Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Huawei H12-891_V1.0 Dumps

Page: 1 / 23
Total 610 questions

HCIE-Datacom V1.0 Questions and Answers

Question 1

When the ACL in the VRP has multiple matching rules (rules), the matching order is about Which of the following statements is true?( Confirmed).

Options:

A.

By default, matching is based on the principle of "depth first"

B.

By default: Match in the order in which the perfect is matched first, then deny is matched.

C.

By default, rule-ID is followed Match from small to large

D.

There is only one matching order and cannot be modified

Question 2

The following statement about the NSSA area is correct (multiple choice).

Options:

A.

In the NSSA area where the OSPF neighbor sends hello packets, the N position 0, E within the option field Position 1

B.

The NSSA zone must automatically generate a default LSA to access the external network

C.

The NSSA zone generates a Category VII LSA to advertise external routing, and the FA address in the Category VII LSA acts to prevent loops

D.

In the OSPF neighbor in the NSSA region sends hello packets, position 1 within the option field , position E

Question 3

If the OSPP protocol is running in the network , after configuring the non-backbone area in the OSPP area as the Totally Stub region, the ABR router sends a message to Totally. The Stub region issues an LSA with an LS ID of 0000, and what type of LSA is the LAS to?

Options:

A.

LSA5

B.

LSA2

C.

LSA1

D.

LSA3

Question 4

ICMPv6 has two types: Error Messages and Information Messages.

Options:

A.

TRUE

B.

FALSE

Question 5

Off-stem cross-domain VPN-Option B scenario, the following description is incorrect?

Options:

A.

During the packet forwarding process, it is necessary to exchange the VPN's private network LSP on the

B.

two ASBRs IP-EBGP neighbor relationships.

C.

The cross-domain VPN-Option B scheme is not limited by the number of interconnection links between ASBRs

D.

The outer layer tag is exchanged between two ASBRs to vpnV4 routes.

Question 6

?? Route ? Policy ??:ip community-filter Ipermit 100: 1 ip as-path-filter 2 permit ^I00$ route-policy test permit node 10 if-match communityfilter 1 if-match as-path-filter 2 apply

as-path 200 Is the above configuration description correct?

Options:

A.

The BGP route matches the above only if the BGP route carries a community attribute value of 100:1 or if the AS PATH is 100 route one policy. The AS-one PATH attribute that matches the route is changed to 200

B.

The BGP route matches the above only if the BGP route carries a community attribute value of 100:1 and the AS-One PATH is 100 route policy? The AS-PATH nature of the matching route is changed to 200

C.

Only if the BGP route carries an AS-PATH of 100, the BGP route matches the route one policy above. The AS-one PATH attribute that matches the route is changed to 200

D.

As long as the BGP route carries a community attribute value of 100:1, the BGP route matches the route-policy above The AS-PATH attribute of the matching route is changed to 200

Question 7

In the laboratory network, the network is built according to the following topology diagram, SWI is the default configuration, and SW2 disables the switch STP function.

Options:

A.

SG0/0/2 for WI enters the Discarding state

B.

SW2 and G0/0/1 enters the Discarding state

C.

SW2 G0/0/2 enters discarding state

D.

No interface is backed up for blocking

E.

SWI's G0/0/1 enters the Discarding state

Question 8

Router HW cannot access hosts in the remote network, router HW runs routing protocols and only pings the remote file server address 105401 on router HW with extensions through a default route remote network , the result of ping on the router HW is rendered as 'requ.' est time out', according to the above description, the error in the following analysis is ?

Options:

A.

The next hop router for router HW did not reach the destination address

B.

Router HW does not have a legitimate router to reach the destination address

C.

Ping is successful, but congestion occurs on the path to the destination address

D.

There is a firewall in the remote destination network, and the destination address can be reached without releasing ICMP traffic E. ICMP packets, but the destination device fails to reply

Question 9

What does IPV6 enable topology ipv6 mean under IS-IS protocol view?

Options:

A.

Does not have any meaning

B.

SPF calculation for IPv6 is not supported

C.

SPF calculation is performed separately in the topology of IPv4 and IPv6,

D.

IPv4, IPv6 using the same topology for SPF calculation

Question 10

As shown below, RI, R2 establish EBGP neighbors, and once turned on, the BFD detection function, the following statement is correct?

Options:

A.

RDetection time for BFD packets for 2 Detection time for BFD messages 800m5

B.

RI Detection time for BFD messages for 1280ms

C.

RI The detection time for bFD messages for 660ms

D.

R2 is 600ms

Question 11

Cross-device link aggregation realizes the back-to-back transmission of data traffic and the mutual spare of the heap member switches, but due to the limited bandwidth of the heap cable between the heap devices, the forwarding efficiency can be improved in the following ways?

Options:

A.

Enable traffic to be forwarded locally first

B.

Connect the stacking device via a stacking card

C.

Configure the stacking system MAC address switching

D.

Enables the stacking multi-master check function

Question 12

If a router only needs to forward iPv6 packets, you do not need to configure any IPV4 agreements and addresses on that router.

Options:

A.

True

B.

False

Question 13

Which of the following descriptions of MPLS header TTL are correct?

Options:

A.

Copy IPTIL value is handled in such a way that the LSR of the MPLS domain is hidden, which plays a certain security role

B.

Can prevent wireless circular forwarding of messages

C.

MPLS has two ways of handling TTL, one is that the IP packet copies the PTTL of the MPLS header hen it enters the MPLS network Value; Another is to set the TTL of the MPLS header to 255 at the entrance LER

D.

When copying TTL is disabled, tracert can see the LSR of the passing MPLS domain

Question 14

In the topology shown in the figure. Running the OSPFv3 protocol over the entire network does not produce what type of LSA on R1 without external route introduction?

Options:

A.

Intra-Area-Prefix-LSA

B.

Inter-Area-RouterLSA

C.

Link-LSA

D.

Inter-Area-Prefix-LSA

Question 15

When two devices with the same priority compete for the master role at the same time, the device on which the interface with the smaller IP address resides should be selected as the master device

Options:

A.

True

B.

False

Question 16

Router RL runs the OSPF protocol and uses the display ip routing-tabe command to view the router RL's routing table , the following information about OSPF in the routing table is described correctly as ?

Options:

A.

In the routing table, the routing table entries identified by the OSPF identifier can only be learned through the 3 types of LSAs to

B.

In the routing table, used The 'OSPF' identifier identifies a route table entry that can only pass a Type 1 LSA

C.

In the routing table, the routing table entries identified with the 'OSPF identifier' can be learned through the 1/2/3/5 LSA to

D.

In the routing table, Route table entries identified with the "O_ASE identifier can only be learned through routing introduction

Question 17

?? ipIp- prefoi p prefierame lndeindeoxrunmber)( pemit demy)ip+4adrssmasklengh gratrequa grater-cqual abel]lescqualesequl ole) for • Pprefofiier? If a pre-list of tooequal has been specified, but the greater-equal has not been specified, then how much of the prefix's range is sufficient?(). Radio neck).

Options:

A.

[0, less-equal-value]

B.

[mask-length, less-equal-value]

C.

[less-equal-value,32]

D.

No limit

Question 18

In an IPv6 network, two nodes A and B are neighbors to each other if node A sends to node B NS message, if Node B receives the message and then replies to the NA message, then on Node A On the view, the neighbor status will be marked as What?

Options:

A.

Reachable

B.

Incomplete

C.

Constant

D.

Probe Answer

Question 19

Traditional BGP-4 can only manage IP4 unicast routing information, and MP-BGP extends BGP-4 to provide support for multiple network layer protocols. Among them, MP-BGP's support feature for IPv6 unicast networks is called BGP4+, BGP4+ via NextHop The route next hop address information is carried by the attribute.

Options:

A.

TRUE

B.

FALSE

Question 20

What messages does an NMS (Network Management Station) running SNMPv1 send to the agent?

Options:

A.

Trap,Get ? Set

B.

Get,Set ? Getnext

C.

Get,Set,Getnext ? GetBulk

D.

Get,Set ? GetBulk

E.

Get Trap

Question 21

As shown in the figure,

all interfaces of the router have OSPF turned on, and the COST value of the link is identified in the figure. R2's loop backO interface advertises a cost in region l, then R1 reaches 10022/32 The value is

Options:

Question 22

What improvements have been made to the IGMPv2 protocol compared to IGMPv1? ( Multiple Choice)

Options:

A.

Added maximum response time field

B.

Added high group messages

C.

Added specific group query message

D.

Added a specific source group query packet

Question 23

Regarding the sliding window of TCP, what are the following descriptions that are enough to be wrong? ( Multiple choice question)

Options:

A.

The sender declares the initial window size

B.

The sender does not need to transmit messages of full window size

C.

The TCP sliding window allows multiple packets to be sent before an acknowledgment is received

D.

After the retransmission timer times out, the sender has not received an acknowledgment and will retransmit unacknowledged data

E.

The receiver needs to acknowledge the sender's packet

F.

Sliding window size can only be increased or remain unchanged

Question 24

What check frames can IPSG set?

Options:

A.

Out of the interface

B.

MAC address

C.

IP address

D.

VLAN ID

Question 25

Configure the ipv6 preference under the IS-IS protocol view, the role of this command is to configure the priority of the Ipv6 protocol generated by the IS-IS protocol

Options:

A.

TRUE

B.

FALSE

Question 26

In an MPLS BGPVPN environment, if tags are distributed only through BGP and LDP, the MPLS tags of the message can be up to two layers of tags

Options:

A.

True

B.

False

Question 27

As shown in the figure, in the HUB & Spoke networking mode of MPLS BGPVPN, in order to achieve the division can only communicate with the headquarters, the division can not communicate with each other When setting up RT, which of the following scenarios is this?( Radio).

A???:import Target:12:3EpodTarget:12:3

B. Headquarters: importTarget:1:1EpodTarget:3:3

C. Headquarters: Impot Target:2:2; Expor Target:3:3 D. Headquarters: importTarget: 12:3EpodTarget: 3:12

Options:

Question 28

Vxlan is based on UDP encapsulation, which encapsulates Ethernet data frames on top of UDP in IP packets, so it is called MAC in UDP encapsulation

Options:

A.

True

B.

False

Question 29

What are the following statements about 8021x, RADIUS, and HWTACACS certification? ( Multiple choice questions).

Options:

A.

Users can use 8021x authentication to access the network and complete identity authentication through RADIUS

B.

RADIUS authentication and WTACACS authentication are mutually exclusive and cannot be two-factor authentication for the same user at the same time.

C.

RADIUS authentication and HWTACACS authentication can perform two-factor authentication for the same user at the same time, which is more secure.

D.

RADIUS authentication is mutually exclusive with 8021x authentication.

Question 30

BGP4+ is running between two routers, and the neighbor relationship is normal, but the BGP routing table of the router on this side does not have a neighbor route entry.

Options:

A.

The route entry in the peer BGP route table is non-optimal.

B.

The next hop address of the

C.

BGP route entry is unreachable

D.

Peer ignore is configured on the peer

E.

The peer is configured with active-route-advertise

Question 31

The network administrator is ready to use the 6to4 automatic tunnel to carry IPv6 data on the IPv4 network, and the IPv4 address of the router interface is 1381485210, so the corresponding tunnel address is 2001:8a0e:55d2:1:230:65ff:fe2:9a6?

Options:

A.

True

B.

False

Question 32

Assume that BGP/MPLSIPVVPN, OSPF, LDP, and static routing protocols are already enabled on the PE router . Which of the following protocols need to enable GR on PE in order to get NSF functionality? (Multiple choice questions).

Options:

A.

BGP

B.

Static circuit

C.

OSPF

D.

MPLS LDP

Question 33

There is an existing network of router RI, router R, router R3, and router R4 The 4 routers are interconnected via an LN network. All 4 routers are equipped with basic oSPF. When you execute the command "displayosp" on router R2 f peer", router R2 and router R3 are discovered The status between is "2-way". So what conclusions can you draw from this output? Multiple choice questions).

Options:

A.

Router R2 is not a DR

B.

Router R3 is not a DR, nor is it a BDR

C.

There is no full adjacency between router R2 and router R3

D.

Router R4 is destined for DR

E.

Router R2 is DR or BDR

Question 34

Underneath, what doesn't belong to EVPN Type2 routing is ?( Multiple choice question)

Options:

A.

Host ARP advertisement

B.

BUM message forwarding

C.

Host MAC address advertisement

D.

Host IP Route Advertisement

Question 35

Which of the following scenarios send free ARP messages?( Multiple choice questions).

Options:

A.

After the VRRP protocol master and standby role election is completed

B.

The DHCP client receives an acknowledgment message from the server after it sends it

C.

When a new host configured with an IP address is connected to the network

D.

When a host connected to the switch issues a Ping message.

Question 36

A bookstore provides a wired network for customers to learn online. However, one day, it was found that some users could not access the network, and after inspection, it was found that the IP resources of the DHCP address pool had been exhausted. Which of the following is the best way to solve the problem of the moment? ( Single choice questions).

Options:

A.

Configure the static ARP binding table

B.

Configure the IPSG

C.

Limits the maximum number of DHCP Snooping binding table entries that the interface allows to learn

D.

Configuration DAI

Question 37

In an MPLSVPN network, when a packet enters the Internet and is forwarded, it is encapsulated with two layers of MPLS tags, and the processing of the packet in the following options is described correctly?

Options:

A.

The penultimate hop device receives packets with an outer label of 3

B.

The Egress PE appliance receives an UNlabeled IP packet

C.

The Egress PE device correctly sends packets to the appropriate VPN

D.

based on the inner tag The packet pops up the outer label on the penultimate hop device and forwards it to the Egress PE device

Question 38

Which address prefix in the following options indicates that the address is globally unique and globally routable among unicast addresses in IPv6, similar to a public address in IPv4?(). Single choice questions).

Options:

A.

::1/128

B.

FE80:/10

C.

FE80::/10

D.

2000:;/3

Question 39

The following statement about RSTP root protection is correct?

Options:

A.

Turning on root protection on the root port takes effect

B.

The port that turns on the root protection receives the RST BDPU with a higher priority and will enter the error-down state

C.

It is recommended that you turn it on on a switch that is at the edge of the network

D.

After opening the root-protected port and receiving the RSTBPDU with a higher priority, if it does not continue to receive the RSTBPDU with a higher priority for a period of time, it will return to the normal forwarding state

Question 40

What is the security level for untrust zones in the USG Series firewalls? ( Radio).

Options:

A.

50

B.

5

C.

10

D.

15

Question 41

In the description of the MAC address spoofing attack, the error is ? Radio

Options:

A.

Mac address spoofing attacks cause the switch to learn the wrong mapping of Mac addresses to IP addresses

B.

A MAC address spoofing attack causes the data that the switch is sending to the correct destination to be sent to the attacker

C.

MAC address spoofing attacks primarily exploit the switch Mac address learning mechanism

D.

An attacker can perform a MAC address spoofing attack by sending a forged source Mac address data frame to the switch

Question 42

As shown in the figure, SWA, SWB runs the PSTP protocol, and Cost of Path remains the default without modification, so the following statement is correct

Options:

A.

GEO/0/1 on ASWB is Alternative port

B.

GE0/0/2 on SWB is Alternative port

C.

SWA On GEO/0/1 for backup port

D.

SWB will become the root bridge

Question 43

Which field in the IPv6 basic header has a similar effect to which field in the IPv4 header does?

Options:

A.

Flags

B.

Protocol

C.

Time to Live

D.

Ldentification

Question 44

The following statement about IS-IS (IPv6) is correct?

Options:

A.

In order to support the processing and calculation of IPv6 routes, IS-IS has added TLV232 and 236

B.

By default, IS-IS has the multi-topology feature turned on

C.

IS-IS works at the data link layer and only needs to add a new TLV to support IPv6

D.

In order to support the processing and calculation of IPv6 routes, IS-IS has added NLPID to the 129 TLV

Question 45

You want only his telnet stream to be able to access the server (address 1011.100). Then, you add the following ACL to the routing ring: nule5pemit cp source ny destination 1011.100000destination-porteq 23 rule 1l0 deny ip source any destination any Then you apply that ACL to the ingress direction of the router's seial interface. What type of message is allowed to pass through the router?( Multiple choice questions).

Options:

A.

A non-sharded, port 21-accessing packet

B.

Non-first-sharded messages that use port 23 to access the server's message

C.

Non-first-of-sharded messages to access other hosts

D.

Non-first-of-its-kind packets that use port 21 to access the server

E.

Packet answer for the first sharded or non-sharded, using port 23 to access the server

Question 46

In which of the following cases, RSTP refreshes the MAC address table?( Multi-select)

Options:

A.

When the port state transitions from Forwarding to Disking

B.

Only when the port state transitions from Listening to Disccarding

C.

When a topology change notification is received

D.

When the status of a port changes

E.

CE when the port state transitions from Disking to Forwarding

Question 47

Deploying the ISIS protocol in an IPv6 environment is true in the following statement (radio).

Options:

A.

By default, the DIS priority of broadcast network interfaces at Level-1 and Level-2 is 1 B In broadcast networks, the DIS priority for IPV4 and IPV6 can be set separately

B.

In the same broadcast network. If each router supports both IPV4 and Pv6, the DISC of JPV4 and Pv6 must be the same device

C.

IS-IS sient is configured under the finger port, this interface will not send ISIS packets, but will receive ISIS packet

Question 48

As a network administrator, which of the following protocols can I use for network device configuration?

Options:

A.

SSH

B.

NETCONF

C.

LLDP

D.

SNMP

Question 49

As shown in the figure, all routers run OSPF, which is correct in the following statement:

Options:

A.

Both R2 and Zone 0 generate Router LSA

B.

R2 generates Router LSA only in Zone 0

C.

R2 forwards the R1-generated Router LSA to R3

D.

R2 Forwards the R3-generated Router LSA to R1

Question 50

The correct statement about the IGMP proxy is ? Multi-select

Options:

A.

The downstream interface of the IGMP proxy device generates multicast relay table items

B.

IGMP proxy can detect the link status with the linkage through the information of the member host joining/leaving the multicast group, and realize the rapid switching of the primary and standby device links

C.

IGMP proxy is typically deployed on devices between hosts that are members of the access device

The

D.

IGMP proxy device cannot send query messages to downstream member hosts in place of the IGMP queryer to maintain group membership

Question 51

The following statement about the OSPFv3 message format is correct?( Multiple select).

Options:

A.

There is no change in the option field of the Hello message

B.

Remove the Authentication, Auth Type fields

C.

Hello messages no longer contain address information, carrying Interface lD

D.

The OSPF version number changed from 2 to 3

Question 52

There is an existing router running OSPF connected to Zone 0 and Zone 1 You configured Zone 1 as a stub zone, what classes does LSA that only operates inside Zone 1 include?

Options:

A.

7 ? LSA

B.

1 ? LSA ? 2 ? LSA

C.

I LSA,2 LSA 5 LSA

D.

3 ? LSA ? 4 ? LSA

E.

1 LSA,2 LSA 3 LSA

Question 53

As shown in the figure, Department A of Branch 1 has access to the Internet, but Department B can only use an encrypted VP to access headquarters resources, and NAT can be configured on the egress device The policy enables Department A to access the Internet, while the PSecVPN (ESP Protocol) + Tunnel mode method configured for Department B gives it access to headquarters.

B. Right

C. Wrong

Options:

Question 54

Regarding IPv6 over IP4(19) road, the following statement is correct

Options:

A.

The 6to4 automatic tunnel requires the use of a specific IP6 address segment, and the assigned address segment is preceded by 3ffe::/16

B.

When configuring manual tunneling on the VRP platform, a Tunnel interface is generally created; When configuring automatic tunneling, a Vrua-Template interface is usually created

C.

The ISATAP tunnel determines the destination IPV4 address of the tunnel based on the destination IP6 address.

D.

All automatic tunnels encapsulate data in the same way.

E.

Automatic tunneling has great advantages over manual tunneling, and manual tunneling will be phased out

Question 55

The following statement about a cross-domain MPLS VPN is mischaracteristic?

Options:

A.

When the public network tag is LDP only , for cross-domain VPN-optionC scenario 2, a three-layer tag is required in the packet forwarding process.

B.

For the cross-domain VPN-OptionB approach, an MP-eBGP neighbor relationship needs to be established between the two ASBRs.

C.

For the cross-domain VPN-OptionA mode, the route passed between the two ASBRs is a normal IPv4 route.

D.

For the cross-domain VPN-OptionB approach, two ASBR-PEs are interconnected with multiple interfaces (including sub-interfaces), each associated with a VPN, each ASBR PE treats the peer as a CE.

Question 56

The Layer 3 logical interface on XLAN L3 Gateway that enables communication between different VXLAN virtual networks is ?

Options:

A.

Layer 2 sub-interface

B.

NVE interface

C.

VBDIF interface

D.

VLANIF interface

Question 57

What parameters can the DHCPv6 server assign to DHCPv6 clients?

Options:

A.

SNTP server address

B.

IPv6 address/prefix

C.

Gateway address

D.

DNS server address

Question 58

The Serial Number field of LS is used to detect expired and duplicate LSAs. The field is a 32bt signed integer, so the small serial number is Ox8000000

Options:

A.

True

B.

False

Question 59

Huawei's two switch SWA, SWB is connected together through 7 Ethernets, and static route aggregation is configured, and the corresponding ports on the switch SWA are E1/0/1, E1/02, E1/0/3, E1/0/4, E1/ 0/5, E1/0/6, E1/0/7, configured sequentially as if switch SWA, SWB Each aggregation group supports only 6 ports.

Options:

A.

With the same configuration across ports, the Ethemet 1/0/7 port is the aggregate group Unselected port

B.

With the same configuration of each port, the Ethemet 1/0/6 port is the aggregate group Unselected port

C.

With the same configuration of each port, SWA randomly selects one of the 7 ports as the aggregate group Unselected port

D.

With the same configuration of each port, the Ethemet1/0/1 port is the aggregation group Unselected port

Question 60

The following statement about the application of BFD is correct?

Options:

A.

The one-arm echo function refers to the detection of the connectivity of the forwarding link through the loopback operation of the BFD packet

B.

BFD multi-hop detection means that BFD can detect arbitrary paths between two systems that may span many hops or overlap in some parts

C.

BFD and OSPF linkage is to associate BFD and OSPF, and notify OSPF through BFD's rapid sensing of link failures, thereby speeding up OSPF Response to changes in network topology

D.

BFD single-hop detection refers to the IP connectivity detection of two direct-connected systems

Question 61

Because BGP is an EGP routing protocol, BGP routing policies can only be deployed between EBGP neighbors, and routing policies between IBGP neighbors are not valid.

Options:

A.

TRUE

B.

FALSE

Question 62

Is the following GR description of ISIS correct?

Options:

A.

The GR feature of AISIS is turned on by default.

B.

ISIS's GR has a total of four timers.

C.

ISIS's GR notifies of events and maintains neighbor relationships through CSNP messages.

D.

ISIS's GR defines a new TLV structure to support this feature.

Question 63

What are the reasons why the BGP connection is down after it is successfully established ? ( Single choice questions) Single choice

Options:

A.

The wrong BGP packet was received.

B.

The mandatory attribute in the route update packet is missing.

C.

Open message negotiation failed.

D.

After the BGP connection is established, the keepalive message is not received within the negotiated holdtime time.

Question 64

If we have a VPN instance configured on a router, if we need to view the VPN route on a Huawei router, which of the following commands should we use?

Options:

A.

display ip routing-table vpn-instance vpn-instance-name

B.

display ip routing-table

C.

display vpn routing-table

D.

display ip vpn-instance

Question 65

Which of the following configurations is the correct OSPFv3 route aggregation configuration:

Options:

A.

[Huawei]ospfv3 1 [Huawei-ospfv3-1J]area 1

[Huawel-ospfv3-1-area-0001]abr-summary fc00:0-0:48 cost 400

B.

[Huawei] interface gigabitethernet 1/0/0

[Huawei-GigabitEthernet1/0/0]asbr-surmary fcO0-0:0:48 cost 20

C.

[Huawei]ospfv3 1 [Huawei-ospfv3-1]asbr-surmary fcO0-0:0::48 3 cost 20 tag 100

D.

[Huawei]ospfv3 1 [Huawei-ospfv3-1]abr-surmary fcO0:0:0:48 cost 400

E.

(Huaweijospf3 1 Huawei-ospfv3-1Jarea 1

Huawei-ospfv3-1-area-0001]asbr-sumary fcO0:0:0: 48 cost 20 tag 100

Question 66

The switch uses IPSG technology to verify the source address of the IP packet, and the verification matrix used by the IPSG is obtained through the ARP resolution process in the listening network

Options:

A.

True

B.

False

Question 67

s the following description of THE MUX VLA N in huawei switches correct?

Options:

A.

MUX VLAN ??Principal VI-AN ?Subordinate VI-AN ???Separate VLAN ? Isolate VLAN

B.

Each Separate VLAN can bind multiple Principal VLANs

C.

Under the same VLAN, muX VLANs can be mixed with SuperVLANs

D.

The Principal port can pass the answer to all ends within the MUX VLAN

Question 68

The following description of Filter-Policy is correct?( Radio neck).

Options:

A.

With Filter-Policy, on ASBR in OSPF, you can filter the generation of type5 LSA and type7LSA.

B.

Prefix lists can be used to filter both routes and packets.

C.

Filter-policy filters the link state information received or published, and can modify the properties of route entries.

D.

When using a prefix list to filter routes, the table entry ip-prefix 1 deny 0000 0 less-equal

32 matches only the default route.

Question 69

When you troubleshoot a local area network with Huawei equipment deployed, you find that there are a large number of unicast frames with unknown source AC addresses in the local area network . A large number of unknown source MAC addresses single-plug frames can cause the switch the biggest danger is ?

Options:

A.

Memory that occupies the cache ton

B.

Increases the power consumption of the power supply

C.

Consumes a TCAM table entry

D.

Consume the available bandwidth

E.

Consume the MAC address table entry available in the system

Question 70

In EPIM-SM, the following description of the PIM Join message is correct?

APIM Join messages are sent every 3 minutes, and status B. PIM Join messages for the multicast tree are only sent when the multicast tree is first established

C. The PIM Join message is sent every 60 seconds to refresh the status of the upstream router mroute for the multicast tree

D. The upstream router sends a PIM Join acknowledgment in response to each PIM Join message received from the downstream router

Options:

Question 71

There can be multiple nodes under a route -policy, different node numbers are identified by nodes, and each node can have multiple if-match and apply clauses, which of the following descriptions are wrong ?

Options:

A.

The relationship between the if-match clauses under each node is "and"

B.

The relationship between different nodes is an "and" relationship

C.

There is an "or" relationship between different nodes

D.

The relationship between the if-match clauses under each node is "or"

Question 72

In order to reduce the number of OSPF routes in some unscheduled areas, the OSPF protocol has developed special area functions, and the following characteristic description of ospf special areas is correct?( Single choice questions).

Options:

A.

ASBR-Sunmary-LSA is allowed to be published to NSSA regions

B.

AS-External-LSA is allowed to be published to Stub regions

C.

Any OSPF zone can be configured as a special zone

D.

Special area routers cannot establish OSPF neighbor relationships with regular area routers

Question 73

In a multicast network running PIM-SM mode, how does the router choose the upstream interface?

Options:

A.

looks up the outgoing interface corresponding to the RP address in the unicast routing table

B.

Interfaces to which multicast group members are directly connected

C.

Find the outbound interface corresponding to the mapping proxy in the unicast routing table

D.

The interface that is fast to the PIlM Join message

E.

Interface for sending PIM Heilo messages.

Question 74

What is the relationship between CIR, BC and TC? (single select)

Options:

A.

CIR=TC/BC

B.

CIR=BE/TC

C.

TC=CIR/BC

D.

TC=BC/CIR

Question 75

Regarding Policy Routing, the following description error is ?( Single choice questions).

Options:

A.

When configuring local policy routing, if two next hop and two outbound interfaces are set in the policy at the same time, packet forwarding only distributes the load between the two outbound interfaces.

B.

Interface policy routing is only supported for application in the inbound direction of an interface.

C.

Interface policy routing only takes effect for forwarded packets, but has no effect on packets sent locally.

D.

If the message matches the permit table entry in the interface policy route , the message must be forwarded according to the next hop specified by the interface policy route

Question 76

In a network in MPLSVPN, different CE devices can exchange routing information with the same PE device using different routing protocols, and different CE devices can exchange routing information with the same PE The routing protocols used between devices are independent of each other

Options:

A.

True

B.

False

Question 77

The following description of 8021S deployment characteristics is correct?( Multiple choice question)

Options:

A.

All VLANs share a spanning tree instance

B.

Multiple bridges share a spanning tree instance

C.

Each VLAN has one spanning tree instance

D.

Multiple VLANs share a spanning tree instance

Question 78

The command ip as-path-fiter as-path-fiter-number (denylpermit) regular-expression to configure as-path-ilter, in this command , multiple sentences can form an as-path-filter statement, what is the relationship between so many statements?

Options:

A.

Routes match in order When a route matches to a clause, the relationship between

B.

and is no longer matched downwards

C.

or relationships

D.

Routes match in order and routes need to match all sub-directions

Question 79

Regarding Route Policy, is the following description correct?

Options:

A.

Advanced ACLs can be applied in route-policy to filter routes

B.

The table entries pernit::0 Less an equal 128 indicate that all IPV6 routes are allowed through

C.

If more than one node is defined in Route one policy, there should be at least one node in each node that matches permit

D.

Route one policy filters only the default route

Question 80

In an Hw IP multicast network—which of the following multicast features are associated with (*, G) table entries? ( Multiple select)

Options:

A.

Dense mode

B.

Source tree

C.

Sparse mode

D.

PIM bidirectional E. Share the tree

E.

Dense Tree

Question 81

The following description of the Layer 6 functionality in the OSI reference model is correct?

Options:

A.

Synchronous communication

B.

Establishing, maintaining, and terminating communication sessions

C.

Provides a common data compression and encryption scheme

D.

Determines the availability of resources

Question 82

The following description of the Lsp shard extension for ISIS is correct?

Options:

A.

Enables is routers to generate more LSP shards to carry more ISIS information.

B.

Isis' shard extension is equally valid for Hello packets.

C.

Shard scaling for ISIS is achieved by adding virtual systems, up to 1000 virtual systems.

D.

The isis router can produce a maximum of 1024 shards.

Question 83

Router HW1 exists in the carrier HW's network as an MPLSLSR router. The router receives a packet carrying a label, but the label entry does not exist in its LFIB. So how does the router handle that message?

Options:

A.

Router HW1 strips off the label and looks for the FIB using the P destination address

B.

Router HW1 uses LDP to create an LSP and creates a new path in LFIB for the label carried in the message

C.

Router HW1 drops the message

D.

Router HW1 will forward the message with the default label

Question 84

In different scenarios, RSTP provides different protection functions, and the wrong statement about this statement is

Options:

A.

The root protection feature is enabled for the specified port, and its port role can only remain as the specified port

B.

When the anti-TC-BPDU packet attack feature is enabled, the number of times the switching device processes IC BPDU packets per unit time is configurable

C.

after the BPDU protection function is enabled on the switching device, if the edge port receives RST BPDU, the edge port will be set to a non-remote port and the spanning tree calculation will be re-performed

D.

Start the specified port of root protection, when the port receives a better RSTBPDU, the port will enter the Discarding state and is no longer forwarding packets. If the port does not receive a better RSTBPD for a period of time then automatically revert to the normal Forwarding state

Question 85

The following statement about IPv6 Over VXLAN is wrong as ?( Single choice questions).

Options:

A.

The tunnel between VXLAN Layer 2 and Layer 3 gateways is an IPv4 network.

B.

IPv6 over VXLAN solves the problem of insufficient IP address resources for end tenants.

C.

IPv6 Over VLANs do not generate ND table entries.

D.

IPv6 over VXLAN means that the Overlay network of the VXLAN is an IPv6 network.

Question 86

The following description of Link ID, Data, Type, and Metirc in Router-LSA is correct :( Multiple select).

Options:

A.

Metric describes the overhead of this connection

B.

The Link ID represents the local identity of this connection, and the different connection types The Link ID represents different meanings

C.

Data is used to describe additional information for this connection, and different connection types describe different information

D.

Type indicates the type of connection

Question 87

If the PIM-SM protocol is running in a multicast network , you need to configure RP, and the configuration equation of RP is divided into dynamic RP and static RP. The following configuration description of the RP is correct (radio).

Options:

A.

When you configure Dynamic RP , you need to configure BSR as a backup of the RP.

B.

When you configure a static RP , you need to configure the BSR to advertise the RP information.

C.

When configuring a static RP, you need to specify the information for the RP on all PIM routers.

D.

When you configure Dynamic RP, you do not need to configure BSR.

Question 88

Regarding the Stub region and the Totally Stub region of the OSPF protocol, the following statement is correct (multiple choice)

Options:

A.

After modifying the original Stub area to a Totally Stub area, the number of LSAs in the LSDB of each router in the region will definitely be reduced

B.

ASBR cannot be present in either the Stub zone or the Totally Stub zone

C.

When you modify the original Stub area to a Totally Stub region, the number of LSAs propagating within the region will definitely decrease

D.

If there are two ABR in the Totally Stub zone, each ABR sends an LS ID of 0000 to the router in the zone LSA

Question 89

Use ping-ax-cY-sZ-vpn-instance M 105162, which has the meaning of

Options:

A.

IcMP request for the ping, message size Z (without IP and ICMP headers)

B.

The source IP address of the ping packet is X

C.

The ping belongs to the VPN instance M

D.

The ping sends Y ICMP requests

Question 90

DHCP Relay is responsible for forwarding DHCP packets between the DHCP server and the DHCP client, assisting the DHCP server in dynamically assigning network parameters to the DHCP client.

Options:

A.

TRUE

B.

FALSE

Question 91

The following description of the RD attribute filter for BGP is correct?

Options:

A.

If RD-filter is not configured, but the RD-filter is referenced for filtering, the matching result is deny.

B.

If RD-filter is configured, but the routed RD is not matched with any of the RDs defined in the rule, the default match result is permit.

C.

Multiple rules are matched in the order in which they are configured.

D.

There is always an "or" relationship between the rules configured by RD-filter.

Page: 1 / 23
Total 610 questions