Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Huawei H12-821_V1.0 Dumps Questions Answers

Page: 1 / 23
Total 329 questions

HCIP-Datacom-Core Technology V1.0 Questions and Answers

Question 1

A large number of routes typically exist in a BGP routing table, and transmitting such extensive routing information brings a heavy burden to a device. In order to address this problem, it is necessary to filter those routes to be advertised. You can configure a device to advertise only necessary routes or those that its peers require.

Options:

A.

TRUE

B.

FALSE

Buy Now
Question 2

On an OSPF network, routers learn routing information on the entire network by exchanging LSAs. Which of the following values is the LS Age in the LSA header when an LSA is deleted?

Options:

A.

1800s

B.

3600s

C.

1200s

D.

600s

Question 3

As shown in the figure, data traffic is forwarded in tunnel mode along the path of STA -> HAP -> HAC -> upper-layer network before roaming. What is the flow direction of data traffic after Layer 3 roaming?

Options:

A.

STA -> FAP -> FAC -> HAC -> HAP -> HAC -> Upper-layer network

B.

STA -> FAP -> FAC -> HAC -> Upper-layer network

C.

STA -> FAP -> FAC -> Upper-layer network

D.

STA -> FAP -> FAC -> HAC -> HAP -> Upper-layer network

Question 4

On an office network of an enterprise, OSPF is enabled on two directly connected routers. During adjacency establishment, the state machine stays in the 2-way state. Which of the following statements are not possible causes?

Options:

A.

Hello time values are different.

B.

Area IDs are different.

C.

Router IDs conflict.

D.

The N-bit and E-bit of Hello packets are the same.

Question 5

When configuring an ACL on a router, you can specify a unique number or name to identify the ACL. Once a named ACL is created, it cannot be modified. You can only delete the named ACL and reconfigure it.

Options:

A.

TRUE

B.

FALSE

Question 6

A campus network uses OSPF for network communication. The display ospf peer command is run on a router, and the command output is as follows:

vbnet

Copy

Edit

display ospf peer

OSPF Process 1 with Router ID 10.0.2.2

Area 0.0.0.0 interface 10.0.235.2 (GigabitEthernet0/0/1)'s neighbors

Router ID: 10.0.5.5 Address: 10.0.235.5

State: Full Mode: Nbr is Master Priority: 1

DR: 10.0.235.5 BDR: 10.0.235.3 MTU: 0

Dead timer due in 40 sec

Area 0.0.0.0 interface 10.0.24.2 (Serial1/0/1)'s neighbors

Router ID: 10.0.4.4 Address: 10.0.24.4

State: Full Mode: Nbr is Master Priority: 1

DR: None BDR: None MTU: 0

Dead timer due in 35 sec

Which of the following statements are true about the device?

Options:

A.

The IP address of the DR on the network where R2 and its neighbor 10.0.5.5 reside is 10.0.235.5.

B.

R2 has established adjacencies with 10.0.5.5 and 10.0.4.4.

C.

The DR/BDR election fails on the network where R2 and its neighbor 10.0.4.4 reside.

D.

Router IDs of the two OSPF neighbors of R2 are 10.0.5.5 and 10.0.4.4.

Question 7

On a WLAN, the HSB service sets up an HSB channel between two devices that back up each other, maintains the channel status, and backs up data. Which of the following can HSB back up in real time?

Options:

A.

CAPWAP tunnel information

B.

DHCP address information

C.

AP entries

D.

User data information

Question 8

ICMPv6 messages are classified as error or informational messages.

Options:

A.

TRUE

B.

FALSE

Question 9

Which of the following statements regarding IGMPv1 and IGMPv2 are true?

Options:

A.

1GMPv2 supports only general query.

B.

1GMPv2 defines the Leave message type.

C.

IGMPv1 does not define the IGMP Leave message type.

D.

IGMPv1 supports general query.

Question 10

See the following figure. All routers on the network run IS-IS and are in area 49.0001. By referring to the LSDB of R1, the Level-2 DIS is. (Enter the device name, for example, R1.)

Options:

Question 11

ACLs are a common matching tool in routing policies. An ACL can be configured on a router to match routes.

Options:

A.

TRUE

B.

FALSE

Question 12

Which of the following statements is false, based on the following IGMP information on an interface of RTA?XC

Options:

A.

The interval for sending group-specific Query messages is 60s.

B.

The maximum time for response to Query messages is 10s.

C.

The IP address of the interface is 192.168.1.1.

D.

The IGMP version is IGMPV2.

Question 13

Both MQC and PBR can be applied on device interfaces to filter received and sent packets or control packet forwarding paths.

Options:

A.

TRUE

B.

FALSE

Question 14

Which of the following statements regarding OSPF multi-instance is false?

Options:

A.

Route exchange between different OSPF processes is similar to route exchange between different routing protocols.

B.

An interface of a router belongs to only a certain OSPF process.

C.

The OSPF process IDs must be the same when OSPF neighbor relationships are established between different routers.

D.

Multiple OSPF processes can run on the same router, and they are independent of each other.

Question 15

The following figure shows the OSPF network of an enterprise and the OSPF configurations of R1. Which of the following statements is false about the network?

Options:

A.

R2 can access the server.

B.

GE 0/0/1 of R1 cannot send OSPF packets.

C.

The network segment to which GE 0/0/1 of R1 belongs cannot be advertised.

D.

GE 0/0/1 of R1 cannot accept OSPF packets.

Question 16

According to BGP route selection rules, the route with the higher Local_Pref is preferred.

Options:

A.

TRUE

B.

FALSE

Question 17

In PIM-DM, which of the following processes are involved in SPT establishment?

Options:

A.

Prune

B.

Graft

C.

Flooding

D.

State-refresh

Question 18

BGP routes have multiple path attributes. When a router advertises a BGP route to its peers, the route carries multiple path attributes. These attributes describe the characteristics of the BGP route and affect route selection in some scenarios. The attribute is Huawei-specific. It is valid only on the local device and is not transmitted to BGP peers. (Enter the attribute name in lowercase as it appears in the command output about the BGP routing table.)

Options:

Question 19

If a router ID is configured in both the system via and the BGP view, BGP uses the router ID configured in the BGP view because the BGP view takes precedence over the system view.

Options:

A.

TRUE

B.

FALSE

Question 20

Which of the following attacks is not the network layer attack?

Options:

A.

IP spoofing attack

B.

ICMP attack

C.

Smurf attack

D.

ARP spoofing attack

Question 21

On an OSPF or IS-IS network, the filter-policy import command can be run on a router to filter out the LSAs forwarded by its neighbors.

Options:

A.

TRUE

B.

FALSE

Question 22

In the OSPF protocol, inter-area route calculation involves only Router LSA, Network LSA, and Summary LSA.

Options:

A.

TRUE

B.

FLASE

Question 23

Compress the 2001:0DBB:B8:0000:C030:0000:0000:09A0:CDEF address.___________(if the answer contains letters, capitalize them.)

Options:

Question 24

The following figure shows the BGP state switching mechanism. Drag the following BGP states to the corresponding sequence numbers.

Options:

Question 25

GRE is a Layer 2 VPN encapsulation technology that encapsulates packets of certain data link layer protocols so that the encapsulated packets can be transmitted over an IP network.

Options:

A.

TRUE

B.

FALSE

Question 26

After BGP initiates a TCP connection, the ConnectRetry timer is disabled if the TCP connection is successfully established. If the TCP connection fails to be established, the device tries to reestablish the TCP connection when the ConnectRetry timer expires.

Options:

A.

TRUE

B.

FALSE

Question 27

There are two types of routing entries on a PIM network. (S, G) routing entries are used to set up on a PIM network and are applicable to both PIM-DM and PIM-SM networks.

Options:

Question 28

As shown in the figure, SWA, SWB, SWC, and SWD run the Rapid Spanning Tree Protocol (RSTP). Which of the following statements are true?

Options:

A.

Once receiving OPOUs, the edge port re-partlci pates in the calculation of the spanning tree.

B.

After a port is Configured as an edge port, the port can quickly enter the Forwarding state.

C.

You can enable the edge port on SWD's GEO/0/2 connected to the terminal so that this port can quickly enter the Forwarding state.

D.

You can enable the edge port on SWC's GE0/0/2 connected to the terminal so that this port can quickly enter the forwarding state.

Question 29

On an enterprise network, the directly connected interfaces of two OSPF routers are on different network segments and have different masks. To establish an OSPF neighbor relationship between the two interfaces, you can change their network types to which of the following?

Options:

A.

Point-to-point

B.

NBMA

C.

P2MP

D.

Broadcast

Question 30

IGMPV3 not only supports IGMPv1 General Query and IGMPv2 Group-Specific Query, and also IGMPv3 Source/Group-Specific Query.

Options:

A.

TRUE

B.

FALSE

Question 31

On an STP network, parameters used for role election, such as the root bridge ID, root path cost, and bridge ID, are all fields in BPDUs.

Options:

A.

TRUE

B.

FALSE

Question 32

A session is an entry used to record the connection status of a protocol and is fundamental for the firewall to forward packets. Which of the following protocol packets will the firewall create sessions for?

Options:

A.

Subsequent fragment

B.

ICMP error packet

C.

GRE

D.

TCP

Question 33

OSPF supports area authentication and interface authentication. If both authentication modes are configured, Interface authentication takes preference over area authentication.

Options:

A.

TRUE

B.

FALSE

Question 34

The native AC function allows an agile switch to integrate AC capabilities, achieving wired and wireless convergence. The agile switch centrally manages wired and wireless service traffic.

Options:

A.

TRUE

B.

FALSE

Question 35

A filter named si is configured on a device using the as-path-filter command and is applied to a specified BGP peer. The detailed configurations are as follows:

csharp

Copy

[SW1] ip as-path-filter si permit _65500$

[SW1] bgp 65100

[SW1-bgp] ipv4-family unicast

[SW1-bgp-af-ipv4] peer 10.1.1.2 as-path-filter si import

After the configuration is complete, which of the following statements is true about the way the local device processes the routes received from the peer?

Options:

A.

It accepts only the routes whose AS_Path contains AS 65500.

B.

It accepts only the routes originated from AS 65500.

C.

It accepts only the routes that last pass through AS 65500.

D.

It accepts only the routes forwarded by AS 65500.

Question 36

Which Of the following IEEE 802.11 standards is also known as Wi-Fi 6?

Options:

A.

802.11ac

B.

802.11n

C.

802.11ax

D.

802.11b

Question 37

As shown in the following figure, a new AP is deployed In dual link MSB networking (load balancing mode). Which AC will the connect to?

Options:

A.

AC1

B.

Random access

C.

None

D.

AC2

Question 38

Link aggregation is a common network technology. Which of the following are advantages of link aggregation?

Options:

A.

Load balancing

B.

Improved reliability

C.

Increased link bandwidth

D.

Route backup

Question 39

Which of the following scenarios is not suitable for deploying interface PBR?

Options:

A.

A core switch needs to forward traffic between the intranet and extranet to an AC device that connects to the core switch in off-path mode.

B.

A core switch needs to forward the traffic between the intranet and extranet to a security detection device that connects to the core switch in off-path mode.

C.

A device needs to modify the next-hop IP address for locally originated traffic.

D.

On an enterprise network with multiple ISP outbound interfaces, each internal network segment accesses the Internet through a particular ISP outbound interface.

Question 40

When receiving a packet that does not match any session table entry, the firewall discards the packet to prevent external attacks and ensure internal information security.

Options:

A.

TRUE

B.

FALSE

Question 41

Which of the following statements about BFD operating modes are true?

Options:

A.

In demand mode, once a BFD session is set up, the system no longer periodically sends BFD Control packets.

B.

Asynchronous mode does not support the Echo function.

C.

In asynchronous mode, two systems periodically exchange BFD Control packets at the negotiated interval. If one system does not receive any BFD Control packets from the other within the detectiontime, the BFD session is declared down.

D.

Asynchronous mode is the primary BFD operating mode.

Question 42

Which of the following protocols are multi-channel protocols?

Options:

A.

H.323

B.

FTP

C.

Telnet

D.

SMTP

Question 43

BFD for OSPF is deployed on a directly connected link. If the physical link is disconnected, drag the following BFD processes to the corresponding sequence numbers.

Options:

Question 44

If the interval for two consecutive packets of a TCP session reaching the firewall is longer than the aging time of the session, the firewall deletes the session information from the session table to ensure network security.

Options:

A.

TRUE

B.

FALSE

Question 45

When two routers exchange LSDB information using DD packets, a master/slave relationship is formed first, the router with a larger router ID is the master, and determine the MS bit.

Options:

A.

TRUE

B.

FALSE

Question 46

When a packet passes through a firewall, the firewall creates a session connection for the packet to guide subsequent forwarding of the packet. However, the firewall does not create session entries for all packets. For which of the following packets does the firewall not create session entries when the packet reaches the firewall?

Options:

A.

ICMP ping packet

B.

GRE packet

C.

Subsequent fragment

D.

UDP packet

Question 47

On an OSPF network, if a router receives an update of an LSA that exists in the local LSDB, the router updates the LSDB and floods the LSA.

Options:

A.

TRUE

B.

FALSE

Question 48

Which of the following statements regarding different LSA types is false?

Options:

A.

LS Request packets contain only LS Type, LS ID, and Advertising Router.

B.

LS Ack packets contain complete LSA information.

C.

DD packets contain only LSA summary information, including LS Type, LS ID, Advertising Router, and LS Sequence Number.

D.

LS Update packets contain complete LSA information.

Question 49

In IP multicast, RPF routes can be elected only from among unicast routes and multicast static routes.

Options:

A.

TRUE

B.

FALSE

Question 50

Which of the following attributes cannot be directly referenced in an apply clause of a route-policy?

Options:

A.

community

B.

IP-prefix

C.

tag

D.

origin

Question 51

On an OSPF network, interfaces are classified into four types based on link layer protocols. Which of the following types can interfaces on an IS-IS network be classified into based on physical links?

Options:

A.

P2P

B.

Broadcast

C.

P2MP

D.

NBMA

Question 52

Which of the following statements regarding the BGP error display of a router is false?

Options:

A.

The error occurred at 11:40:39 on March 22, 2010.

B.

The neighbor address of this router is 10.1.1.2.

C.

The error may be caused by the incorrect peer AS number.

D.

Error Type indicates that the BGP error is caused by the neighbor relationship error.

Question 53

In BGP, the AS_Path attribute records the numbers of all ASs that a route passes through from the local end to the destination in the vector order.

Which of the following statements is false about the attribute change during route transmission?

Options:

A.

When advertising the route to an IBGP peer, the BGP speaker creates an empty AS_Path in the Update message.

B.

When advertising the route to an EBGP peer, the BGP speaker adds the local AS number to the end of the AS_Path.

C.

When advertising the route to an EBGP peer, the BGP speaker creates an AS_Path carrying the local AS number in the Update message.

D.

When advertising the route to an IBGP peer, the BGP speaker does not change the AS_Path attribute of the route.

Question 54

In BGP, the origin attribute of the routes imported using the import-route command is incomplete.

Options:

A.

TRUE

B.

FALSE

Question 55

When an SSH client accesses an SSH server for the first time and the SSH server's public key is not configured on the SSH client, you can enable first-time authentication on the SSH client. This allows the SSH client to access the SSH server and saves the SSH server's public key on the SSH client. In this way, the next time the SSH client accesses the SSH server, the SSH client can use the saved public key to authenticate the SSH server.

Options:

A.

TRUE

B.

FALSE

Question 56

After HSB is configured, the HSB channel fails to be established and cannot back up information on the active device to the standby device. What are the possible causes for this HSB function failure?

Options:

A.

The TCP channel is not established.

B.

The retransmission count and interval for HSB service packets are different on the two devices.

C.

The two ACs have the same priority.

D.

The source IP address and port number of the local end are different from the destination IP address and port number of the remote end.

Question 57

Based on IGMP snooping, IGMP snooping proxy enables a switch to act as a substitute for an upstream Layer 3 device to send IGMP Query messages to downstream hosts, and also to act as a substitute for downstream hosts to send IGMP Report/Leave messages to an upstream device. As such, this function conserves bandwidth between the upstream device and the local device.

Options:

A.

TRUE

B.

FALSE

Question 58

In which of the following scenarios can a neighbor relationshipnotbe established between two directly connected Huawei routers after IS-IS is configured?

Options:

A.

The two routers are Level-2 routers with the same area address, and the interfaces connecting them are on the same network segment.

B.

One router is a Level-1 router, and the other router is a Level-2 router.

C.

The two routers are Level-2 routers and have different area addresses.

D.

The two routers are Level-1 routers and have different area addresses.

Question 59

On an RSTP network, you can set the STP priority of a switch to specify the switch as the root bridge.

Which of the following values is thedefault STP priorityof a Huawei switch?

Options:

A.

4096

B.

128

C.

32768

D.

1

Question 60

On an enterprise WLAN where Portal authentication is deployed, an AC functions as an access device and communicates with a Portal server using the Portal protocol. Which of the following statements are true about the Portal protocol?

Options:

A.

The HTTP or HTTPS protocol can be used as the Portal access or authentication protocol.

B.

By default, the access device processes Portal protocol packets through port 2000.

C.

By default, the device uses the destination port number 50100 to proactively send packets to the Portal server.

D.

Portal protocol packets are transmitted over TCP.

Question 61

On an IS-IS network, routers send LSPs to exchange link state information. LSPs are classified into Level-1 LSPs and Level-2 LSPs and have the same format. Which of the following parts constitute the LSP ID in an LSP?

Options:

A.

LSP Number

B.

Pseudonode ID

C.

System ID

D.

IS Type

Question 62

A route-policy can have multiple nodes, and each node can have multiple if-match and apply clauses. Which of the following statements are false?

Options:

A.

The operator between if-match clauses under a node is AND.

B.

The operator between nodes is AND.

C.

The operator between if-match clauses under a node is OR.

D.

The operator between nodes is OR.

Question 63

During routine O&M, an engineer finds that theHold Timeparameters of two devices are inconsistent. In this case, which of the following situations occurs?

Options:

A.

A peer relationship can be established, and the smaller Hold Time is selected after negotiation.

B.

A peer relationship can be established, and the larger Hold Time is selected after negotiation.

C.

No peer relationship can be established.

D.

A peer relationship can be established, and the devices use their own parameter values to send messages.

Question 64

There are two BFD operating modes. In_______mode, the local end sends BFD Control packets at specified intervals, and the remote end checks whether the local end periodically sends BFD Control packets. (Use lowercase letters.)

Options:

Question 65

As shown in the figure, R1 imports the direct route 10.1.1.0/24 to OSPF. An engineer enables bidirectional route re-advertisement on R2 and R3, and configures the following commands on R3. After the network becomes stable, which of the following is thePrevalue of the route 10.1.1.0/24 in the routing table of R4?

[R3]acl 2000

[R3-acl-basic-2000] rule permit source 10.1.1.0 0

[R3-acl-basic-2000] quit

[R3]route-policy hcip permit node 10

[R3-route-policy-10] if-match acl 2000

[R3-route-policy-10] apply preference 14

[R3-route-policy-10] quit

[R3]ospf 1

[R3-ospf-1] preference ase route-policy hcip

Options:

A.

150

B.

14

C.

10

D.

15

Question 66

In BGP, Keepalive messages are used to maintain BGP peer relationships. When a BGP router receives a Keepalive message from a peer, the BGP router sets the state of the peer to Established and periodically sends Keepalive messages to maintain the connection. By default, the device sends Keepalive messages every seconds.

Options:

Question 67

When deploying BFD, you need to adjust some parameters so that it can better detect the network status. Which of the following statements isfalseabout BFD optimization?

Options:

A.

After a high priority is configured for BFD packets, BFD packets are preferentially forwarded.

B.

To quickly learn about the network status and performance requirements, you can set the interval for sending BFD packets to the minimum value.

C.

On a live network, some devices switch traffic only when a BFD session changes to the Up state. If a routing protocol goes Up later than an interface, no route is available for switching traffic back, leading to traffic loss. To resolve this issue, configure a delay to compensate for the time difference caused when the routing protocol goes Up later than the interface.

D.

If a BFD session flaps, master/backup switchovers are frequently performed on the application associated with the BFD session. To prevent this, set the WTR time of the BFD session.

Question 68

The BFD Echo function checks the connectivity of the forwarding link by looping back packets. Which of the following statements are true about this function?

Options:

A.

If URPF is enabled on the peer end, BFD packets may be incorrectly discarded on the peer end.

B.

In the BFD Echo function, the device uses the IP address of the outbound interface as the source IP address by default.

C.

The BFD Echo function applies only to single-hop BFD sessions.

D.

When configuring a BFD session supporting the BFD echo function, you need to configure both the local and remote discriminators.

Question 69

Compared with RSTP, which of the following port roles are added to MSTP?

Options:

A.

Backup port

B.

Master port

C.

Edge port

D.

Regional edge port

Question 70

An IP prefix list is a common matching tool used in routing policies. Which of the following cannot be configured as matching conditions in an IP prefix list on a Huawei router?

Options:

A.

Port number

B.

Mask

C.

Action

D.

Index

Question 71

On the campus OSPF network shown in the following figure, the interfaces connecting the five routers are GE interfaces, and their costs are not changed. The import-route command is run on R1. After the network converges, the route to the server at 192.168.1.0/24 is queried on R2. Which of the following is the cost of this route?

Options:

A.

2

B.

4

C.

3

D.

1

Question 72

After the administrator of an enterprise deploys a DHCP server, employees complain that their clients cannot obtain IP addresses from the DHCP server. Which of the following may cause this problem?

Options:

A.

Multiple DHCP servers are configured.

B.

STP is enabled on the DHCP server.

C.

The DHCP function is disabled by default, and the administrator forgets to enable the DHCP function.

D.

DHCP clients and the DHCP server are on different network segments, and no DHCP relay agent is configured on the network.

Question 73

Preferences of routing protocols determine the sequence In which a router selects a route among routes to the same destination /earned through different routing protocols.

Options:

A.

TRUE

B.

FALSE

Question 74

An enterprise uses Huawei routers to deploy an IS-IS network for network-wide communication. An engineer wants to change the interface cost to control route selection. By default, which of the following values is the maximum cost that can be configured?

Options:

A.

67

B.

63

C.

64

D.

68

Question 75

On the OSPF network shown in the figure, an adjacency has been established between R1 and R2. An engineer configures the commands in the figure on R2. In this case, which of the following routing entries may exist in the routing table of R2?

Options:

A.

10.1.4.0/24

B.

10.1.3.0/24

C.

10.1.2.0/24

D.

10.1.1.0/24

Question 76

Which of the following routing protocols support the default route through command configuration?

Options:

A.

BGP

B.

IS-IS

C.

OSPF

D.

ICMP

Question 77

Which of the following statements about stack split is false?

Options:

A.

After a stack splits, the MAC addresses of the two stacks change immediately.

B.

If the master and standby switches are still in the same stack after the stack splits, the slave switches separated from the original master and standby switches re-elect the master and standby switches due to protocol packet timeout.

C.

If the master and standby switches are in two stacks after the split, the stack where the original master switch resides updates the topology and selects a new standby switch. The original standby switch becomes the master switch in the new stack and a new standby switch is elected.

D.

After a stack splits, multiple stacks have the same IP address and MAC address. To prevent network faults, the stacks perform MAD detection. The stack that fails the MAD detection shuts down all physical ports except reserved ports.

Question 78

As shown in the figure, SWA, SWB, and SWC run the Rapid Spanning Tree Protocol (RSTP). What are the roles of SWB's GE0/0/2 and SWC's GE0/0/1?

Options:

A.

Backup port, alternative port

B.

Alternative port, backup port

C.

Backup port, root port

D.

Root port, designated port

Question 79

To inject IGP routes into BGP routes, you can only use the network command.

Options:

A.

TRUE

B.

FALSE

Question 80

OSPF has multiple types of routes with varying priorities. Which of the following types of routes has the lowest priority when they have the same prefix?

Options:

A.

Type 1 external route

B.

Inter-area route

C.

Type 2 external route

D.

Intra-area route

Question 81

On an STP network, only the designated port processes inferior BPDUs. On an RSTP network, a port with any role processes inferior BPDUs.

Options:

A.

TRUE

B.

FALSE

Question 82

IPv6 defines multiple types of addresses. Which of the following statements is false about these addresses?

Options:

A.

Link-local addresses can be quickly generated using the EUI-64 method.

B.

Anycast addresses can be used only as destination addresses.

C.

Each interface can have multiple global unicast addresses with different network prefixes.

D.

Manually configured link-local addresses have a higher priority than automatically generated ones.

Question 83

Which of the following statements regarding the firewall zone security level is false?

Options:

A.

The configured security level cannot be changed.

B.

Two zones cannot be configured with the same security level.

C.

The default security level of the new zone is 1.

D.

Only the security level of the user-defined zone can be configured.

Question 84

Which of the following statements regarding OSPF is true?

Options:

A.

OSPF does not have an acknowledgement mechanism. Therefore, OSPF relies on the upper-layer protocol, TCP, for acknowledgement.

B.

OSPF performs LSDB update every 30 minutes.

C.

OSPF uses the Bellman-Ford algorithm, and each router independently runs this algorithm.

D.

OSPF floods a LSU packet at an interval of 5s.

Question 85

In addition to a route reflector, the confederation is another method that reduces the number of IBGP connections in an AS.

Which of the following statements are true about the confederation technology? (Choose all that apply)

Options:

A.

This technology is applicable to large-scale networks.

B.

Special EBGP connections are established among sub-ASs in a confederation, and the sub-ASs need to be fully meshed.

C.

All member devices in a confederation need to be reconfigured.

D.

The logical topology does not need to be changed when a confederation is used.

Question 86

The traffic limiting policy feature only supports the number of connections initiated by the specified IP or the number of connections received.

Options:

A.

TRUE

B.

FALSE

Question 87

Which of the following statements is true about BGP?

Options:

A.

If the export routing policy applied to a BGP peer changes, manual intervention is required so that the device resends Update messages to the peer.

B.

IGP routes can be converted into BGP routes only through the network command.

C.

A router cannot be configured with multiple BGP processes.

D.

Open messages carry only the BGP header.

Question 88

Security policy is the core feature of firewalls. Only valid traffic that complies with security policies can be forwarded by firewalls. Which of the following statements are true about security policy matching rules?

Options:

A.

Multiple values can be configured for a single matching condition, and the values are logically ANDed.

B.

If a security policy contains multiple matching conditions, the relationship between them is AND.

C.

The system has a default security policy nameddefault, where all matching conditions areanyand the default action ispermit.

D.

When multiple security policy rules are configured, they are sorted in a list by configuration sequence by default. A security policy rule configured earlier is placed higher in the list and has a higher priority.

Question 89

Route attributes are specific descriptions of routes. BGP route attributes can be classified into four types. Which of the following are well-known discretionary attributes?

Options:

A.

Atomic_Aggregate

B.

Local-Preference

C.

Community

D.

MED

Question 90

Which three transmission modes are supported for IPv4 packets?

Options:

A.

Anycast

B.

Broadcast

C.

Unicast

D.

Multicast

Question 91

In an MST region, MSTP independently calculates an MSTI for each VLAN based on mappings between VLANs and MSTIs.

Which of the following statements is false about the characteristics of MSTIs?

Options:

A.

A port must have the same spanning tree parameter settings for different MSTIs.

B.

The spanning tree calculation method of each MSTI is similar to that in STP.

C.

Spanning trees of MSTIs can have different roots and topologies.

D.

Each MSTI sends BPDUs only on its own spanning tree.

Page: 1 / 23
Total 329 questions