption of multicast data in the LAN, the network administrator made the following configuration on the switch A. True B. False Answer: B Explanation: Question: 504 In the IS-IS broadcast network type, when establishing an adjacency relationship, if the router interface priority is set to 0, it will not participate in the dis election A. True B. False Answer: B Explanation: Question: 505 In Huawei switches, the hybird port can select vlan1 as an untagged vlan A. True B. False Answer: A Explanation: Question: 506 The following statement about isis a route leak of ISIS is correct? Questions & Answers PDF P-159 A. Route leaks for ISIS must be deployed on Level-1 routers B. Route disclosure for ISIS is turned on by default. C. Route disclosure for ISIS avoids suboptimal paths. D. Route leaks for ISIS can only be applied to IPv4 environments. Answer: C Explanation: Question: 507 Mainstream Layer 2 technologies such as VXLAN, TRILL, NVGRE and MPLS A. True B. False Answer: A Explanation: Question: 508 What is correct below about LDP synchronization in ISIS? A. LDP synchronization can be turned on globally. B. LDP establishes neighbors faster than ISIS, so LDP synchronization is turned off by default C. LDP synchronization avoids traffic loss when the active-standby link is switched. D. LDP synchronization can be deployed on the Loopback interface. Answer: C Explanation: Question: 509 What are the characteristics of Syslog information? A. The transmission of Syslog messages is not secure B. The transmission of Sysiog messages is reliable C. The transmission of Syslog messages is confirmable D. The transmission of Syslog messages is secure E. The transmission of Syslog messages is not acknowledgable F. The transmission of Syslog messages is unreliable Answer: AEF Explanation: Question: 510 Questions & Answers PDF P-160 You need to access the subnets of different VPNs in the VXLAN network , such as information about one subnet Bottom: RT=10:1ORT.100:1000 Export 1000 in EVPN instance and RT-100-100 in VPN instance. Which of the following can be basketed for another subnet? A. All EVPN instances are 1000:1000 B. In VPN instances, it is 10:10 C. 1000:1000 appears in VPN instances D. EVPN implements 1000:1000 export Answer: CD Explanation: Question: 511 What commands are related to BGP route reflectors?( Multiple select). A. reflect between-clients B. group 1 internal C. peer reflect-client D. reflector cluster-id Answer: ACD Explanation: Question: 512 What are the ways to divide VLANs in Huawei switches? ( Multi-select) A Subnetting based on IP. B. Division based on QoS C. Partitioning based on port D. Division based on protocol E. Division based on MAC address. Answer: ACDE Explanation: Question: 513 Regarding the DSCP field, the following statement is incorrect: single selection A. The DSCP value can be 0, and packets use the default forwarding mechanism when 0 B. When the value of DSCP is EF, it indicates that the data belongs to the accelerated forwarding class. C. In addition to indicating the priority of the data, DSCP can also indicate the probability of data being discarded. The CS class in D. DSCP divides data into 8 priorities. Answer: B Questions & Answers PDF P-161 Explanation: Question: 514 The following description of VLANs in Ethernet is correct? A. VLANs do not support bulk creation on devices B. The range of VLANs is 0 to 4096 C. The default reserved VLANs for Huawei devices are 4000~4010 D. VLANs can be extended through QinQ technology. Answer: D Explanation: Question: 515 Which IPV6 address would you ping to confirm that OSPFv3 is capable of pastoring unicast messages over the link? A. Site local Multicast B. Anycast Address C. Global Address of the link D. Unique Local Add E. Link Local Address Answer: CDE Explanation: Question: 516 In a multicast network running PIM-SM mode, how does the router choose the upstream interface? A. looks up the outgoing interface corresponding to the RP address in the unicast routing table B. Interfaces to which multicast group members are directly connected C. Find the outbound interface corresponding to the mapping proxy in the unicast routing table D. The interface that is fast to the PIlM Join message E. Interface for sending PIM Heilo messages. Answer: A Explanation: Question: 517 Auto-negotiate mode is to obtain the maximum interface rate and operating mode, the network administrator configures all Ethernet interface rates of a working switch to 10OMbps, and the operating mode is configured as Full-duplex, when a network card is configured After the auto- Questions & Answers PDF P-162 negotiate workstation is connected to the switch, the negotiation result is that the interface rate is 10OMbps and the working mode is half-duplex, which of the following explanations is the most reasonable for this phenomenon? A. The problem is on the workstation's NIC, mostly due to the aging of the NIC driver on the workstation , which causes the workstation NIC to learn the interface rate and operating mode configured on the switch B. Port rate negotiation is negotiated through the initial port sending FLP , and the operating mode is not negotiated through FLP C. STP initializes the port into the blocking state, causing auto-negotiation to fail, so the port should be configured as an edge port D. At higher port rates and operating modes, the workstation's network interface card cannot be configured as auto-negotiate E. Auto-negotiation is not configured on the switch, resulting in the switch not being able to send FLP messages to the workstation, causing the workstation to set its own operating mode to Halfduple Answer: E Explanation: Question: 518 IPV6 multicast introduces the concept of multicast scope, which of the following ways is the multicast scope concept implemented? Multi-select A. When the group shake source sends IP6 multicast data, the TTL value of the packet is set to limit the transmission range of the group shake B. There is a special field in the IPv6 multicast address that specifies the propagation range of multicast. C. Multicast scope is just a concept of spreading scope, and there is no specific technical implementation. D. During network configuration, the administrator uses the configuration command at the edge of the network to limit the multicast scope. Answer: BD Explanation: Question: 519 What is the field that the IPv6 header has similar to the IPv4 header "Type of Service" field? A. Version B. Flow Label C. Next Header D. Traffic Class Answer: D Questions & Answers PDF P-163 Explanation: Question: 520 The switch can suppress traffic by suppressing traffic and extremely other failures can affect operations, which of the following traffic suppression configurations is the wrong configuration A. [Quidway] wan 10 [Quidway-wan10] multicast-suppression 1000 [Quidway-van10] quit B. [Qudway ineface gigabtethemnet /0'1 [Quidway-GigabitEfthemetO0/O/1]multicast-suppression 80TQuidway-GigabitEthernet0/0/1]quit C. Quidway inteface gigabiethenet ou0/1 [Quidway-GigabtEthernet/0/1J,broadcast-suppression 80 IQuidway-GigabitEthernet//1]Jqut D. [Quidway] icmp rate-limit enable [Quidway] icmp rate-limit total threshold 20 E. [Quidway ] wan 10 [Quidway-wani0] broadcast-suppression 1000 [Quidway-van10] quit Answer: A Explanation: Question: 521 The following description of the Layer 6 functionality in the OSI reference model is correct? A. Synchronous communication B. Establishing, maintaining, and terminating communication sessions C. Provides a common data compression and encryption scheme D. Determines the availability of resources Answer: C Explanation: Question: 522 Questions & Answers PDF P-164 The Path Selection tool can define multiple entries, which of the following tools will automatically generate a rejection of any entries at the end of the slot A. Community -filter B. IP-prefix C. Route policy D. AS-Path- filter Answer: ABCD Explanation: Question: 523 CMPv6 uses the Type field to identify the message type, and according to the value of the type field, we can divide the ICMPv6 message into two categories, one is the error message and the other is the information message A. True B. False Answer: A Explanation: Question: 524 The CPU was attacked by malicious traffic. Here are some of the following ways to prevent an attack: Multi-select A. USE CPCAR to rate limit messages sent up to the CPU according to the protocol type B. Speed limiting of messages sent to the CPu on the soil. C. Filter packets with AcL on the compromised router port D. Turn off the remote login function of the router. E. Analyze and count the packets sent to the CPU to find out the user of the attack source or the interface of the attack source. Answer: CD Explanation: Question: 525 In an HWIP multicast network, where multiple sources exist and each source has several receivers, which protocol allows source-to-RP traffic and RP-to-receiver traffic to share the same tree 2? A. MOSPF B. PIM SM C. DVMRP Questions & Answers PDF P-165 D. 56768GZliuji F. PIM-DM Answer: D Explanation: Question: 526 Which of the following DNS resource records are legitimate? A. FQDN B. NS C. PTR D. MX E. A Answer: BCDE Explanation: Question: 527 A workstation is connected to an Ethernet switch in the work through a super-class 5 wire, the workstation can access the entire network (that is, full connection) through the switch, but the access rate is much lower than expected, when viewing the switch interface statistics, you can detect that there are many ultra-small frames, with software to read the statistics of the workstation network card, found that there are Many FCS and frame alignment errors, what causes the machine to cause these errors? A. The rate mismatch between the workstation and the switch B. Interface mismatched to an 8021Qtrunk interface C. The line between the workstation and the switch has been completely damaged D. The operating mode between the workstation and the switch does not match E. The network interface card on the workstation is damaged Answer: D Explanation: Question: 528 The authentication types of ISIS include interface authentication, zone authentication, and routed domain authentication A. True B. False Answer: A Questions & Answers PDF P-166 Explanation: Question: 529 If the topology of the entire network does not change, but the allocation of IP segments in the router changes, ISIS only uses PRC to calculate the changed routing information, and does not recalculate all SPT A. True B. False Answer: A Explanation: Question: 530 Which of the following configurations for OSPFv3 route aggregation is correct? A. [Huawei]ospf3 1 [Huawei-ospv3-1]area 1 [Huawei-ospf3-1-area-0001] abr-summary fo0:0 0:48 cost 400 B. [Huaweijinterface gigabitethernet 1/0/0[Huawei-GigabilEthemnet1 / 0/0] asbr-summany fcOO:0048 cost 20 C. [Huawei] ospfs 1 [Huawei-ospf3-1] asbr-summary fcO0:O:0:.48 cost 20 tag 10o D. Huawei]ospv3 1 [Huawe-ospt/3-1]area 1 Huawei-osph3-1-area-0001]asbr-summary fc000:048 cost 20 tag 100E. [Huawei] ospfv3 1 [Huawei-ospfv3-1] abr-summary fc000:0;. 48 cost 400 Answer: A Explanation: Question: 531 Each DD message has a sequence number for data confirmation, and a DD sequence number is 2 bytes long A. True B. False Answer: B Explanation: Question: 532 SNMPv3 defines which security features A. Privacy B. Authentication Questions & Answers PDF P-167 C. Domain checking D. Accounting Answer: AB Explanation: Question: 533 Which timer for spanning tree protocol dictates how often to see the root bridge send configuration BPDUs? A. forwarding delay timer B. STP timer C. HOLD timer D. Maxage timer E. Hello timer Answer: E Explanation: Question: 534 Users hope to be able to make the router forward and select messages according to their own defined policies on the basis of traditional route forwarding, and can adopt policy routing, and the following description of policy routing is incorrect A. Policy Routing can set the next hop IP address B. Policy Routing cannot be set in the next statement DSCP C. Policy Routing cannot be used to set IP precedence D. Policy-based routing can be used to match message lengths Answer: C Explanation: Question: 535 The command ip as-path-fiter as-path-fiter-number (denylpermit) regular-expression to configure aspath-ilter, in this command , multiple sentences can form an as-path-filter statement, what is the relationship between so many statements? A. Routes match in order When a route matches to a clause, the relationship between B. and is no longer matched downwards C. or relationships D. Routes match in order and routes need to match all sub-directions Questions & Answers PDF P-168 Answer: A Explanation: Question: 536 The following description of the characteristics of Huawei device Eth-trunk link aggregation is correct? A. Link aggregation enables load balancing based on data TCP or UDP ports B. Link aggregation cannot be deployed across devices C. Link aggregation can be applied to Both Layer 2 and Layer 3 devices D. Link aggregation can only be applied to Layer 2 devices. Answer: C Explanation: Question: 537 The following description of the GVRP interface registration mode in Huawei switches is correct? A. When fixed registration mode is selected, the interface cannot propagate dynamic VLANs B. When the normal registration mode is selected, allow the interface to dynamically register and unregister the VLAN. Logout here includes deleting dynamically learned VLANs and VLANs created natively by the administrator C. When the interface layer two operating mode must be hybird D. GVRP when the register mode with forbidden is selected, there are four types of interface registration mode Answer: A Explanation: Question: 538 When troubleshooting a local area network, you notice a large number of frame alignment errors, FCS errors and LAG conflicts, and the possible cause of these problems is ? A. Switches and terminals are interconnected over 10/100/1000base-T Ethernet links, and switches and terminals operate in half-duplex mode B. There is a mode mismatch on the 1000base-LX/LH link C. The operating mode does not match D. on a 10/1000/1000base-T Ether link This type of error occurs in most environments Answer: C Explanation: Questions & Answers PDF P-169 Question: 539 Protocols with TCP ports 443, 179, 137, 110, and 23 are, in order: radio A. Finger,DHCP Server,NetBios Name Server,POP3,TelnetB B. LDAP,SNMP,TFTP,POP3,Telnet C. HTTPS,SNMP,POP3,DNS ,Telnet D. HiPS,BGP, NetBios Name Server ,POP3,TelnetE. BGP,POP3,SNMP,TFTP,Teinet Answer: D Explanation: Question: 540 What designs in the router can improve the reliability of the router? A. Dual power supply design B. Module hot-swappable design C. Issu Design D. Dual-engine design Answer: AD Explanation: Question: 541 Compared to IPV4 multicast, which of the following descriptions is the characteristic of multicast? IP6 A. IPv6 multicast does not contain MSDP and dense mode B. The first 8bit IPV6 multicast address is always FF(11111111). C. IPv6 multicast clients use IGMPv3 to join multicast groups D. IPv6 multicast load sharing extends the multicast routing rules and is completely independent of RPF check Answer: B Explanation: Question: 542 VPN instances are also known as VPN routing forwarding tables (PN Routing and Forwarding table), and there are multiple route forwarding tables on the PE, including a public route forwarding table, one or more VPN route forwarding tables, and VPNv4 Route forwarding table. A. False B. TRUE Questions & Answers PDF P-170 Answer: B Explanation: Question: 543 If you want to advertise 19072270/27 to an EBGP neighbor, is the following command correct? A. network 19072270 mask 255255255224 B. network 1907227000031 C. network 19072270255255255224 D. network 19072270 E. network 19072270255255255240 Answer: C Explanation: Question: 544 What is the significance of reserved multicast address 224000~22400255? A. The multicast address range is reserved for the management of multicast addresses, and is valid locally B. The address identifies Global lnternet, and the address range is valid for the entire network C. This multicast address range is reserved for the management of multicast addresses, which cannot transmit multicast traffic to the Internet D. Any legitimate multicast traffic and multicast application Junhui adopts an address change E. The multicast address range is reserved for link-local multicast traffic, including network control messages, and the address range is only valid locally Answer: E Explanation: Question: 545 Regarding the WRR (Weight Round Robin) description of the error is ?( Multiple select). A. WRR avoids congestion in the network B. WRR guarantees that various queues are allocated to a certain amount of bandwidth C. WRR is a congestion management technique D. WRR can no longer use E. WRR on GE interfaces to ensure that critical services are prioritized for Answer: A, E Explanation: Questions & Answers PDF P-171 Question: 546 Why is BGP an enhanced distance vector routing protocol? A. According to the routing rules of BGP routing, the route with lower MED is preferred B. BGP uses the ASPATH attribute to record all autonomous system numbers that a route passes through into an AS list, and based on that attribute, routes with shorter AS-PATH are preferred C. NEXT_HOP is a recognized mandatory attribute D. BGP cannot accept routes that carry a local AS number in the AS_PATH Answer: B Explanation: Question: 547 Which of the following options is correct? A. Unicast and broadcasting cannot effectively achieve data transmission between one source and multiple destinations on P2MP, but multicast technology can B. Multicast technology is able to reduce redundant traffic, so network bandwidth can be saved C. Multicast technology is used for "-to-many" applications D. Since multicast is based on TCP to establish a connection, multicast technology can ensure the reliable transmission of data Answer: B, C Explanation: Question: 548 What is the exact description of the SSM features? A. Using SSM, the receiver can use INCLUDE in IGMPv3 to indicate that the source B. SSM he wishes to join is an extension of the DVMP protocol. to efficiently transmit one-to-many communication traffic C. SSM requires MSDP to discover active sources in other PIM domains D. Routing multicast traffic in the SSM is done by relying on the number of sources, and the RP is used for the receiver to answer the corresponding number of sources Answer: A Explanation: Question: 549 Configuring filter-policy 2000 export in the IS-IS process, the wrong statement about the function of the command is ? Questions & Answers PDF P-172 A. which needs to be used in conjunction with route ingestion, acts as an external route sender neighbor that only partially introduces. B. If you do not configure this command, the device will by default introduce the external routing protocol to the IS-IS route all outgoing C. Restricts the external publication of route entries generated by the device itself D. This command will filter the link status information released to the outside world Answer: D Explanation: Question: 550 When running OSPFv3 on a Huawei router, the OSPFv3 process automatically selects an interface address as the process router id A. True B. False Answer: B Explanation: Question: 551 Mainstream Layer 2 tunneling technologies include VXLAN TRILL, NVGB and MPLS. A. FALSE B. TRUE Answer: A Explanation: Question: 552 Which of the following options enables encapsulation and unencapsulation of VXLAN messages? A. VBDIF B. VLANIF C. BD D. VTEP Answer: D Explanation: Question: 553 Questions & Answers PDF P-173 An engineer uses 2 routers to test Pv6 services and runs OSPFV3 to achieve interconnection and interoperability of IPV6 networks The RI has access to the loopback address of R2 The engineer looks at ri's OSPF3 routing table entry and finds that there is no route reaching the R2 loopback address It can't be caused by which of the following? A. R2 does not enable OSPFv3 on the loopback port B. R2 does not advertise the loopback address C. R2 in area 0 to advertise the loopback into a different OSPFv3 process D. R2 does not configure the Router ID used in the OSPFv3 process Answer: B Explanation: Question: 554 MACsec provides users with secure MAC layer data sending and receiving services. Which of the following is not a service available by ACsec? A. User data encryption B. Data source authenticity verification C. Integrity check D. Controllability check Answer: D Explanation: Question: 555 The following statement about the concept of multicast is wrong? A. Multicast Source: The sender of the message needs to join the multicast group to provide forwarding of multicast group messages B. Multicast router: A router or layer-three switch that supports layer-3 multicast functionality C. Multicast Group Members: Multicast group members can be widely distributed anywhere in the network D. Multicast Groups: A collection identified by ip multicast addresses Answer: A Explanation: Question: 556 To implement the traffic filtering function, you can use trapp-filter or MQC, which can be called in more views than traffic-filter A. FALSE Questions & Answers PDF P-174 B. TRUE Answer: B Explanation: Question: 557 By default, routers running IS-IS in broadcast networks have a period of seconds for DIS to send CSNP packets? A. 33 B. 40 C. 30 D. 10 Answer: D Explanation: Question: 558 About multi-instance CE (Multi-VPN-Instance CE, MCE). What is the error described below? A. Users who connect to the same MCE but are not part of a VPN instance cannot access each other B. The MCE vs. PE direction must have multiple physical links to achieve isolation between different VPN instances C. MCE-enabled devices can access multiple VPI instances in BGP/RPLS IPVPN applications, reducing user network equipment investment D. On the MCE device, you need to create their own routing tables for different VPNs and bind to the corresponding interface Answer: B Explanation: Question: 559 All interfaces of the router have OSPF enabled, the Cost value of the link is identified in the figure, and the Loopback0 socket for R2 is advertised in area 1 , then Rl reaches 10022/32 with a Cost value of ? Questions & Answers PDF P-175 A. 50 B. 150 C. 200 D. 100 Answer: C Explanation: Question: 560 As a network administrator, which of the following protocols can I use for network device configuration? A. SSH B. NETCONF C. LLDP D. SNMP Answer: BD Explanation: Question: 561 What messages can Huawei equipment suppress traffic for? A. Multicast B. Known unicast C. Broadcast D. Unknown unicast Answer: BCD Explanation: Questions & Answers PDF P-176 Question: 562 What mechanisms or techniques can VRRP combine with to monitor uplink connectivity? A. IP-link B. BFD C. NQA D. Interface trace Answer: BCD Explanation: Question: 563 The following statement about static VXLAN tunnel configuration is correct? A. A BD needs to create an NVE country, and when there are multiple BDs, multiple NVE interfaces must be created B. An NVE interface can be associated with multiple VNls, so you can create only one NVE interface when there are multiple BDs C. For a VXLAN tunnel, you need to create a corresponding NVE interface, in which you explicitly specify the source IP address and the destination IP address , so there are multiple VXLAN tunnels on the VTEP that must be vE interfaces The destination address of the VXLAN tunnel is specified in the D. NVE interface, and multiple VXLAN tunnels can create only one NVE interface Answer: D Explanation: Question: 564 How do IGMPv2 routers maintain cinderband group membership? Multi-select A. The router queries a specific group B. The router maintains a timeout timer for each group membership, refreshes the timer if the receiver host is received, and deletes the group membership if the timer times out C. The router periodically sends a Query message, and after the receiver host receives the Query message, it reports a Report message D. As soon as the leave message is received, the router immediately deletes the group membership Answer: BC Explanation: Question: 565 Questions & Answers PDF P-177 As shown in the figure, all interfaces of the router have OSPF turned on, and the COST value of the link is identified in the figure. R2's loop backO interface advertises a cost in region l, then R1 reaches 10022/32 The value is Answer: 200 Explanation: Question: 566 The following statement about IPSec VPN is correct ?qo A. Two routers establish an IPSec VPN in brutal mode, so that the two devices can interact with a minimum of 4 messages to establish a tunnel. B. Brutal mode can support NAT traversal, while main mode does not support NAT traversal. C. The two routers can establish OSPF neighbor relations and exchange intranet routes through the IPSec VPN tunnel D. The two routers establish IPSecVPN in main mode, and from the 5th packet (included), the payload's data will be encrypted. Answer: D Explanation: Question: 567 During isis ' broadcast network database synchronization, is the following statement correct? A. R2, as DIS, sends CSNP periodically. B. R2 As DIS, Hello time is 3 times that of a normal router . C. R2 as DIS does not receive PSNP nouns for other routes. D. RI and R3 maintain database consistency by periodically sending PSNP requests. Questions & Answers PDF P-178 Answer: A Explanation: Question: 568 Two routers, connected together through the serial port, but can not ping between each other , now check the port status as follows: Can the following information determine what the cause is? A. Insufficient link bandwidth B. The IP addresses on both ends are not on the same network segment C. The link layer protocols on both ends are inconsistent D. Subnet mask does not match the Answer: C Explanation: Question: 569 As shown in the topology diagram, all interfaces of the router in the figure are enabled with the ISIS protocol, and the following statement is correct. A. If the RI's Ethernet0/0/0 interface goes down, R2 becomes the master device B. If the Ri's Ethernet0/0/1 interface goes down, R2 becomes the master device C. If R3's G E0/0/0 interface goes down, R2 becomes the master device D. If R3's Ethernet0/0/0 interface goes down, then R2 becomes the master device Answer: ABC Explanation: Question: 570 Questions & Answers PDF P-179 As shown below, RI, R2 establish EBGP neighbors, and once turned on, the BFD detection function, the following statement is correct? A. R Detection time for BFD packets for 2 Detection time for BFD messages 800m5 B. RI Detection time for BFD messages for 1280ms C. RI The detection time for bFD messages for 660ms D. R2 is 600ms Answer: C Explanation: Question: 571 In the laboratory network, the network is built according to the following topology diagram, SWI is the default configuration, and SW2 disables the switch STP function. A. SG0/0/2 for WI enters the Discarding state B. SW2 and G0/0/1 enters the Discarding state C. SW2 G0/0/2 enters discarding state D. No interface is backed up for blocking E. SWI's G0/0/1 enters the Discarding state Answer: D Explanation: Question: 572 As shown in the following figure, R1 and R2 establish a neighbor relationship with LeveL2, and the key configuration is as follows, so is the following route entry for R2 correct? Questions & Answers PDF P-180 A. 0::/64 The router will appear in the IP routing table B. 2022::/64 Routers appear in the IP routing table C. 2019::/64 Routers appear in the IP routing table D. 2021::/64 Routers appear in the IP routing table Answer: ABC Explanation: Question: 573 As shown in the following topology, EBGP is running between AS100, AS200, AS300, AS400, and the neighbor relationship is established S400 When you receive a BGP route from ASI00 for a 1.1.1.1/32 network segment, is the path order recorded in the ASPath properties correct? A. 10,200,3 B. 400,300,200,100 C. 100, 200,300, 400 D. 300, 200,100 Answer: D Explanation: Question: 574 Questions & Answers PDF P-181 As shown in the figure, R1, R2, and R3 run OSPP at the same time and declare their respective ring ports, as described below is the error. A. R2, you can use the filter po y export command to filter R3's loopback route B. R2 you can make Ëfilter in Area 0 The import command to filter the loopback route for R3 on C. RI can make Ëfilter-policy import filter the loopback route for R3 D. RI, you can use the Make Ëfilter export command in Area 1 to filter loopback routes for R3 Answer: A Explanation: Question: 575 In the following topology diagram, R1 can access the Internet through R2 and R3, R1 and R2, R1 and R1 An EGP connection is established between R3 , and R2R3 belongs to the same AS, each via BGP Publishing a default route that requires R1 to visit lnternet's traffic preference R2, can the following practices be achieved? A. R1 specifies that the peer R3 sets the MED property to 150 in the import direction B. R2 specifies that the peer R1 sets the local priority to 150 in the export direction C. R2 specifies that the peer R1 sets the MED property to 150 in the export direction D. R1 specifies that the peer R2 beats the local priority in the import direction to 150 Answer: AD Explanation: Question: 576 As shown in the figure, in the context of IPv4 and IPv6, the SEL field in the NET address of isis always takes a value of 00 ? A. Right B. Wrong Answer: A Explanation: Questions & Answers PDF P-182 Question: 577 As shown in the figure, the neighbor relationship between R1 and R2 has just been established, and the database synchronization process between R1 and R2 is correct. A. The message sent by R1 to R2 is a PSNP message B. R1 sends the packet of R2 as the CSNP packet. The message sent by C. R1 to R2 is an LSP packet. The message sent by D. R1 to R2 is the Hello message. Answer: B Explanation: Question: 578 As shown in the figure, the PPP link between R1 and R2 is not in the same network segment, but the R1 and R2 direct connectors can communicate, and the Ethernet link cannot communicate under the same planning, why? A. The interconnect POS ports of R1 and R2 learn the 24-bit subnet route of each other's direct connection ports through IPCP B. The interconnect POS ports of R1 and R2 learn the 32-bit host route for each other's direct Questions & Answers PDF P-183 connections through IPCP C. The interconnect POS port of RI and R2, through LCP learns the MAC address of the opposite termination , does not need to use ARP to request the MAC address D. The data packets of the interconnect POS ports of R1 and R2 do not need to encapsulate ethernet headers and do not need to use ARP to request MAC addresses Answer: BD Explanation: Question: 579 There are routers as follows, according to which the compromise conclusion is wrong? A. R3 must be the DIS of some Level-1 link B. The R3 router is a Level-1-2 router C. R3 must be the DIS of some Level-2 link D. The system ID of the R3 router is 000300000000 Answer: A Explanation: Question: 580 What is the correct description of the scene shown in the following figure? A. R1 simultaneously exists level-1 and Level-2 LSDB B. R1 can ping the interface address of R2 loopback 0 C. R1 has a route to R2 loopback 010022/32 D. There is no neighbor relationship between R1 and R2 Answer: AC Explanation: Question: 581 As shown in the FIGURE, in the HUB & Spoke networking mode of MPLS BGPVPN, in order to achieve the division, it can only communicate with the headquarters. Divisions cannot communicate with each other, and the settings for RT can be which of the following scenarios? (Multiple choice questions). Questions & Answers PDF P-184 A. ??:Import Target: 123; Export Target:123 ?? 1: lmport Target:123; Export Target:123 ?? 2:lmport Target: 12: 3; Export Target: 123 B. ??: Ilmport Target: 1:1l; Export Target: 3:3 ?? 1: Import Target: 33; Export Target: 1.1 ?? 2:lmport Target: 3:3; ExportTarget: 2 C. ??: lmport Target: 22; Export Target: 33 ?? 1: lmport Target: 33; Export Target: 1:1 ?? 2:lImport Target: 33; Export Target: 2 D. ??: lmport Target:123; Export Target: 3:12 ?? 1:Import Target: 312; Export Target:123 ?? 2:Import Target: 3:12; Export Target: 12:3 Answer: D Explanation: Question: 582 As shown in the following figure, a part of the LSDB LSDB of a router LSDB is shown in the first one in the following figure. A new LSP has been received, the second one in the figure below, and the following statement is incorrect (single choice). A. this router will put the newly received LSP into the LSDB B. In the case of a broadcast network, DIS will include summary information for this LSP in the next CSNP message. C. This router ignores LSPs received from neighbors D. If it is a point-to-point network, the router will send PSNP Answer: C Explanation: Question: 583 As shown in the figure, all routing diagrams declare the loopback address in OSPF, where R2 does not return the address is 10022/32, it is advisable to tell AraD. The R3 loopback address is Questions & Answers PDF P-185 10033/321001.1.0/24 external routing, in order to reduce the burden on the RI router, the configuration command is as follows:( Multiple choice questions)[Rlip ip-prefix 1 permit 001.1.024 [RLIJospfl [RL-ospf-1]filter-policy ip-prefix l import please ask the following description is correct? A. In the P route table of router R1, there is no external route to 1001.1.0/24 B. In the IP routing table of router R1, there is an external route to 1001.1.0/24 C. In the IP routing table of router R1, there is no loopback route to R2 D. In the IP routing table of router RI, there is no loopback route to R3 Answer: ACD Explanation: Question: 584 The following topology diagram is available, and it is correct to analyze the following statement accordingly A. There are route entries for 10022/32 and 10000/16 in the IP routing table for AR1 B. R1's IP routing table has both 10033/32 and 10000/16-bit route entries C. Because R does the route aggregation, R1 Only route entries of 10000/16 exist in the IP routing table D. There are route entries for 10022/32 and 10033/32 in the IP routing table for R1 Answer: B Explanation: Question: 585 As shown in the figure, Department A of Branch 1 has access to the Internet, but Department B can only use an encrypted VP to access headquarters resources, and NAT can be configured on the egress device The policy enables Department A to access the Internet, while the PSecVPN (ESP Protocol) + Tunnel mode method configured for Department B gives it access to headquarters. B. Right C. Wrong Answer: A Questions & Answers PDF P-186 Explanation: Question: 586 A company's two-layer phase network architecture as shown in the figure, when the engineer is configured to find that the business between departments can not communicate, through the command to view the status of the equipment as follows, please determine the possible causes? A. The BPDU interval between switches is not configured B. The Transition VLAN mapping between the handover machines is not configured to be caused C. The Revislon Level configuration is inconsistent between switches D. Inconsistent Registry Name configuration between text exchange machines Answer: BCD Explanation: Question: 587 As shown in the following figure, R1, R2, R3 establish a neighbor relationship of Level2 The IP routing table for R3 is correct (multiple choice). Questions & Answers PDF P-187 A. The 2::/64 route appears in the P route table B. The 2019:/64 route appears in the IP routing table C. 2020::/64 The route appears in the IP routing table D. The 2021/64 route will appear in the IP routing table Answer: ABCD Explanation: Question: 588 The data results of a router are as follows, and the analysis conclusion is correct (single choice). A. The GEO/0/0 port of the A. R3 is in a different region than the neighbor B. The B. R3 router's Eth0/0/1 enables both IPv4 and IPv6 ISIS C. R3 is on the link where Eth0/0/0 is Eth0/ 1 of the LEVEL-1 and Level-2 DISC D. R3 routers Circuit-level is Level-1-2 Answer: D Questions & Answers PDF P-188 Explanation: Question: 589 As shown in the figure, a company wants to achieve secure mutual access between the head office and branches through MPLSVPN, and at the same time requires that the IPN traffic of the branch bank must be forwarded through the head office to achieve traffic monitoring A. VPN routing information can be exchanged between A. CE and PE using BGP messages B. When Hub-CE passes routing information with Hub-PE, you need to configure a route on Hub-PE that allows receiving AS numbers to be repeated 1 time to receive routes published by Hub-CE C. Between Hub-CE and Hub-PE, and between Spoke-PE and Plan-CE, routing information can be exchanged using the OSPF protocol D. An MP-IBGP peer relationship is established between Spoke-PE and THE VPN routing information is exchanged. Answer: D Explanation: Question: 590 As shown in the figure, three switches S1, SW, and SN3, where SWI is the root bridge, and link congestion occurs between SI and SW2, SWD cannot receive the configuration BPDU sent by the root bridge, which spanning tree protection mechanism does the administrator need to configure to prevent the problem caused by link congestion?( Single choice questions). A. root protection B. PreventS TC-BPDU attacks C. BPDU Protection D. Loop Protection Answer: D Explanation: Questions & Answers PDF P-189 Question: 591 As shown below, what routes will R2 learn?( Single choice questions). A. R2 can learn the 101.20/24 and 101.30/24 routes. B. R2 can learn the 101.1.0/24 route. C. R2 can receive an LSP for R1, but cannot join to the routing table. D. R2 can learn all routes to R1. Answer: D Explanation: Question: 592 View the details of all VPN instances on a network device and the results are as follows, which of the following statements is wrong?( Multiple choice questions). A. The total number of instances that enable the IPv6 address family in the VPN configured on this side is 1 . B. VPN-Instance vpna does not receive VPN routes with an RT of 2:1. C. The GigabitEthernet 1/0/0 interface is tied to the VPN-Instance vpna D. The device assigns a label to each route of the VPN-Instance vpna. Answer: AD Questions & Answers PDF P-190 Explanation: Question: 593 As shown in the figure, the use of redundant links between the branch and the headquarters to establish IPsecVPN, while turning on URLPF on the Router_B for traffic from branch l, which of the following options is correct? A. When using IPsec active-standby link redundant backups to enable the URPF function under the physical interface , it is recommended to use URPF loose mode. B. When using IPsec multilink redundant backup, the URPF function can be used under the physical interface, and URPF strict mode can be used C. When using IPsec multilink redundant backups, urPF can be enabled under the tunnel interface, and URPF strict mode can be used D. When using lPsec active-standby link redundancy backup, the URPF function is enabled under the physical interface, and URPF strict mode can be used. Answer: AC Explanation: Question: 594 As shown in the figure, which of the following options satisfies two routers to establish an ISIS neighbor?( Single choice questions). A. Both routers are of The Level-1 type. B. Both routers remain of the default type. C. One of the two routers can be of the Level-1-2 type and the other of the Leve1-1 type. D. The ISIS process numbers of the two routers must be consistent. Answer: B Explanation: Questions & Answers PDF P-191 Question: 595 The switch SWA and SWB are connected together by 2 Ethernet links, where the switch SWA has the following interface configuration: A. Without changing the current configuration, GigabitEthernet1/0/1 and GigabitEthernet1/0/2 can join the same aggregation group B. Because of the different VLANs allowed, GigabitEthernet1/0/1 and GigabitEthernet1/0/2 cannot join the same aggregation group C. After link clustering is configured on both SWA and SWB, if MSTP is enabled on the switches SWA and SWB Both GigabitEthernetl1/0/1 and GigabitEthernetl/O/2 are the forwarding status of MSTP D. Only if the configuration of GigabitEthernet 1/0/2 is changed to match GigabitEthernet 1/0/1 can the two join the same aggregation group Answer: BD Explanation: Question: 596 As shown in the figure, as shown, as the AS10 has two paths to access THEA1, the optimal route passed from the 4S23 by default is now sprinkled with S00 to ass4O The odds belt wins even more worrying. Therefore, in the R2 configuration as follows, after the completion of the coordination, it is found that the most worrying route has not changed, and some operations can be adjusted to make the configuration ??[ R2]jpas-path-fiter l permit "4D0& [2]pouteplicy med permit node 10[R2-routepolicyli- match aspath-ilterl[R2-oute-policylapplycoast.20 Questions & Answers PDF P-192 A. Configure compare-di fferent-as-med under the BGP process for R2 B. Configure destiny-med under the BGP process for R1 C. Configure compare-di fferent-as-med under the BGP process of Rl D. Configure the targeted-med under the BGP process for R2 Answer: BC Explanation: Question: 597 A multi-protocol network, the topology is shown in the figure. Take a closer look at the topology, router R4 (in Areal) is introduced into the OSPF process via the routes learned by BGP. So what categories of LS4 will R3 advertise to zone 0?( Multiple choice questions). A. 5 ?LSA B. 7 ?LSA C. 1 ?LSA D. 4 ?LSA E. 2 ?? ?? Answer: ACE Explanation: Question: 598 Is the following figure correct about NDP's process of resolving link-layer addresses? Questions & Answers PDF P-193 A. Right B. Wrong Answer: A Explanation: Question: 599 result :(moloteric question). A. When sending a packet with a destination address of 4444, it is sent without labeling. B. When the router receives a packet with the label 1024, it replaces the label with 1027 and sends it. C. When a packet with a destination address of 2222 is sent , it is sent without labeling. D. When sending a packet with a destination address of 3333, label 1026 and send it. Answer: C Explanation: Question: 600 Questions & Answers PDF P-194 As shown in the figure, SWA, SWB, SWC all run RSTP, GED/O/2 on SWB Ports and GEO/0/1 ports on SWC have a port role of ? Radio A. Alternative port, Backup port B. Backup port, root port C. Root port, Designated port D. Backup port, Alternative port Answer: D Explanation: Question: 601 OSPFV is the GP running on the P4 network) OSPF3 is the KGP running on the IP6 network. OsPFV works the same basic way as OSPF2, such as elections for DR and BDR. As shown in the figure, an engineer uses three routers for IP6 service testing, and he wants to interconnect the IPv6 network by running OSPFv3 Which of the following statements is correct regarding the election of the network DR? A. After the network converges, R1 is DR B. After the network converges, the engineer modifies the priority of R1 to 100, the priority of R2 to 10, and R3 to the default value. When the network converges again, Rl is DR and R2 is BDR C. After the network converges, the broadcast link adds a device, R4, with a priority of 150 When the network converges again, R4 is DR D. After the network converges, R1 is powered off and restarted, and when the network converges again, R3 is DR Answer: BCD Explanation: Question: 602 View the IGMP configuration of the interface on the router RTA as follows, and the information about the operation of the RTA is incorrect Questions & Answers PDF P-195 A. The packet interval for a particular group query is 60 seconds B. The interface IP address is 1921681.1 C. The maximum response time for query messages is 10 seconds D. The IGMP protocol version is 2 Answer: A Explanation: Question: 603 Based on the configuration shown in the figure below, it can be known that R4 has () interfaces advertised into IS-IS? A. 2 B. 3 C. 1 D. 0 Answer: B Explanation: Question: 604 Questions & Answers PDF P-196 As shown in the figure, all routers run OSPF, which is correct in the following statement: A. Both R2 and Zone 0 generate Router LSA B. R2 generates Router LSA only in Zone 0 C. R2 forwards the R1-generated Router LSA to R3 D. R2 Forwards the R3-generated Router LSA to R1 Answer: A Explanation: Question: 605 R3 is not established with the RI's IS-IS neighbor, and according to the information in this figure, the possible cause is ? A. R3 duplicates the System ID of R1 B. R3 does not match the IS-Level of R1 C. R3 and R1 interconnection ports circuit-type do not match the lH authentication of D. R3 and R1 Answer: C Explanation: Question: 606 Questions & Answers PDF P-197 As shown in the figure, an engineer uses four routers to test the interoperability of branch networks, where R1, R2, and R3 in branch 1 deploy OSPF Network interoperability is implemented, and R, R3, R4 in Branch 2 is deployed is-IS to achieve network interoperability. Now that the engineer wants to implement R1 access to R4's loopback address, which of the following actions will meet this requirement? A. No configuration is required B. Publish default routes only in the OSPF process for R2 C. In the OSPF process of R2 and the IS-IS process, the default routes are published separately D. Publish the default route only in the IS-IS process of R2 Answer: B, C Explanation: Question: 607 A campus deploys OSPF to achieve network interoperability, and an engineer configures R2 as shown in the figure, then the following description of the LSA in the OSPF network is wrong A. There is no Type3 LsA flooding within Areal B. There is no Type3 LSA flooding in Area2 C. There is Type5 LSA flooding within Areal D. Area2 contains Type5 LSA generic adverb Answer: A Explanation: Questions & Answers PDF P-198 Question: 608 As shown in the figure, PC1 and PC2 are hosts that belong to the same network segment, below about between PC1 and PC2 What are the correct descriptions of IPv6 neighbor states? A. If the MAC address information of PC2 can be queried on PC1, the neighbor relationship may be Stale B. If pc2's MAC address information can be queried on PC1, the neighbor relationship may be Probe C. There are five possible neighbor states between PC1 and PC2: Incomplete, Reachable, and Stale , Delay, Probe D. If the MAC address information of PC2 can be queried on PC1, the neighbor relationship must be Reachable Answer: AC Explanation: Question: 609 As shown in the figure, the overload bit of ISIS is set in the configuration of router R3, and the following statement is correct A R3's direct route will be ignored by R1 and R2 because of the setting of the overload bit . B. When the router runs out of memory, the system automatically sets the overload flag bit in the sent LSP packets. Irrelevant to whether the user has a set-overload command configured. Questions & Answers PDF P-199 Routes introduced by C. R3 through import-route will not be published. The LSP of D. R3 will not be able to spread to R1 and R2 E. R3 initiates the load state, and R1 and RZ will not calculate the LSP of R3 cattle in the SP tree. Answer: BC Explanation: Question: 610 The network administrator defines a traffic policing policy as follows: A. 256K bytes B. 48128 bytes C. 32K bytes D. 80128 bytes Answer: C Explanation: