Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Huawei > HCIA-Datacom > H12-811_V1.0

H12-811_V1.0 HCIA-Datacom V1.0 Exam Question and Answers

Question # 4

telnetlib is a module provided by Python to implement the Telnet protocol.

A.

TRUE

B.

FALSE

Full Access
Question # 5

Which of the following statements is true about the edge port in RSTP?

A.

Interconnected ports between switches must be configured as edge ports.

B.

Edge ports participate in RSTP calculation.

C.

The edge port can directly transition from the Disabled state to the Forwarding state.

D.

The edge port discards the received configuration BPDUs.

Full Access
Question # 6

Which of the following packets is used by OSPF to describe its link state database (LSDB)?

A.

LSR

B.

DD

C.

LSU

D.

HELLO

Full Access
Question # 7

How to add AP on AC.? ()*

A.

Add online

B.

Automatically discover AP

C.

Import AP offline

D.

Manually confirm APs in the non-certified list

Full Access
Question # 8

From a security perspective, router A refuses to receive OSPF packets. ICMP packets received from the cO/0/1 interface. Which of the following commands can achieve this requirement? ()

A.

acl rumber 300o rule 5 deny ospf rule 10deny icmp interface

GigabitEthernet0/0/1 traffic-filter inbounD.ac1300o#

B.

acl rumber 2000 rule 5 deny 89 rule 10 deny 1 interface

GigabitEtherneto/0/1 trafficfilter inbounD.ac12000#

C.

acL rumber 300o rule 5 deny 89 rule 10 deny icmp interface

GigabitEthernet0/0/1 traffic-filter inbounD.ac1 30oo#

D.

acl number 3000 rule 5 deny 89 rule 10 deny 1 interface GigabitEtherneto/0/1 trafficfilter inbounD.aci 3000

Full Access
Question # 9

The following figure shows the configuration of a sub-interface on a router. For which VLAN does the sub-interface receive tagged data frames?

A.

20

B.

1

C.

30

D.

100

Full Access
Question # 10

Which of the following applications is based on the TCP protocol?()*

A.

Ping

B.

TFTP

C.

FTP

D.

HTTP

Full Access
Question # 11

What command line views exist on the VRP operating platform? ()*

A.

User view

B.

Interface view

C.

Agreement view

D.

System view

Full Access
Question # 12

VLAN 4095 is reserved for system use and VLAN 1 cannot be deleted on Huawei switches.

A.

TRUE

B.

FALSE

Full Access
Question # 13

Which of the following are not open interfaces for Huawei network equipment? ()*

A.

NETCONF

B.

RESTCONF

C.

JSON

D.

XML

Full Access
Question # 14

The network shown in the figure. Which of the following configurations can realize that the host A can access the Internet, but the host B can not? (ABCD) (Multiple Choice Questions)

A.

acl number 2000

Rule5 deny source100.0.12.0.0.0.0.255Rule 10 permit

#

Interface GigabitEthernet0/0/3

Traffic-filter outbound acl 2000

#

B.

acl number 2000

Rule 5 permit source 100.0.13.0.0.0.0.255

Rule10 deny source100.0.12.0.0.0.0.255#

Interface GigabitEthernet0/0/3

Traffic-filter outbound acl 2000

#

C.

acl number 2000

Rule 5 permit source 100.0.13.0.0.0.0.255

Rule 10 deny

#

Interface GigabitEthernet0/0/3

Traffic-filter outbound acl 2000

#

D.

acl number 2000

Rule5 deny source 100.0.12.0.0.0.0.255 Rule 10 permit source 100.0.13.0.0.0.0.255

#

Interface GigabitEthernet0/0/3

Traffic-filter outbound acl 2000

#

Full Access
Question # 15

According to the VTY user interface configuration shown in the following figure, the user level is set to 3.

A.

TRUE

B.

FALSE

Full Access
Question # 16

By referring to the topology and the configurations of G0/0/1 interfaces on LSW1 and LSW2 shown in the figure, it can be determined that data frames tagged with VLAN 10 can be normally forwarded between LSW1 and LSW2.

A.

TRUE

B.

FALSE

Full Access
Question # 17

As shown in the following figure, in the switching network, all switches are running the stp protocol. When the topology is stable, which of the following switches can be used to modify the BPDU sending cycle. Can it affect the SWD configuration BPDU sending cycle? () (Single-choice question)

A.

SWA

B.

C. SWC

C.

D. SWD

Full Access
Question # 18

SDN requires the control and forwarding planes to be separated.

A.

TRUE

B.

FALSE

Full Access
Question # 19

If the value of the "Type/Length" field of an Ethernet data frame is 0x0800, the length range of the upper-layer packet header carried by the data frame is from 20B to 60B.

A.

TRUE

B.

FALSE

Full Access
Question # 20

The network shown in the figure below. The host has an ARP cache. Which of the following statements are correct? )(Multiple Choice Questions)

A.

The following entries may appear in the ARP cache of host A 10.0.12.2MAC-C

B.

The router needs to be configured with a static route. Otherwise, host A and host B cannot communicate in both directions

C.

Host A and Host B can communicate in two directions

D.

D. The following entry 11.0.12.1 MAC-B exists in the ARP cache of host A

Full Access
Question # 21

Through sR (Segment Routing), an explicit path can be easily defined. The nodes in the network only need to maintain the SegmentRouting information to cope with the real-time and rapid development of the business. What are the following characteristics of Segment Routing?

A.

Extending the existing protocol (eg IGP) can make the existing network better and smoothly evolve

B.

SR (Segment Routing) adopts IP forwarding, no extra dimensioning is required-a label forwarding table

C.

Source routing technology is used to provide the ability to quickly exchange text between the network and upper-layer applications

D.

At the same time, it supports the centralized control mode of the controller and the distributed control mode of the transponder, providing a balance between centralized control and distributed control

Full Access
Question # 22

In STP, which of the following items may affect the selection of the root switch?

A.

Switch interface bandwidth

B.

Switch priority

C.

Switch MAC address

D.

Switch port ID

E.

Switch IP address

Full Access
Question # 23

After switches are virtualized into one logical switch using stacking or CSS, an inter-chassis Eth-Trunk can be deployed to improve network reliability.

A.

TRUE

B.

FALSE

Full Access
Question # 24

When both ends running PPP protocol detect that the physical link is active, the link state will transit from dead to establish. Which of the following protocols is used to negotiate the link parameters during this phase?

A.

IP

B.

NCP

C.

LCP

D.

DHCP

Full Access
Question # 25

Which of the following IEEE802.11 standards support operation in the 5GHz frequency band? ()

A.

802.11ac

B.

802.11n

C.

802.11g

D.

802.11a

Full Access
Question # 26

Which of the following is a link-state routing protocol?

A.

FTP

B.

OSPF

C.

Direct

D.

Static

Full Access
Question # 27

Dynamic routing protocols can automatically adapt to network topology changes.

A.

TRUE

B.

FALSE

Full Access
Question # 28

SWA and SWB run RSTP. Which of the following statements are true?

A.

G0/0/3 of SWB is a backup port.

B.

G0/0/3 of SWA is a designated port.

C.

G0/0/3 of SWB is an alternate port.

D.

G0/0/2 of SWA is a designated port.

Full Access
Question # 29

As shown in the figure below. All switches enable the $P protocol and keep other configurations in their default state. When the network is stable, are the following statements correct? () (Multiple Choice Questions)

A.

Both ports of SWC are in Forwarding state

B.

Both ports of SWB are in Forwarding state

C.

SWA is the root bridge in this network

D.

D. SWB is the root bridge in this network

Full Access
Question # 30

As shown in the figure below. Router A has passed the IP address 10.0.12.2 Telnet Router B. Which of the following operations on the current interface will cause the Telnet session between Router A and Router B to be interrupted? () (Multiple Choice Questions)

A.

Enable OSPF protocol under G0/0/1 interface

B.

Configure static routing

C.

Modify G0/0/1 interfaceIP address

D.

Close G0/0/1 interface

Full Access
Question # 31

An administrator wishes to manage the router in the remote branch office, which method can be used?

A.

Console Connection

B.

FTP

C.

Telnet

D.

DHCP

Full Access
Question # 32

On Huawei routers, which of the following is the default preference of static routing?

A.

0

B.

100

C.

60

D.

120

Full Access
Question # 33

Which frequencies does IEEE802.11n support? ()

A.

2.4GHz

B.

5GHz

C.

D. 6GHz

Full Access
Question # 34

To enable Router A to communicate with Loopback 0 on Router B on the network shown in the figure, which of the following commands needs to be run on Router A?

A.

ip route-static 10.0.2.2 32 GigabitEthernet 0/0/0

B.

ip route-static 10.0.2.2 255.255.255.255 10.0.12.1

C.

ip route-static 10.0.2.2 255.255.255.255 10.0.12.2

D.

ip route-static 10.0.2.2 0 GigabitEthernet 0/0/0

Full Access
Question # 35

Fit APs can work independently of an AC.

A.

TRUE

B.

FALSE

Full Access
Question # 36

Which of the following statements about IPv6 address configuration are correct? ()*

A.

IPv6 supports stateless automatic configuration

B.

IPv6 address supports automatic configuration in multiple ways

C.

IPv6 supports DHCPv6 for address configuration

D.

IPv6 addresses can only be configured manually

Full Access
Question # 37

Refer to the following configuration of an interface on a switch. For which VLAN does the interface transmit tagged data frames?

interface GigabitEthernet0/0/1

port hybrid tagged vlan 2 to 3 100

port hybrid untagged vlan 4 6

A.

2, 3, 4, 6, 100

B.

2, 3, 100

C.

1, 2, 3, 4, 6, 100

D.

1, 2, 3, 100

Full Access
Question # 38

Which of the following statements about the default route are correct?

A.

If the destination address of the message cannot match any other routing entries in the routing table, the router will forward the message according to the default route

B.

The default route can only be manually configured by the administrator

C.

There must be a default route in the routing table of any router

D.

In the routing table, the default route appears in the form of a route to the network 0.0.0.0 (the mask is also 0.0.0.0)

Full Access
Question # 39

You can run the user-interface maximum-vty command to configure the maximum number of users who can log in to the device through Telnet simultaneously.

A.

TRUE

B.

FALSE

Full Access
Question # 40

Fit APs can provide wireless services independently of an AC.

A.

TRUE

B.

FALSE

Full Access
Question # 41

Ethernet_I containing the Ethernet headerIWhat is the length of the frame? ()

A.

46-1500B

B.

C. 64-1500B

C.

D. 64-1518B

Full Access
Question # 42

FIT AP can work independently without relying on AC. ()

A.

True

B.

False

Full Access
Question # 43

The following rules exist in an ACL of a router. Rule deny top source192.168, 1.00.0.0.255 destination 172.16.10.1 0.0.0.0 destination-port eq 21 is the correct statement? ()

A.

sourceIP is 192.168.1.1, destination P is 172.16.10.1, and all TCP packets with destination port number 21 match this rule

B.

The source IP is 192.168.1.1, the destination IP is 172.16.10.2, and all 1CP packets whose destination port number is 21 match this rule

C.

Rule sourceIP is 192.168.1.1, the destination IP is 72.16.10.3, and all TCP packets with the destination port number of 21 match this rule

D.

D. The type of ACL is basic ACL

Full Access
Question # 44

The configuration of the country code will affect the frequency used for actual transmission and the maximum transmission power. ()

A.

True

B.

False

Full Access
Question # 45

On the Huawei VRP, what is the default preference of different route types, in descending order?

A.

Direct > Static > RIP > OSPF

B.

Direct > OSPF > RIP > Static

C.

Direct > RIP > Static > OSPF

D.

Direct > OSPF > Static > RIP

Full Access
Question # 46

By default, network devices running the SNMPv2C. protocol use which of the following port numbers to send trap messages to the network management system? ()

A.

6

B.

161

C.

17

D.

162

Full Access
Question # 47

The MAC address table of existing switches is shown in the figure. Which of the following statements are correct? () (Single-choice question)

A.

The MAC address 5489-9811-0b49 is manually configured by the administrator

B.

B. The MAC address 5489-989d-1d30 is manually configured by the administrator

C.

After the switch restarts, all MAC addresses need to be relearned. The MAC address 5489-9885-18a8 is manually configured by the administrator

D.

The MAC address 5489-9885-18a8 is manually configured by the administrator

Full Access
Question # 48

The administrator made the configuration on the router as shown in the figure. At the same time, the administrator wants to assign a shorter lease period to the DHCP address. Which of the following commands should be used? () (Single-choice question)

ip pool pooll

netyork10.10.10.0ask255.255.255.0

gateway-list 10.10.10.1

A.

B. Dhcp select relay

B.

C. Lease day 0 hour 10

C.

D. Lease 24

Full Access
Question # 49

Which of the following descriptions about the switch is wrong?

A.

The switch is generally used as the export equipment of the network

B.

B. Switches generally work at the data link layer

C.

C. The switch can complete the exchange of data frames

D.

D. The switch can provide network access services for terminal devices (PC/server)

Full Access
Question # 50

Refer to the configuration of the single-arm routing in the figure below, you can judge that even if the ARP proxy is not enabled on the sub-interface of R1,The administrative department and the financial department can also visit each other. ()(True or False)

A.

True

B.

False

Full Access
Question # 51

All the devices in the picture can communicate normally. Is the corresponding relationship between the MAC address table of $WA and the port correct? () (Single-choice question)

A.

MAC-AG0/0/2

MAC-BG0/0/2

MAC-CG0/0/3

B.

MAC-AG0/0/1

MAC-BG0/0/2

MAC-CG0/0/1

C.

MAC-A--GO/0/1

MAC-B--G0/0/1

MAC-C--GO/0/3

D.

MAC-A--GO/0/1

MAC-B-G0/0/2

MAC-C-GO/0/3

Full Access
Question # 52

Using the command mkdirtest in the VRP operating platform, the system will create a directory named test. ()

A.

True

B.

False

Full Access
Question # 53

Which of the following statements are correct for the MAC address of the existing switch? ()

A.

MAC. The address 5489-9885-18a8 is manually configured by the administrator

B.

MAC. The address 5489-9811-0b49 is manually configured by the administrator

C.

MAC. Address 5489-989d-1d30 is manually configured by the administrator

D.

After the switch restarts, all MAC addresses need to be re-learned

Full Access
Question # 54

The topology shown in the figure and the configuration on the interconnection ports of the switch. Can it be judged that the data frame tagged as VLAN10 can be forwarded normally between the two switches? ()(True or False)

(LSW1) interface GigabitEthernet 0/0/1

(LSW1-GigabitEthernet0/0/1) port link-type trunk

(LSW1-GigabitEthernet0/0/1) port trunk pvid vlan 20

(LSW1-GigabitEthernet0/0/1) port trunk allow-passvlan 10

#

(LSW2) interface GigabitEthernet 0/0/1

(LSW2-GigabitEthernet0/0/1) port link-type trunk

(LSW2-GigabitEthernet0/0/1 port trunk pvid vlan 10

(LSW2-GigabitEthernet0/0/1) port trunk allow-passvlan 10

A.

True

B.

B. False

Full Access
Question # 55

You can manually specify the source address or source interface of the CAPWAP tunnel on the AC. ()

A.

True

B.

False

Full Access
Question # 56

In the figure below, all switches have enabled the STP protocol, assuming that the path cost value of all ports is 200. What is the root path cost value contained in the configuration BPDU message received by the G0/0/4 port of $WD? () (Single-choice question)

A.

600

B.

200

C.

0

D.

400

Full Access
Question # 57

Which of the following types of addresses are not included in IPv6 addresses? ()

A.

Anycast address

B.

Broadcast address

C.

Unicast address

D.

Multicast address

Full Access
Question # 58

By default, the bridge priority of Huawei switches is 32768 ()

A.

True

B.

False

Full Access
Question # 59

In the OSPF protocol, which of the following descriptions of DR is correct? ()

A.

If the priority values ​​of the two routers are equal, the router with the larger Router ID is selected as the DR

B.

By default, all routers in this broadcast network will participate in the DR election

C.

If the priority values ​​of the two routers are different, the router with the lower priority is selected as the DR

D.

D. DThe adjacency relationship should also be established between R and BDR

Full Access
Question # 60

The administrator hopes that all hosts cannot access the Internet from 8:00-17:00 every day, so in the interface configuration of GO/0/1, trahic-HIter outbounD. Which ACL rule needs to be bound? ()

A.

time-range am9topm5 08:00 to working-day Acl number 2003 rule 5 deny time-range am9topjni5

B.

time-range am9topm5 08:00 to 17:00 off-day acl number 2004 rule 5 permit timerange

C.

time-range am9topm5 08:00 to 17:00 daily acl number 2001 rule 5 deny time-range am9topm5

D.

D. time-range am9topm5 07:00 to 18:00 daily Acl number 2002

Full Access
Question # 61

Which of the following is not included in AAA? ()

A.

Audit

B.

B. Authentication

C.

C. Authorization

D.

D. Accounting)

Full Access
Question # 62

When the Access type port sends a message, it will ().

A.

Add the VLAN information of the message, and then send it out

B.

B. Send tagged messages

C.

Strip the VLAN information of the message, and then send it out

D.

Type the PVID. information of this port, and then send it out

Full Access
Question # 63

The output information of the router is shown in the figure. Which of the following statements is wrong? () (Single-choice question)

A.

The broadcast address corresponding to the AEthernet0/0/0 interface is 10.0.12.255

B.

B. The physical link of the Ethernet0/0/0 interface is normal

C.

Ethernet0/0/0 interfaceThe MTU value is 1480

D.

D. Ethernet (The IP address of the /0/0 interface is 10.0.12.1/24

Full Access
Question # 64

All ports on the root bridge exchange machine are designated ends ()

A.

True

B.

False

Full Access
Question # 65

Which of the following 0SPF protocol packets can ensure the reliability of LSA update? ()

A.

LSACK

B.

C. LSR

C.

D. DD

Full Access
Question # 66

The network shown in the figure below. The router receives a data packet with a destination IP address of 11.0.12.1 from host A. After this data is forwarded by the router, what are the destination MAC and destination IP? )(Single-choice question)

A.

MAC-B.11.0.12.1

B.

C. MAC-D.10.0.12.2

C.

D. MAC-D.11.0.12.1

Full Access
Question # 67

Three Layer 2 switches are interconnected with one HUB. The switches are all enabled with STP bridge ID. Refer to the figure below. What are the default errors of other configurations? () (Single-choice question)

A.

The two ports on SWA are designated ports and are in the forwarding state

B.

C. G0/0/2 of SWA is blocked

C.

G0/0/1 of SWC is alternative. It is in blocking state

Full Access
Question # 68

A network administrator of a company wants to be able to remotely manage the network equipment of the branch. Which of the following protocols will be used? ()

A.

RSTP

B.

VLSM

C.

CIDR

D.

TeInet

Full Access
Question # 69

The protocol uses the P/A. mechanism to speed up the upstream port's transition to the Forwarding state, but what is the reason for no temporary loop? ()

A.

Ensure that there will be no temporary loops through the synchronization mechanism

B.

B. Speed ​​up port role election

C.

C. Reduced the time of ForwarD.Delay

D.

D. Edge port

Full Access
Question # 70

The two switches shown in the figure below have both enabled the STP protocol. Which port will eventually be in the Blocking state? ()

A.

SWA's G0/0/3 port

B.

SWA's G0/0/2 port

C.

G0/0/2 port of SWB

D.

G0/0/3 port of SWB

Full Access
Question # 71

The Hybri D port can be connected to the user host or other switches. ()

A.

True

B.

False

Full Access
Question # 72

AC. Use CAPWAP control tunnel to transmit management messages to FIT AP. ()

A.

True

B.

False

Full Access
Question # 73

The priority of the LACP protocol is shown in the figure. Switch A and Switch B adopt LACP mode link aggregation, and all interfaces are added to the link aggregation group. At the same time, set the maximum number of active ports to 3. Then which port of switch A is not an active port ? () (Single-choice question)

A.

G0/0/0

B.

G0/0/1

C.

G0/0/2

D.

G0/0/3

Full Access
Question # 74

On an interface that uses PPP as the data link layer protocol, can you configure a static route by specifying the next hop address or outbound interface? ()

A.

True

B.

False

Full Access
Question # 75

As shown in the figure, two switches use the default parameters to run STP root primary; Switch B uses the configuration command STP priority 0. Then which port will be blocked? () (Single-choice question)

A.

B. G0/0/2 of switch A

B.

C. G0/0/1 of switch A

C.

D. G0/0/1 of switch B

Full Access
Question # 76

As shown in the figure below. Which port of the following switches will be blocked? () (Single-choice question)

A.

B.SWA's G0/0/3

B.

C.SWC's G0/0/1

C.

D.G0/0/3 of SWB

Full Access
Question # 77

Which of the following statements about the usage scenarios of the DHCP protocol is correct? ()

A.

network does not allow multiple DHCP servers

B.

After receiving the DHCP request or response message, the DHCP relay does not modify the message format and forwards it directly

C.

If the DHCP client and the DHCP server are not on the same network segment, the DHCP relay needs to be used to forward DHCP messages

D.

D. DHCP client and DHCP server must be connected to the same switch

Full Access
Question # 78

In order to distinguish between different users and provide different network services on the AP. Which of the following can be configured through configuration? ()

A.

VT

B.

B. VAP

C.

VAC

D.

D. WAP

Full Access
Question # 79

Which of the following commands can change the device name to huawei? ()

A.

Sysname Huawei

B.

C. Rename Huawei

C.

D. Do name Huawei

Full Access
Question # 80

As shown in the figure below. Which network device can host A and host B use to achieve communication? () (Single-choice question)

A.

HUB

B.

Hub

C.

Layer 2 switch

D.

router

Full Access
Question # 81

Which information of the data frame is used by the interface to determine whether to forward Layer 2 or Layer 3 forwarding? ()

A.

Source IP

B.

Source MAC

C.

Destination port

D.

Destination MAC

Full Access
Question # 82

The switch G0/0/1 port configuration information is shown in the figure. Which VLAN data frame does the switch forward without VLANTAG? ? () (Single-choice question)

A.

B. 30

B.

C. 20

C.

D. 40

Full Access
Question # 83

Which of the following parameters cannot be used for advanced access control lists? ()

A.

Physical interface

B.

B. time limit

C.

C. Agreement number

D.

D. Destination port number

Full Access
Question # 84

If a windows host is started for the first time, if it uses DHCP to obtain an IP address, what is the source IP address of the first packet sent by this host? ()

A.

0.0.0.0

B.

B. 169.254.2.33

C.

C. 255.255.255.255

D.

D. 127.0.0.1

Full Access
Question # 85

Two switches use manual link aggregation at the same time. The following statement is wrong. () (Single-choice question)

A.

Only switch off G0/0/2 port on switch B. The Eth-Trunk status is still UP

B.

Turn off the G0/0/1 and G0/0/2 ports on switch B, and the Efh-Trunk status is still UP

C.

C. Only switch off G0/0/1 port on switch B. The Eth-Trunk status is still UP

D.

D. Turn off the G0/0/1 and G0/0/2 ports on switch B. The Eth-Trunk status is down

Full Access
Question # 86

The switch GE0/0/1 port configuration information is shown in the figure. Which VLAN data frame does the switch not carry when forwarding?()

A.

10

B.

20

C.

D. 30

Full Access
Question # 87

The network management system can only view the operating status of the device through the SNMP protocol, but cannot issue the configuration ()

A.

True

B.

False

Full Access
Question # 88

In the network shown in the figure below, the switch uses VLANIF interfaces to connect with the router sub-interfaces. Which of the following configurations can achieve this requirement? () (Single-choice question)

A.

interface Vlanif10

Ip address10.0.12.1255.255.255.0

#

Interface GigabitEthernet 0/0/2

Port link-type trunk

Port trunk pvid 10

Port trunk allow-pass vlan 10

#

B.

interface Vlanif10

Ip address10.0.12.1255.255.255.0#

Interface GigabitEthernet 0/0/2

Port link-type trunk

Port trunk allow-pass vlan 10#

C.

interface Vlanif10

Ip address10.0.12.1255.255.255.0#

Interface GigabitEthernet 0/0/267

Port link-type hybrid

Port hybrid untag vlan 10

#

D.

interface Vlanif10

Ip address10.0.12.1255.255.255.0#

Interface GigabitEthernet 0/0/2

Port link-type access

Port default vlan 10

Full Access
Question # 89

As shown in the figure below. All hosts can communicate normally. Is the corresponding relationship between SWA MAC address and port correct? () (Single-choice question)

A.

MAC-A GO/0/1

MAC-B G0/0/2

MAC-C G0/0/1

B.

MAC-A G0/0/2

MAC-B GO/0/2

MAC-C GO/0/3

C.

MAC-A GO/0/1

MAC-B GO/0/1

MAC-C GO/0/3

D.

MAC-A GO/0/1

MAC-B GO/0/2

MAC-C GO/0/3

Full Access
Question # 90

If the network address of a network is 10.1.1.0/30, what is its broadcast address? ()

A.

10.1.1.3

B.

C. 10.1.1.4

C.

D. 10.1.1.1

Full Access
Question # 91

The output information of the STP port of a certain switch is shown in the figure. Which of the following statements is wrong? () (Single-choice question)

ï¼»Huaweiï¼½display stp interface Ethernet 0/0/1

-------[CIST Global Info][Mode STP]-------

CIST Bridge: 32768.4c1f-cc46-4618

Config TimesHello 4s MaxAge 20s FwDly 15s MaxHop 20

Active Times:Hello 2s MaxAge 20s FwDly 15s MaxHop 20

CIST Root/ERPC:0.4c1f-ccf7-3214/200000

CIST RegRoot/IRPC: 32768.4c1f-cc46-4d18/0

A.

Forward-delay is 20s

B.

B. Configure the MaxAge of the BPDU to 20s

C.

C. The period for sending configuration BPDUs on this port is 2s

D.

D. The switch is not a root bridge

Full Access
Question # 92

When the lease period reaches what percentage does the DHCP client send the lease renewal message for the first time? ()

A.

0.5

B.

0.875

C.

D. 0.25

Full Access
Question # 93

By default, it takes at least 30s for the port status in the STP protocol to change from Disable D. to Forwarding status. ()

A.

True

B.

False

Full Access
Question # 94

If the broadcast address of a network is 172.16.1.255, what might its network address be? ()

A.

172.16.1.128

B.

C. 172.16.1.1

C.

D. 172.16.1.253

Full Access
Question # 95

Which statement about the 0SPF protocol DR is correct? ()

A.

DR must be the highest priority device in the network

B.

Router ID, the larger the value, the more preferred it is to be elected as DR

C.

DR election is preemptive

D.

An interface priority is 0, then the interface cannot be a DR

Full Access
Question # 96

How many types of OSPF packets are there? ()

A.

B. 4

B.

5

C.

D. 3

Full Access
Question # 97

UDP has a sliding window mechanism to control the speed of data transmission

A.

True

B.

False

Full Access
Question # 98

If the Proto of a certain route information in the routing table is OSPF, the priority of this route must be 10. ()

A.

True

B.

False

Full Access
Question # 99

As shown in the figure below, all hosts can communicate normally. Is the correspondence between the MAC address and the port in the MAC address table of SWB correct? () (Single-choice question)

A.

MAC-A GO/0/1

MAC-B GO/0/2

MAC-C GO/0/3

B.

MAC-A GO/0/2

MAC-B G0/0/2

MAC-C GO/0/3

C.

MAC-A GO/0/3

MAC-B GO/0/3

MAC-C GO/0/1

D.

MAC-A GO/0/1

MAC-B GO/0/1

MAC-C GO/0/3

Full Access
Question # 100

When using FTP for file transfer, how many TCP connections will be established? ()

A.

2

B.

B. 1

C.

C. 3

D.

D. 4

Full Access
Question # 101

There are multiple route entries to the same destination network in the routing table. These routes are called? ()

A.

Equal cost routing

B.

B. Multipath routing

C.

Default route

D.

D. Suboptimal routing

Full Access
Question # 102

Which of the following authentication methods does not require the user name and password? ()

A.

authentication-mode none

B.

C. authorization-mode hwtacacs

C.

D. Authentication-mode hwtacacs

Full Access
Question # 103

What are the functions of OSPF protocol DR and BDR?

A.

Reduce the number of adjacencies

B.

Reduce the types of OSPF protocol packets

C.

Reduce the time to establish adjacency

D.

Reduce the number of exchanges of link state information

Full Access
Question # 104

When the router is powered on, it will read the configuration file from the default storage path to initialize the router. If there is no configuration file in the default storage path, what will the router use for initialization? ()

A.

Initial configuration

B.

Current configuration

C.

New configuration

D.

Default parameter

Full Access
Question # 105

FIT AP can work independently without relying on AC. ()

A.

True

B.

False

Full Access
Question # 106

What kind of packets does the OSPF protocol use to discover and maintain neighbor relationships? ()

A.

HELLO

B.

C. LSU

C.

D. DD

Full Access
Question # 107

The switch is connected to the host. What is the common port link type of the switch? ()

A.

Access link

B.

Trunk link

C.

C. Trunk link

D.

D. HybriD. link

Full Access
Question # 108

Layer 2 ACL can match source MAC, destination MAC, source IP, destination IP and other information. ()

A.

True

B.

False

Full Access
Question # 109

The ACL configuration information of a certain router is shown in the figure. Which of the following statements is correct? () (Single-choice question)

A.

The packet whose source IP address is 192.168.1.254 is matched by the permit rule

B.

Packets with source IP addresses of 192.168.1.1 and 192.168.1.254 are matched by the permit rule

C.

The packet with the source IP address of 192.168.1.1 is matched by the pemit rule

D.

D. The packet with the source IP address 192.168.1.1 is matched by the deny rule

Full Access
Question # 110

As shown in the figure, the network administrator creates VLAN2 on SWA and SWB. The ports connecting the hosts on the two switches are configured as Access ports. They are assigned to VLAN2. G0/0/1 of SWA and G0/0/2 of SWB are configured as Trunki ports. All VLANs are allowed to pass. What is needed to achieve normal communication between two hosts? () (Single-choice question)

A.

Configure G0/0/1 on SWC as a trunk port and allow VLAN2 to pass. Set G0/0/2 as an access port. PVID is 2.

B.

Create VLAN2 on SWC, configure G0/0/1 and G0/0/2 as trunk ports, and allow VLAN2 to pass

C.

C. Just create BLAN2 on SWC

D.

Configure G0/0/1 on SWC as a teunk port and allow VLAN2 to pass through

Full Access
Question # 111

Which of the following protocols does the RA. message used by IPv6 stateless autoconfiguration belong to? ()

A.

ICMPv6

B.

C. UDPv6

C.

D. TCPv6

Full Access
Question # 112

UDP cannot guarantee the reliability of data transmission, and does not provide functions such as message sequencing and flow control. It is suitable for flows that do not require high transmission reliability, but require high transmission speed and delay ().

A.

True

B.

False

Full Access
Question # 113

If the network address of a network is 192.168.1.0, then its broadcast address must be 192.168.1.255. ()

A.

True

B.

False

Full Access
Question # 114

A company has 50 private P addresses, and the administrator uses NAT technology to connect the company's network to the public network, but the company has only one public network address and is not fixed. Which of the following NAT conversion methods meets the requirements? ()

A.

easy-ip

B.

B. NAPT

C.

Static NAT

D.

D. BasiC.NAT

Full Access
Question # 115

What is the value of TPID. defined by IEEE802.1Q? ()

A.

B. 0x7200

B.

0x8100

C.

D. 0x9100

Full Access
Question # 116

All interfaces of the router belong to the same broadcast domain. ()

A.

True

B.

False

Full Access
Question # 117

Network devices running the SNMP protocol run an agent process locally. ()

A.

True

B.

False

Full Access
Question # 118

What is the MAC address of the data link layer of each VAP on the AP? ()

A.

SSID

B.

BSS

C.

ESS

D.

BSSID

Full Access
Question # 119

The main function of the DNS protocol is ()

A.

file transfer

B.

C. Remote access

C.

D. Mail transfer

Full Access
Question # 120

VRP operating system commands are divided into four levels: access level, monitoring level, configuration level, and management level. Which level can run various business configurations and set commands but cannot operate the file system?

A.

Configuration level

B.

B. Access level

C.

C. Management level

D.

D. Monitoring level

Full Access
Question # 121

When accessing across network segments, the source and destination IP will change, and the source and destination MAC will not change

A.

True

B.

False

Full Access
Question # 122

748.192.168.1.127/25 represents the () address. ()

A.

broadcast

B.

B. The internet

C.

C. Host

D.

D. Multicast

Full Access
Question # 123

The router running the OSPF protocol reaches the FULL state first, and then synchronizes the LSDB. ()

A.

True

B.

False

Full Access
Question # 124

Which of the following statements about the edge port in the RSTP protocol is correct? ()

A.

The edge port discards the received configuration BPDU packet

B.

The edge port can be directly transferred to the Forwarding state from Disable

C.

Edge port participates in RSTP operation

D.

The interconnection ports between switches need to be set as edge ports

Full Access
Question # 125

Which of the following OSCan PF protocol packets ensure the reliability of LSA update? ()

A.

LSACK

B.

B. DD

C.

LSU

D.

D. LSR

Full Access
Question # 126

The HybriD. port can be connected to the user host or other switches. ()

A.

True

B.

False

Full Access
Question # 127

Which of the following information prompts is used by the VRP operating platform for incomplete input commands? ()

A.

False Incomplete commanD.founD.at'position

B.

C. Error:Too many parameters founD.at'position

C.

D. Error: Wrong parameter founD.at'position

Full Access
Question # 128

VLAN4095 cannot be created on Huawei switches, and VLAN1 cannot be created ()

A.

True

B.

False

Full Access
Question # 129

In a Layer 2 network with redundant links, which of the following protocols can be used to avoid loops? ()

A.

VRRP

B.

ARP

C.

UDP

D.

STP

Full Access
Question # 130

OSThe I reference model from high-level to bottom-level is ()

A.

Application layer, transport layer, network layer, data link layer, physical layer

B.

Application layer Session layer Presentation layer Transport layer Network layer Data link layer Physical layer

C.

Application layer Presentation layer Session layer Network layer Transport layer Data link layer Physical layer

D.

Application layer Presentation layer Session layer Transport layer Network layer Data link layer Physical layer

Full Access
Question # 131

Which of the following descriptions of wireless devices is correct? ()

A.

FIT AP-Generally complete user access, authentication, service forwarding and other functions independently

B.

The wireless controller AC is generally located at the convergence layer of the entire network, providing high-speed, safe and reliable VLAN services

C.

D. FAT AP generally works with wireless controller

Full Access
Question # 132

NAPT distinguishes the IP addresses of different users through the protocol numbers in TCP, UDP, or IP packets ()

A.

True

B.

False

Full Access
Question # 133

If host A. has the ARP cache of host B., host A. can ping host B. ()

A.

True

B.

False

Full Access
Question # 134

Using a traditional landline to make a call is a way of network communication. ()

A.

True

B.

False

Full Access
Question # 135

As shown in the figure, you only need to configure this static route on R1, and the two hosts can communicate with each other normally.

A.

True

B.

False

Full Access
Question # 136

Which of the following is not the reason why RSTP can increase the speed of convergence? ()

A.

B. The introduction of edge ports

B.

Forward.Delay cancelled

C.

D. P/A. Mechanism

Full Access
Question # 137

The administrator hopes that RTA. uses static routing and preferentially sends data packets to RTB's Loopback0 interface through G0/0/1 port, while G0/0/2 is used as a backup. How to configure on RTA to achieve this requirement ()

A.

ip route-statiC.10.0.2.2255.255.255.255 10.0.12.2ip

Route-statiC.10.0.2.2255.n255.255.255 10.0.21.2 preference 40

B.

ip route-statiC.10.0.2.2255.255.255.25 5 10.0.12.2 preference 70 ip route-static/n10.0.2.2255.255.255.25510.0.21.2

C.

ip route-statiC.10.0.2.2255.255.255.255 10.0.12.2ip

Route-statiC.10.0.2.2255.255.n255.25510.0.21.2

D.

ip route-statiC.10.0.2.2255.255.255.25510.0.12.2ip

Route-statiC.10.0.2.2255.n255.255.255

Full Access
Question # 138

By default, the port cost calculated by STP has a certain relationship with the port bandwidth, that is, the larger the bandwidth, the higher the cost ()

A.

Big

B.

Unanimous

C.

uncertain

D.

small

Full Access
Question # 139

What are the characteristics of VLAN based on ports? ()

A.

Add an AVLAN tag to the data frame according to the IP address carried in the message

B.

B. Assign VLAN ID according to the protocol type and encapsulation format of the data frame

C.

C. No need to reconfigure VLAN when the host moves

D.

When the host moves, the VLAN needs to be reconfigured

Full Access
Question # 140

When the IPv4 protocol is used as the network layer protocol, which field is not included in the network layer header? ()

A.

Source IPv4 Address

B.

TTL

C.

Destination IPv4 Address

D.

Sequence Number

Full Access
Question # 141

IPCP dynamic address negotiation can automatically obtain the address()

A.

True

B.

False

Full Access
Question # 142

Which of the following port states is not included in the RSTP protocol? ()

A.

Learning

B.

Discarding

C.

Forwarding

D.

Blocking

Full Access
Question # 143

Wireless access controller (AC, Access Cntroller) As a unified management and control device in the FIT AP architecture, the following description of the role of AC. is wrong ()

A.

No matter when the data is forwarded, the user's data message will be forwarded by AC.

B.

B. User access control

C.

C. User access authentication

D.

D. AP configuration delivery

Full Access
Question # 144

Which of the following IPv4 addresses can be used by a host to directly access the Internet? ()

A.

192.168.1.1/24

B.

172.32.1.1/24

C.

172.16.255.254/24

D.

10.255.255.254/24

Full Access
Question # 145

On the VRP operating platform, what command is used to display the current interface configuration in the interface view? ()

A.

display users

B.

display version

C.

display this

D.

display ip interfacebrief

Full Access
Question # 146

Which state does the 0SPF protocol use to indicate that the adjacency relationship has been established? ()

A.

Full

B.

B. 2-way

C.

C. Attempt

D.

D. Down

Full Access
Question # 147

After FIT AP obtains AC.'s IP address, what is the first operation to perform? ()

A.

B. Upgrade software version

B.

Establish a CAPTAP tunnel

C.

D. Request configuration file

Full Access
Question # 148

Which of the following commands to configure the default route is correct? ()

A.

B. (Huawei)ip route-statiC.0.0.0.0 255.255.255.255192.168.1.1

B.

(Huawei)ip route-statiC.0.0.0.0 0.0.0.0 192.168.1.1

C.

D. (Huawei)ip route-statiC.0.0.0.0 0.0.0.0 0.0.0.0

Full Access
Question # 149

Switch stacking supports more than two devices, and multiple switches can be grouped into a logical device through stacking. ()

A.

True

B.

False

Full Access
Question # 150

The two ends of the PPP link are not in the same network segment and cannot communicate

A.

True

B.

False

Full Access
Question # 151

The output information of the link aggregation port of a certain switch is as follows. If you want to delete Eth-Trunk1, which of the following commands is correct? ()

A.

undo interface Eth-trunk 1

B.

B. inte GigabitEthernet 0./0/2 Undo eth-trunk Quit Undo interface eth-trunk 1

C.

inte GigabitEthernet 0./0/1 Undo eth-trunk Quit inte GigabitEthernet0./0/2 Undo ethtrunk Quit

D.

D. inte GigabitEthernet 0./0/1 Undo eth-trunk Quit Undo interface eth-trunk 1

Full Access
Question # 152

When deploying ACL on Huawei equipment, which of the following descriptions is correct is ()

A.

When calling ACL under the interface, it can only be applied to the outbound direction

B.

ACL can match the TCP/UDP port number of the packet, and can specify the range of port numbers

C.

ACL cannot be used to filter OSPF traffic, because COSPF traffic does not use UDP protocol encapsulation

D.

The same ACL can be called under multiple interfaces

E.

E. When ACL defines rules, it can only proceed in the order of 10, 20, 30

Full Access
Question # 153

The following description about the specified port of the spanning tree is correct ()·

A.

The designated port can forward configuration BPDU packets to the network segment connected to it

B.

B. The port on the root switch must not be a designated port

C.

C. Each switch has only one designated port

D.

D. The port on the root switch must be a designated port

Full Access
Question # 154

Which of the following are not the characteristics of a small campus network? ()

A.

Simple network level

B.

Fewer users

C.

Simple network requirements

D.

Wide coverage

Full Access
Question # 155

Regarding the IPv6 address 2031:0000:720C:0000:0000:09E0:839A:130B, which of the following abbreviations are correct? ()

A.

2031:0:720C:-9E0:839A:130B

B.

2031:0:720C:0:0:9E0:839A:130B

C.

D. 2031:720C:9E0:839A:130B

Full Access
Question # 156

Which layer of protocol does ARP belong to

A.

data link layer

B.

B. Network layer

C.

C. Physical layer

D.

D. Transport layer

Full Access
Question # 157

All four switches run STP, and various parameters adopt default values. If the G0/0/2 port of switch C is blocked and the configuration BPDU cannot be sent through this port, how long will the blocked port in the network enter the forwarding state ()

A.

About 50 seconds

B.

About 30 seconds

C.

D. About 15 seconds

Full Access
Question # 158

Does the WEP security policy support the use of TKIP for data encryption?

A.

True

B.

False

Full Access
Question # 159

AP does not need AC. It can independently complete the work of wireless user access, wireless user authentication, and business data forwarding.

A.

True

B.

False

Full Access
Question # 160

An ACL rule is as follows: Which of the following IP addresses can be matched by permit rules? () rule5per mit ip source10.0.2.00.0.254.255

A.

10.0.6.7

B.

10.0.4.5

C.

10.0.5.6

D.

10.0.2.I

Full Access
Question # 161

If it is UDP, the value of the protocol field of the network layer is 6 ()

A.

True

B.

False

Full Access
Question # 162

The administrator plans to implement route backup by configuring static floating routes. The correct way to achieve this is ()

A.

The administrator needs to configure different metric values ​​for the main static route and the standby static route

B.

The administrator needs to configure different TAGs for the main static route and the standby static route

C.

The administrator only needs to configure two static routes

D.

The administrator needs to configure different protocol priority values ​​for the main static route and the standby static route

Full Access
Question # 163

Which of the following information is not included in the MAC address table of the switch? ()

A.

B. MAC.Address

B.

IP address

C.

D. VLAN

Full Access
Question # 164

At which layer of the OSI reference model do Ethernet switches operate? ( )

A.

Network layer

B.

Data link layer

C.

Physical layer

D.

Transport layer

Full Access
Question # 165

Which of the following is not included in the VRP system login method? ()

A.

Telnet

B.

Netstream

C.

SSH

D.

web

Full Access
Question # 166

In order to realize the launch of FIT AP, FIT AP first needs to obtain the IP address of AC. Which of the following is not included in the way FITAP obtains the IP address of AC.? ()

A.

Broadcasting method

B.

Static designation method on AP

C.

Multicast mode

D.

DHCP Option mode

Full Access
Question # 167

The bridge ID of the STP protocol in the switching network is as follows. Which of the following bridge IDs will be the root bridge? ()

A.

409600-01-02-03-04-DD

B.

3276800-01-02-03-04-AA

C.

3276800-01-02-03-04-CC

D.

3276800-01-02-03-04-BB

Full Access
Question # 168

Switch stacking supports more than two devices, and multiple switches can be grouped into a logical device through stacking. ()

A.

True

B.

False

Full Access
Question # 169

System-view (huawei) command-privilege level3 view user save is correct about the above configuration command ()

A.

Modify the user's authority level to 3, and save the configuration

B.

Modify the permission level of the user view command to 3, and save the configuration

C.

Modify the authority level of the save command used by a user to 3

D.

Modify the permission level of the save command in the user view to 3

Full Access
Question # 170

When the host frequently moves the office, which VLAN division method is most suitable? ()

A.

Based on MAC. Address division

B.

Based on port division

C.

Based on IP subnetting

D.

Based on strategy division

Full Access
Question # 171

What is the range of VLAN ID that users can use? ()

A.

1-4096

B.

1-4094

C.

0-4096

D.

0-4095

Full Access
Question # 172

Which of the following routing protocols has the highest priority?

A.

Direct

B.

C. Static

C.

D. OSPF

Full Access
Question # 173

Which of the following IPv6 addresses is a multicast address? ()

A.

FE80:2EO:FCFF:FEEF:FEC

B.

FC0O:2EO:FCFF:FEEF:FEC

C.

FF02::2EO:FCFF:FEEF:FEC

D.

2000::2EO:FCFF:FEEF:FEC

Full Access
Question # 174

What is the default step length of ACL on AR G3 series routers? ()

A.

10

B.

5

C.

20

D.

15

Full Access
Question # 175

When using the ping command on the VRp platform, if you need to specify a P address as the source address of the echo request message, which of the following parameters should be used? ()

A.

=-d

B.

=-a

C.

=-S

D.

=-n

Full Access
Question # 176

When a switch receives a unicast data frame with a VLAN tag, but finds that the destination MAC address of the data frame cannot be queried in its MAC address table, the switch's processing behavior for the data frame is ().

A.

The switch will broadcast this data frame to all ports (except the receiving port) in the VLAN where the data frame is located

B.

The switch will broadcast the data frame to all ports

C.

The switch will discard this data frame

D.

The switch will broadcast this data frame to all Access ports

Full Access
Question # 177

When an Access type port sends a message, it will ()·

A.

Send tagged messages

B.

Strip the VLAN information of the message, and then send it out

C.

Type the PVID. information of this port, and then send it out

D.

Add the ZLAN message of the message, and then send it out

Full Access
Question # 178

NAPT allows multiple private IP addresses to be mapped to the same public P address through different port numbers. The following description of the port number in NAPT is correct ().

A.

The correspondence between port numbers and private addresses must be manually configured

B.

No need to do any configuration about port number

C.

Only need to configure the range of port numbers

D.

Need to use ACL to assign port numbers

Full Access
Question # 179

Which of the following fields is not included in the HELL0 packet of the OSPF protocol?

A.

B. Nei ghbor

B.

sysname

C.

D. He11 oInt erval

D.

E. He11 oInt erval

Full Access
Question # 180

OSPF Router ID. It must be the same as the IP address of an interface on the router.

A.

True

B.

False

Full Access
Question # 181

In order for the STA to obtain the SSID related information on the AP, which of the following messages is used by the AP to proactively declare the wireless network SSID information? ()

A.

Join

B.

eacon

C.

Probe

D.

Discovery

Full Access
Question # 182

The Layer 2 networking of WLAN refers to STA. It uses AC as its own gateway. ()

A.

True

B.

False

Full Access
Question # 183

The mask length is 12 bits can be expressed as?

A.

255.240.0.0

B.

255.248.0.0

C.

255.255.0.0

D.

255.255.255.0

Full Access
Question # 184

The administrator configures R1 as shown in the figure. But R1 cannot learn the routes of other routers, so it may be.

The reason is? () (Multiple Choice Questions)

A.

This router did not announce the network connected to neighbors when configuring ospf

B.

This router is not configured with authentication function but the neighbor router is configured with authentication function

C.

C. When this router is configured, the ospf process number is not configured

D.

The area configured by this routerID and its neighbor router areaID is different

Full Access
Question # 185

What is the total length of an IPv6 address in bits? ()

A.

96

B.

64

C.

32

D.

128

Full Access
Question # 186

Which of the following statements about direct routing is correct? ()

A.

Direct routing requires the administrator to manually configure the destination network and next hop address

B.

Direct routes have lower priority than static routes

C.

Direct routing has lower priority than dynamic routing

D.

Direct routing has the highest priority

Full Access
Question # 187

After link authentication is completed, STA. will continue to initiate link service negotiation. Which of the following messages will be used to achieve the specific negotiation? ()

A.

Join

B.

Handshake

C.

Association

D.

Negotiate

Full Access
Question # 188

As shown in the figure below. All hosts can communicate normally. Which of the following statements are correct? () (Multiple Choice Questions)

A.

G0/0/3 of SWB learned 2 mac addresses

B.

SWA's G0/0/3 learned 1 mac address

C.

C. SWA's G0/0/3 learned 2 mac addresses

D.

D. SWA's G0/0/3 learned 3 mac addresses

Full Access
Question # 189

In the VRP system, what function does the Ctrl+Z key combination have? ()

A.

Return to user view from any view

B.

B. Return from system view to user view

C.

C. Exit interface view

D.

D. Exit the current view

E.

E. Exit the console interface view

Full Access
Question # 190

By default, what is the period for sending 0SPF HELLO packets on the broadcast network? ()

A.

10s

B.

B. 20s

C.

C. 30s

D.

D. 40s

Full Access
Question # 191

What is the length of the Ethernet II frame containing the Ethernet header?

A.

64-1518B

B.

60-1560B

C.

46-1500B

D.

64-1500B

Full Access
Question # 192

The display startup information of the AR2200 router. Regarding these information, the statement is wrong ()

A.

The system file at the next startup of the device can be modified with the command "startup system software"

B.

The running configuration file is not saved

C.

The system file used for this startup of the device is ar2220-v200r003c00spc00.cc

D.

The system file cannot be modified when the device is started next time

Full Access
Question # 193

A network engineer prompts the following message when entering the command line: Error: UnrecognizeD.commanD.founD.at 'ï¼¾' position. Which of the prompt information is correct? ()

A.

The input command is incomplete

B.

Wrong parameter type

C.

Keyword not found

D.

The input command is ambiguous

Full Access
Question # 194

By default, on the broadcast networkOSPFWhat is the transmission period of the protocol HELLO message? ()

A.

10s

B.

40s

C.

30s

D.

20s

Full Access
Question # 195

The RSTP protocol uses the P/A mechanism to speed up the speed of the upstream port to the F orwarding state, but what is the reason for the no temporary loop? . Shorten the time of ForwarD.Del ay

A.

Shorten the time of ForwarD.Del ay

B.

Edge port

C.

Speed ​​up port role election

D.

Ensure that there will be no temporary loops through the synchronization mechanism

Full Access
Question # 196

By default, what is the lease period for the DHCP server to assign an IP address? ()

A.

12h

B.

1h

C.

24h

D.

18h

Full Access
Question # 197

What is the value of the Type field in the RStp configuration BPDU message? ()

A.

0x01

B.

0x00

C.

0x02

D.

0x03

Full Access
Question # 198

All interfaces of routers running 0SPF protocol must belong to the same area. ()

A.

True

B.

False

Full Access
Question # 199

The load sharing mode at both ends of the Eth-Trunk can be inconsistent ()

A.

True

B.

False

Full Access
Question # 200

Which of the following commands can be used to check the session status of the PPPoE client? ()

A.

display current configuration

B.

display pppoe-client session summary

C.

display ip interface brief

D.

display pppoe-client sessi on packet

Full Access
Question # 201

There is a WeB server in the private network that needs to provide HITP services to public network users. Therefore, the network administrator needs to configure NAT on the gateway router RTA.

A.

RTA-Gigabitethernet0/0/1 nat server protocol tcp global 192.168.1.1 www inside 202.10.10.18080

B.

(RTA-Serial1/0/1) nat server protocol tcpglobal 192.168.1.1 www inside202.10.1 0.18080

C.

(RTA-Gigabitethernet0/0/1) nat server protocol tcp global 202.10.10.1 www inside 192.168.1.18080

D.

(RTA-Serial1/0/1) nat server protocol top global 202.10.10.1 www inside192.168.1.18080

Full Access
Question # 202

When two OSPF routers form a 2-WAY neighbor relationship, LSDB. has been synchronized. ()

A.

True

B.

False

Full Access
Question # 203

There is no channel overlap in the 14 available frequency bands in the 2.4GHz frequency band. ()

A.

True

B.

False

Full Access
Question # 204

If the administrator wants to completely delete the old device configuration file, the following command is correct ().

A.

clear config.zip

B.

delete /unreserveD.config.zip

C.

delete /force config.zip

D.

reset config.zip

Full Access
Question # 205

A company applies for a C. IP address segment, which needs to be evenly distributed to 8 subsidiaries. The largest subsidiary has 14 computers. Different subsidiaries must be in different network segments, so the subnet mask should be set. for()

A.

255.255.255.240

B.

255.255.255.0

C.

D. 255.255.255.128

Full Access
Question # 206

Which of the following statements is correct? ()

A.

The router works at the physical layer

B.

The switch works at the physical layer

C.

The switch works at the network layer

D.

The router works at the network layer

Full Access
Question # 207

What elements can NAPT convert? ()

A.

Only MAC. address

B.

IP address + port number

C.

MAC. Address + port number

D.

Only IP address

Full Access
Question # 208

What kind of packets does the OSPF protocol use to request LSAs that are missing locally? ()

A.

B. LSACK

B.

LSR

C.

D. LSU

Full Access
Question # 209

The following figure shows the routing table of a router. When the router receives a data packet with a destination IP address of 9.LL, the router will forward it according to the route of 91.0.016 because the mask length of this route is longer. ()

A.

True

B.

False

Full Access
Question # 210

Which of the following protocols is OSPF based on?

A.

UDP

B.

HTTP

C.

TCP

D.

IP

Full Access
Question # 211

Which of the following is not the reason why RSTP can increase the speed of convergence? ()

A.

The introduction of edge ports

B.

Fast switching of the root port

C.

P/A mechanism

D.

Forward.delay cancelled

Full Access
Question # 212

The basic header length of IPv6 packets is a fixed value ()

A.

True

B.

False

Full Access
Question # 213

AC uses CAPTAP control tunnel transmission to FIt AP management packet

A.

True

B.

False

Full Access
Question # 214

FIT AP does not need AC. It can also work independently ()

A.

True

B.

False

Full Access
Question # 215

Management Information Base (MIB) Information Base) is a virtual database, which only exists on the NMS. ()

A.

True

B.

False

Full Access
Question # 216

Which statement about OSPF area division is wrong? ( )

A.

AreA.0 is the backbone area. All other areas must be connected to this area

B.

The LSDBs in the routers in the same OSPF area are exactly the same

C.

Dividing OSPF areas can reduce the size of the LSDB of some routers

D.

Only ABR can be used as ASBR

Full Access
Question # 217

When two OSPF routers form a 2TAY neighbor relationship, LSDB. has been synchronized.

A.

True

B.

False

Full Access
Question # 218

What is the main function of the DNS protocol?

A.

Remote access

B.

File transfer

C.

Domain name resolution

D.

Email transmission

Full Access
Question # 219

It is advised to assign static IP addresses to servers during campus network planning.

A.

TRUE

B.

FALSE

Full Access
Question # 220

(Loops may cause broadcast storms on a Layer 2 network.)

A.

TRUE

B.

FALSE

Full Access
Question # 221

The data link layer uses PPP encapsulation. The IP addresses of the two ends of the link can be in different network segments.

A.

TRUE

B.

FALSE

Full Access
Question # 222

(Which of the following statements about IPv6 anycast addresses are true?)

A.

Packets destined for an anycast address are sent to the nearest interface identified based on the routing distance.

B.

IPv6 anycast addresses implement load balancing for services.

C.

Anycast and unicast addresses use the same address space.

D.

IPv6 anycast addresses provide redundancy functions for services.

Full Access
Question # 223

(Which of the following OSPF packets can be used to confirm the received Link State Update (LSU) packets?)

A.

LSA

B.

LSU

C.

LSR

D.

LSACK

Full Access
Question # 224

On an STP-enabled switch, a port in the Learning state can transition to the Forwarding state only after the Forward Delay timer expires.

A.

TRUE

B.

FALSE

Full Access
Question # 225

Which of the following VRP commands can be used to enter area 0 view?

A.

[Huawei-ospf-1] area 0.0.0.0

B.

[Huawei-ospf-1] area 0 enable

C.

[Huawei-ospf-1] area 0

D.

[Huawei] ospf area 0

Full Access
Question # 226

(Which of the following is a dynamic IGP routing protocol?)

A.

Static

B.

BGP

C.

Direct

D.

OSPF

Full Access
Question # 227

(You can run the "pwd" and "dir" commands on the Versatile Routing Platform (VRP) to view file information in the current directory.)

A.

TRUE

B.

FALSE

Full Access
Question # 228

(Which of the following statements is true about active interface election for an Eth-Trunk in LACP mode?)

A.

Only interface priorities are compared.

B.

Device priorities are compared.

C.

Interface priorities are compared first. If priorities of interfaces on the Actor are the same, interfaces with smaller interface numbers are elected as active interfaces.

D.

Only interface numbers are compared.

Full Access
Question # 229

In RSTP, an edge port becomes a common STP port after receiving a configuration BPDU.

A.

TRUE

B.

FALSE

Full Access
Question # 230

In the following figure, all links are Ethernet links, and all interfaces on the routers are running OSPF. Given this, how many DRs will be elected on this network?

A.

1

B.

3

C.

4

D.

2

Full Access
Question # 231

After a switch restarts, static MAC address entries saved on the switch remain in the MAC address table.

A.

TRUE

B.

FALSE

Full Access
Question # 232

(An administrator cannot log in to a Huawei router through Telnet, but other administrators can log in to the router. Which of the following are possible causes?)

A.

The administrator account has been disabled.

B.

The Telnet service has been disabled on the AR2200 router.

C.

The administrator account has been deleted.

D.

The user level of the administrator account has been changed to 0.

Full Access
Question # 233

The rules in an ACL may overlap. If packets match the rules with loose conditions, the later ACL rules are not processed. In this case, packets cannot match the rules with strict conditions. Therefore, the rules with strict conditions must be arranged in front lines and those with loose conditions must be arranged towards the end.

A.

TRUE

B.

FALSE

Full Access
Question # 234

Which of the following descriptions regarding the TTL field of the IP packet is correct?

A.

The TTL value will decrement by 1 each time the packet is routed.

B.

The TTL defines the duration during which the source can send packets.

C.

The TTL defines how many packets the source can send.

D.

The TTL value will increment by 1 each time the packet is routed.

Full Access
Question # 235

(If a routing table contains multiple routes to the same destination network, what are these routes called?)

A.

Sub-optimal routes

B.

Multipath routes

C.

Equal-cost routes

D.

Default routes

Full Access
Question # 236

telnetlib is a module provided by Python to implement the Telnet protocol.

A.

TRUE

B.

FALSE

Full Access
Question # 237

When a host uses the stateless address autoconfiguration solution to obtain an IPv6 address, the host cannot obtain the DNS server address.

A.

TRUE

B.

FALSE

Full Access
Question # 238

Network devices running SNMP can proactively report traps to help network administrators detect faults in a timely manner.

A.

TRUE

B.

FALSE

Full Access
Question # 239

Which of the following is the default port number of the Telnet server?

A.

22

B.

24

C.

21

D.

23

Full Access
Question # 240

The network shown in the figure below. Which router is the BDR in this network? () (Single-choice question)

A.

B. Router B

B.

No BDR

C.

D. Router C

Full Access
Question # 241

On Huawei switches, you can use the vlan batch command to create multiple VLANs in batches, simplifying the configuration process. ()

A.

True

B.

False

Full Access
Question # 242

What is the number range of an advanced ACL?

A.

2000-2999

B.

3000-3999

C.

6000-6031

D.

4000-4999

Full Access
Question # 243

Which SNMP version focuses on two main aspects, namely security and administration. The security aspect is addressed by offering both strong authentication and data encryption for privacy. The administration aspect is focused on two parts, namely notification originators and proxy forwarders.

A.

SNMPv2c

B.

SNMPv1

C.

SNMPv3

D.

SNMPv2

Full Access
Question # 244

(Each network device running SNMP runs an agent process locally.)

A.

TRUE

B.

FALSE

Full Access
Question # 245

Which of the following fields are contained in an ARP packet?

A.

Source Protocol Address

B.

Source Hardware Address

C.

Hardware Type

D.

Operation Code

Full Access
Question # 246

For an Eth-Trunk in LACP mode, what is the default LACP system priority of a Huawei switch?

A.

4096

B.

36864

C.

32768

D.

24576

Full Access
Question # 247

When the ACL in the following figure is configured on a Telnet server, only the device with an IP address of 172.16.105.2 can remotely log in to the Telnet server.

bash

Copy code

acl number 2000

rule 5 permit source 172.16.105.2 0

A.

TRUE

B.

FALSE

Full Access
Question # 248

Which of the following is correct regarding the configuration of the trunk port and access port on a switch?

A.

Access ports can only send untagged frames.

B.

Trunk ports can only send tagged frames.

C.

Access ports can only send tagged frames.

D.

Trunk ports can only send untagged frames.

Full Access
Question # 249

After the administrator performs the configuration shown in the figure on a router, which of the following commands can be used to specify a short lease for addresses assigned using DHCP?

A.

dhcp select relay

B.

lease 0

C.

lease day 0 hour 10

D.

lease 24

Full Access
Question # 250

Assuming that OSPF has been enabled on all routers in the following figure, which router is the BDR on this network?

A.

Router B

B.

Router A

C.

Router D

D.

Router C

Full Access
Question # 251

In RSTP, a backup port can replace a faulty root port.

A.

TRUE

B.

FALSE

Full Access
Question # 252

(The administrator performs the configuration shown in the figure on a router, and a host is connected to Gi/0/0 of the router. Which of the following statements is true about the IP address obtained by the host through DHCP?)

A.

The host cannot obtain an IP address.

B.

The IP address obtained by the host belongs to the 10.10.10.0/24 network segment.

C.

The IP address obtained by the host belongs to the 10.20.20.0/24 network segment.

D.

The IP address obtained by the host may belong to the 10.10.10.0/24 or 10.20.20.0/24 network segment.

Full Access
Question # 253

A router in the backbone area has complete LSDBs of routers in other areas.

A.

TRUE

B.

FALSE

Full Access
Question # 254

On the Huawei VRP, what is the default preference of different route types, in descending order?

A.

Direct > Static > RIP > OSPF

B.

Direct > OSPF > RIP > Static

C.

Direct > RIP > Static > OSPF

D.

Direct > OSPF > Static > RIP

Full Access
Question # 255

The router that runs OSPF first enters the Full state and then synchronizes the LSDB.

A.

TRUE

B.

FALSE

Full Access
Question # 256

As shown in the figure. If host A has the ARp cache table of host B, then host A can ping host B. ()(True or False)

A.

True

B.

False

Full Access
Question # 257

(What is the main function of a dynamic routing protocol?)

A.

Generate an IP address.

B.

Manage routers.

C.

Generate a routing table.

D.

Control the status of router interfaces.

Full Access
Question # 258

Which of the following methods is not supported by the Versatile Routing Platform (VRP) to configure a router?

A.

Configure the router through FTP.

B.

Configure the router through the mini USB port.

C.

Configure the router through Telnet.

D.

Configure the router through the console port.

Full Access
Question # 259

(The IPv6 address architecture does not include which of the following address types?)

A.

Unicast.

B.

Anycast.

C.

Multicast.

D.

Broadcast.

Full Access
Question # 260

Which of the following packets are exchanged between STAs and an AP to obtain the AP's SSID before association with the AP?

A.

Probe Request

B.

Discovery

C.

Probe Response

D.

Beacon

Full Access
Question # 261

Which of the following sources of routes can be obtained by a router?

A.

Static routes

B.

Direct routes

C.

Summary routes

D.

Dynamic routes

Full Access
Question # 262

On the VRP platform, which of the following parameters can be used together with the "ping" command to specify the source address of an echo request message?

A.

-d

B.

-n

C.

-a

D.

-s

Full Access
Question # 263

Which of the following IEEE 802.11 standards supports a theoretical negotiated rate of 5 Gbit/s or higher?

A.

802.11a

B.

802.11ax

C.

802.11n

D.

802.11b

Full Access
Question # 264

Which of the following fields are included in an MPLS header?

A.

Label

B.

TTL

C.

EXP

D.

Tos

Full Access
Question # 265

Which of the following statements are true about transport-layer protocols?

A.

UDP uses SYN and ACK flags to request and confirm connection establishment.

B.

UDP is suitable for transmitting delay-sensitive traffic, and UDP packets can be reassembled based on the sequence number field in the packet header.

C.

Establishing a TCP connection requires the three-way handshake mechanism, while terminating a TCP connection requires the four-way handshake mechanism.

D.

The well-known port number range is from 0 to 1023.

Full Access
Question # 266

What is used as the data link-layer MAC address that identifies each VAP on an AP?

A.

BSS

B.

SSID

C.

BSSID

D.

ESS

Full Access
Question # 267

Which of the following parameters is used to elect the root bridge in STP?

A.

Bridge ID

B.

System name of the switch

C.

Port ID

D.

Root path cost

Full Access
Question # 268

As shown in the figure, which of the following ports will be in blocking state?

A.

G0/0/3 of SWA

B.

G0/0/3 of SWB

C.

G0/0/2 of SWC

D.

G0/0/1 of SWC

Full Access
Question # 269

The TCP protocol uses the three-way handshake mechanism to establish and disable connections. Therefore, TCP supports reliable data transmission.

A.

TRUE

B.

FALSE

Full Access
Question # 270

When a switch receives a unicast data frame, if the destination MAC address of the data frame can be found in the MAC address table of the switch, the data frame is definitely forwarded through the port corresponding to the MAC address.

A.

TRUE

B.

FALSE

Full Access
Question # 271

Which of the following are features of the OSPF protocol?

A.

The shortest path is calculated based on the number of hops.

B.

Triggered update is supported.

C.

Routing loops are likely to occur.

D.

Area division is supported.

Full Access
Question # 272

To provide the information about the IP addresses that a user packet traverses along the path to the destination, which of the following does Tracert record in each expired ICMP TTL packet?

A.

Source port.

B.

Destination IP address.

C.

Source IP address.

D.

Destination port.

Full Access
Question # 273

If a device running STP receives an RSTP configuration BPDU, it discards the BPDU.

A.

TRUE

B.

FALSE

Full Access
Question # 274

Which of the following is not a characteristic of small campus networks?

A.

Simple network requirements

B.

Wide coverage

C.

Simple network architecture

D.

Small number of users

Full Access
Question # 275

As shown in the figure, all switches run STP. Assume that the path cost of all ports is 200. What is the root path cost contained in the configuration BPDU received by G0/0/4 on SWD?

A.

200

B.

600

C.

400

D.

0

Full Access
Question # 276

Which of the following operations are mandatory to restore the factory default settings of an AR2200 router?

A.

Restarting the AR2200 router

B.

Resetting saved configurations

C.

Clearing the current configuration

D.

Specifying the configuration file for the next startup

Full Access
Question # 277

(Network Functions Virtualization (NFV) implements software-based network application deployment.)

A.

TRUE

B.

FALSE

Full Access
Question # 278

Which of the following states indicates that the OSPF neighbor relationship has been established?

A.

Attempt

B.

Down

C.

Full

D.

2-way

Full Access
Question # 279

Which of the following WLAN security policies support open link authentication?

A.

WPA2-PSK

B.

WPA

C.

WEP

D.

WPA2-802.1X

Full Access
Question # 280

(Which of the following routing protocols are dynamic routing protocols?)

A.

Static routing

B.

Direct routing

C.

OSPF

D.

BGP

Full Access
Question # 281

The network shown in the figure below. From a security perspective, router A refuses to receive OSPF packets and ICMP packets received from interface G0/0/1. Which of the following commands can achieve this requirement? () (Multiple Choice Questions)

A.

acl number 3000

Rule 5 deny 89

Rule 10 deny icmp

#

Interface GigabitEthernet0/0/1Traffic-filter inbound acl 3000#

B.

acl number 3000

Rule 5 deny 89

Rule 10 deny 1

#

Interface GigabitEtherneto/0/1Traffic-filter inbound acl 3000#

C.

acl number 2000

Rule 5 deny 89

Rule 10 deny 1

#

Interface GigabitEthernet0/0/1Traffic-filtet inbound acl 2000#

D.

acl number 3000

Rule 5 deny ospf

Rule 10 deny icmp

#

Interface GigabitEthernet0/0/1Traffic-filtet inbound acl 3000#

Full Access
Question # 282

During STP calculation, the port cost is associated with the port bandwidth by default. Which of the following statements about the relationship between port cost and port bandwidth is true?

A.

The port cost varies randomly according to port bandwidth.

B.

A higher port bandwidth indicates a smaller port cost.

C.

The port bandwidth is equal to the port cost.

D.

A higher port bandwidth indicates a larger port cost.

Full Access
Question # 283

The output information of a certain device is shown in the figure. Which of the following statements are correct? () (Multiple Choice Questions)

A.

The standby main control board of the device is operating normally

B.

The VRP operating version of this device is CRP5

C.

The device name is Huawei

D.

The device has been running for 1 minute

Full Access
Question # 284

On Huawei AR G3 Series routers, which authentication modes does AAA support?

A.

Radius

B.

None

C.

Local

D.

802.1X

Full Access
Question # 285

Which of the following statements about the various versions of the SNMP protocol are correct?

A.

The SNMPv2C. message has the functions of identity verification and encryption processing.

B.

SNMPv.3 messages have the functions of identity verification and encryption processing.

C.

SNMPv1 uses UDP as the transport layer protocol, while SNMPv2C. and SNMPv3 use TCP as the transport layer protocol, so the reliability is higher.

D.

SNMPv2C. follows the 5 protocol operations defined in the v1 version and adds two additional operations.

Full Access
Question # 286

What packet types are included in DHCP?

A.

DHCP Discover packet

B.

DHCP Request packet

C.

DHCP Rollover packet

D.

DHCP Offer packet

Full Access
Question # 287

After a fault occurs in the network, the administrator finds that the configuration of a certain router has been modified through troubleshooting. What measures should the administrator take to avoid this situation from happening again? ()*

A.

The administrator should configure ACL to control that only the administrator can log in to the device

B.

The administrator should enable port-security on the routed management port

C.

The administrator should configure AAA. to authenticate and authorize users who log in to the device

D.

The administrator should configure the permission level of all accounts except the administrator to log in to the device as

Full Access
Question # 288

Now there are the following four segments: 10.24.0.0/24, 10.24.1.0/24, 10.24.2.0/24, 10.24.3.0/24, which route can point to these four network segments at the same time? ()*

A.

10.24.1.0/23

B.

0.0.0.0/0

C.

10.24.0.0/22

D.

10.24.0.0/21

Full Access
Question # 289

On the network shown in the figure, router A adopts link aggregation in manual load balancing mode, and G0/0/1 and G0/0/2 are added to link aggregation group (LAG) 1. Which of the following statements is false about Eth-Trunk 1 on router A?

A.

If both G0/0/1 and G0/0/2 on router B are disabled, Eth-Trunk 1 is Up.

B.

If only G0/0/2 on router B is disabled, Eth-Trunk 1 is Up.

C.

If only G0/0/1 on router B is disabled, Eth-Trunk 1 is Up.

D.

If both G0/0/1 and G0/0/2 on router B are disabled, Eth-Trunk 1 is Down.

Full Access
Question # 290

Which of the following ACLs can match the transport layer port number?

A.

Basic ACL

B.

Layer 2 ACL

C.

Advanced ACL

D.

Intermediate ACL

Full Access
Question # 291

In order to detect the connectivity status of the CAPWAP tunnel, after the CAPWAP tunnel is established, which of the following CAPTAP messages is used by the AC for detection? ()*

A.

Hello

B.

DPD

C.

Keepalive

D.

Echo

Full Access
Question # 292

Which of the following message types does DHCP contain?

A.

DHCP DISCOVER

B.

DHCP REQUEST

C.

DHCP OFFER

D.

DHCP ROLLOVER

Full Access
Question # 293

Which of the following statements about RA. and RS messages in IPv6 are correct? ()*

A.

RS is used to request address prefix information

B.

RA. Used to reply address prefix information

C.

D. RS is used to reply address prefix information

Full Access
Question # 294

Which of the following commands can switch a view from the system view to the user view?

A.

System-view

B.

User-view

C.

Quit

D.

Router

Full Access
Question # 295

The router that runs OSPF first enters the Full state and then synchronizes the LSDB.

A.

TRUE

B.

FALSE

Full Access
Question # 296

The following figure shows the display interface Eth-Trunk 1 command output on SWA. In the MAC address table of SWA, which of the following interfaces maps the MAC address of SWB?

A.

GigabitEthernet0/0/1

B.

Eth-Trunk 1

C.

GigabitEthernet0/0/3

D.

GigabitEthernet0/0/2

Full Access
Question # 297

Which of the following fields are present in both IPv6 and IPv4 packet headers? ()*

A.

Next Header

B.

Destination Address

C.

Version

D.

Source Address

Full Access