Pre-Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Huawei > HCIP-Datacom > H12-821_V1.0

H12-821_V1.0 HCIP-Datacom-Core Technology V1.0 Question and Answers

Question # 4

STP ensures a loop-free network but has a slow network topology convergence speed, affecting communication quality. RSTP has made some improvements based on STP. Which of the following improvements is not included?

A.

If a port does not receive configuration BPDUs from the upstream device within four Hello intervals, the switch considers that the negotiation with the neighbor fails.

B.

The non-root switch running RSTP sends configuration BPDUs at the interval specified by the Hello timer, which is performed independently by each device.

C.

RSTP reduces five port states to three port states based on user traffic forwarding and MAC address learning.

D.

RSTP deletes three port states and adds two port roles.

Full Access
Question # 5

IPv6 defines multiple types of addresses. Which of the following statements is false about these addresses?

A.

Link-local addresses can be quickly generated using the EUI-64 method.

B.

Anycast addresses can be used only as destination addresses.

C.

Each interface can have multiple global unicast addresses with different network prefixes.

D.

Manually configured link-local addresses have a higher priority than automatically generated ones.

Full Access
Question # 6

Drag the following VRRP states to the corresponding working mechanisms.

Full Access
Question # 7

As shown in the following figure, a new AP is deployed In dual link MSB networking (load balancing mode). Which AC will the connect to?

A.

AC1

B.

Random access

C.

None

D.

AC2

Full Access
Question # 8

Which of the following statements is false?

A.

If the current DR fails, the current BDR automatically becomes a new DR, and a BDR will be elected again.

B.

A device with a higher router priority has a higher election priority.

C.

When a router with the highest router priority joins an OSPF network, this router will become the new DR.

D.

If two devices have the same router priority, the device with a larger router ID has a higher election priority.

Full Access
Question # 9

As shown in the figure, SWA, SWB, SWC, and SWD run the Rapid Spanning Tree Protocol (RSTP). Which of the following statements are true?

A.

Once receiving OPOUs, the edge port re-partlci pates in the calculation of the spanning tree.

B.

After a port is Configured as an edge port, the port can quickly enter the Forwarding state.

C.

You can enable the edge port on SWD's GEO/0/2 connected to the terminal so that this port can quickly enter the Forwarding state.

D.

You can enable the edge port on SWC's GE0/0/2 connected to the terminal so that this port can quickly enter the forwarding state.

Full Access
Question # 10

PBR is a mechanism for selecting routes based on user-defined policies. There are two types of PBR: interface-based PBR and local PBR. Which of the following statements is false about these two types of PBR?

A.

Interface-based PBR takes effect only for forwarded packets.

B.

Local PBR takes effect only for locally originated packets.

C.

Interface-based PBR is configured on an interface and takes effect only for incoming packets on the interface.

D.

Local PBR is configured in the protocol view.

Full Access
Question # 11

Similar to the OSPF DR, the IS-IS DIS needs to be elected on a broadcast network. However, the OSPF DR is preemptive by default, whereas the IS-IS DIS is not preemptive by default.

A.

TRUE

B.

FALSE

Full Access
Question # 12

A Layer 2 switch supports multiple types of Ethernet interfaces. Similar to a trunk interface, a hybrid interface allows data frames from multiple VLANs to pass through. In addition, you can determine whether data frames from a VLAN sent out from a hybrid interface are tagged or untagged.

A.

TRUE

B.

FALSE

Full Access
Question # 13

An ACL can be used to match routes or data, but cannot be used to match both the IP address prefix length and mask length.

A.

TRUE

B.

FALSE

Full Access
Question # 14

Huawei modular devices have multiple hardware modules that provide different functions. Match the following hardware modules with their functions.

Full Access
Question # 15

On an OSPF network, if a router receives an update of an LSA that exists in the local LSDB, the router updates the LSDB and floods the LSA.

A.

TRUE

B.

FALSE

Full Access
Question # 16

Which of the following statements is false about the default processing of the next hop address when a BGP device advertises a route?

A.

When advertising a locally originated route to an IBGP peer, a BGP device sets the next hop address to the IP address of its interface connected to the peer.

B.

When advertising a non-labeled route received from an EBGP peer to an IBGP peer, a BGP device changes the next hop address to the IP address of its interface connected to the IBGP peer.

C.

When advertising a route to an EBGP peer, a BGP device sets the next hop address to the IP address of its interface connected to the peer.

D.

A BGP device does not change the next hop address of a route if the route is received from an IBGP peer and is to be sent to another IBGP peer.

Full Access
Question # 17

Which of the following statements about multicast packet forwarding is true?

A.

If a multicast data packet fails the RPF check, the packet must have been received through a sub-optimal interface. However, this interface still receives and forwards the multicast traffic downstream.

B.

IGMP snooping cannot control the scope of multicast traffic flooding on a Layer 2 network.

C.

The source address of a multicast packet is a unicast address.

D.

In multicast transmission, the destination address of a packet can be the unicast address of a host.

Full Access
Question # 18

The following figure shows the OSPF network of an enterprise and the OSPF configurations of R1. Which of the following statements is false about the network?

A.

R2 can access the server.

B.

GE 0/0/1 of R1 cannot send OSPF packets.

C.

The network segment to which GE 0/0/1 of R1 belongs cannot be advertised.

D.

GE 0/0/1 of R1 cannot accept OSPF packets.

Full Access
Question # 19

Which of the following statements regarding the OSPF protocol is false?

A.

Each OSPF router uses only one Router-LSA to describe the local active connection status of an area.

B.

Routing information can be advertised only between backbone and non-backbone areas and cannot be advertised directly between non-backbone areas.

C.

Router-LSA describes four connection types: P2P, TransNet, SubNet, and virtual link.

D.

Link State ID in a Type 3 LSA indicates the router ID of an ABR.

Full Access
Question # 20

On the OSPF network shown in the figure, R1, R2, and R3 run OSPF, and R1 advertises four VPN routes to OSPF. A filter-policy needs to achieve the following goal: R1's and R3's routing tables contain the routes to 192.168.3.0/24, but R2's routing table does not. Which of the following filter-policies cannot meet this requirement?

A.

A filter-policy on R2 for filtering received routes

B.

A filter-policy on R2 for filtering the routes to be advertised

C.

A filter-policy on R1 for filtering the routes to be imported

D.

A filter-policy on R1 for filtering the imported routes to be advertised

Full Access
Question # 21

iMaster NCE-Campus can be used as an authentication server on a WLAN to authenticate STAs.

A.

TRUE

B.

FALSE

Full Access
Question # 22

When a packet passes through a firewall, the firewall creates a session connection for the packet to guide subsequent forwarding of the packet. However, the firewall does not create session entries for all packets. For which of the following packets does the firewall not create session entries when the packet reaches the firewall?

A.

ICMP ping packet

B.

GRE packet

C.

Subsequent fragment

D.

UDP packet

Full Access
Question # 23

Which of the following statements about BFD operating modes are true?

A.

In demand mode, once a BFD session is set up, the system no longer periodically sends BFD Control packets.

B.

Asynchronous mode does not support the Echo function.

C.

In asynchronous mode, two systems periodically exchange BFD Control packets at the negotiated interval. If one system does not receive any BFD Control packets from the other within the detection time, the BFD session is declared down.

D.

Asynchronous mode is the primary BFD operating mode.

Full Access
Question # 24

OSPF supports area authentication and interface authentication. If both authentication modes are configured, Interface authentication takes preference over area authentication.

A.

TRUE

B.

FALSE

Full Access
Question # 25

When creating a single-hop BFD session for the first time, bind the single-hop BFD session to the peer IP address and the local address. To modify a configured BFD session, delete it and create a new one.

A.

TRUE

B.

FALSE

Full Access
Question # 26

When a routing policy is used to filter routes, which of the following route prefixes will be denied by the IP prefix below?

A.

1.1.1.1/26

B.

1.1.1.2/16

C.

1.1.1.1/32

D.

1.1.1.1/24

Full Access
Question # 27

On an OSPF network, an algorithm is used to prevent loops within an area, but loops may occur between areas. Therefore, OSPF defines a loop prevention mechanism for inter-area routes. Which of the following statements are true about the loop prevention mechanism?

A.

Inter-area routes cannot be directly transmitted between non-backbone areas.

B.

All non-backbone areas must be directly connected to area 0.

C.

Inter-area routes need to be forwarded through area 0.

D.

An ABR cannot inject Type 3 LSAs that describe routes to a network segment in an area back to the same area.

Full Access
Question # 28

Which of the following scenarios is not suitable for deploying interface PBR?

A.

A core switch needs to forward traffic between the intranet and extranet to an AC device that connects to the core switch in off-path mode.

B.

A core switch needs to forward the traffic between the intranet and extranet to a security detection device that connects to the core switch in off-path mode.

C.

A device needs to modify the next-hop IP address for locally originated traffic.

D.

On an enterprise network with multiple ISP outbound interfaces, each internal network segment accesses the Internet through a particular ISP outbound interface.

Full Access
Question # 29

Typically, a protocol that occupies two ports during communication is called a multi-channel protocol. For such protocols, the ASPF function must be enabled on the firewall to ensure smooth setup of the data channel and reduce the risk of attacks. Which of the following protocols is not a multi-channel protocol?

A.

FTP

B.

SIP

C.

SMTP

D.

H.323

Full Access
Question # 30

As shown in the figure, SWA, SWB, and SWC run the Rapid Spanning Tree Protocol (RSTP). What are the roles of SWB's GE0/0/2 and SWC's GE0/0/1?

A.

Backup port, alternative port

B.

Alternative port, backup port

C.

Backup port, root port

D.

Root port, designated port

Full Access
Question # 31

There are two types of routing entries on a PIM network. (S, G) routing entries are used to set up on a PIM network and are applicable to both PIM-DM and PIM-SM networks.

Full Access
Question # 32

When a BGP device sends an Open message to establish a peer connection, which of the following information is carried?

A.

Local AS number

B.

Router ID

C.

NLRI

D.

Hold time

Full Access
Question # 33

After HSB is configured, the HSB channel fails to be established and cannot back up information on the active device to the standby device. What are the possible causes for this HSB function failure?

A.

The TCP channel is not established.

B.

The retransmission count and interval for HSB service packets are different on the two devices.

C.

The two ACs have the same priority.

D.

The source IP address and port number of the local end are different from the destination IP address and port number of the remote end.

Full Access
Question # 34

In the OSPF protocol, inter-area route calculation involves only Router LSA, Network LSA, and Summary LSA.

A.

TRUE

B.

FLASE

Full Access
Question # 35

IP multicast effectively conserves network bandwidth and reduces network load. Therefore, it is widely used in network services, such as IPTV, real-time data transmission, and multimedia conferencing.

A.

TRUE

B.

FALSE

Full Access
Question # 36

Which of the following statements regarding the display bgp routing-table command output is true?

A.

The route to the destination address 192.168.1.0 is learned through AS 200.

B.

The MED value of the route to the destination address 192.168.1.0 is 100.

C.

The route to the destination address 192.168.1.0 is not the optimal route in the BGP routing table.

D.

The route to the destination address 192.168.1.0 is injected into the BGP routing table using the network command.

Full Access
Question # 37

On a network, each router has a local core routing table and protocol routing tables. A routing entry in the local core routing table has multiple key fields. Which of the following are included?

A.

Destination address of a route

B.

Routing protocol preference of a route

C.

Inbound interface that learns a route

D.

Routing protocol that learns a route

Full Access
Question # 38

A route-policy consists of one or more nodes. What is the maximum number of nodes in a route-policy?

A.

4096

B.

65535

C.

256

D.

1024

Full Access
Question # 39

Which of the following statements about WLAN roaming are true?

A.

APs for roaming do not need to have overlapping signal coverage.

B.

APs for roaming must be in the same extended service set (ESS).

C.

APs for roaming must have overlapping signal coverage.

D.

APs for roaming must be in the same basic service set (BSS).

Full Access
Question # 40

A campus network uses OSPF for network communication. The display ospf peer command is run on a router, and the command output is as follows:

vbnet

Copy

Edit

display ospf peer

OSPF Process 1 with Router ID 10.0.2.2

Area 0.0.0.0 interface 10.0.235.2 (GigabitEthernet0/0/1)'s neighbors

Router ID: 10.0.5.5 Address: 10.0.235.5

State: Full Mode: Nbr is Master Priority: 1

DR: 10.0.235.5 BDR: 10.0.235.3 MTU: 0

Dead timer due in 40 sec

Area 0.0.0.0 interface 10.0.24.2 (Serial1/0/1)'s neighbors

Router ID: 10.0.4.4 Address: 10.0.24.4

State: Full Mode: Nbr is Master Priority: 1

DR: None BDR: None MTU: 0

Dead timer due in 35 sec

Which of the following statements are true about the device?

A.

The IP address of the DR on the network where R2 and its neighbor 10.0.5.5 reside is 10.0.235.5.

B.

R2 has established adjacencies with 10.0.5.5 and 10.0.4.4.

C.

The DR/BDR election fails on the network where R2 and its neighbor 10.0.4.4 reside.

D.

Router IDs of the two OSPF neighbors of R2 are 10.0.5.5 and 10.0.4.4.

Full Access
Question # 41

A route-policy can have multiple nodes, and each node can have multiple if-match and apply clauses. Which of the following statements are false?

A.

The operator between if-match clauses under a node is AND.

B.

The operator between nodes is AND.

C.

The operator between if-match clauses under a node is OR.

D.

The operator between nodes is OR.

Full Access
Question # 42

Access control lists can be classified into which types as follows?

A.

Basic ACL

B.

User-defined ACL

C.

Advanced ACL

D.

Layer 2 ACL

Full Access
Question # 43

Both MQC and PBR can be applied on device interfaces to filter received and sent packets or control packet forwarding paths.

A.

TRUE

B.

FALSE

Full Access
Question # 44

On an IS-IS network, routers send LSPs to exchange link state information. LSPs are classified into Level-1 LSPs and Level-2 LSPs and have the same format. Which of the following parts constitute the LSP ID in an LSP?

A.

LSP Number

B.

Pseudonode ID

C.

System ID

D.

IS Type

Full Access
Question # 45

Without a prior version check, an engineer configures IGMP snooping on a device and the version of IGMP snooping is earlier than the IGMP versions on user hosts. In this case, which of the following situations will occur?

A.

Users cannot receive multicast data because the device forwards received IGMP Report messages only to router ports and does not generate group member ports or forwarding entries.

B.

Users cannot receive multicast data, but the device generates forwarding entries after receiving IGMP Report messages.

C.

The IGMP snooping version of the device is automatically degraded, and users can receive multicast data properly.

D.

The IGMP versions of the hosts are automatically upgraded, and users can receive multicast data properly.

Full Access
Question # 46

As shown in the figure, data traffic is forwarded in tunnel mode along the path of STA -> HAP -> HAC -> upper-layer network before roaming. What is the flow direction of data traffic after Layer 3 roaming?

A.

STA -> FAP -> FAC -> HAC -> HAP -> HAC -> Upper-layer network

B.

STA -> FAP -> FAC -> HAC -> Upper-layer network

C.

STA -> FAP -> FAC -> Upper-layer network

D.

STA -> FAP -> FAC -> HAC -> HAP -> Upper-layer network

Full Access
Question # 47

Which of the following statements is false about BFD?

A.

The asynchronous mode is the primary BFD operating mode.

B.

In asynchronous mode, two systems periodically exchange BFD Control packets at the negotiated interval. If one system does not receive any BFD Control packets from the other within the detection interval, the BFD session is declared down.

C.

The asynchronous mode does not support the echo function.

D.

In demand mode, after a BFD session is set up, the system does not periodically send BFD Control packets.

Full Access
Question # 48

Four routers run IS-IS and have established adjacencies. The area IDs and router levels are marked in the following figure. Which of the following statements is true?

A.

The LSDB of R2 does not contain the LSP of R4.

B.

The LSDB of R1 does not contain the LSP of R4.

C.

The LSDB of R2 does not contain the LSP of R3.

D.

The LSDB of R3 does not contain the LSP of R4.

Full Access
Question # 49

L2TP does not provide security encryption. Therefore, other security measures, such as IPsec, are required to ensure the security of the entire tunnel for data transmission.

A.

TRUE

B.

FALSE

Full Access
Question # 50

Which of the following statements regarding OSPF route summarization commands are true?

A.

The asbr-summary command is executed in the OSPF view.

B.

The abr-summary command is executed in the OSPF area view.

C.

Advertise is the default parameter of the abr-summary command. That is, if not-advertise is not specified in the abr-summary command, the advertise parameter takes effect by default.

D.

Not-advertise is the default parameter of the abr-summary command. That is, if advertise is not specified in the abr-summary command, the not-advertise parameter takes effect by default.

Full Access
Question # 51

Which three transmission modes are supported for IPv4 packets?

A.

Anycast

B.

Broadcast

C.

Unicast

D.

Multicast

Full Access
Question # 52

An enterprise network runs OSPF to implement network communication. Which of the following types of LSAs may be generated by an ABR?

A.

NSSA LSA

B.

AS External LSA

C.

Network Summary LSA

D.

ASBR Summary LSA

Full Access
Question # 53

This configuration is part of RTA configuration. Which of the following statements regarding the configuration are true?

[RTA] ospf 100

[RTA-ospf-100]silent-interface GigabitEthernet 1/0/0

A.

RTA cannot establish a neighbor relationship with the neighbor that this interface is directly connected to.

B.

GigabitEthernet 1/0/0 is prohibited from sending OSPF packets.

C.

Direct routes of GigabitEthernet 1/0/0 can still be advertised.

D.

This interface cannot send Hello packets.

Full Access
Question # 54

Which of the following attacks is not the network layer attack?

A.

IP spoofing attack

B.

ICMP attack

C.

Smurf attack

D.

ARP spoofing attack

Full Access
Question # 55

Match the following IPv4 multicast protocols with the corresponding functions.

Full Access
Question # 56

On the campus OSPF network shown in the following figure, the interfaces connecting the five routers are GE interfaces, and their costs are not changed. The import-route command is run on R1. After the network converges, the route to the server at 192.168.1.0/24 is queried on R2. Which of the following is the cost of this route?

A.

2

B.

4

C.

3

D.

1

Full Access
Question # 57

Which of the following statements about stack split is false?

A.

After a stack splits, the MAC addresses of the two stacks change immediately.

B.

If the master and standby switches are still in the same stack after the stack splits, the slave switches separated from the original master and standby switches re-elect the master and standby switches due to protocol packet timeout.

C.

If the master and standby switches are in two stacks after the split, the stack where the original master switch resides updates the topology and selects a new standby switch. The original standby switch becomes the master switch in the new stack and a new standby switch is elected.

D.

After a stack splits, multiple stacks have the same IP address and MAC address. To prevent network faults, the stacks perform MAD detection. The stack that fails the MAD detection shuts down all physical ports except reserved ports.

Full Access
Question # 58

STAs stay on different subnets before and after Layer 3 roaming. To enable the STAs to access the original network after roaming, network engineers need to configure user traffic to be forwarded to the original subnet over a CAPWAP tunnel.

A.

TRUE

B.

FALSE

Full Access
Question # 59

Which of the following statements regarding the firewall zone security level is false?

A.

The configured security level cannot be changed.

B.

Two zones cannot be configured with the same security level.

C.

The default security level of the new zone is 1.

D.

Only the security level of the user-defined zone can be configured.

Full Access
Question # 60

Depending on the type of algorithms used, routing protocols are classified into distance-vector protocols and link-state protocols. Which of the following routing protocols are link-state protocols?

A.

RIP

B.

OSPF

C.

IS-IS

D.

BGP

Full Access
Question # 61

Which of the following statements regarding IGMPv1 and IGMPv2 are true?

A.

1GMPv2 supports only general query.

B.

1GMPv2 defines the Leave message type.

C.

IGMPv1 does not define the IGMP Leave message type.

D.

IGMPv1 supports general query.

Full Access
Question # 62

Which of the following statements regarding routing policy and policy-based routing are true?

A.

A routing policy is used to control import, advertisement, and receiving of routing information.

B.

Policy-based routing is used to control import, advertisement, and receiving of routing information.

C.

Policy-based routing is used to control packet forwarding without following routes in the routing table.

D.

A routing policy is used to control packet forwarding without following routes in the routing table.

Full Access
Question # 63

IGMP group entries play an important role in multicast forwarding. An administrator runs a command to view information about a multicast entry. The information is as follows:

sql

Copy

display igmp group

Interface group report information

Vlanif100(10.1.6.2):

Total 1 IGMP Group reported

Group Address Last Reporter Uptime Expires

225.1.1.2 10.1.6.10 00:02:04 00:01:17

Given this, which of the following statements are true?

A.

This entry can be used to construct the corresponding (S, G) entry.

B.

This entry is created when the device receives an IGMP Join message from a user.

C.

Expires indicates the aging time of the IGMP group.

D.

225.1.1.2 is the address of the group that the user joins.

Full Access
Question # 64

GRE is a VPN encapsulation technology that is widely used to transmit packets across heterogeneous networks. Which of the following statements is false about GRE?

A.

GRE supports encryption and authentication.

B.

GRE supports multicast transmission.

C.

GRE is a Layer 3 VPN encapsulation technology.

D.

GRE can work with other VPN protocols to better ensure data security.

Full Access
Question # 65

Which of the following attributes cannot be directly referenced in an apply clause of a route-policy?

A.

community

B.

IP-prefix

C.

tag

D.

origin

Full Access
Question # 66

To prevent inter-area routing loops, OSPF does not allow advertising routing information between two non-backbone areas and allows sing routing information only within an area or between the backbone area and a non-backbone area. Therefore, each ABR must be connected to the backbone area.

A.

TRUE

B.

FALSE

Full Access
Question # 67

Which of the following statements regarding the stateful inspection firewall is true?

A.

When the stateful inspection firewall checks packets, packets of one same connection are not correlated.

B.

Because UDP is a connectionless protocol, so the stateful inspection firewall cannot match UDP packets with the status table.

C.

The stateful inspection firewall only needs to match the first data packet against a rule, and the subsequent packets of the connection are matched directly in the state table.

D.

The stateful inspection firewall needs to match the rules for each incoming packet.

Full Access
Question # 68

BFD control packets are encapsulated in UDP packets for transmission. What is the destination port number of multi-hop BFD control packets?

A.

4784

B.

3784

C.

5784

D.

2784

Full Access
Question # 69

On an OSPF network, one router with P2P as the network type is directly connected to another router with P2MP as the network type. If the Hello intervals on the two routers are changed to be the same, neighbor relationship establishment and LSDB synchronization are not affected.

A.

TRUE

B.

FALSE

Full Access
Question # 70

ACLs are a common matching tool in routing policies. An ACL can be configured on a router to match routes.

A.

TRUE

B.

FALSE

Full Access
Question # 71

According to BGP route selection rules, the route with the higher Local_Pref is preferred.

A.

TRUE

B.

FALSE

Full Access
Question # 72

On an office network of an enterprise, OSPF is enabled on two directly connected routers. During adjacency establishment, the state machine stays in the 2-way state. Which of the following statements are not possible causes?

A.

Hello time values are different.

B.

Area IDs are different.

C.

Router IDs conflict.

D.

The N-bit and E-bit of Hello packets are the same.

Full Access
Question # 73

When receiving a packet that does not match any session table entry, the firewall discards the packet to prevent external attacks and ensure internal information security.

A.

TRUE

B.

FALSE

Full Access
Question # 74

See the command output of a router below. Which of the following statements is true?

display ospf interface GigabitEthernet 0/0/0 verbose

OSPF Process 1 with Router ID 10.0.2.2

Interface: 10.0.12.2 (GigabitEthernet 0/0/0)

Cost: 1 State: BDR Type: Broadcast MTU: 1500

Priority: 1

Designated Router: 10.0.12.1

Backup Designated Router: 10.0.12.2

Timers: Hello 10 , Dead 40 , Poll 120 , Retransmit 5 , Transmit Delay 1

A.

The router ID is 10.0.12.2.

B.

The interface cost is 1500.

C.

This router is a BDR.

D.

The interface IP address is 10.1.12.1.

Full Access
Question # 75

Which of the following attribute must be carried in an Update message?

A.

Local-pref

B.

Prefval

C.

MED

D.

AS-Path

Full Access
Question # 76

Regarding the route-policy set-cost configuration below, which of the following statements is true?

A.

The route 11.1.0.0/16 is permitted by node 10, and its tost Is set to 300.

B.

The cost of all routes is set to 200.

C.

All the routes that are not permitted by node 10 will be denied.

D.

The route 11.1.0.0/16 will continue to match node 20 after permitted by node 10, and (he final cost is set to 200.

Full Access
Question # 77

Which of the following attributes must be carried when BGP sends route update messages?

A.

MED

B.

Next_Hop

C.

AS_Path

D.

Local_Preference

Full Access
Question # 78

Which of the following methods is usually used by a network administrator to configure a newly purchased device for the first time?

A.

Telnet

B.

SNMP

C.

Login through the Console port

D.

FTP

Full Access
Question # 79

IGMPV3 not only supports IGMPv1 General Query and IGMPv2 Group-Specific Query, and also IGMPv3 Source/Group-Specific Query.

A.

TRUE

B.

FALSE

Full Access