Baixe o app para aproveitar ainda mais
Prévia do material em texto
Dumpsinfo is a good website providing the latest exams information and dumps questions for all hot IT certification exams, such as Microsoft, Cisco, Huawei, IBM, VMware, Fortinet, and so on. Features of Dumpsinfo’s products Instant Download Free Update in 3 Months Money back guarantee PDF and Software 24/7 Customer Support Besides, Dumpsinfo also provides unlimited access. You can get all Dumpsinfo files at lowest price. HCIP-Datacom-Core Technology V1.0 H12-821_V1.0-ENU exam free dumps questions are available below for you to study. Full version: H12-821_V1.0-ENU Exam Dumps Questions 1.L2TP is a virtual private dial-up network VPDN (Virtual Private Dial-up Network) tunnel protocol. It is a VPN that provides access services for employees on business trips or corporate branches to remotely access corporate intranet resources in remote office scenarios, and runs on the network layer of the TCP/IP protocol stack. A. TRUE B. FALSE Answer: B 2. Network administrator A wants to use ACL to match only the four routing entries 1, 3, 5, and 7 in the figure. How many ACL rules does network administrator A need to configure at least? 1 10.0.1.0/242 10.0.2.0/243 10.0.3.0/244 10.0.4.0/245 10.0.5.0/246 10.0.6.0/247 10.0.7.0/24 A. 2 B. 3 1 / 37 https://www.dumpsinfo.com/vendors/microsoft/ https://www.dumpsinfo.com/vendors/cisco/ https://www.dumpsinfo.com/vendors/huawei/ https://www.dumpsinfo.com/vendors/ibm/ https://www.dumpsinfo.com/vendors/vmware/ https://www.dumpsinfo.com/vendors/fortinet/ https://www.dumpsinfo.com/unlimited-access/ https://www.dumpsinfo.com/exam/h12-821_v1-0-enu C. 1 D. 4 Answer: C 3.In the VRP system, which of the following parameters can the Route-Policy match? (Multiple choice) A. Access Control List B. Prefix list C. Outgoing interface of routing information D. Routing cost Answer: ABCD 4.The output information of a certain router is shown in the figure <R1>display ospf peer OSPF Process1 with Router ID 10.0.2.2 Neighbors Area 0.0.0.0interface10.0.12.2 ( GigabitEthernet0/0/0 ) s neighbors Router ID:10.0.1.1 Address:10.0.12.1 State: Full Mode: Nbr is Slave Priority:1 DR:10.0.12.2 BDR:10.0.12.1MTU:0 Dead timer due in 32sec Retrans timer interval:5 Neighbor is up for 00:03:30 Authentication Sequence: [o] Which of the following options are correct? (Multiple choice) A. Router ID is l0.0.1.1 B. Router ID is 10.0.2.2. C. The router's connection address is 10.0.12.2. D. This router is the DR. Answer: BCD 5. It can be used in a variety of routing protocols. The routing selection tool consisting of if-match and apply clauses is: A. route-policy B. IP-Prefix C. commnityfilter D. as-path-filter Answer: A 6. The routes injected through the Network method in BGP do not necessarily have to be routing entries that exist in the IP routing table, and this method of injecting routes is more accurate. A. TRUE B. FALSE Answer: B 7. If the two interfaces of the fire protection block are divided into the same area, then the data packets flowing between the two interfaces do not need to be processed by packet filtering and are 2 / 37 directly forwarded. A. TRUE B. FALSE Answer: B 8.When the BGP routing protocol is configured on the network, you can see a routing entry by using commands on the router to view the BGP routing table, but you cannot find the BGP route in the global routing table of the router. What are the possible reasons? (Multiple choice) A. The AS-PATH of the BGP route contains its own ASID B. bgp-rib-only is used on the BGP router C. There are other routing entries with higher priority in the global routing table D. The next BGP route is unreachable Answer: ABCD 9.Regarding the use of the network management system, which of the following options are correct? (Multiple choice) A. The network management software has an alarm management function, such as the UP/DOWN change of the device port, which can be immediately fed back to the network management software through the TRAP message, so that the network administrator can discover and deal with network faults in time B. The network management software has performance management functions. The network management software can automatically perform routine collection and statistics on the CPU and memory occupancy of the device, and can assist the network administrator to analyze the network performance bottleneck C. The network management software has configuration file management functions, which can automatically backup, compare, and restore configuration files. Allows network administrators to automatically back up configuration files in batches D. The network management can regularly output reports according to user needs, providing reference for later network optimization Answer: ABCD 10.Which of the following attack methods are fragmented packet attacks? (Multiple choice) A. Syndropl attack B. Huge number of fragment attacks C. Huge offset attack D. UDP Floodi attacks E. Tear Drop: Attack F. Smurf attack Answer: BC 11. When dual-link hot standby is configured in a WLAN group, the AP will establish CAPWAP links with the active AC and the backup AC respectively. A. TRUE B. FALSE Answer: A 12. The router receives two BGP routes containing the following attributes, please select the optimal 3 / 37 route according to the BGP route selection rules. A. The optimal route is route M, because its AS_Path is shorter than route N B. The optimal route is route N, because its MED is smaller than route M C. The optimal route is route N, because its AS_Path is longer than route N D. The optimal route is route M, because its MED is larger than route N Answer: A 13.Which of the following statements about IGMPv2 routers maintaining segment group membership are correct? (Multiple choice) A. After receiving the Leave message, the router immediately removes the members of the group B. The router queries for a specific group C. The router maintains a timeout timer for each group membership D. After the router sends a general group query message, all receivers need to respond within the maximum response time Answer: BC 14. Which of the following BGP attributes will not be advertised to neighbors along with BGP Update packets? A. Next_Hop B. Preferred-Value C. Origin D. AS_Path Answer: B 15. Similar to 0SPF, the two routers establishing a BGP peer relationship must be directly connected. A. TRUE B. FALSE Answer: B 16.EVPN is a VPN technology that can only provide Layer 2 network interconnection. A. True B. False Answer: B 17. Cutover rollback refers to rolling back the current change to the state before execution. A. TRLE B. FALSE Answer: A 4 / 37 18.Which of the following descriptions about Policy-Based-Routing and Routing-Policy are correct? (Multiple choice) A. The deployment of the routing policy is based on the forwarding plane and will not affect the routing table entries B. After the device receives the message, the policy routing will first search for the policy for matching and forwarding. If the match fails, it will search the routing table for forwarding C. Routing policies can only be formulated based on source addresses D. Policy routing can formulate policies based on parameters such as source and destination IP addresses, protocol types, and packet sizes Answer: BD 19. The output of a device viewing LSDB is shown in the figure. According to the content analysis in the figure, what information can we obtain? (Multiple choice) A. The LSA 10.1.0.4 has survived on this router for 875 seconds B. Router 4.4.4.4 belongs to Guqian District City C. Route summarization is not used in the entire OSPF domain D. Router 1.1.1.1 belongs to the non-backbone area E. Router 2.2.2.2 is an ASBR, but does not belong to the same area as 4.4.4.4 Answer: ADE 5/ 37 20. The AS border router can be an internal router R or an ABR, and must belong to the backbone area. A. TRUE B. FALSE Answer: B 21.A campus deploys OSPF to implement network interworking, and GE0/0/2 of R3 also enables OSPF. Among them, Area1 is deployed as an NSSA area, and the addresses of each device are shown in the figure. An engineer configures a static route on R3 to access the loopback interface address of R4, and imports the static route into the OSPF process. At this time, in the Type5 LSA received by R1, the forwarding address (FA) is _____. (Note: Please fill in the IP address without masking) Answer: 10.1.12.2 22.Which statement about IP address allocation is correct? (Multiple choice) A. Unless AnyCast is used, the IP address of the entire network must remain unique! B. The IPv4 address space is divided into three types: ABC C. When assigning addresses, if the system uses a /24-bit mask length, the network design can be simplified D. In order to improve the efficiency of the use of IP addresses, we generally use VLSM to determine the mask length as needed Answer: AD 23.As shown in the figure, R1 and R2 form a VRRP backup group 1. By executing the vrrp vrid 1 virtual-ip ( ) command on R1, it can become the owner of the IP address, so that R1 is the Master and R2 is the Backup. 6 / 37 Answer: 192.168.1.254 24.There are many differences between data center switches and ordinary campus switches. Which of the following features are available in data center switches but not supported by campus switches? (Multiple choice) A. MSTP B. TRILL C. NFV D. FCOE E. VXLAN Answer: BDE 25. Which of the following descriptions about the different classifications of PBR is correct? A. Interface PBR can modify the IP-Precedence of IP packets B. Local PBR is invalid for the original message, and only works for the forwarded message C. The interface PBR is called under the interface, and it takes effect on the outbound packets of the interface. D. PBR can be divided into interface PBR, local PBR and routing PBR Answer: D 26.SSH has negotiated multiple algorithms during the implementation process, so which of the following algorithm categories are used by SSH? (Multiple choice) A. The key exchange algorithm used to generate the session key B. Algorithms for Data Integrity Protection C. Spanning tree algorithm for preventing communication loops D. Algorithms used for data encryption E. Host Public Key Algorithms for Digital Signature and Authentication F. Shortest Path Algorithm for Determining the Shortest Communication Path Answer: ABDE 27. In route-policy, what are the BGP attributes that can be used in the apply clause? (Multiple choice) A. MED B. AS-Path C. Tag D. Local-Preference Answer: ABD 28. The port role that cannot be in the forwarding state in RSTP is? (Multiple choice) A. Alternate Port B. Designated Port C. RootPort D. Backup Port Answer: AD 7 / 37 29. Which function does the switch control plane not include? A. Business processing B. Routing operation C. System loading D. Traffic Statistics Answer: C 30.In BGP, MED is mainly used to influence BGP route selection between ASs. The smaller the MED attribute value is, the better the BGP route is. By default, the BGP MED value of Huawei devices is ( ). (Please fill in the Arabic numerals) Answer: 0 31. Which of the following statements about different types of firewalls is wrong? A. A stateful inspection firewall needs to be configured with security policies for the "go" and "return" directions of packets B. Packet filtering firewall for each data packet passing through the firewall, an ACL matching check is performed C. Proxy firewall acts as a proxy for business between internal network and external network users D. The state inspection firewall only checks the security policy for the first packet that does not hit the session Answer: A 32. Which of the following descriptions about the OSPF Stub area is wrong? A. If an area is to be configured as a Stub area, all routers in the area must be configured with Stub area attributes B. Virtual connections cannot exist in the stub area C. ASBRs cannot exist in the stub area, that is, routes outside the autonomous system cannot be propagated in the stub area D. The backbone area (Area0) cannot be configured as a stub area E. The cost of the default route sent to the Stub area cannot be configured Answer: E 33. Regarding the command description of OSP, which is wrong? (Multiple choice) A. The difference between OSPF v2 and OSPF V3 interface configuration commands is that OSPF v2 can use the network command, while OSPF v3 can be directly enabled on the interface B. The stub router command is used to configure the secondary router as a Stub router, and the stub router can form a neighbor relationship with a non- stub router C. There is no need to use router-id in OSPF v3 configuration, the configuration method is the same as OSPF v2 D. The no-summary parameter is configured for the stub area and the totally stub area Answer: BCD 34. A company often has employees who need to go on business trips, so they often need to remotely access the company's internal network for office work. Which of the following technologies can achieve this requirement? A. ISDN Dial-in B. IPSec VPN 8 / 37 C. NPLS VPN D. SSL VPN Answer: D 35. Which of the following BGP routing attributes is not a recognized attribute? A. AS_ PATH B. Origin C. MED D. Local_Pref Answer: C 36.Which of the following descriptions about RP in PIM-SM are correct? (Multiple choice) A. Only static RPs can specify which multicast groups the RP provides services for B. Dynamic election of RP will involve two types of roles C-BSR and C-RP C. RP is used to process source DR registration information and group member joining requests D. Not all PIM routers in the network must know the address of the RP Answer: BC 37. Routers R1 and R2 are directly connected through GigabitEthernet0/0/0 respectively, and try to establish an OSFP neighbor relationship, but the neighbor relationship has not been successfully established. The troubleshooting process is shown in the figure. 9 / 37 10 / 37 So which of the following operations can make R1 and R2 neighbor management established normally? A. [R2] ospf 1 [R2-0spf-1] ara0 [R2-ospf-1-area-0.0.0.0] timer hello 10 B. [R2] interface GigabitEthernet 0/0/0 [R2-GigabitEtherneto/0/0] undo ospf timer hello C. [Relintertace GigabitEthernet 0/0/0 [R2-GigabitErhernet0/0/0] ospf timer hello 20 D. [R2] ospf 1 [R2-ospf-1] area0 [R2-ospf=1-area-0 , 0.0.0lundotimer hello Answer: C 38.What are the factors that cause traffic interruption after a network failure? (Multiple choice) A. Fault Propagation Time B. Routing Loops C. Response time to a single device failure (table item update) D. Fault detection time Answer: ABCD 39. In IS-IS, setting which of the following flags means that although the LSP will still spread in the network, the LSP will not be used when calculating the route through the overloaded router? A. OL B. Checksum C. ATT D. P 11 / 37 Answer: A 40. When a large number of IP phones and WLAN APs need to be accessed in the network, which function switch do we generally consider to choose? A. A switch with STP edge port function B. A switch with POE function C. A switch with SACG function D. A switch with QOS function Answer: B 41.What problems should an engineer check before the equipment is installed and powered on? (Multiple choice) A. Whether the signal cable has been correctly installed and bundled according to the approved specifications B. Whether the device is connected according to the planned topology C. Whether the ground wire has been installed correctly according to thespecification D. Whether the power cord has been correctly installed according to the specification Answer: ABCD 42.In PIM-DM, the multicast data will be spread across the network periodically by default ( ) seconds. The main purpose of the periodic spread is to detect whether there are new members joining the group. (Please fill in the Arabic numerals) Answer: 180 43. Which of the following statements about the OSPF protocol is wrong? A. The OSPF protocol supports area division B. OSPF supports load balancing for equal-cost routes C. OSPF packets are encapsulated in IP packets and can be sent in the form of unicast or multicast D. OSPF is a link state based exterior gateway protocol Answer: D 44.Which of the following descriptions about the OriginatorID attribute in BGP are correct? (Multiple choice) A. OriginatorID is a recognized arbitrary attribute B. If there are multiple RRs in As, the OriginatorID attribute is created by the first RR C. When a route is reflected by RR for the first time, RR adds the OriginatorID attribute to this route to identify the originating router of this route D. When other BGP Speakers receive this route, they will compare the received OriginatorID with the local RouterID. If the two IDs are the same, BGPSpeaker will ignore this route and do not process it. Answer: BC 45. OpenSent A. 3-1-2-5-4 B. 1-3-5-2-4 C. 3-5-1-2-4 D. 3-1-5-2-4 12 / 37 Answer: D 46. Which of the following information is carried in the BGP OPEN message? (Multiple choice) A. Routing attributes B. BGP Router ID C. Hold time D. Local Autonomous System (AS) number Answer: BCD 47. Regarding the OSPF multi-process description, the error is: A. Multiple different OSPF processes can run on the same router, and they do not affect each other and are independent of each other B. An interface of a router can only belong to one OSPF process C. The routing interaction between different OSPF processes is equivalent to the routing interaction between different routing protocols D. Different OSPF routers establish neighbors, and the process numbers must be the same Answer: D 48. As shown in the figure, all three switches run the RSTP protocol, so which one of the following descriptions about the topology convergence process is correct? A. The upstream link port of SW2 will immediately enter the Forwarding state after receiving the RSTBPDU with the Proposal bit set from 5W1. B. When the network is initialized, the ports of all the switches in the figure are designated ports and are in the Discarding state C. The edge port of SW3 will immediately enter the Forwarding state after a round of P/A mechanism D. The device interconnection port of the downstream link quickly enters the Forwarding state through the P/A mechanism Answer: B 13 / 37 49.Which of the following statements about DHCP Server denial of service attacks are correct? (Multiple choice) A. DHCP denial of service attacks consume address resources by continuously modifying the CHADDR field in the DHCP request message B. DHCP denial of service attacks will quickly exhaust the IP address resources in the DHCP address pool C. After the DHCP server address resources are exhausted, it will no longer process and respond to DHCP request messages. D. DHCP denial of service attack consumes address pool resources by controlling a large number of terminals to send address request messages at the same time Answer: ABC 50.What are the three ways of sending IPV4 packets? (Multiple choice) A. Anycast _ B. Multicast C. Unicast D. broadcasting Answer: BCD 51. Three elements of the Server map table of the USG series firewall, excluding A. Destination port number B. Agreement number C. Destination IP D. Source lP Answer: D 52. Confirm failure 53. When configuring dual-link hot backup, the engineer configures the CAPWAP heartbeat detection interval to be 20 seconds, and enables the dual-link backup function, then the time when the AP detects that the primary link times out and performs active-standby switchover? A. 75 seconds B. 20 seconds C. 60 seconds D. 90 seconds Answer: C 54. Which of the following option packets belong to OSPF protocol packets? (Multiple choice) A. Hello B. LSU C. LSA D. LSR Answer: ABD 55.Trunk ports can allow multiple VLANs to pass through, including VLAN4096. A. True B. False 14 / 37 Answer: B 56. The shortest path from the multicast source to the receiver is called the shortest path tree SPT. A. TRUE B. FALSE Answer: A 57. The configuration of the two routers is shown in the figure, and they can establish OSPF adjacency. A. TRUE B. FALSE Answer: A 58. The BFD version number supported by the VRP version is: A. version 3 B. Version 2 C. Version 1 D. Version 4 Answer: C 59. From the topology shown in the figure and the configuration on the interconnection port of the switch, it can be judged that the data frame tagged with VLAN10 can be forwarded normally between 15 / 37 the two switches. A. True B. False Answer: B 60. By default, which of the following is the MED attribute value in Huawei equipment BGP? A. 180 B. 0 C. 100 D. 10 Answer: B 61. To implement the traffic filtering function, you can use traffic-flter or MQC. Compared with traffic- filter, MQC can be called in more views. A. True B. False Answer: A 62. A switch will join the stack system, so the stack ID is manually configured to be 2 in advance, but after joining the stack system, the stack system assigns the stack ID to the switch to be 3 , and the GE0/0/2 interface of the switch is added to the stack system The interface number is GE___ . Answer: 3/0/2 16 / 37 63.In the MSTP domain, multiple spanning trees can be generated based on instance calculations, and each spanning tree is called an MSTI. Which of the following descriptions about MSTI is correct? (Multiple choice) A. Each MSTI can share parameters to calculate its own spanning tree B. The role and status of each port on different MSTIs can be different C. The spanning tree of each MSTI can have different roots and different topologies D. The spanning tree parameters of each port on different MSTIs can be different Answer: BCD 64. In the inter-domain report filtering, which option of the following is in the outbound direction? A. trust―untrust B. untrust―dmz C. trust―local D. untrust―trust Answer: A 65. Using the IP prerequisite list shown in the figure for route matching, which of the following routes can be matched? ip ip-prefix List1 index 10 permit 192.168.1.0 24 greater-equal 24 less-equal 27 A. 192.168.2.0/24 B. 192.168.3.0/25 C. 192.168.1.0/27 D. 192.168.1.0/23 Answer: C 66. As shown in the figure, the four switches have run the RSTP protocol and completed the calculation of the spanning tree. 17 / 37 So, which of the following descriptions about port roles are correct? (Multiple choice) A. The G0/0/2 port of SW2 is the AP port, and the G0/0/2 port of SW3 is the DP port B. The G0/0/1 port of SW4 is the AP port, and the G0/0/2 port of SW4 is the RP port C. The G0/0/2 port of SW2 is the DP port, and the G0/0/2 port of SW3 is the AP port D. The G0/0/1 port of SW4 is the RP port, and the G0/0/2 port of SW4 is the AP port Answer: CD 67.There is an existing wireless access controller as a DHCP relay. If the DHCP client cannot dynamically obtain an IP address, which of the following reasons may be the cause? (Multiple choice) A. In the global view of the wireless access controller, the DHCP server function is not enabled B. In the interface view of the wireless access controller, no dhcp select relay is configured C. In the global view of the wireless access controller, no DHCP server group is bound D. In the interface view of the wireless access controller, no proxy DHCP server is specifiedAnswer: ABCD 68.Which of the following types of protocols can BGP inject into the BGP routing table through the import-route command? (Multiple choice) A. Static routing B. Direct routing 18 / 37 C. IS-IS Routing D. OSPF routing Answer: ABCD 69. The FIB table is located on the data plane of the router, and each forwarding table entry specifies information such as the outgoing interface and the next-hop IP address to reach a certain destination. Which of the following meanings does the B field in FLAG represent? A. Static routing B. Black hole routing C. Available routes D. Gateway routing Answer: B 70. In the hardware module of the frame type equipment, which of the following modules provides high-speed non-blocking data channels and realizes the business exchange function between various business modules? A. MPU B. LPU C. MPUs and LPUs D. SFU Answer: D 71. If the router-id is configured in both the system view and the BGP view, BGP uses the router-id in the BGP view because the BGP view has a higher priority. A. True B. False Answer: A 72.Which of the following are the advantages of building a campus network using stacking and clustering technologies? (Multiple choice) A. Business interruption time is greatly reduced B. Simplify network management and reduce the complexity of network deployment planning C. Can effectively reduce network power consumption D. Prompt utilization of network devices and links Answer: ABD 73. The following is part of the output information of the router RTD. Which of the following description of the output information is wrong? <RID>display igmp-snooping IGMP Snooping Information for VLAN 3 IGMP Snooping is Enabled IGMP IP Version is Set to default 2 IGMP Query Interval is Set to default 60 IGMP Max Response Interral is Set to default 10 IGMP Robustress is Set o default 2 IGMP Lase Weniber Query Interval is Set to defauit 1 IGMP Router Port Aging Interval is Set to 180s or holdtime in hello A. The version of the IGMP message that can be processed in VLAN3 is the default value 19 / 37 B. The display igmp-snooping command is used to view the IGMP Sooping configuration information on the VLAN C. The maximum response time of IGMP in VLAN3 is the default value, which is 60 seconds D. IGMP Snoping of VLAN3 is enabled Answer: C 74. Which of the following descriptions about OSPF is correct? A. The DD message does not necessarily carry link state summary information. At this time, the DD message can be used to negotiate the master-slave relationship B. The destination address of the Hello packet is 224.0.0.5 and 224.0.0.6 C. Only LS Update and LS Request messages carry complete LSA information D. After the ospf mtu-enable command, OSPF will check the MTU length in the LSU, if it is inconsistent with the MTU length in the message sent by itself, the device will remain in the Exchange state Answer: A 75. In order to avoid inter-area loops, OSPF regulations do not allow routing information to be published directly between two non-backbone areas, and only allow routing information to be published within an area or between a backbone area and a non-backbone area. Therefore, each area border router (ABR) must be connected to the backbone area. A. True B. False Answer: A 76.Which of the following reasons may cause the failure to establish a BGP neighbor relationship? (Multiple choice) A. Neighbor configuration information is wrong B. IP route unreachable C. Fiber optic cable break D. Disable TCP179 port number Answer: ABCD 77. In the switching network shown in the figure, all switches run the STP protocol. When the topology is stable, modifying the sending cycle of the configuration BPDU on which of the following switches can affect the sending cycle of the STD configuration BPDU? 20 / 37 A. STC B. SWD C. SWA D. SWB Answer: C 78. Type 4 LSA (ASBR-Summary-LSA) is not allowed to appear in the NSSA area. A. TRUE B. FALSE Answer: A 79. Which of the following is not the main function of NDP? A. Path MTU Discovery B. Neighbor Status Tracking C. Duplicate address detection D. Address Answer: A 80. The goal of network management is to realize the monitoring, testing, configuration, analysis, evaluation and control of network software and hardware, so as to ensure the normal operation of the network. A. TURE B. FLASE Answer: A 21 / 37 81. The four routers run IS-IS and have established adjacency. The area numbers and router levels are marked in the figure. The link between R1 and R2 is a PPP link, and R2 is DIS. Which of the following statements is correct? (Multiple choice) A. R2 sends the LSP to R3 and R4 in unicast mode B. If R1 sends an LSP message, R2 needs to send PSNP for confirmation C. R3 periodically sends CSNP to help achieve Level-2 LSDB synchronization Answer: BC 82.Which of the following descriptions about VRRP fast switching is wrong? (Multiple choice) A. If multiple BFDs are configured to monitor at the same time, each configuration is related to each other and may affect each other B. The VRRP backup group monitors common BFD and when the BFD state changes, it will change the master/standby state by modifying the priority of the backup group. When the monitored BFD session state recovers, the priority of the router in the backup group will be restored to original value C. A VRRP backup group cannot monitor Peer BFD, Link BFD and Normal BFD at the same time D. Use VRRP to monitor the BFD session or EFM function. After the BFD session or EFM session status changes, the VRRP module will be notified to realize VRRP fast switching Answer: AC 83. The LAN mapping table is an attribute of the IST domain and is used to describe the mapping relationship between VLANs and MSTIs. Each VLAN can correspond to multiple ISTIs, and one MST can correspond to multiple VLANs. A. TRUE B. FALSE Answer: B 84. Which of the following descriptions about MP-BGP is wrong? A. A router that supports MP-BGP cannot interact with a router that only supports BGP-4 B. MP-BGP can isolate the routing information of different address clusters from each other C. MP-BGP introduces two new optional non-transition path attributes: MP_REACH_NLRI and 22 / 37 MP_UNREACH_NLRI D. MP-BGP can carry multiple network layer protocols Answer: A 85. The MAC address of a certain PC is 5489-98FB-65D8. The administrator wants this PC to obtain the specified IP address 192.168.1.11/24 from the DHCP server, so the command configured by the administrator should be: A. dhcp static-bind ip-address 192.168.1.11 24 mac-address 5489-98FB-65D8 B. dhcp server static-bind ip-address 192.168.1.11 mac-address 5489-98FB-65D8 C. dhcp server static-bind ip-address 192.168.1.11 255.255.255.0 mac-address 5489-98FB-65D8 D. dhcp static-bind ip-address 192.168.1.11 mac-address 5489-98FB-65D8 Answer: B 86. Which of the following descriptions about the working process of VRRP is wrong? A. The stabilized Master device will periodically send notification messages B. In the VRRP backup group, the Master device will be elected first according to the VRRP priority C. After the original Master device fails, the new Master device will immediately send ARP packets D. If the Master device fails, the Backup device will immediately switch to the Master device Answer: D 87. Type 7 LSAs are generally not allowed to be transmitted in the backbone area, but the suppress- forwarding-address command can be used to allow Type 7 LSAs to be transmitted in Area 0. A. TRUE B. FALSE Answer: B 88. In 0SPF, using the default-route-advertise command will turn the router into an ABR. A. TRUE B. FLASE Answer: B 89. As shown in the figure, PC1 and PC2 are hosts belonging to the same network segment. Which of the following descriptions about the status of IPv6 neighbors between PC1and PC2 are correct? (Multiple choice) A. If the C address information of PC2 can be queried on PC1, the neighbor relationship may be Stale at this time B. If the C address information of PC2 can be queried on PC1, then the neighbor relationship at this 23 / 37 time is set as Reachable C. There may be five neighbor states between PC1 and PC2, which are Incomplete, Reachable, Stale, Delay and Probe. D. If the MAC address information of PC2 can be queried on the PC, the relationship between the department and the residence may be Probe at this time. Answer: AC 90. As shown in the figure, SW1 and SW2 have just run RSTP and are now performing spanning tree calculation. So, which of the following descriptions about the port synchronization process in the P/A mechanism are correct? (Multiple choice) A. After the ports of SW2 are synchronized, all downstream ports enter the Discarding state B. SW2 receives the RSTBPDU with the Proposal bit set from the root bridge, and starts to put all its ports into the synchronous state C. While each port is synchronized, SW2 will return the response RST BPDU with the Agreement bit set D. When the downstream port of SW2 is synchronized, the status of the AP port remains unchanged Answer: BC 91. Among the following encryption algorithms, which one requires the use of two different secret keys, the public key and the private key? A. AES B. RSA C.DES 24 / 37 D. 3DES Answer: B 92.Which of the following techniques can effectively prevent ARP spoofing attacks? (Multiple choice) A. Strict learning of ARP entries B. ARP packet rate limit C. DAI technology D. ARP entry solidification Answer: AD 93. The output of a certain router is shown in the figure. According to the information analysis in the figure, which one of the following descriptions is correct? A. The reason why there is no DR and BDR in the figure may be that the dr-priority of the peer router is set to 0 B. If the router's neighbor failure time adopts the default configuration and does not receive the Hello packet from the other party within 6 seconds shown in the figure, the state will become Down C. The Hello packet sending interval used by this adjacency is 5 seconds D. The network type used by the router must not be broadcast Answer: D 25 / 37 94.Which of the following characteristics does the IS-IS protocol have? (Multiple choice) A. Fast convergence when the network fails B. Suitable for high-volume routing delivery C. Improve the scalability of the network D. Can provide a loop-free network Answer: ABCD 95. On Huawei equipment, which of the following commands can realize the linkage between BFD and the static default route? A. ip route-static 0.0.0.0 0.0.0.0 10.0.12.2 track 1 B. ip route-static 0.0.0.0 0.0.0.0 10.0.12.2 track session 1 C. ip route-static 0.0.0.0 0.0.0.0 10.0.12.2 track bfd-session 1 D. ip route-static 0.0.0.0 0.0.0.0 10.0.12.2 bfd-session 1 Answer: C 96.In RSTP, many optional protection functions are set to prevent the Layer 2 network from being invaded by malicious users. So which of the following descriptions about TC-BPDU functions are correct? (Multiple choice) A. By default, the time required for the device to process the maximum number of topology change packets is Hello Time B. After this function is enabled, for other TC BPDU packets that exceed the threshold, the device only processes them once after the timer expires C. The anti-TC-BPDU attack function can be configured and enabled on all interfaces D. By default, the maximum number of topology change packets processed by the device within a specified time is 2 Answer: AB 97. In the MSTP protocol, each MST Instance uses the RSTP algorithm alone to calculate a separate spanning tree. A. True B. False Answer: A 98. Which of the following descriptions about IPv6 transition technology is correct? A. The principle of conversion technology is to rewrite the header of IPv6 into the header of IPv4, or rewrite the header of IPv4 into the header of IPv6. Using tunneling technology, IPv4 can be encapsulated in the IPv6 tunnel to achieve intercommunication, but the endpoint of the tunnel Need to support dual stack technology B. Conversion technology is suitable for communication between pure IPv4 network and pure IPv6 network, which is convenient for network management and auditing C. IPv4/IPv6 dual-stack technology has hardware requirements for the device, and two network cards are required to run IPv4/IPv6 respectively Answer: B 99.The VLAN Pool has two algorithms for assigning VLANs, namely sequential assignment and HASH assignment. Which of the following descriptions about these two algorithms are correct? (Multiple choice) 26 / 37 A. When set to the sequential allocation algorithm, the user may change the IP address when going online or offline B. When the HASH allocation algorithm is set, the VLAN will not change when the user goes online or offline C. When the HASH allocation algorithm is set, it may cause uneven user division among VLANs D. When the sequential allocation algorithm is set, VLAN changes may occur when users go online and offline Answer: ABCD 100. Which of the following attributes cannot be directly referenced by the apply statement of router- policy? A. commmunity B. origin C. ip-prefix D. tag Answer: C 101. If two Huawei routers establish a BFD session, and the sending interval of AR1 is 30 milliseconds, and the receiving interval is 40 milliseconds; the sending interval of AR2 is 40 milliseconds, and the receiving interval is 30 milliseconds. Which of the following statements about the post-negotiation time interval is correct? A. After negotiation, AR1 sends at an interval of 40 milliseconds and receives at an interval of 40 milliseconds B. After negotiation, AR2 sends at an interval of 30 milliseconds and receives at an interval of 40 milliseconds C. After negotiation, AR1 sends at an interval of 30 milliseconds and receives at an interval of 30 milliseconds D. After negotiation, AR2 sends at an interval of 40 milliseconds and receives at an interval of 30 milliseconds Answer: D 102. Which of the following statements about stacked MAD detection is wrong? A. When the stacking systems act as agents for each other to perform MAD detection, the two stacking systems can use the same Domain ID B. MAD detection methods are divided into direct connection detection and proxy detection C. MAD proxy detection requires that all stack member Betta proxy devices are connected, and the connected links are added to an Eth -Tunk D. MAD direct connection detection can use the full-mesh method through the intermediate device leaf Answer: A 103. Through the following display commands, by which of the following you can judge whether the switch loop failure is caused? A. [CE02]displaytrapbuffer Pleasecheckthenetworkaccessedtoflappingport B. [CE02]displaycpu-usage C. [CE02]displaycpu-defendstatistics D. [CE02]displayinterfacebriefincludeup Answer: A 27 / 37 104. A certain router runs IS-IS. The figure below shows the Hello message sent by the router. Which of the following statements is correct? (Multiple choice) A. The System ID of the router is 0050.0600.7008 B. The interface address of the router is 10.6.7.5 C. The area number of the router is 00.0001 D. This router is a LEVEL-1-2 router Answer: AC 105.In a broadcast network, IS-IS establishes a neighbor relationship through _______ handshakes. (Arabic numerals) Answer: 3 106. If roaming is implemented between two APs, the same security policy must be met. The 28 / 37 forwarding mode and the same () (if English words are involved, please use uppercase) Answer: SSID 107.Which of the following descriptions about AC roaming groups is wrong? (Multiple choice) A.The AC in the roaming group needs to deploy a Master Controller B. AC can act as the roaming group server of multiple roaming groups, and at the same time, it can join multiple roaming groups C. The Master Controller must be the AC in the roaming group D. STAs can roam only between ACs in the same roaming group Answer: BD 108. Which of the following LSA descriptions about various messages is wrong? A. DD only contains the summary information of the LSA, which includes LS Type LS ID Advertising Router and LS Sequence Number B. The LSACK message contains complete LSA information C. LS Update message contains complete LSA information D. LS Request message only has LS Type LS ID and Advertising Router Answer: B 109. Idle 110. Which of the following IEEE 802.11 standards corresponds to Wi-Fi6? A. 802.11ac B. 802.11b C. 802.11n D. 802.11ax Answer: D 111. In the Portal authentication scenario based on MAC priority, when the user successfully completes Portal authentication and disconnects from the network within a certain period and reconnects, he can directly access through MAC authentication without entering the username and password to perform Porta1 authentication again. A. True B. False Answer: A 112. Which of the following tools is used to filter routing information and set routing attributes for filtered routing information? A. route-policy B. as-path-filter C. policy-based-route D. IP-prefix Answer: A 113. Which of the following states represents the established connection between peers in BGP? A. Open 29 / 37 B. Established C. Active D. Connect Answer: B 114. If a modular switch only supports the cluster card on the main control board to establish a cluster connection, it means that the modular switch uses the CSS2 stacking technology. A. True B. False Answer: B 115. Which of the following description of the information contained in the OPEN message in EGP is wrong? A. The OPEN message contains the local AS number information B. VERSION information is included in the OPEN message C. The OPEN message contains the Hold time message D. The OPEN message only contains the BGP message header Answer: D 116. As shown in the figure, there is part of the information output by the current ATE of the router. In the following description of this part of information, which one is wrong? 30 / 37 A. The display pin p-info command is used to view the RP information corresponding to the multicast group B. The RP address is 2.2.2.2 C. The group address is 225.0.0.0 D. The priority of RP is 0 Answer: C 117.IGMP Snooping mainly solves the problem of: A. Legality of IGMP Report messages B. There are many receiver hosts on the network segment, and the router will receive many IGMP Report messages. C. Solve the problem of broadcasting multicast data packets on Layer 2 devices, and use them to manage and control the forwarding of multicast data packets D. The receiver host only supports the IGMPv2 protocol, but the SSM multicast model is used in the network Answer: C 118. A certain router runs IS-IS and its output information is shown in the figure. Which of the following statements is correct? (Multiple choice) A. The S4/0/0 interface of this router has established the neighbor relationship of Level1-1 and Level-2 at the same time B. The S4/0/0 interface of this router only establishes the neighbor relationship of Level1-1 C. The GE0/0/0 interface of this router has established the neighbor relationship of Level1-1 and Level1-2 at the same time D. The GE0/0/0 interface of this router only establishes the neighbor relationship of Level1-1 Answer: AC 119.Which of the following descriptions about the packet authentication method in IS-IS are correct? (Multiple choice) A. Plaintext authentication is to directly add the password to the message, which is very low in security. B. Keychain authenticates the password list that changes over time to further enhance the security of the network C. IS-IS carries authentication information in the form of TLV, and the authentication TLV type is 2 D. MD5 authentication can add the configured password to the message after performing the MD5 31 / 37 algorithm, which improves the security of the password Answer: ABD 120. Which of the following OSP F messages carries master-slave relationship information? A. LSA Update message B. LSA Request message C. D. D message D. Hello message Answer: C 121. What are the key components of building an IP wide-area bearer network solution together with Huawei NetEngine intelligent routers? A. iMaster NCE-Fabric B. iMaster NCE-IP C. iMaster NCE-Campus D. iMaster NCE-WAN Answer: D 122. Among the routing policy tools commonly used in BGP, the one that can be used to match a specific AS_path is: A. filter-policy B. ip-prefix C. ip as-path-filer D. community-filter Answer: C 123. The prefix list (IP-Prefix List) can match the IP address prefix length and mask length at the same time because it has three parameters: less-equal-value, mask-length and greater-equal-value, so which of the following can correctly describe the relationship between these three parameters? A. less-equal-value<=mask-length<=greater-equal-value<=32 B. mask-length<=greater-equal-value<=less-equal-value<=32 C. mask-length<=less-equal-value<=greater-equal-value<=32 D. greater-equal-value<=less-equal-value<=mask-length<=32 Answer: B 124. Two routers R1 and R2 are directly connected and want to establish an OSPF adjacency relationship. R1 uses MD5 port authentication, and R2 uses MD5 area authentication. If the passwords are the same, the two devices can establish an OSPF adjacency relationship. A. TRUE B. FALSE Answer: A 125. Which of the following parameters does the configuration BPDU message of the STP protocol not contain? A. Port ID 32 / 37 B. VLAN ID C. Bridge ID D. Root ID Answer: B 126.Which of the following descriptions about the four forwarding models of WLAN roaming traffic are correct? (Multiple choice) A. The difference between direct forwarding in Layer 3 roaming and tunnel forwarding in Layer 3 roaming is whether the packet needs to be returned to the HAP B. There is no difference between direct forwarding in layer 2 roaming and tunnel forwarding in layer 2 roaming, both are forwarded directly in the local network of FAP or FAC C. During the forwarding of the Layer 3 roaming tunnel, if the STA wants to access the atomic network, it needs to return the message to the HAP D. The difference between Layer 2 roaming forwarding and Layer 3 roaming forwarding is whether the subnet before and after STA roaming is the same subnet Answer: ACD 127. In the state detection firewall, when the state detection mechanism is enabled, when the second message (SHN+ACK) of the three-way handshake reaches the firewall, if there is no corresponding session table on the firewall, then which of the following statement is correct? A. If the firewall security policy allows the packet to pass through, create a session table B. By default, after the status function is turned off, and the allow policy is configured, it can pass C. The message must pass through the firewall and establish a session table D. If the firewall security policy allows the packet to pass through, the packet can pass through the firewall Answer: B 128.Which of the following steps or actions are step-by-step in a structured network troubleshooting process? (Multiple choice) A. Contingency plans B. Rollback preparation C. Temporary environment construction D. Information filtering Answer: AB 129.Which of the following descriptions about BGP, OSPF, IS-IS, and RIP is correct? A. The port number used by the BGP neighbor relationship based on the UDP session is 179 B. RIP runs on the basis of UDP sessions, and the port number used is 520 C. IS-IS runs onthe basis of the IP protocol, using the protocol number 89 D. OSPF runs on the basis of the IP protocol and uses the protocol number 88 Answer: B 130.Different types of LSAs have different functions. Which of the following LSAs can only be spread within a single area? (Multiple choice) A. Network Summary LSA B. Router LSA C. Network LSA 33 / 37 D. AS-External-LSA Answer: BC 131. The IPv6 address 2001:FC1A:8BAD:0112:0000:1200:0001/64 is abbreviated to 2001:FC1A:8BAD:112:0:1200::1/64. A. TRUE B. FALSE Answer: B 132. The Stub area and Totally Stub area of OSPF solve the problem caused by maintaining an excessively large LSDB in the end area, but they are not the best solution for some specific scenarios. A. TRUE B. FALSE Answer: A 133. Which of the following characteristics meet the following conditions. A BCP router may not support these attributes, but it will still receive such attributes and pass them on to other peers. (Multiple choice) A. Commmnity B. Ageregator C. Multi_Exit_Disc D. Local_Pref Answer: AB 134. In different scenarios, RSTP provides different protection functions. Which of the following statement is wrong? A. After the BPDU protection function is enabled on the switching device, if the edge port receives RST BPDU, the edge port will be set as a non-edge port, and the spanning tree calculation will be performed again B. After the anti-TC-BPDU message attack function is enabled, the number of times the switching device processes TC BPDU messages within a unit time is configurable C. The designated port with the root protection function enabled, its port role can only remain as the designated port D. The designated port with root protection enabled, when the port receives a better RSTBPDU, the port will enter the Discarding state and no longer forward packets. If the port does not receive a better RST BPDU for a period, it will automatically return to the normal Forwarding state Answer: A 135. Which of the following descriptions about 0SPF Stub area and Totally Stub area is wrong? A. The E-bit bit in the Hello message sent by the routers in the Stub area is 0, and they will process the data packet with the E-bit 1 B. The Totally Stub area does not allow S external routes to propagate in the area, nor does it allow inter-area routes to propagate in the area C. Access to other areas between the Totally Stub area is achieved through the default route delivered by 8 photos in this area D. A default route will be generated in the Stub area to ensure that the Stub area can reach the 34 / 37 outside of the AS Answer: A 136.As shown in the figure, a return summary route 10.0.0.0/24 is configured on the border route RT1, the next hop points to RT2, and a default route to the external network is configured at the same time. At this time, a routing black hole will appear. Which of the following statements are correct about the routing black hole? (Multiple choice) [Extranet]--AR1--AR2----SW1-PC1/PC2 (10.1.1.1-2/24) A. Precise routing summary can avoid routing black holes B. Configuring black hole routing can solve the routing black hole problem C. If a terminal in the network sends a data packet to a network segment that does not appear on the internal network, a loop will occur D. Routing black holes have no impact on the network and can not be dealt with Answer: ABC 137. Which of the following descriptions about the Keepalive message in BGP is wrong? A. Keepalive messages are mainly used to maintain the connection between BGP peers B. The Keepalive message contains only one BGP data header C. By default, the Keepalive interval is 180 seconds D. Keepalive messages are periodically sent between two BGP neighbors Answer: C 138.Regarding boundary security optimization, which of the following options are correct? (Multiple choice) A. The purpose is to prevent/reduce external cyber attacks and harm B. The optimization location is usually at the network boundary C. Optimization methods include attack prevention technology, packet filtering technology, hardware firewall, etc. D. The purpose is to achieve user security access control Answer: ABC 139. In order to adapt to the application of the data center, what new features have been developed by the switch?(Multiple choice) A. MSTP B. TRILL C. NFV D. FCOE Answer: BCD 140. Regarding the description of the Hello message in PIM-SM, the error is: A. The routers periodically use Hello messages to keep in touch B. In the PIM-SM network, the newly started multicast router needs to use Hello messages to discover neighbors and maintain neighbor relationships C. Hello packets are sent to the multicast address 224.0.0.5 D. Elect DR in multi-router network segment through Hello message Answer: C 35 / 37 141. The four routers run lS-IS and have established adjacency. The area code and the level of the router are marked in the figure. Which of the following statements is correct? A. The LSP of R4 does not exist in the LSDB of router R1 B. The LSP of R3 does not exist in the LSDB of the R2 router C. The LSP of R4 does not exist in the LSDB of R3 router D. The LSP of R4 does not exist in the LSDB of the R2 router Answer: A 142.In OSPF, the AS boundary router can be Internal Router or ABR, but it must belong to the backbone area. A. TRUE B. FALSE Answer: B 143. In PIM-SM, the wrong description about RP is: A. The initial multicast streams of all groups in the shared tree are forwarded to the receivers through the RP B. One RP can provide multiple multicast services at the same time, and one multicast group can correspond to multiple RPs C. RP can be responsible for the forwarding of several or all multicast groups, and there can be one RP in the network D. All the members of the group and the multicast sources that send multicast data to the group converge to the only RP Answer: B 144.ACL can be divided into which of the following categories? (Multiple choice) A. User-defined ACL B. Basic ACLs C. Layer 2 ACL D. Advanced ACLs Answer: ABCD 145. As shown in the figure, the IS-IS neighbor relationship is established between the two routers. Which of the following description about the process of establishing the neighbor relationship is correct? (Multiple choice) 36 / 37 A. In this broadcast network, R1 and R2 use a three-way handshake to establish an adjacency relationship B. In the broadcast network, the DIS needs to be elected. After the adjacency relationship is established, the router will wait for the interval between two Hello messages before electing the DIS. C. R2 marks the adjacency state as Initial after receiving the IIH message sent by R1. Then, R2 replies to R1 with Level-1LANIIH, which identifies R1 as the adjacency of R2 D. In Down state, R1 unicast sends Level-1LANIIH, and the adjacency list in this message is empty Answer: ABC 146. The output information of a router is below, which is correct about this information? A. The MED value of the route to the destination network 5.1.1.0/24 is 50 B. The MED value of the route to the destination network 1.1.1.0/24 is 100 C. The next hop of the route to the target network 5.1.1.0/24 is 1.1.1.1, and the route is optimal D. The next hop of the route to the target network 1.1.1.0/24 is 1.1.1.1, and the route is optimal Answer: C 147. If you want to realize communication between different protocols, you can only use the method of routing import. A. TRUE B. FALSE Answer: B 37 / 37
Compartilhar