Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Huawei > HCIP-Datacom > H12-831_V1.0

H12-831_V1.0 HCIP-Datacom-Advanced Routing & Switching Technology V1.0 Question and Answers

Question # 4

Which of the following features affects BGP neighbor establishment?

A.

BGPCertification

B.

BGP GSTM

C.

BGProute filtering

D.

ebgp max hop

Full Access
Question # 5

What is the meaning of display current-configuration I include vlan command?

A.

View eachVLANphysical interface information bound to the

B.

See what's currently createdVLAN

C.

CheckVLANIFinterfaceIPaddress

D.

View all included"VLAN"Configuration of keywords

Full Access
Question # 6

What is the Router-ID of OSPFv3?

A.

100bit value

B.

128bit value

C.

32bit value

D.

64bit value

Full Access
Question # 7

IPSG is a source IP address filtering technology based on Layer 3 interfaces. It prevents malicious hosts from forging authorized hosts' IP addresses to access authorized network resources.

A.

TRUE

B.

FALSE

Full Access
Question # 8

In the hub-spoke networking shown in the figure, the Hub-PE can be configured to allow repetitive local AS numbers for correct route transmission.

A.

TRUE

B.

FALSE

Full Access
Question # 9

[According to this picture, Peimen can judge?

cR3>display ipv6 routing-table protocol isis

A.

R3The device type must beLevel-1-2

B.

unable to judgeR3type of device

C.

R3The device type must beLevel-1

D.

R3The device type must beLevel-2

Full Access
Question # 10

Both VLAN aggregation and MUX VLAN are deployed on the enterprise network shown in the figure, and all switch interfaces connected to terminals are access interfaces. Given this, match PCI to PC4 with the hosts or servers that they can access on the network. (Note: A host cannot be matched with itself. For example, PCI cannot match PCI.) (Tokens can be reused.)

Full Access
Question # 11

When 0SPFV2 evolves to 0SPFV3, the LSA format and function are exactly the same, but the network layer in the LSA address from IPv4 to IPv6o

A.

True

B.

False

Full Access
Question # 12

On the OSPFv3 network shown in the figure, OSPFv3 parameters use default values. The LSDB is checked on one of the devices. The router IDs of R1, R3, and R4 are 10.0.1.1, 10.0.3.3, and 10.0.4.4, respectively. The Origin Router part of some LSAs is hidden. Complete this part. (Tokens can be reused.)

Full Access
Question # 13

Regarding BGP/MPLS IPVPN data forwarding, which of the following descriptions is wrong?

A.

data inB, CP/MPLS IP VPNWhen the backbone network is transmitted, it always carries two layers of labels

B.

The inner label when data is forwarded is defined byMP-BGPdistribute

C.

The outer layer label when data is forwarded can beLDPdistribute

D.

PEsend toCEThe data isIPv4Genuine

Full Access
Question # 14

An administrator runs the display mpls Isp command to view LSPs on a device. The command output is shown in the figure. Which of the following statements are true?

A.

Traffic sent from GEO/0/1 of the device to 3.3.3.3 does not carry any label.

B.

For the traffic destined for 3.3.3.3, the device is the penultimate transit device.

C.

For the traffic destined for 1.1.1.1, the device is the last hop, that is, the egress device.

D.

Traffic sent from GE0/0/0 of the device to 1.1.1.1 carries label 1026.

Full Access
Question # 15

The following six tools cannot be used to match BGP routing entries?

A.

Community Filter

B.

advancedA, CL

C.

basicA, CL

D.

IP Prefix List

Full Access
Question # 16

In addition to virtual connections, what type of IPv6 address is the source IPv6 address of OSPFv3's Hello text?

A.

IPv6anycast address

B.

unique local address

C.

Global Unicast Address

D.

link-local address

Full Access
Question # 17

by executing___________The command can completely isolate the second and third layer users of different ports on the same LAN and cannot communicate. (Please use English and lowercase letters to complete the command, and the command cannot be abbreviated)

Full Access
Question # 18

As shown in the figure, in a medium-sized network, BGP generally deploys dual RRs to improve R reliability. When deploying dual RRs, the Cluster IDs of the two RRs are generally set to be the same. The reason for this is

A.

Prevent RR from receiving too many routes and causing insufficient memory

B.

prevent suboptimal

C.

prevent loops

D.

Prevent the client from receiving too many routes and causing it to run out of memory

Full Access
Question # 19

How many bits are there in the label field of PLS?

A.

1

B.

8

C.

3

D.

20

Full Access
Question # 20

(Drag and drop question) The configuration shown in the figure is performed on R2 to filter all incoming routes. Suppose there is an entry on R1

AS_Path attribute is [100 200 300 400] BGP routes need to be sent to R2, please help network administrators in

Adjust the AS order in the AS_Path attribute of the route on R1 to ensure that the route entry will not be routed by R2

route^policy AS-PATH permit node 10 if-match as-path-filter BGP route-policy AS-PATH deny node 20 ip as-path-filter BGP permit A[A2]00 400 100_

route-policy AS-PATH permit node 10 if-match ip-prefix BGP

apply as-pathoverwrite

ip ip-prefix BGP permit 10.0.0.0 24

A.

300—A 400—C 100—B 200—D

B.

300—A 400—B100—C 200—D

C.

300—B 400—A 100—C 200—D

D.

300—C 400—A 100—B 200—D

Full Access
Question # 21

IEIF expands the functions of OSPF by taking advantage of the strong expansibility of OSPF. To enable it to support IPv6 networks, the expanded protocol is called OSPFv3. OSPFv3 is compatible with OSPFv2.

A.

True

B.

False

Full Access
Question # 22

What is the purpose of configuring LSP fragmentation on an IS-IS device?

A.

make the device unbuildableIS-ISNeighbor

B.

enable the device to support moreIS-ISrouting entry

C.

make the device unable to learnIS-ISrouting information

D.

no real purpose

Full Access
Question # 23

ping -a Xc Ys z -vpn-instance M 10.5.16.2, the meaning of this command is:

A.

ShouldpingsendYindivualICMPask

B.

ShouldpingofICMPThe request packet size isZ(excludingIPandICMPhead)

C.

Shouldpingpackage sourceIFPaddress isX

D.

Shouldpingpackage belongs toVPNexampleM

Full Access
Question # 24

The OSPF protocol is run between CE and PE, when CE1 advertises the route of its site to CE2. Which of the following descriptions is incorrect?

A.

whenPE2receivePE1sentBGProutedDomain IDcorrect for all when different from localLSA.

PE2will generateType5LSAorType7 LSA

B.

whenPE2receivePE1sentBGProutedDomain IDWhen the same as local, forTypel LSAandType2LSA. PE2will generateType3 LSA

C.

whenPE2receivePEIsentBGProutedDomain IDSame as local forType3 LSA.

PE2will generateType5 LSA

D.

PEIconfiguredDomain IDcan be used asBGPThe extended community attribute of is sent with the route toPE2

Full Access
Question # 25

If end-to-end QoS is configured on an MPLS network, the penultimate hop device on the MPLS network can pop MPLS labels from packets based on penultimate hop popping (PHP), so that the egress node can process packets based on the QoS priority in inner packets.

A.

TRUE

B.

FALSE

Full Access
Question # 26

An interface of a switch is in error-down state. A possible cause is that the average rate of broadcast packets received by the interface exceeds the upper threshold set by the administrator for storm control.

A.

TRUE

B.

FALSE

Full Access
Question # 27

Which of the following statements about MPLS header TTL is correct?

A.

MPLSTcorrect toTTLis handled in two ways. one isIPmessage is enteringMPLSwhen the network MPLSheadTTLcopyIPTTLValue: The other is at the entranceLERWillMPLSheadTTLsystem-settings for 255

B.

Can prevent infinite loop forwarding of packets

C.

copyIPTTLThe way the value is handled is hiddenMPLSDomainLSRPlayed a role in the safety of the lake

D.

Banned from holding shellsTTLin the case of,tracertcan see passingMPLSDomainLSR

Full Access
Question # 28

According to this picture, you can judge

A.

The optimal outgoing interface for R1 to access room 3000: FDEA::3 is GigabitEtherneto/0/1

B.

R1 with 3000:FDEA::3 is IB6P neighbor

C.

R1 has a TCP connection with 3000:FDEA::3

D.

R1 learned route 3002 through IBGP::3/128

Full Access
Question # 29

After port isolation is configured on a switch, hosts in the same VLAN cannot communicate with each other at Layer 2 or Layer 3 by default.

A.

TRUE

B.

FALSE

Full Access
Question # 30

In what ways can log information be viewed:

A.

Network management system interface view

B.

log in to the device viadisplay logbuferCheck

C.

there is no way

D.

Willflash:/logfile/Tlog file viaFIP/TFTPtransfer toPCsuperior

Full Access
Question # 31

As its network scale expands, an enterprise plans to move scattered servers to the same equipment room for unified management. During hardware migration, network engineers do not need to perform device commissioning and therefore do not need to work out a migration solution.

A.

TRUE

B.

FALSE

Full Access
Question # 32

When there are multiple redundant links in the IS-S network, multiple equal-cost routes may appear. Which of the following statements is false about equal-cost routing within an IS-IS network?

A.

When the number of equal-cost routes in the network is greater than the number configured by the command, and these routes have the same priority,

Preferred next hop deviceSystem IDLarge routes for load balancing

B.

If load sharing is configured, the traffic will be evenly distributed to each link

C.

After configuring equal-cost route priorityJS-ISWhen the device forwards the traffic reaching the destination network segment, it will not adopt the load balancing method, but forward the traffic to the next hop with the highest priority

D.

For each route in the equal-cost route, a priority can be specified, and the route with higher priority will be preferred. the rest as backup routes

Full Access
Question # 33

If technology migration on the network affects the services running on the live network, strictly follow the preset operation process and risk control measures during the implementation of the technology migration project. Generally, this type of project is defined as a migration project. Which of the following operations performed on the live network belongs to a non-migration project?

A.

Changing the mode of importing routes to BGP from network mode to import mode in batches

B.

Modifying the description of router interfaces in batches

C.

Changing the area type of some OSPF routers to the stub area in batches

D.

Changing the levels of IS-IS Level-1-2 routers to Level-1 in batches

Full Access
Question # 34

If the display ospfv3 peer verbose command is run to check OSPFv3 neighbor information, the command output contains information such as the peer router ID, global unicast address of the peer interface, and neighbor status.

A.

TRUE

B.

FALSE

Full Access
Question # 35

According to this picture, cooked I'] can be judged?

A.

R1ofGE0/0/1Interface is not enabledIS-IS IPv6

B.

R1ofGE0/0/1interfaceIS-ISThe interface type isLeve-1

C.

R1ofGEO/O/OinterfaceIS-ISThe interface type isLevel-1-2

D.

R1ofGEO/O/Ointerface is enabledIS-IS IPv6

Full Access
Question # 36

Which of the following reasons may cause the hosts in the same VLAN of the LAN to fail to communicate with each other?

A.

switchMA, Caddress learning errors

B.

interface is artificialshutdownor the physical interface is damaged

C.

The wrong port is configured on the switch andMA, Caddress binding

D.

Port isolation is configured on the switch

Full Access
Question # 37

To protect a device against the attacks of forged BGP messages, you can configure GTSM to check whether the TTL value in the IP message header is within the specified range. If the peer x.x.x.x valid-ttl-hops 100 command is configured on a device, the valid TTL value range of the detected message is [155, 255].

A.

TRUE

B.

FALSE

Full Access
Question # 38

When configuring the DHCP Relay function on the device, the VLAN ANIF interface of the relay connection client must be bound with a DHCP server group, and the IP address of the proxy DHCP server must be configured in the bound DHCP server group.

A.

True

B.

False

Full Access
Question # 39

Which of the following is the least likely cause of a VRRP backup group dual-active failure?

A.

transmissionVRRPLink failure of advertisement message

B.

low priorityVRRPThe backup group will receiveVRRPAnnounce packets are discarded as illegal packets

C.

both endsVRRPbackup groupIDdifferent

D.

Master Equipment1send in seconds1announcement message

Full Access
Question # 40

The security protection actions that a secure MA, C address can perform does not include which of the following?

A.

Protect

B.

Restrict

C.

Shutdown

D.

Remark

Full Access
Question # 41

Which of the following BGP routing attributes cannot control BGP routing?

A.

MED

B.

AS Path

C.

Community

D.

Originator ID

Full Access
Question # 42

BGP4+ carries the next hop address of the IPv6 route through the Next Hop attribute in the Update packet. (Moved into Attribute 14)

A.

True

B.

False

Full Access
Question # 43

In an MPLS VPN network, data packets are forwarded when they enter the public network. will be encapsulated with two layers of MPLS labels

sign. Which of the following options describes the processing of the packet correctly:

A.

The data packet is forwarded toEgress PEequipment

B.

Egress PEThe device correctly sends the data packet to the correspondingVPNmiddle

C.

the outer label of the packet received by the penultimate hop device is3

D.

Egress PEDevice received untaggedIPdata pack

Full Access
Question # 44

About the difference between NSR and NSF, which is correct?

A.

NSFCan be done without neighbor routers

B.

NSRMust rely on neighbor routers to complete

C.

NSFMust rely on neighbor routers to complete

D.

NSRandNSFBy6Requires neighbor router to complete

Full Access
Question # 45

SFFv2 is an IGP running on an IPv4 network: 0SPFV3 is an IGP running on an IPv6 network. Compared with 0SPFV2, SPFV3 has a similar LSA type, but has slightly different functions. Which of the following is not included in the LSA type of 0SPFV3?

A.

AS-External-LSA

B.

Router-LSA

C.

ASBR-Summary-LSA

D.

Network-LSA

Full Access
Question # 46

The figure shows the file information on R2. When a network engineer runs the dir | exclude 1 command to view the file information, which of the following files will be displayed?

A.

2.cfg

B.

3.dat

C.

4.zip

D.

1.cfg

Full Access
Question # 47

Run the display ip interface GEO/D/D command to view statistics about ping packets received on the interface.

A.

True

B.

False

Full Access
Question # 48

MPLS is called Multi-Protocol Label Switching. Regarding the label description in MPLS, the correct one is:

A.

MPLSThe system has a variety of label publishing protocols, such asLDPis a label publishing agreement

B.

Labeled byMIPLSheader of messageBIt has global significance, that is, the label values of all routers cannot be repeated.

C.

A label is a fixed-length identifier with only local significance, which is used to uniquely identify the group to which a group belongs.FEC

D.

MPLSSupports single-layer labels as well as multi-layer labels

Full Access
Question # 49

R1 and R2 use directly connected interfaces to establish an EBGP peer relationship. R1 imports 2000:: 1/128 to BGR By default, which of the following is the next hop of the route from R2 to 2000:: 1/128?

A.

2002: 12:: 1

B.

2001:12.1

C.

2003:12::1

D.

2000:12::1

Full Access
Question # 50

What check items can be set by IPSG?

A.

MA, Caddress

B.

Outgoing interface

C.

VLANID

D.

IPaddress

Full Access
Question # 51

Assuming that the neighbor relationship between BGP routers has been established successfully, the configuration on R1 is shown in the figure. ask for R1

Which router can the route entry 10.10.10.0/24 be delivered to the farthest?

AS 200

bgp 100

peer 13.X3 as-number 300

peer B3.33 connect * interface LoopBackO peer 3.33.3 route-policy COMMUNITY e»porx peer 3333 next >hop-local

peer Xl.3.3 advertise-cofnmunity

network 10.10.T0.0 24

route^poktcy COMMUNITY permit node 10 prefix COMMUNITY spply cocYWTUiiMty route-policy COMMUNITY permit node 20 «p ip prefix COMMUNITr index 10 permit

A.

R1

B.

R2

C.

R3

D.

R4

Full Access
Question # 52

R1 executes the operation ping -a lO.l.Ll 10.5.16.2, what is the meaning of this command?

A.

pingpackage sourceIPaddress isR1any direct interface address of

B.

pingpackage sourceIFPaddress isR1direction10.5.16.2the optimalIPThe outgoing interface address of the route, and is not

10.1.1.1

C.

pingpackage sourceIPaddress is10.1.1.1

D.

pingPurpose of the packageIPaddress is10.1.1.1and10.5.16.2

Full Access
Question # 53

According to this picture, we can judge that R4 is on?

A.

1 default route

B.

2 equal-cost default routes

C.

2 default routes with different costs

D.

4 equivalent default routes

Full Access
Question # 54

When MPLS is deployed in the network and the network layer protocol is IP, the route corresponding to the FEC must exist in the IP routing table of the LSR, otherwise the label forwarding entry of the FEC will not take effect.

A.

True

B.

False

Full Access
Question # 55

As shown below:

A.

R3andR1ofIS-LevelMismatch

B.

R3andR1different area codes

C.

R3andR1ofIIHAuthentication failed

D.

R3andR1ofSystem

Full Access
Question # 56

Which of the following are advantages of VLAN aggregation?

A.

decreasedIPwaste of address

B.

added availableM LANquantity

C.

Increased addressing flexibility

D.

accomplishSub-VLANIsolation between broadcast domains

Full Access
Question # 57

The configuration shown is performed on R2 to filter all incoming routes. Suppose there is a BGP route with the AS_Path attribute of [100200300400] on R1 that needs to be sent to R2. Please help the network administrator to adjust the AS order in the AS_Path attribute of the route on R1 to ensure that the route entry will not be filtered by the routing policy of R2____, ____, ____, ____.

100 This space corresponds to the [A] space in the routing policy

200 This space corresponds to the [B] space in the routing policy

300 This space corresponds to the [C] space in the routing policy

400 This space corresponds to the [D] space in the routing policy

Full Access
Question # 58

From this figure, we can conclude that

A.

R4not anyIS-ISNeighbor

B.

R4andee8c.aOc2.baf3establishedIPv4,IPv6ofIS-ISNeighbor

C.

R4andee8C. aOe2.baf3only establishedIPv6ofIS-ISNeighbor

D.

R4andee8c.aOc2.bat3only establishedIPv4ofIS-ISNeighbor

Full Access
Question # 59

Which of the following is included in the routine collection of basic equipment information?

A.

License information

B.

Patch information

C.

The software version the device is running

D.

Whether the configuration is saved

Full Access
Question # 60

As shown in the figure, SF is enabled on all interfaces of the router, the cost value of the link is marked in the figure, and the Loopback0 interface of R2 is advertised in area 1, then the cost value of R1 reaching 10.0.2.2/32 is?

A.

100

B.

150

C.

50

D.

200

Full Access
Question # 61

If faced with a complex network failure, and it is estimated that the troubleshooting cannot be completed in a short period of time, and the user urgently needs to restore the availability of the network, then the correct approach is.

A.

Tell the user it's not possible

B.

Directly build an alternative network environment without notifying customers

C.

Always try to troubleshoot without informing the user of the current troubleshooting difficulty

D.

Communicate with users whether it is possible to skip the faulty node and build an alternative network environment

Full Access
Question # 62

Which of the following commands can be used to view information about BGP VPNv4 routes and BGP private network routes on PEs

interest

A.

display bgp routing-table address-family vpnv4

B.

display bgp vpnv4 routing-table

C.

display bgp routing-table ipv4-family vpnv4

D.

display vpnv4 bgp routing-table

Full Access
Question # 63

IS-/S supports multi-instance and multi-process, that is, one IS-S router. Multiple VPN instances can be configured with multiple

IS-IS process associated. Are the following descriptions of IS-JS multi-instance and multi-process correct?

A.

indivualIS-ISprocess can only be used with1indivualVPNinstance association

B.

if oneIS-ISThe router creates multipleIS-ISProcess, each process does not affect each other, independent of each other

C.

1indivualIS-ISprocess can be associated with multiple differentVPNinstance association

D.

1indivualVPNInstances can be associated with multiple differentIS-ISprocess association

Full Access
Question # 64

On a BGP/MPLS IP VPN network, VPNv4 routes carry the export RT. Which of the following attributes is used by MP-BGP to carry the export RT?

A.

Extended_Community

MP_REACH_NLRI

B.

Local_Preference

C.

AS Path

Full Access
Question # 65

To speed up the detection of link failures in an IS-IS network, you can associate IS-IS with BFD.

A.

True

B.

False

Full Access
Question # 66

As shown in the figure, OSPF is enabled on all the routers. The IP address marked in the figure is the IP address of the loopbackO interface of the device. The LoopbackO of R1 and R2 is advertised in area 1, the LoopbackO of R4 is advertised in area 0, and the LoopbackO of R3 and R5E is advertised in area 0. In area 2, which of the following IP addresses can ping each other?

A.

10.0.2.2and10.0.3.3 (Non-backbone area received3class received does not count)

B.

10.0.3.3and10.0.5.5 (same area1kind)

C.

10.0.4.4and10.022 (normal calculation3kind)

D.

10.022and10.0.5.5 (Non-backbone area received3class received does not count)

Full Access
Question # 67

Which of the following statements about the multicast address used by 0SPFv3 is correct?

A.

DR routers use FF08::6

B.

All 0SPF routers use FF08: 5

C.

All 5PF Routers use FF02:5

D.

DRThe router uses FF02::6

Full Access
Question # 68

From this figure, it can be known that

A.

R1access172.17.1.5There is a loop

B.

R1have access172.17.1 5routing

C.

R1no access172.17.1.5routing

D.

R1access172.17.1.5There is no problem with the path

Full Access
Question # 69

On a broadcast network, routers (including non-DIS routers) of the same level on a network segment can establish neighbor relationships. In the implementation of BFD for IS-IS, however, BFD sessions are established only between a DIS and non-DIS routers, not between non-DIS routers.

A.

TRUE

B.

FALSE

Full Access
Question # 70

The rollback operation of project cutover can be temporarily determined according to the situation during cutover, and no advance plan is required.

A.

True

B.

False

Full Access
Question # 71

In OSPF, the A, BR will convert all type 7 L SAs in the NSSA area to type 5 L SAs.

A.

True

B.

False

Full Access
Question # 72

Qing technology is a technology to expand VLAN space. It can achieve the function of expanding Vian space by adding a layer of 8D2.1Q Tag on the basis of 8Q2.12 tag message. Which of the following statements about qinq is false?

A.

flexibleQinQAccording to different inner layersTagwith different outer layersTag,correct to the userVLANThe division is more detailed

B.

QinQMakeVLANincreased to4095*4095

C.

QinQtechnology enables private networksLANTransparent transmission on the public network

D.

basicQinQbased on the interface

Full Access
Question # 73

As shown in the figure, the operator's BGP/MPLS IP VPN backbone network builds SP through DP. If you want to implement user X

If the two sites communicate through the BGP/MPLS IPVPN network, PE1 and PE2 must use a 32-bit masked loopback interface address to establish an MP-IBGP peer relationship.

A.

True

B.

False

Full Access
Question # 74

On the OSPFv3 network shown in the figure, OSPFv3 is enabled on the interfaces connecting R1, R2, and R3. The router ID of each router is 10.0.X.X, where X is the number of the router. If you check detailed information about an LSA on R3, the command output shows that the LSA is generated by R2 and describes the IPv6 prefix address associated with the Router-LSA.

A.

TRUE

B.

FALSE

Full Access
Question # 75

The routing policy tools that can be used by BGP mainly include Filterpolicy and oRoute-policy.

Fiterpolicy can only filter routes, Rote - policy can only modify routes

A.

True

B.

False

Full Access
Question # 76

Can Huawei equipment perform traffic suppression for Mingbi packets?

A.

Unknown unicast

B.

known unicast

C.

multicast

D.

broadcast

Full Access
Question # 77

Ethernet is a network that supports broadcasting, and once there is a loop in the network, this simple broadcasting mechanism can cause catastrophic consequences. Which of the following phenomena may be caused by loops

A.

The device cannot log in remotely

B.

pass throughPINGSerious packet loss during network test with command

C.

CPUOccupancy exceeds70%

D.

use on the deviceDISPLAY INTERFA, CEcommand to view interface statistics, it is found that the interface receives a large number of

broadcast message

Full Access
Question # 78

On a PIM-SM multicast network, a network engineer finds that multicast clients cannot receive multicast data. Which of the following is not a possible cause of this problem?

A.

The unicast routes from multicast devices to the RP are unavailable.

B.

The downstream interfaces of multicast devices do not receive any (*, G) Join messages.

C.

Downstream interfaces of multicast devices are disabled from forwarding State-Refresh messages.

D.

The RP addresses of multicast devices are different.

Full Access
Question # 79

After reset isis all is executeD. the IS-Is protocol process needs to be restarted and neighbors need to be re-establisheD. but various IS-IS statistics will not be cleared.

A.

True

B.

False

Full Access
Question # 80

Please match 0SPFv3LSA with its transmission range.

Full Access
Question # 81

During the test phase of the cutover, the criteria to indicate that the test has been completed are:

A.

IPThe configuration view result of the device is normal as the standard

B.

Test that the network service is normal as the standard

C.

The upper-layer application service test carried by the network is normal as the standard

D, check that the network is running normally as a standard

Full Access
Question # 82

BFDLink state detection at the heart (millisecond) level can be achieved.

A.

right

B.

wrong

Full Access
Question # 83

What are the wrong statements about OSPF's Router LSA and Network LSA?

A.

runDSPFThe router must generateNetwork LSA

B.

runOSPFThe router must generateRouter LSA

C.

OSPFmust exist in the networkRouter LSAandNetwork LSA

D.

Network LSA, Carry both topology and routing information

Full Access
Question # 84

According to this picture, we can judge?

display ospf Isdb router self-originate OSPF Process 1 with Router ID 10.0.12J Area: 0.0.0.0

Type:Router

Lsid: 10.0.12 J

Adv rtr: 10.0.12.1

Ls age: 312

Len: 36

Options : A, BR E

\seq#:80000013

1chksum : 0xc61c

ILink count: 1

1* Link ID: 10.0.12.2

IData : 10.0.12.1

,Link Type: TransNet

.Metric : 1

A.

R1ofsystem IDYesee8c.a0c2.bafl

B.

R1existinglevel", andlevel-1-2Dimensional state information of

C.

R1onlylevel-2link state information

Ds level-2In the network, there are a total of8Tailu Electric

Full Access
Question # 85

Ethernet is a broadcast-enabled network, and once there are loops in the network, this simple factory broadcast mechanism can have disastrous consequences. Which of the following phenomena may be caused by loops?

A.

CPUOccupancy exceeds70%

B.

The device cannot log in remotely

C.

use on devicedisplay interfaceWhen commanding to view interface statistics, it is found that the interface receives a large number of broadcast packets

D.

pass throughpingSerious packet loss during network test with command

Full Access
Question # 86

0SPFV2 is an IGP running on an IPv4 network; 0SPFvV3 is an ICPO running on an IPv6 network the packet types of OSPFV3 and OSPFV2 are the same, including .Hall. message, DD message, LSU message, LSU packets and SAck packets. Which of the following statements is correct about 0SPFV3 packets?

A.

0SPFv3Complete packet authentication using the authentication field in the packet header

B.

OSPFV3The link-local address is used as the source address of the sent packet, and the packet can be forwarded outside the range of the originating link

C.

OSPFv3useIPv6multicast addressFFO2::5heheFFO2:.6sendOSPFv3message

D.

0SPFV3ofHelloThe packet carries the router interfaceIPv6address prefix list

Full Access
Question # 87

OSPFV2 is an IGP running on an IPv4 network; OSPFV3 is an IGPo running on an IPv6 network. The basic working mechanism of OSPFv3 is the same as that of OSPFV2, such as the election of DR and B, DR. As shown in the figure, an engineer uses 3 routers to test IPv6 services. He wants to realize the interconnection of IPv6 networks by running OSPFV3.

Pass. Which of the following statements about the election of the network DR is correct?

A.

After the network converges, engineers modifyR1the priority is100,R2the priority is10,R3Keep the default value. When the network converges again,R1forDR, R2forB, DR

B.

After the network converges, a new device is added to the broadcast linkR4,R4the priority is150. When the network converges again,R4forDR

C.

After the network convergesR1Power off and restart, when the network converges again,R3forDR

D.

After the network converges,R1forDR

Full Access
Question # 88

During the daily troubleshooting process, engineers may need to view some alarm information of the device. Run the terminal command to enable the terminal to display the debugging/log/alarm information sent by the information center.

Full Access
Question # 89

Which of the following operations is not part of the middle stage of dissection?

A.

field defense

B.

cutover implementation

C.

Cutover preparation

D.

business test

Full Access
Question # 90

Which of the following information can the DHCP binding table contain?

A.

port andUDPport

B.

MA, Caddress

C.

IPaddress

D.

lease time

Full Access
Question # 91

You have set IS-IS IPv6 enable under the interface, what is the meaning of this command?

A.

Activate on the interfaceIPv6 IS-ISprocess1

B.

Activate on the interfaceIPv6 IS-ISprocess3

C.

activate on the interfaceIPv6 IS-ISprocess10

D.

activate on the interfaceIPv6 IS-ISprocess2

Full Access
Question # 92

In the topology shown in the figure, the entire network runsOSPFv3agreement inNoIn the case of attracting external routes,R1which type ofLAS?

A.

Intra-Area-Prefix-LSA

B.

Link-LSA

C.

Inter-Area-Router LSA

D.

Inter-Area-Prefix-LSA

Full Access
Question # 93

About the difference between NSR and NSF, which is correct?

A.

NSF must rely on neighbor routers to complete

B.

Both NSR and NSP require neighbor routers to complete

C.

NSR must rely on neighbor routers to complete

Full Access
Question # 94

A network engineer entered the following information when troubleshooting OSPF faults. Based on this, you can judge what causes the adjacency relationship to fail to be established normally?

A.

Authentication passwords do not match

B.

Inconsistent area type

C.

Hell. Inconsistent message sending interval

D.

interfaceIPInconsistent address masks

Full Access
Question # 95

On the OSPF network shown in the figure, the cost values of links are marked, and OSPF IP FRR is enabled on R1. Which of the following statements is false?

A.

If the link between R1 and SI is disconnected, Rl recalculates the optimal path to R3 and performs path switching instantly.

B.

If the link between R2 and SI is disconnected, R1 recalculates the optimal path to R3 and performs path switching instantly.

C.

If the link between R1 and SI is disconnected, R1 directly uses the backup path to forward packets to R3 because FRR is enabled on R1.

D.

If the link between R1 and SI is disconnected and you check neighbor information on R1, the neighbor relationship between R1 and R2 will instantly display Down.

Full Access
Question # 96

The figure shows the debugging information on an OSPF router. Which of the following is the router ID of this router?

A.

10.0.2.2

B.

10.0.12.2

C.

10.0.12.1

D.

10.0.1.1

Full Access
Question # 97

When deploying MPLS/BGP IP VPN, which of the following descriptions is wrong about using BGP to exchange routing information between PEs and CEs?

A.

existCEIn the case of multi-homing, enableBGP ASThe number substitution function may cause routing loops that can be passed throughBGP SoDpreventVPNIntra-site routing loops

B.

whenPEandCEbetweenBGPWhen exchanging routing information, if twoVPNThe autonomous system the site is in uses the same privateASnumber, can be passed throughASThe number replacement function is to use any specifiedASreplace the received private network route with theASnumber to preventASRoutes are discarded due to duplicate numbers

C.

existHub&Spokescene, whenHub-CEandHub-PEuseIGPTimeSpoke-PEandSpake-CEcannot makeEBGP

D.

whenPEandCEbetweenBGPWhen exchanging routing information, you do not need toPEPerform private network route import on theBGPoperation

Full Access