Black Friday Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Huawei > HCIA-Datacom > H12-811_V1.0

H12-811_V1.0 HCIA-Datacom V1.0 Exam Question and Answers

Question # 4

After a switch restarts, static MAC address entries saved on the switch remain in the MAC address table.

A.

TRUE

B.

FALSE

Full Access
Question # 5

After the administrator performs the configuration shown in the figure on a router, which of the following commands can be used to specify a short lease for addresses assigned using DHCP?

A.

dhcp select relay

B.

lease 0

C.

lease day 0 hour 10

D.

lease 24

Full Access
Question # 6

How many bytes are there in a basic IPv6 header?

A.

40

B.

48

C.

32

D.

64

Full Access
Question # 7

What is the main function of the DNS protocol?

A.

Remote access

B.

File transfer

C.

Domain name resolution

D.

Email transmission

Full Access
Question # 8

Which of the following methods is not supported by the Versatile Routing Platform (VRP) to configure a router?

A.

Configure the router through FTP.

B.

Configure the router through the mini USB port.

C.

Configure the router through Telnet.

D.

Configure the router through the console port.

Full Access
Question # 9

What function does Ctrl+Z have in the VRP system?

A.

Exits the console interface view.

B.

Exits the interface view.

C.

Returns from any view to the user view.

D.

Exits the current view.

E.

Returns from the system view to the user view.

Full Access
Question # 10

The rules in an ACL may overlap. If packets match the rules with loose conditions, the later ACL rules are not processed. In this case, packets cannot match the rules with strict conditions. Therefore, the rules with strict conditions must be arranged in front lines and those with loose conditions must be arranged towards the end.

A.

TRUE

B.

FALSE

Full Access
Question # 11

As shown in the figure, if host A has the ARP cache of host B, host A can ping host B.

A.

TRUE

B.

FALSE

Full Access
Question # 12

On the VRP platform, which of the following parameters can be used together with the "ping" command to specify the source address of an echo request message?

A.

-d

B.

-n

C.

-a

D.

-s

Full Access
Question # 13

Which of the following information prompts is used by the VRP operating platform for incomplete input commands? ()

A.

False Incomplete commanD.founD.at'position

B.

C. Error:Too many parameters founD.at'position

C.

D. Error: Wrong parameter founD.at'position

Full Access
Question # 14

The election of the root switch in STP only compares the priority of the switch, while in RSTP, the priority of the switch and the MAC address are compared at the same time. ()

A.

True

B.

False

Full Access
Question # 15

RADIUS is a common protocol to implement AAA. ()

A.

True

B.

False

Full Access
Question # 16

VRP operating system commands are divided into four levels: access level, monitoring level, configuration level, and management level. Which level can run various business configuration commands but cannot operate the file system? ()

A.

Configuration level

B.

B. Monitoring level

C.

C. Access level

D.

D. Management level

Full Access
Question # 17

The transport layer protocol has UDP and TCP, but UDP is more reliable than TCP

A.

True

B.

False

Full Access
Question # 18

The Backup port in RSIP can replace the failed root port. ()

A.

True

B.

False

Full Access
Question # 19

O: 25

In RSTP, a backup port can replace a faulty root port.

A.

TRUE

B.

FALSE

Full Access
Question # 20

Which of the following is the default port number of the Telnet server?

A.

22

B.

24

C.

21

D.

23

Full Access
Question # 21

When a host uses the stateless address autoconfiguration solution to obtain an IPv6 address, the host cannot obtain the DNS server address.

A.

TRUE

B.

FALSE

Full Access
Question # 22

Refer to the following configuration of a switch interface. Which of the following statements is false?

interface GigabitEthernet0/0/1

port link-type trunk

port trunk pvid vlan 200

port trunk allow-pass vlan 100

A.

If the VLAN tag carried in a data frame is 100, the switch removes the VLAN tag before sending the data frame.

B.

If the interface receives data frames without VLAN tags, the switch needs to tag the data frames with VLAN 200.

C.

The interface cannot send data frames tagged with VLAN 200.

D.

The link type of the interface is trunk.

Full Access
Question # 23

A router in the backbone area has complete LSDBs of routers in other areas.

A.

TRUE

B.

FALSE

Full Access
Question # 24

Which of the following sources of routes can be obtained by a router?

A.

Static routes

B.

Direct routes

C.

Summary routes

D.

Dynamic routes

Full Access
Question # 25

Which of the following IEEE 802.11 standards supports a theoretical negotiated rate of 5 Gbit/s or higher?

A.

802.11a

B.

802.11ax

C.

802.11n

D.

802.11b

Full Access
Question # 26

If a device running STP receives an RSTP configuration BPDU, it discards the BPDU.

A.

TRUE

B.

FALSE

Full Access
Question # 27

What is used as the data link-layer MAC address that identifies each VAP on an AP?

A.

BSS

B.

SSID

C.

BSSID

D.

ESS

Full Access
Question # 28

With SNMP, an NMS can only display the device running status but cannot deliver configurations.

A.

TRUE

B.

FALSE

Full Access
Question # 29

Which of the following fields are contained in an ARP packet?

A.

Source Protocol Address

B.

Source Hardware Address

C.

Hardware Type

D.

Operation Code

Full Access
Question # 30

In the following figure, all links are Ethernet links, and all interfaces on the routers are running OSPF. Given this, how many DRs will be elected on this network?

A.

1

B.

3

C.

4

D.

2

Full Access
Question # 31

Which statement is true regarding the following command?

ip route-static 10.0.12.0 255.255.255.0 192.168.1.1

A.

The configuration represents a static route to the 10.0.12.0 network.

B.

The configuration represents a static route to the 192.168.1.1 network.

C.

If the router has learned the same destination network via a dynamic routing protocol, the static route will always take precedence.

D.

The preference value of this configured route is 100.

Full Access
Question # 32

The network administrator performs the configuration shown in the following figure on RTA. If a user needs to be authenticated in the authentication domain named huawei, which of the following statements is true?

A.

The authentication scheme au2 is used for authentication.

B.

The authentication scheme aul is used for authentication.

C.

The authentication scheme au2 is used for authentication. If the authentication scheme au2 is deleted, the authentication scheme aul is used.

D.

The authentication scheme aul is used for authentication. If the authentication scheme aul is deleted, the authentication scheme au2 is used.

Full Access
Question # 33

Which of the following statements about the routing table shown in the figure are true?

A.

The local router forwards data packets destined for 10.0.2.2 from Ethernet0/0/0.

B.

The next hop in the route to the destination network 10.0.3.3/32 is not directly connected. Therefore, the local router does not forward data packets destined for 10.0.3.3.

C.

The local router forwards data packets destined for 10.0.12.1 from Ethernet0/0/0.

D.

The local router forwards data packets destined for 10.0.3.3 from Ethernet0/0/0.

Full Access
Question # 34

A Layer 2 switch works at the data link layer. As such, it can identify MAC addresses in data frames, forward data based on MAC addresses, and record mappings between MAC addresses and interface numbers in its MAC address table.

A.

TRUE

B.

FALSE

Full Access
Question # 35

Which of the following parameters is used to elect the root bridge in STP?

A.

Bridge ID

B.

System name of the switch

C.

Port ID

D.

Root path cost

Full Access
Question # 36

When two switches are connected through link aggregation, what are the requirements for the interfaces on the two switches?

A.

The physical interface rates of the interconnected switches are the same.

B.

The physical interface quantities of the interconnected switches are the same.

C.

The models of the optical modules used by the interconnected switches are the same.

D.

The duplex modes of the physical interfaces on the interconnected switches are the same.

E.

The physical interface IDs of the interconnected switches are the same.

Full Access
Question # 37

A Layer 2 ACL can match information such as the source MAC address, destination MAC address, source IP address, and destination IP address.

A.

TRUE

B.

FALSE

Full Access
Question # 38

telnetlib is a module provided by Python to implement the Telnet protocol.

A.

TRUE

B.

FALSE

Full Access
Question # 39

Which of the following is the default value of the Router Dead Interval field in OSPF Hello packets on a broadcast network?

A.

20 seconds

B.

30 seconds

C.

40 seconds

D.

10 seconds

Full Access
Question # 40

Which of the following statements about the network shown in the figure is true?

A.

The sub-interface of Router B cannot learn the MAC address of the sub-interface of Router A.

B.

The sub-interface of Router A cannot learn the MAC address of the sub-interface of Router B.

C.

The sub-interface numbers of Router A and Router B are different, so Router A and Router B cannot communicate with each other.

D.

The host at 10.0.12.1 can ping the host at 10.0.12.2.

Full Access
Question # 41

For the Versatile Routing Platform (VRP), the login timeout period can be set only on a VTY interface.

A.

TRUE

B.

FALSE

Full Access
Question # 42

After an Eth-Trunk in LACP mode is created, devices on both ends send LACPDUs to elect the Actor. Which of the following parameters in LACPDUs determine the Actor election?

A.

Device priority

B.

Interface number

C.

MAC address

D.

Interface priority

Full Access
Question # 43

In RSTP mode, both alternate and backup ports cannot forward user traffic and cannot receive, process, and send BPDU.

A.

TRUE

B.

FALSE

Full Access
Question # 44

Which of the following statements regarding static routing and dynamic routing is incorrect?

A.

Dynamic routing will use more resources than static routes.

B.

The static routing can automatically recover when a link failure is encountered.

C.

The use of dynamic routing is more convenient for the administrator to manage the network following network convergence.

D.

The static routing can be easily configured and managed on the enterprise network.

Full Access
Question # 45

An ACL is essentially a packet filter. An ACL takes effect only after it is applied to a service module.

A.

TRUE

B.

FALSE

Full Access
Question # 46

What is the number range of an advanced ACL?

A.

2000-2999

B.

3000-3999

C.

6000-6031

D.

4000-4999

Full Access
Question # 47

On a Layer 2 WLAN, STAs use an AC as their gateway.

A.

TRUE

B.

FALSE

Full Access
Question # 48

The data link layer uses PPP encapsulation. The IP addresses of the two ends of the link can be in different network segments.

A.

TRUE

B.

FALSE

Full Access
Question # 49

Refer to the following configuration of an interface on a switch. What is the PVID of the interface?

interface GigabitEthernet0/0/1

port hybrid tagged vlan 2 to 3 100

port hybrid untagged vlan 4 6

A.

2

B.

100

C.

1

D.

4

Full Access
Question # 50

Which of the following states indicates that the OSPF neighbor relationship has been established?

A.

Attempt

B.

Down

C.

Full

D.

2-way

Full Access
Question # 51

Which of the following network parameters can be allocated using DHCP?

A.

Address of the DNS server

B.

Operating system

C.

Gateway address

D.

IP address

Full Access
Question # 52

If the transport-layer protocol is UDP, the value of the "Protocol" field at the network layer is 6.

A.

TRUE

B.

FALSE

Full Access
Question # 53

On an STP-enabled switch, a port in the Learning state can transition to the Forwarding state only after the Forward Delay timer expires.

A.

TRUE

B.

FALSE

Full Access
Question # 54

Which of the following VRP commands can be used to enter area 0 view?

A.

[Huawei-ospf-1] area 0.0.0.0

B.

[Huawei-ospf-1] area 0 enable

C.

[Huawei-ospf-1] area 0

D.

[Huawei] ospf area 0

Full Access
Question # 55

When a switch receives a unicast data frame, if the destination MAC address of the data frame can be found in the MAC address table of the switch, the data frame is definitely forwarded through the port corresponding to the MAC address.

A.

TRUE

B.

FALSE

Full Access
Question # 56

Which of the following is correct regarding the configuration of the trunk port and access port on a switch?

A.

Access ports can only send untagged frames.

B.

Trunk ports can only send tagged frames.

C.

Access ports can only send tagged frames.

D.

Trunk ports can only send untagged frames.

Full Access
Question # 57

UDP does not guarantee data transmission reliability and does not provide packet sorting and traffic control functions. It is suitable for the traffic that has low requirements for data transmission reliability, but high requirements for the transmission speed and delay.

A.

TRUE

B.

FALSE

Full Access
Question # 58

As shown in the figure, RTA uses NAT and has an address pool configured to implement many-to-many non-NAPT address translation, so that hosts on the private network can access the public network. Assume that the address pool has only two public IP addresses, which are translated for Host A and Host B. If Host C wants to access the public network, which of the following statements is true?

A.

All hosts use public IP addresses in turn and can access the public network.

B.

No public IP address is assigned to Host C, and Host C cannot access the public network.

C.

RTA performs NAT based on the source port number of Host C, and Host C can access the public network.

D.

RTA assigns an interface address (200.10.10.3) to Host C, and Host C can access the public network.

Full Access
Question # 59

Which of the following are features of the OSPF protocol?

A.

The shortest path is calculated based on the number of hops.

B.

Triggered update is supported.

C.

Routing loops are likely to occur.

D.

Area division is supported.

Full Access
Question # 60

If the IPv4 address of a host on a LAN is 192.168.1.1/30, the host will process IP packets with specific destination IP addresses. Which of the following IP addresses may be the destination IP addresses?

A.

192.168.1.3

B.

192.168.1.1

C.

192.168.1.2

D.

255.255.255.255

Full Access
Question # 61

As shown in the figure, which of the following ports will be in blocking state?

A.

G0/0/3 of SWA

B.

G0/0/3 of SWB

C.

G0/0/2 of SWC

D.

G0/0/1 of SWC

Full Access
Question # 62

Which of the following is not a characteristic of small campus networks?

A.

Simple network requirements

B.

Wide coverage

C.

Simple network architecture

D.

Small number of users

Full Access
Question # 63

The tree topology is a hierarchical star topology, facilitating network expansion. A consequence of this topology is that faults on a node at a higher layer are more severe.

A.

TRUE

B.

FALSE

Full Access
Question # 64

Assuming all STP enabled switches have the same bridge priority. The MAC address of switch A is 00-e0-fc-00-00-40, the MAC address of switch B is 00-e0-fc-00-00-10, the MAC address of switch C is 00-e0-fc-00-00-20, and the MAC address of switch D is 00-e0-fc-00-00-80. Which switch will be elected as the root switch?

A.

Switch B

B.

Switch A

C.

Switch D

D.

Switch C

Full Access
Question # 65

If Spanning Tree Protocol (STP) is disabled on the network consisting of switches, a Layer 2 loop will definitely occur.

A.

TRUE

B.

FALSE

Full Access
Question # 66

IPCP dynamic address negotiation can automatically obtain the address()

A.

True

B.

False

Full Access
Question # 67

After FIT AP obtains AC.'s IP address, what is the first operation to perform? ()

A.

B. Download the configuration file

B.

Establish a CAPWAP tunnel

C.

D. Request configuration file

Full Access
Question # 68

Which of the following statements is true about link aggregation in manual load balancing mode?

A.

A maximum of four active interfaces can be configured in manual load balancing mode.

B.

In manual load balancing mode, devices at both ends of a link send LACPDUs to each other.

C.

In manual load balancing mode, all active interfaces forward data and load balance traffic.

D.

The number of active interfaces can be set in manual load balancing mode.

Full Access
Question # 69

By default, the port cost calculated by STP has a certain relationship with the port bandwidth, that is, the larger the bandwidth, the higher the cost ()

A.

Big

B.

Unanimous

C.

uncertain

D.

small

Full Access
Question # 70

Which of the following statements about Prefix Segment is wrong? ()

A.

Prefix Segmont needs to be configured manually

B.

Prefix Segment spreads to other network elements through the IGP protocol, which is globally visible and effective

C.

Prefix Segment is used to identify a destination address prefix in the network (Prefix)

Full Access
Question # 71

The switch receives a unicast data frame. If the destination MAC of the data frame can be found in the MAC table, the data frame will be forwarded from the corresponding port of this MAC. ()

A.

True

B.

False

Full Access
Question # 72

VLAN4095 cannot be created on Huawei switches, and VLAN1 cannot be created ()

A.

True

B.

False

Full Access
Question # 73

Which information of the data frame is used by the VLANIF interface to determine whether to perform Layer 2 or Layer 3 forwarding? ()

A.

Destination MAC

B.

B. Source MAC

C.

C. Destination port

D.

D. Source IP

Full Access
Question # 74

UDP has a sliding window mechanism to control the speed of data transmission

A.

True

B.

False

Full Access
Question # 75

What are the characteristics of VLAN based on ports? ()

A.

Add an AVLAN tag to the data frame according to the IP address carried in the message

B.

B. Assign VLAN ID according to the protocol type and encapsulation format of the data frame

C.

C. No need to reconfigure VLAN when the host moves

D.

When the host moves, the VLAN needs to be reconfigured

Full Access
Question # 76

When using the FTP protocol to upgrade the router software, the transmission mode should be selected ()

A.

Binary mode

B.

B. Byte mode

C.

C. Text mode

D.

D. Stream byte mode

Full Access
Question # 77

The following statement about the TTL field in the IP packet header is correct. ()

A.

TTL defines the time interval at which the source host can send data packets

B.

B. TTL defines the number of packets that the source host can send

C.

Each time a P packet passes through a router, its TTL value will be reduced by 1

D.

Each time an IP packet passes through a router, its TTL value is increased by 1

Full Access
Question # 78

On the VRP platform, which of the following methods can be used to access previous historical commands? ()

A.

Ctr1+U

B.

Ctr1+P

C.

Left cursor

D.

Up cursor

Full Access
Question # 79

How many types of data flows with different service levels can be marked based on MPLS labels? ()

A.

4

B.

2

C.

16

D.

8

Full Access
Question # 80

When the switch port receives a data frame that does not carry VLAN TAG, it must add PVID. ()

A.

True

B.

False

Full Access
Question # 81

Use the command kdir test in the VRP operating platform. The system will create a directory named test.

A.

True

B.

False

Full Access
Question # 82

What kind of message does the DHCP server use to confirm that the host can use the IP address? ()

A.

B. DHCP ACK

B.

DHCP OFFER

C.

D. DHCP REQUSET

Full Access
Question # 83

When deploying ACL on Huawei equipment, which of the following descriptions is correct is ().*

A.

ACL can match the TCP/UDP port number of the packet, and can specify the range of port numbers

B.

The same ACL can be called under multiple interfaces

C.

When ACL defines rules, it can only proceed in the order of 10, 20, 30

D.

ACL cannot be used to filter OSPF traffic, because OSPF traffic does not use UDP protocol encapsulation

E.

When calling ACL under the interface, it can only be applied to the outbound direction

Full Access
Question # 84

Is there any correct statement about the shortcut keys of the VRP operating platform? ()*

A.

TAB. Prompt for the most recently entered command

B.

CTRL+C. Stop the current command

C.

The left cursor key (<) moves the cursor one place to the left.

D.

CTRL+Z back to user view

Full Access
Question # 85

In STP, the bridge ID on the switching network is as follows. With which of the following bridge IDs is the switch selected as the root bridge?

A.

32768 00-01-02-03-04-BB

B.

4096 00-01-02-03-04-DD

C.

32768 00-01-02-03-04-CC

D.

32768 00-01-02-03-04-AA

Full Access
Question # 86

In the STP protocol, which of the following factors will affect the election of the root switch? ()*

A.

MAC address of the switch

B.

IP address of the switch

C.

Switch priority

D.

Switch interface bandwidth

E.

Switch interface ID

Full Access
Question # 87

Network administrators use Ping to test the connectivity of the network. Which of the following protocols may be used in this process? ()

A.

ICMP

B.

UDP

C.

TCP

D.

ARP

Full Access
Question # 88

By referring to the network structure and OSPF areas shown in the figure, it can be determined that all routers on the network except RTA are ABRs.

A.

TRUE

B.

FALSE

Full Access
Question # 89

Which of the following port states is not included in the RSTP protocol? ()

A.

Learning

B.

Discarding

C.

Forwarding

D.

Blocking

Full Access
Question # 90

In order to join the wireless network $TA. The wireless network information needs to be obtained first. Which of the following messages is used by the STA to actively obtain the SSID information? ()

A.

Probe

B.

B. Join

C.

C. Discovery

D.

D. Beacon

Full Access
Question # 91

The output information of the router R1 routing table is shown in the figure. Which of the following statements is correct? () (Multiple Choice Questions)

<R1>display ip routing-table

Route Flags: R-relay, D-download to fib

A.

The data packet whose destination network is 12.0.0.0/8 will be forwarded from the router's Ethernet0/0/0 interface

B.

The router will discard packets whose destination network is 11.0.0.0/8

C.

The router will forward data packets whose destination network is 12.0.0.0/8

D.

The data packet whose destination network is 11.0.0.0/8 will be forwarded from the router's GigabitEthernet0/0/0 interface

Full Access
Question # 92

Which of the following features does the OSPF protocol have? ()*

A.

Support area division

B.

Prone to routing loops

C.

Calculate the shortest path based on the number of hops

D.

Trigger update

Full Access
Question # 93

Which of the following parameters need to be considered when electing a root port in STP? ()*

A.

Port priority

B.

Port slot number, such as G0/0/1

C.

Duplex mode of the port

D.

The cost of the port reaching the root switch

E.

MAC address of E port

Full Access
Question # 94

In order to realize the network layer function on the VLANIF interface, do you need to configure it on the VLANIF interface? ()

A.

MAC.Address

B.

Subnet mask

C.

IP prefix

D.

IP address

Full Access
Question # 95

The network shown in the figure below. From a security perspective, router A refuses to receive OSPF packets and ICMP packets received from interface G0/0/1. Which of the following commands can achieve this requirement? () (Multiple Choice Questions)

A.

acl number 3000

Rule 5 deny 89

Rule 10 deny icmp

#

Interface GigabitEthernet0/0/1Traffic-filter inbound acl 3000#

B.

acl number 3000

Rule 5 deny 89

Rule 10 deny 1

#

Interface GigabitEtherneto/0/1Traffic-filter inbound acl 3000#

C.

acl number 2000

Rule 5 deny 89

Rule 10 deny 1

#

Interface GigabitEthernet0/0/1Traffic-filtet inbound acl 2000#

D.

acl number 3000

Rule 5 deny ospf

Rule 10 deny icmp

#

Interface GigabitEthernet0/0/1Traffic-filtet inbound acl 3000#

Full Access
Question # 96

With what kind of routers does a DRother router exchange link state information and route information?

A.

DRother

B.

DR

C.

BDR

D.

All OSPF neighbors

Full Access
Question # 97

For STP, the Message Age in the configuration BPDUs sent by the root bridge is 0.

A.

TRUE

B.

FALSE

Full Access
Question # 98

The load balancing modes at both ends of an Eth-Trunk can be different.

A.

TRUE

B.

FALSE

Full Access
Question # 99

After a fault occurs in the network, the administrator finds that the configuration of a certain router has been modified through troubleshooting. What measures should the administrator take to avoid this situation from happening again? ()*

A.

The administrator should configure ACL to control that only the administrator can log in to the device

B.

The administrator should enable port-security on the routed management port

C.

The administrator should configure AAA. to authenticate and authorize users who log in to the device

D.

The administrator should configure the permission level of all accounts except the administrator to log in to the device as

Full Access
Question # 100

Refer to the graphic, which of the following statements is true about OSPF topology and configuration?

A.

Compared with R1, R2 is more likely to become the DR because the DR priority of the interface on R2 is lower than that of R1.

B.

After the default network type of the interface on R1 is restored to broadcast, a stable OSPF neighbor relationship can be set up between R1 and R2.

C.

After the default network type of the interface on R1 is restored to broadcast and the hello packet sending interval is changed to 10s, a stable OSPF neighbor relationship can be set up between R1 and R2.

D.

A stable OSPF neighbor relationship can be set up between R1 and R2.

Full Access
Question # 101

How to add AP on AC.? ()*

A.

Import AP offline

B.

Automatically discover AP

C.

Add online

D.

Manually confirm APs in the non-certified list

Full Access
Question # 102

If the network administrator assigns the IPv4 address 192.168.1.1/28 to a host on the network, how many hosts can be added to the network where the host resides?

A.

13

B.

15

C.

14

D.

12

Full Access
Question # 103

When configuring the PPP authentication mode as PAP, which of the following operations are necessary? ()*

A.

Configure the data link layer encapsulation type of the interface connected to the peer device to PPP

B.

Add the user name and password of the authenticated party to the authenticating party's local user list

C.

Set the authentication mode of PPP to CHAP

D.

Configure the user name and password sent to the authenticating party on the authenticated party

Full Access
Question # 104

DHCP is an application layer protocol. In order to make it more reliable when assigning P, its transport layer uses TCP protocol.

A.

True

B.

False

Full Access
Question # 105

In the network shown in the figure below, the bridge ID of the switch has been marked. Enter the command stp rootsecondary on the sWD. switch and the following switch will become the root bridge of this network. ()

A.

SWA

B.

SWB

C.

D. SWD

Full Access
Question # 106

The HybriD. port can be connected to the user host or other switches. ()

A.

True

B.

False

Full Access
Question # 107

When planning a campus network, which of the following methods can be used to divide service VLANs? ()

A.

VLAN by business

B.

C. Divide VLAN by logical area

C.

D. Divide VLAN into J by geographical area

Full Access
Question # 108

What is the protocol number corresponding to the ospf protocol at the network layer? ()

A.

89

B.

B. 6

C.

0

D.

D. 1

Full Access
Question # 109

The router running the OSPF protocol reaches the FULL state first, and then synchronizes the LSDB. ()

A.

True

B.

False

Full Access
Question # 110

CSS refers to the combination of two switch devices that support cluster features. Logically combined into one switch device. ()

A.

True

B.

False

Full Access
Question # 111

Which of the following IPv6 is a global unicast address ()

A.

2001::12:1

B.

B. FF02:1

C.

C. FF:02:2E0:FCFF:FEEF:FEC

D.

D. FEE:FCFF:FEEF:FEC

Full Access
Question # 112

The Backup port in RSTP can replace the failed root port ()

A.

True

B.

False

Full Access
Question # 113

1/128 is the IPv6 loopback address ()

A.

True

B.

False

Full Access
Question # 114

The last option field (option) of 1Pv4 is variable-length optional information. What is the maximum length of this field? ()

A.

10B

B.

40B

C.

60B

D.

20B

Full Access
Question # 115

If the network address of a network is 192.168.1.0, then its broadcast address must be 192.168.1.255. ()

A.

True

B.

False

Full Access
Question # 116

When accessing across network segments, the source and destination IP will change, and the source and destination MAC will not change

A.

True

B.

False

Full Access
Question # 117

The following statement about Python is incorrect ()

A.

Is a fully open source high-level programming language

B.

B. Has a rich third-party library

C.

Have a clear grammatical structure, easy to learn, and high efficiency for colleagues

D.

Can be used for automated operation and maintenance scripts, artificial intelligence data science and many other fields

Full Access
Question # 118

How many more bytes are the packets using MPLS label double-layer nesting technology than the original IP packets ()

A.

8

B.

4

C.

D. 16

Full Access
Question # 119

Which of the following packet types is used by RADIUS to indicate authentication rejection? ()

A.

Access-Accept

B.

Access-Request

C.

Access-Challenge

D.

Access-Reject

Full Access
Question # 120

Which of the following fields is not included in the HELL0 packet of the OSPF protocol? ().

A.

Neighbor

B.

Network Mask

C.

HelloInterval

D.

Sysname

Full Access
Question # 121

The administrator hopes that RTA. uses static routing and preferentially sends data packets to RTB's Loopback0 interface through G0/0/1 port, while G0/0/2 is used as a backup. How to configure on RTA to achieve this requirement ()

A.

ip route-statiC.10.0.2.2255.255.255.255 10.0.12.2ip

Route-statiC.10.0.2.2255.n255.255.255 10.0.21.2 preference 40

B.

ip route-statiC.10.0.2.2255.255.255.25 5 10.0.12.2 preference 70 ip route-static/n10.0.2.2255.255.255.25510.0.21.2

C.

ip route-statiC.10.0.2.2255.255.255.255 10.0.12.2ip

Route-statiC.10.0.2.2255.255.n255.25510.0.21.2

D.

ip route-statiC.10.0.2.2255.255.255.25510.0.12.2ip

Route-statiC.10.0.2.2255.n255.255.255

Full Access
Question # 122

After the network administrator uses the TracertRoute function on the router device, in the data packet sent by the router, the value of the Protoco1 field in the IPv4 header is? ()

A.

17

B.

2

C.

6

D.

1

Full Access
Question # 123

When using FTP for file transfer, how many TCP connections will be established? ()

A.

2

B.

B. 1

C.

C. 3

D.

D. 4

Full Access
Question # 124

Which of the following authentication methods does not require the user name and password? ()

A.

authentication-mode none

B.

C. authorization-mode hwtacacs

C.

D. Authentication-mode hwtacacs

Full Access
Question # 125

The router forwards data according to the IP routing table, and the Layer 2 switch forwards data according to the MAC. address table

A.

True

B.

False

Full Access
Question # 126

In the wLAN network architecture, terminal devices that support the 802.11 standard are called? ()

A.

Client

B.

AC

C.

STA

D.

AP

Full Access
Question # 127

A certain ACL of the router is in the following rules, rule deny source192.168.2.00.0.0.255 destination 172.16.10.20.0.0.0 Which of the following statements is correct? ()

A.

The source IP is 172.16.10.2. All TCP packets whose destination IP is 192.168.2.1 match this rule

B.

All TCP packets whose source IP is 192.168.2.1 and destination IP is 172.16.10.1 match this rule

C.

C. sourceIP is 172.16.10.2 and all TCP packets whose destination IP is 192.168.2.0 match this rule

D.

sourceIAll TCP packets whose P is 192.168.2.1 and destination P is 172.16.10.2 are configured with this rule.

Full Access
Question # 128

In VRPOn the platform, the command"interfacevlanit<vlan-id>"The role is (). ()

A.

B. No such command

B.

Create or enter VLAN virtual interface view

C.

D. Configure VLAN for a port

Full Access
Question # 129

Which of the following are not the characteristics of a small campus network? ()

A.

Simple network level

B.

Fewer users

C.

Simple network requirements

D.

Wide coverage

Full Access
Question # 130

On the broadcast network, both DR and BDR use the multicast address 224.0.0.6 to receive link state update messages ()

A.

True

B.

False

Full Access
Question # 131

For switches running the STP protocol, the port needs to wait for the forwarding delay in the Learning state to transform into the Forwarding state. ()

A.

True

B.

False

Full Access
Question # 132

An existing switch is connected to a designated port through a port, but the port does not forward any packets, but can monitor network changes by receiving BPDUs, then the role of the port should be ().

A.

Alternate port

B.

Disable port

C.

D. Root port

Full Access
Question # 133

The correct setting of the terminal emulation program when configuring the router through the Console ()

A.

B. 9600bps, 8 data bits, 1 stop bit, even parity and hardware flow control

B.

9600bps, 8 data bits, 1 stop bit, no checksum and no flow control

C.

D. 4800bps, s data bit, 1 stop bit, odd checksum and no flow control

Full Access
Question # 134

Which of the following statements about the edge port in the RSTP protocol is correct? ()

A.

The edge port discards the received configuration BPDU packet

B.

The edge port can be directly transferred to the Forwarding state from Disable

C.

Edge port participates in RSTP operation

D.

The interconnection ports between switches need to be set as edge ports

Full Access
Question # 135

ARP request is sent by ()

A.

broadcast

B.

B. Unicast

C.

C. There are broadcast and unicast

D.

D. Multicast

Full Access
Question # 136

By default, what is the ForwarD.Delay time of the STP protocol in seconds? ()

A.

B. 10

B.

15

C.

D. 20

Full Access
Question # 137

DNS is used for domain name resolution

A.

True

B.

False

Full Access
Question # 138

What is the function of the command port trunk allow pass vlan all? ()

A.

If the port default vlan3 command is configured for the connected remote device, VLAN3 cannot communicate between the two devices

B.

All VLAN data frames are allowed to pass through this port

C.

The connected peer device can dynamically determine which VLAN IDs are allowed.

D.

The opposite port connected to the port must be configured with port trunk permit vlan all at the same time

Full Access
Question # 139

In the VRP interface, use the command startup saved-confi guration backup.cfg. Configure the backup.cfg file to be used at the next startup. ()

A.

True

B.

False

Full Access
Question # 140

Regarding the configuration shown in the figure, which statement is correct? () (Single-choice question)

A.

history-command max-size20 is to adjust the size of the history named cache to 20

B.

B. The default size of the history command cache is 5 bytes

C.

After the above configuration is completed, the history command buffer can store 20 bytes of commands

D.

The default size of the history command cache is 5

Full Access
Question # 141

AAA. Which of the following is not included? ()

A.

Authentication

B.

Accounting

C.

Authorization

D.

Audit

Full Access
Question # 142

The administrator made the configuration on the router as shown in the figure. At the same time, the administrator wants to assign a shorter lease period to the DHCP address. Which of the following commands should be used? () (Single-choice question)

ip pool pooll

netyork10.10.10.0ask255.255.255.0

gateway-list 10.10.10.1

A.

B. Dhcp select relay

B.

C. Lease day 0 hour 10

C.

D. Lease 24

Full Access
Question # 143

Telnet is a module that implements the Telnet protocol that comes with Python ()

A.

True

B.

False

Full Access
Question # 144

Which stage in the life cycle of campus network construction is the beginning of a project? ()

A.

B. Network implementation

B.

Planning and design

C.

Network operation and maintenance

Full Access
Question # 145

Which of the following SNMP packets are sent to the NMS by the Agent on the managed device ()

A.

Set-Request

B.

Get-Request

C.

Get-Next-Request

D.

Response

Full Access
Question # 146

All the devices in the picture can communicate normally. Is the corresponding relationship between the MAC address table of $WA and the port correct? () (Single-choice question)

A.

MAC-AG0/0/2

MAC-BG0/0/2

MAC-CG0/0/3

B.

MAC-AG0/0/1

MAC-BG0/0/2

MAC-CG0/0/1

C.

MAC-A--GO/0/1

MAC-B--G0/0/1

MAC-C--GO/0/3

D.

MAC-A--GO/0/1

MAC-B-G0/0/2

MAC-C-GO/0/3

Full Access
Question # 147

If the configured ACL rules have an inclusive relationship, it should be noted that the rule numbers of strict conditions need to be sorted first, and the rule numbers of loose conditions need to be sorted later to prevent packets from hitting the rules of loose conditions and stop being pushed down to continue matching. Cannot hit the strict conditions of the rules. ()

A.

True

B.

False

Full Access
Question # 148

Which of the following are related to the purpose of encapsulation and decapsulation? ()

A.

Encapsulation and decapsulation can complete network fault location

B.

Encapsulation and decapsulation are important steps to realize the functions of different protocols

C.

Interworking between different networks

D.

D. Shorten the length of the message

Full Access
Question # 149

The priority of the LACP protocol is shown in the figure. Switch A and Switch B adopt LACP mode link aggregation, and all interfaces are added to the link aggregation group. At the same time, set the maximum number of active ports to 3. Then which port of switch A is not an active port ? () (Single-choice question)

A.

G0/0/0

B.

G0/0/1

C.

G0/0/2

D.

G0/0/3

Full Access
Question # 150

Management Information Base (MIB) Information Base) is a virtual database, this database only exists on NMS. ()

A.

True

B.

False

Full Access
Question # 151

Which of the following statements about Prefix Segment is wrong? ()

A.

Prefix Segment spreads to other network elements through the IGP protocol, which is globally visible and effective

B.

B. Prefix Segment needs to be configured manually

C.

Prefix Segment is used to identify a destination address prefix in the network (Prefix)

D.

Prefix Segment can be automatically allocated by IGP

Full Access
Question # 152

The protocol uses the P/A. mechanism to speed up the upstream port's transition to the Forwarding state, but what is the reason for no temporary loop? ()

A.

Ensure that there will be no temporary loops through the synchronization mechanism

B.

B. Speed ​​up port role election

C.

C. Reduced the time of ForwarD.Delay

D.

D. Edge port

Full Access
Question # 153

Which packet type is used by network devices running the SNMPv1 protocol to actively send alarm information? ()

A.

Trap

B.

B. Response

C.

C. Get Request

D.

D. Get-Next Request

Full Access
Question # 154

In the OSI reference model, what can complete end-to-end error detection and flow control is ()

A.

Physical layer

B.

data link layer

C.

Network layer

D.

Transport layer

Full Access
Question # 155

As shown in the figure, is the description of this network topology correct? () (Single-choice question)

A.

There are 6 broadcast domains in this network

B.

There are 12 conflict domains in this network

C.

There are 6 conflict domains in this network

D.

There are 2 broadcast domains in this network

Full Access
Question # 156

AC. Use CAPWAP control tunnel to transmit management messages to FIT AP. ()

A.

True

B.

False

Full Access
Question # 157

In the MAC address table of the switch, which of the following entries will not age? ()

A.

Static MAC. Address table entry

B.

C. Port MAC. Address table entry

C.

D. Device MAC. Address table entry

Full Access
Question # 158

The two-layer switch is a data link layer device, which can identify the MAC address information in the data frame, and record these MAC addresses and corresponding port information in its own MAC address table. ()

A.

True

B.

False

Full Access
Question # 159

Two switches use manual link aggregation at the same time. The following statement is wrong. () (Single-choice question)

A.

Only switch off G0/0/2 port on switch B. The Eth-Trunk status is still UP

B.

Turn off the G0/0/1 and G0/0/2 ports on switch B, and the Efh-Trunk status is still UP

C.

C. Only switch off G0/0/1 port on switch B. The Eth-Trunk status is still UP

D.

D. Turn off the G0/0/1 and G0/0/2 ports on switch B. The Eth-Trunk status is down

Full Access
Question # 160

The information shown in the figure is the port status information displayed on a switch running STP. According to this information, what is wrong in the following description? () (Single-choice question)

A.

B.The priority of this switch is 0

B.

C.This network may only contain this switch

C.

This switch may be connected to 6 other switches

Full Access
Question # 161

Which of the following fields is not included in the HELL0 packet of the OSPF protocol? ()

A.

B. Network mask

B.

Sysname

C.

D. Hellointerval

Full Access
Question # 162

Complete the ACL configuration shown in the figure on the router RTA. Which of the following descriptions is correct? () (Single-choice question)

(RTA) acl 2001

(RTA-acl-basic-2001) rule 20 permit source 20.1.1.0 0.0.0.255

ï¼»RTA-acl-basic-2001ï¼½rule 10 deny source 20.1.1.0 0.0.0.255

A.

The VRP system will adjust the sequence number of the first rule to 5 according to the configuration sequence.

B.

The VRP system will not adjust the sequence number, but will first match the rule permit source 20.1.1.00.0.0.255

C.

The VRP system will first match the rule deny source20.1.1.00.0.0.255 according to the sequence number.

D.

The sequence number of configuration error rules must be configured from small to large

Full Access
Question # 163

The following description of static and dynamic routing is wrong ().

A.

Dynamic routing protocols take up more system resources than static routing protocols.

B.

After the link fails, the static route can automatically complete the network convergence.

C.

After the administrator deploys the dynamic routing protocol in the corporate network, later maintenance and expansion can be more convenient

D.

Static routing is easy to configure and easy to manage when applied in the enterprise

Full Access
Question # 164

As shown in the figure, a static NAT command is deployed on router R1. When the PC accesses the Internet, the destination address in the data packet will not change. ()(True or False)

A.

B. False

Full Access
Question # 165

When the router forwards a data packet, if it does not match the corresponding detailed route and there is no default route, it will directly discard the data packet ()

A.

True

B.

False

Full Access
Question # 166

What identifies the coverage area of ​​an AP in a WLAN? ()

A.

B. SSID

B.

BSSID

C.

D. ESS

Full Access
Question # 167

Which of the following statements about the usage scenarios of the DHCP protocol is correct? ()

A.

network does not allow multiple DHCP servers

B.

After receiving the DHCP request or response message, the DHCP relay does not modify the message format and forwards it directly

C.

If the DHCP client and the DHCP server are not on the same network segment, the DHCP relay needs to be used to forward DHCP messages

D.

D. DHCP client and DHCP server must be connected to the same switch

Full Access
Question # 168

Apply the ACL configured in the figure in Telnet. Only the device with the IP address of 172.16.105.2 is allowed to log in remotely: ()#acl number 2000 rule 5 permit source 172.16.105.20#

A.

True

B.

False

Full Access
Question # 169

On Huawei devices, if you use aaA authentication to authorize. When the remote server does not respond, you can authorize from the network device side ()

A.

True

B.

False

Full Access
Question # 170

Which information of the data frame is used by the interface to determine whether to forward Layer 2 or Layer 3 forwarding? ()

A.

Source IP

B.

Source MAC

C.

Destination port

D.

Destination MAC

Full Access
Question # 171

Which of the following are not the characteristics of a small campus network? ()

A.

Low number of users

B.

Single network level

C.

Simple network requirements

D.

Wide coverage

Full Access
Question # 172

The network administrator configures the RTA on the Huawei router as shown in the figure. If a user needs to be authenticated in the authentication domain "huawei", which of the following descriptions is correct? () (Single-choice question)

(RTA) aaa

(RTA-aaa) domain huawei

(RTA-aaa-doaain huavei) authentication -schene au1

(RTA-aaa-dogairhuavel) authenticIcation-schene au2

A.

B."Authentication-scheme aul authentication will be used. If "au1 is deleted."au2 authentication will be used

B.

"Authentication-scheme au2 authentication will be used. If "au2" is deleted, "aul authentication will be used

C.

D.Will use "authentication-scheme au2" authentication

Full Access
Question # 173

Which of the following parameters cannot be used for advanced access control lists? ()

A.

B. Destination port number

B.

Physical interface

C.

D. time limit

Full Access
Question # 174

As shown in the figure, the network administrator creates VLAN2 on SWA and SWB. The ports connecting the hosts on the two switches are configured as Access ports. They are assigned to VLAN2. G0/0/1 of SWA and G0/0/2 of SWB are configured as Trunki ports. All VLANs are allowed to pass. What is needed to achieve normal communication between two hosts? () (Single-choice question)

A.

Configure G0/0/1 on SWC as a trunk port and allow VLAN2 to pass. Set G0/0/2 as an access port. PVID is 2.

B.

Create VLAN2 on SWC, configure G0/0/1 and G0/0/2 as trunk ports, and allow VLAN2 to pass

C.

C. Just create BLAN2 on SWC

D.

Configure G0/0/1 on SWC as a teunk port and allow VLAN2 to pass through

Full Access
Question # 175

What is the destination IP address of the DHCP DISCOER message? ()

A.

127.0.0.1

B.

224.0.0.1

C.

224.0.0.2

D.

255.255.255.255

Full Access
Question # 176

Network as shown in the picture. The administrator hopes that all hosts cannot access the Web service (the port number is 80). Other services can be accessed normally. In the interface configuration of G0/0/1, which ACL rule needs to be bound to trattie-frilter outbound?

A.

rule 5 permit ip

ARule 10 deny top destination-port eq ww#

B.

acl number 3003

Rule 5 permit ip

Rule 10 deny udp destination-port eq ww#

C.

acl number 3001

Rule 5 deny udp destination-port eq ww

Rule 10 permit ip

#

D.

acl number 3000

Rule 5 deny tcp destination-port eq www Rule 10 permit ip

#

Full Access
Question # 177

The network is shown in the figure. Which router is the BDR in this network? () (Single-choice question)

A.

B. No BDR

B.

C. Router C

C.

D. Router A

Full Access
Question # 178

In the history of WLAN development, which of the following is not included in the main wireless protocol standards in the primary mobile office era? ()

A.

802.11g

B.

802.11a

C.

802.11b

D.

802.11ac

Full Access
Question # 179

As shown in the following figure, in the switching network, all switches are running the stp protocol. When the topology is stable, which of the following switches can be used to modify the BPDU sending cycle. Can it affect the SWD configuration BPDU sending cycle? () (Single-choice question)

A.

SWA

B.

C. SWC

C.

D. SWD

Full Access
Question # 180

At what percentage does the DHCP client send the lease renewal message for the first time? ()

A.

0.5

B.

B. 0.875

C.

C. 1

D.

D. 0.25

Full Access
Question # 181

The configuration information of a certain port of the switch is shown in the figure. Which of the following statements is wrong? ()

interface GigabitEthernet0/0/1 port link type trunk port trunk pviD.vlan 200 port trunk allow-pass vlan100#

A.

If the VLAN TAG carried in the data frame is 100, the switch will strip off the VLAN TAG and send it out

B.

This port cannot send data frames carrying VLAN TAG200

C.

C. The port type is Trunk type

D.

If the port receives a data frame without VLAN TAG, the switch needs to add VLAN TAG 200

Full Access
Question # 182

The network administrator has captured a data frame on the network, and its destination MAC address is 01-00-5E-A0-B1-C3. The correct statement about the MAC. address is ().

A.

It is a multicast MAC. address

B.

B. It is a unicast MAC. address

C.

C. It is a broadcast MAC. address

D.

D. It is an illegal MAC. address

Full Access
Question # 183

In an IPv4 network, AP supports static and DHCP methods to obtain IP addresses. ()

A.

True

B.

False

Full Access
Question # 184

Which of the following descriptions about the switch is wrong?

A.

The switch is generally used as the export equipment of the network

B.

B. Switches generally work at the data link layer

C.

C. The switch can complete the exchange of data frames

D.

D. The switch can provide network access services for terminal devices (PC/server)

Full Access
Question # 185

The origin of SDN is the separation of transfer and control. The separation of transfer and control is a way to realize SDN, not the essence. ()

A.

True

B.

False

Full Access
Question # 186

For switches running the SIP protocol, the port needs to wait for the forwarding delay in the Learning state before it can be converted to the Forwarding state. ()

A.

True

B.

False

Full Access
Question # 187

Among the configuration BPDUs sent by the switch, which bridge D. is unlikely to appear? ()

A.

819200-01-02-03-04-CC

B.

409600-01-02-03-04-CC

C.

000-01-02-03-04-CC

D.

204800-01-02-03-04-CC

Full Access
Question # 188

The IPv6 protocol uses NS and NA. packets for duplicate address detection ()

A.

True

B.

False

Full Access
Question # 189

The following rules exist in an ACL of a router. Rule deny top source192.168, 1.00.0.0.255 destination 172.16.10.1 0.0.0.0 destination-port eq 21 is the correct statement? ()

A.

sourceIP is 192.168.1.1, destination P is 172.16.10.1, and all TCP packets with destination port number 21 match this rule

B.

The source IP is 192.168.1.1, the destination IP is 172.16.10.2, and all 1CP packets whose destination port number is 21 match this rule

C.

Rule sourceIP is 192.168.1.1, the destination IP is 72.16.10.3, and all TCP packets with the destination port number of 21 match this rule

D.

D. The type of ACL is basic ACL

Full Access
Question # 190

As shown in the picture. About OSPF topology and configuration. Which of the following statements is correct? () (Single-choice question)

A.

R1 and R2 can establish a stable OSPF neighbor relationship

B.

R1 is more likely to become DR than R2, because its interface DR priority value is smaller

C.

As long as the interface network type of R1 is restored to the default broadcast type, R1 and R2 can establish a stable neighbor relationship

D.

As long as the interface network type of R1 is restored to the default broadcast type, and the hello time is adjusted to 10s, R1 and R2 can establish a stable neighbor relationship

Full Access
Question # 191

By default, the root path cost of the root bridge in the STP protocol must be 0 ()

A.

True

B.

False

Full Access
Question # 192

As shown in the figure below. Host A and Host B cannot communicate. ()(True or False)

A.

True

B.

False

Full Access
Question # 193

In order to distinguish between different users and provide different network services on the AP. Which of the following can be configured through configuration? ()

A.

VT

B.

B. VAP

C.

VAC

D.

D. WAP

Full Access
Question # 194

The DHCPv6 server supports the provision of other configuration information such as DNS server addresses for the host.

A.

True

B.

False

Full Access
Question # 195

The network shown in the figure below assumes that all routers can enable OSPF at the same time. Which router is the DR in this network? () (Single-choice question)

A.

Router B

B.

B. Router D

C.

C. Router A

D.

D. Router C

Full Access
Question # 196

The number of VLANs that can be created using the commands "vlan batch1020 and "vlan batch10to20" respectively is ()

A.

11 and 11

B.

11 and 2

C.

2 and 2

D.

2 and 11

Full Access
Question # 197

When two OSPF routers form a 2-WAY neighbor relationship, the LSDB. has been synchronized. ()

A.

True

B.

False

Full Access
Question # 198

What is the default step length of ACL on AR G3 series routers? ()

A.

10

B.

5

C.

20

D.

15

Full Access
Question # 199

After the network administrator uses the Tracer tRoute function on the router device, in the data packet sent by the router, the value of the Protoco1 field in the IPv4 header is?

A.

17

B.

B. 2

C.

1

D.

D. 6

Full Access
Question # 200

In the network shown in the figure below, what commands can be entered on the router to make host A ping host B through? ()

A.

RTA:ip route-static 0.0.0.0 0.0.0.0 11.0.12.2

RTB:ip route-static 0.0.0.0 0.0.0.0 11.0.12.1

B.

RTA:ip route-static 10.0.12.5 255.255.255.25211.0.12.2

RTB: route-static10.0.12.1255.255.255.25211.0.12.1

C.

RTA:ip route-static 0.0.0.0 0.0.0.0 11.0.12.1

CRTB:ip route-static 0.0.0.0 0.0.0.0 11.0.12.2

D.

RTA:ip route-static 10.0.12.5 255.255.255.25211.0.12.1

RTB:ip route-static 10.0.12.1 255.255.255.25211.0.12.2

Full Access
Question # 201

The DHCPv6 server supports the provision of other configuration information such as DNS server addresses for the host. ()

A.

True

B.

False

Full Access
Question # 202

By default, on the broadcast networkOSPFWhat is the transmission period of the protocol HELLO message? ()

A.

10s

B.

40s

C.

30s

D.

20s

Full Access
Question # 203

VRP operating platform, which of the following commands can only view static routes? ()

A.

display ip routing-table statistics

B.

display ip routing-table verbose

C.

display ip routing-table

D.

display ip routing-table protocol static

Full Access
Question # 204

NAPT allows multiple private IP addresses to be mapped to the same public P address through different port numbers. The following description of the port number in NAPT is correct ().

A.

The correspondence between port numbers and private addresses must be manually configured

B.

No need to do any configuration about port number

C.

Only need to configure the range of port numbers

D.

Need to use ACL to assign port numbers

Full Access
Question # 205

If the administrator wants to completely delete the old device configuration file, the following command is correct ().

A.

clear config.zip

B.

delete /unreserveD.config.zip

C.

delete /force config.zip

D.

reset config.zip

Full Access
Question # 206

If the application layer protocol is Te1net, then the value of the Protoco1 field in the IPv4 header? ()

A.

23

B.

17

C.

6

D.

67

Full Access
Question # 207

Only the WPA2-PSK security policy supports the use of TKIP for data encryption. ()

A.

True

B.

False

Full Access
Question # 208

In order for the STA to obtain the SSID related information on the AP, which of the following messages is used by the AP to proactively declare the wireless network SSID information? ()

A.

Join

B.

eacon

C.

Probe

D.

Discovery

Full Access
Question # 209

NFV (Network Functional Virtualization), network function virtualization, realizes the deployment of network applications in a software-based way. ()

A.

True

B.

False

Full Access
Question # 210

By default, what is the period for sending 0SPF HELLO packets on the broadcast network? ()

A.

10s

B.

B. 20s

C.

C. 30s

D.

D. 40s

Full Access
Question # 211

The basic header length of IPv6 packets is a fixed value ()

A.

True

B.

False

Full Access
Question # 212

Which of the following OSPF versions is suitable for IPv6? ()

A.

OSPFv1

B.

OSPFv2

C.

OSPFv3

D.

OSPFv4

Full Access
Question # 213

Which of the following IPv6 addresses can be abbreviated as 2FFF DAC:ABEF:CDAA:732? ()

A.

2FFF:ODAC.:ABEF:0000:0000:0000:CDAA4:0732

B.

2FFF:ODAC:ABEF 0000:0000:CDAA:0732

C.

2FFF DACO:ABEF 0000000:0000:CDAA:0732

D.

2FFF:ODAC:ABEF:0000:0000:0000:CDAA:7320

Full Access
Question # 214

In the RSTP protocol, when the edge port receives the configuration BPDU message, it loses the edge port attribute. ()

A.

True

B.

False

Full Access
Question # 215

When AP and MC are in different Layer 3 networks, what method is recommended for AP to discover AC?

A.

DHCP

B.

DNS

C.

Broadcasting method

D.

Manually specified on AP

Full Access
Question # 216

In the WLAN architecture, the FIT AP cannot work independently and needs to be managed by AC. Which of the following protocols are used to communicate between FIT AP and AC.? ()

A.

IPsec

B.

WEP

C.

APWAP

D.

WAP

Full Access
Question # 217

What is RouterDeadInterval of the OSPF protocol on the broadcast network by default? ()

A.

40s

B.

10s

C.

20s

D.

30s

Full Access
Question # 218

SNMPv1 defines five protocol operations. ()

A.

True

B.

False

Full Access
Question # 219

Now you need to implement a Python automation script Telnet to the device to view the running configuration of the device. What is wrong with the following statement? ()

A.

TelnetliB. can achieve this function.

B.

Use telnet.Telnet (host) to connect to the Telnet server.

C.

You can use telnet.write (b\) to input the command to view the current configuration of the device.

D.

Telnet.close() is used every time a command is entered, and the function is that the user waits for the switch to return information. ·

Full Access
Question # 220

Switch stacking supports more than two devices, and multiple switches can be grouped into a logical device through stacking. ()

A.

True

B.

False

Full Access
Question # 221

The config mode is the default ACL matching order on Huawei devices. ()

A.

True

B.

False

Full Access
Question # 222

When two OSPF routers form a 2-WAY neighbor relationship, LSDB. has been synchronized. ()

A.

True

B.

False

Full Access
Question # 223

At which layer of the OSI reference model do Ethernet switches operate? ( )

A.

Network layer

B.

Data link layer

C.

Physical layer

D.

Transport layer

Full Access
Question # 224

As shown in the figure below. All hosts can communicate normally. Which of the following statements are correct? () (Multiple Choice Questions)

A.

G0/0/3 of SWB learned 2 mac addresses

B.

SWA's G0/0/3 learned 1 mac address

C.

C. SWA's G0/0/3 learned 2 mac addresses

D.

D. SWA's G0/0/3 learned 3 mac addresses

Full Access
Question # 225

Which parameter is used in the spanning tree protocol for root bridge election? ()

A.

Port ID

B.

Bridge priority

C.

Root path cost

D.

Bridge ID

Full Access
Question # 226

A device has been configured to complete Telnet configuration. The device login address is 10.1.1.10. The Telnet user name is admin and the password is Huawei (@123. The following is the correct way to log in to this device using telnetliB. ()

A.

telnetlib.Telnet (10.1.1.0, 23, admin, Huawei@123)

B.

telnetlib.Telnet (10.1.1.0)

C.

telnetlib.Telnet 10.1.1.0, 23, Huawei@123)

D.

telnetlib.Telnet (10.1.1.0, admin

Full Access
Question # 227

Which of the following MAC addresses cannot be used as the MAC address of the host network card? ()*

A.

03-04-05-06-07-08

B.

00-02-03-04-05-06

C.

02-03-04-05-o6-d7

D.

01-02-03-04-05-06

Full Access
Question # 228

The following protocols are China's link state routing protocol

A.

OSPF

B.

C. Direct

C.

D. Static

Full Access
Question # 229

Which of the following IPv4 addresses the host uses cannot directly access the Internet? ()

A.

100.1.1.1

B.

50.1.1.1

C.

10.1.1.1

D.

200.1.1.1

Full Access
Question # 230

What kind of network equipment can host A and host B use to achieve communication?

A.

router

B.

Hub

C.

HUB

D.

Layer 2 switch

Full Access
Question # 231

On an interface that uses PPP as the data link layer protocol, you can configure a static route by specifying the next hop address or outgoing interface. ()

A.

True

B.

False

Full Access
Question # 232

For multiple paths to the same destination network, the router needs to select by comparing the magnitude of the Prererence value. If the Preference is the same, the router selects according to the magnitude of the Cost value. ()

A.

True

B.

False

Full Access
Question # 233

To provide different network services for different users on the AP, which of the following can be configured?

A.

TAP

B.

VAP

C.

VAC

D.

VT

Full Access
Question # 234

The IPv4 address assigned by the network administrator to a host in the network is 192.168.128, how many more hosts can be added to the network where this host is located? ()

A.

12

B.

15

C.

13

D.

14

Full Access
Question # 235

According to the command output as shown in the figure, which of the following descriptions is correct? () (Multiple Choice Questions)

A.

GigabitEthernet0/0/l allows VLAN1 to pass

B.

GigabitEthernet (/0/1 does not allow VLAN1 to pass

C.

If you want to change GigabitEthernet (0/0/1 to Access port, you first need to use the command "undo port trunk Allow-pass vlan all"

D.

If you want to turn GigabitEthernet0/o/1 into an Access port, you first need to use the command "undo port trunk Allow-pass vlan 2 to 4094"

Full Access
Question # 236

In the VRP system, what function does the Ctrl+Z key combination have? ()

A.

Return to user view from any view

B.

B. Return from system view to user view

C.

C. Exit interface view

D.

D. Exit the current view

E.

E. Exit the console interface view

Full Access
Question # 237

The configuration information of a certain port of the switch is shown in the figure. Then, when the data frame of which VLAN is sent by this port, it carries the VLAN TAG? ()interface GigabitEtherneto/0/1 port hybriD.taggeD.vlan 2 to 3 100 port hybriD. untaggeD. vlan 4 6#

A.

1, 2.3, 100

B.

2, 3, 100

C.

1, 2, 3, 4.6, 100

D.

2.3, 4, 6, 100

Full Access
Question # 238

Which of the following statements about direct routing is correct? ()

A.

Direct routing requires the administrator to manually configure the destination network and next hop address

B.

Direct routes have lower priority than static routes

C.

Direct routing has lower priority than dynamic routing

D.

Direct routing has the highest priority

Full Access
Question # 239

System-view (huawei) command-privilege level3 view user save is correct about the above configuration command ()

A.

Modify the user's authority level to 3, and save the configuration

B.

Modify the permission level of the user view command to 3, and save the configuration

C.

Modify the authority level of the save command used by a user to 3

D.

Modify the permission level of the save command in the user view to 3

Full Access
Question # 240

Which bridge is in the configuration BPDU sent by the switchID. Impossible to appear?

A.

204800-01-02-03-04CC

B.

819200-01-02-03-04-CC

C.

000-01-02-03-04cc

D.

409600-01-02-03-04-CC

Full Access
Question # 241

The load sharing mode at both ends of the Eth-Trunk can be inconsistent ()

A.

True

B.

False

Full Access
Question # 242

A company applies for a C. IP address segment, which needs to be evenly distributed to 8 subsidiaries. The largest subsidiary has 14 computers. Different subsidiaries must be in different network segments, so the subnet mask should be set. for()

A.

255.255.255.240

B.

255.255.255.0

C.

D. 255.255.255.128

Full Access
Question # 243

An ACL rule is as follows: Which of the following IP addresses can be matched by permit rules? () rule5per mit ip source10.0.2.00.0.254.255

A.

10.0.6.7

B.

10.0.4.5

C.

10.0.5.6

D.

10.0.2.I

Full Access
Question # 244

The following description of the Layer 2 Ethernet switch is incorrect ().

A.

Need to make certain modifications to the layer 3 header of the forwarded message, and then forward it

B.

Able to learn MAC. Address

C.

Forward according to the Layer 2 header information of the Ethernet frame

D.

Layer 2 Ethernet switch works at the data link layer

Full Access
Question # 245

What is the value of the Type field in the RStp configuration BPDU message? ()

A.

0x01

B.

0x00

C.

0x02

D.

0x03

Full Access
Question # 246

What is the total length of an IPv6 address in bits? ()

A.

96

B.

64

C.

32

D.

128

Full Access
Question # 247

FIT AP does not need AC. It can also work independently ()

A.

True

B.

False

Full Access
Question # 248

To ensure that the same data stream is forwarded on the same physical link, which load sharing method does Eth Trunk use?

A.

Load sharing based on data packet inbound interface

B.

Packet-based load sharing

C.

Load sharing based on application layer information

D.

Flow-based load sharing

Full Access
Question # 249

Which of the following descriptions about firewalls is wrong? ()

A.

Firewall can realize user identity authentication

B.

Firewall can realize access control between different networks

C.

The firewall can isolate the network of unreachable security level

D.

The firewall cannot implement network address translation

Full Access
Question # 250

The following figure shows the routing table of a router. When the router receives a data packet with a destination IP address of 9.LL, the router will forward it according to the route of 91.0.016 because the mask length of this route is longer. ()

A.

True

B.

False

Full Access
Question # 251

On Huawei routers, what is the default value of the OSPF protocol internal routing priority? ()

A.

20

B.

10

C.

30

D.

0

Full Access
Question # 252

If the Length/Type of an Ethernet data frame is 0x8100. Which of the following statements is correct?

A.

There is always a UDP header in the upper layer of each data frame

B.

The upper layer of a data frame must exist IP header

C.

There is always a TCP header in the upper layer of each data frame

D.

Each data frame must carry VLAN TAG

Full Access
Question # 253

When two OSPF routers form a 2TAY neighbor relationship, LSDB. has been synchronized.

A.

True

B.

False

Full Access
Question # 254

In a Layer 2 network with redundant links, which of the following protocols can be used to avoid loops?

A.

STP

B.

UDP

C.

ARP

D.

VRRP

Full Access
Question # 255

How to add AP on AC.? ()*

A.

Add online

B.

Automatically discover AP

C.

Import AP offline

D.

Manually confirm APs in the non-certified list

Full Access
Question # 256

Network Address and Port Translation (NAPT) allows multiple private IP addresses to be mapped to the same public IP address through different port numbers. Which of the following statements about port numbers in NAPT is true?

A.

Only the port number range needs to be configured.

B.

The mappings between port numbers and private IP addresses must be manually configured.

C.

An ACL is required to allocate port numbers.

D.

No port number needs to be configured.

Full Access
Question # 257

Which of the following applications is based on the TCP protocol?()*

A.

Ping

B.

TFTP

C.

FTP

D.

HTTP

Full Access
Question # 258

Which frequencies does IEEE802.11n support? ()

A.

2.4GHz

B.

5GHz

C.

D. 6GHz

Full Access
Question # 259

Which of the following packets is used by OSPF to describe its link state database (LSDB)?

A.

LSR

B.

DD

C.

LSU

D.

HELLO

Full Access
Question # 260

On the network shown in the following figure, assuming that SWA, SWB, and SWC retain factory defaults, which of the following ports will be selected as a designated port?

A.

G0/0/2 on SWC

B.

G0/0/3 on SWA

C.

G0/0/1 on SWB

D.

G0/0/1 on SWC

Full Access
Question # 261

Which of the following statements about IPv6 anycast addresses are correct?

A.

The group anycast address and the single address address use the same address space

B.

Back to provide services with more than functions

C.

The packet whose destination address is the anycast address will be sent to the nearest network interface in the sense of routing

D.

Back to achieve service load sharing

Full Access
Question # 262

As shown in the figure, all switches run STP. Assume that the path cost of all ports is 200. What is the root path cost contained in the configuration BPDU received by G0/0/4 on SWD?

A.

0

B.

400

C.

200

D.

600

Full Access
Question # 263

As shown in the figure below, assuming that the other configurations of the switch are kept in the default state, which port of the following switch will become the designated port? () (Multiple Choice Questions)

A.

G0/0/1 of SWB

B.

SWC's G0/0/2

C.

SWA's G0/0/3

D.

D. SWC's G0/0/1

Full Access
Question # 264

For STP, the default root path cost of the root bridge is 0.

A.

TRUE

B.

FALSE

Full Access
Question # 265

During STP calculation, the port cost is associated with the port bandwidth by default. Which of the following statements about the relationship between port cost and port bandwidth is true?

A.

The port cost varies randomly according to port bandwidth.

B.

A higher port bandwidth indicates a smaller port cost.

C.

The port bandwidth is equal to the port cost.

D.

A higher port bandwidth indicates a larger port cost.

Full Access
Question # 266

The output information of a certain switch is shown in the figure. Which of the following statements is correct? () (Multiple Choice Questions)

A.

Switch GE0/0/1 port does not carry VLAN TAG when sending VLAN20 data frame

B.

The GE0/0/2 port of the switch carries VLAN TAG when sending VLAN20 data frames

C.

Switch GE0/0/1 port does not carry VLAN TAG when sending VLAN10 data frame

D.

The user manually created 4 VLANs

Full Access
Question # 267

As shown in the figure below. Router A has passed the IP address 10.0.12.2 Telnet Router B. Which of the following operations on the current interface will cause the Telnet session between Router A and Router B to be interrupted? () (Multiple Choice Questions)

A.

Enable OSPF protocol under G0/0/1 interface

B.

Configure static routing

C.

Modify G0/0/1 interfaceIP address

D.

Close G0/0/1 interface

Full Access
Question # 268

After the two routers are configured with 0SPF, the administrator configures the command on RTA. The following description is correct ()

A.

The neighbor relationship between the two routers will be down

B.

The neighbor relationship between the two routers will not be affected

C.

RTA. Will no longer send OSPF packets

D.

RTA. will continue to receive and analyze and process OSPF packets sent by RTB.

Full Access
Question # 269

Only the WPA2-PSK security policy supports TKIP data encryption.

A.

TRUE

B.

FALSE

Full Access
Question # 270

According to the VTY user interface configuration shown in the following figure, the user level is set to 3.

A.

TRUE

B.

FALSE

Full Access
Question # 271

Which of the following is a link-state routing protocol?

A.

FTP

B.

OSPF

C.

Direct

D.

Static

Full Access
Question # 272

In the network as shown in the figure, the administrator hopes that all hosts cannot access the Web service (the port number is 80). Other services can be accessed normally. Then, in the interface configuration of G0/0/1, traffic-filWhich ACL rule needs to be bound to ter outbound? ()

A.

acl number 3000

ARule 5 deny tcy destination-port eq www

Rule 10 permit ip

#

B.

acl number 3001

Rule 5 deny udp destination-port eg www

Rule 10 permit ip

#

C.

acl number 3002

Rule 5 permit ip

Rule 10 deny tep destination eq www

#

D.

acl number 3003

Rule 5 permit ip

Rule 10 deny udp destination eq www

#

Full Access
Question # 273

Which of the following options describes the concept of NFV architecture correct?

A.

MANO is composed of NFVO, VNFM and VIM

B.

NFVO (NFV Orchestrator). Responsible for business orchestration.

C.

VIM (VirtualiseD.Infrastructure Manager) virtual resource management is responsible for the virtualization of infrastructure.

D.

VNFM. Virtual network function management, responsible for the life cycle management of VNF.

Full Access
Question # 274

What is the total length of the port ID in STP?

A.

8 bits

B.

4 bits

C.

16 bits

D.

2 bits

Full Access
Question # 275

The network is shown in the figure below. The router uses a sub-interface as the host gateway. The gateway IP address is 10.0.12.2. Which of the following commands can achieve this requirement? () (Multiple Choice Questions)

A.

interface GigabitEthernet0/0/0.20Dotlg termination vid 10

Ip address10.0.12.2255.255.255.0Arp broadcast enable

B.

interface GigabitEthernet0/0/0.10Dotlq termination vid 10

Ip address10.0.12.2255.255.255.0 Arp broadcast enable #

C.

interface GigabitEthernet0/0/0.20Dotlq termination vid 20

Ip address10.0.12.2255.255.255.0Arp broadcast enable #

D.

interface GigabitEtherneto/0/0.10Dotlq termination vid 20

Ip address10.0.12.2255.255.255.0Arp broadcast enable

Full Access
Question # 276

As shown in the figure, which of the following ports will be in a blocking state?

A.

G0/0/2 of SWC

B.

G0/0/3 of SWB

C.

G0/0/1 of SWC

D.

G0/0/3 of SWA

Full Access
Question # 277

Which of the following fields does the MPLS header include? ()*

A.

EXP

B.

TTL

C.

Label

D.

Tos

Full Access
Question # 278

Which of the following IPv4 addresses can be directly used by a host to access the Internet?

A.

172.32.1.1/24

B.

10.255.255.254/24

C.

192.168.1.1/24

D.

172.16.255.254/24

Full Access
Question # 279

Which of the following methods is not used for logging in to the VRP system?

A.

Telnet

B.

Netstream

C.

Web

D.

SSH

Full Access
Question # 280

If the application-layer protocol is Telnet, what is the value of the "Protocol" field in the IPv4 header?

A.

67

B.

53

C.

6

D.

17

Full Access
Question # 281

When the LCP phase of PPP is negotiated, the content of the negotiation includes ()*

A.

MRU

B.

Authentication protocol

C.

Magic word

D.

IP address

Full Access
Question # 282

Which of the following network types are supported by OSPF?

A.

Point-to-point (P2P)

B.

Point-to-multipoint (P2MP)

C.

Broadcast

D.

NBMA

Full Access
Question # 283

Wi-Fi 6 is also known as the IEEE 802.11ax standard.

A.

TRUE

B.

FALSE

Full Access
Question # 284

The country code configuration affects the actual transmission frequency and maximum transmission power.

A.

TRUE

B.

FALSE

Full Access
Question # 285

Which statement about the dynamic AC. address table is correct?

A.

The dynamic MAC obtained through the source AC. Address learning in the message. The table entries will age

B.

By viewing the number of specified dynamic MAC. address table entries, you can get the number of users communicating under the interface. After the device restarts, the previous dynamic table entries will be lost

C.

After the device restarts, the previous dynamic entries will be lost

D.

After the device restarts, the previously saved entries will not be lost

Full Access
Question # 286

Which of the following network parameters can be assigned by Dynamic Host Configuration Protocol DHCP? ()*

A.

IP address

B.

Gateway address

C.

Operating system name

D.

DNS address

Full Access
Question # 287

On the VRP, when the mkdir test command is run, the system creates a directory named test.

A.

TRUE

B.

FALSE

Full Access
Question # 288

After switches are virtualized into one logical switch using stacking or CSS, an inter-chassis Eth-Trunk can be deployed to improve network reliability.

A.

TRUE

B.

FALSE

Full Access
Question # 289

After OSPF is configured on the two routers, the administrator configures commands on RTA. Which of the following descriptions is correct? ()

A.

The neighbor relationship between the two routers will be down

B.

RTA. Will no longer send OSPF packets

C.

The neighbor relationship between the two routers will not be affected

D.

RTA. will continue to receive and analyze and process OSPF packets sent by RIB.

Full Access
Question # 290

A trunk interface allows frames from multiple VLANs including VLAN 4096.

A.

TRUE

B.

FALSE

Full Access