Buscar

Huawei H12-821_V1.0-ENU Exam Questions and Answers

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes
Você viu 3, do total de 37 páginas

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes
Você viu 6, do total de 37 páginas

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes
Você viu 9, do total de 37 páginas

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Prévia do material em texto

Dumpsinfo is a good website providing the latest exams information and dumps
questions for all hot IT certification exams, such as Microsoft, Cisco, Huawei, 
IBM, VMware, Fortinet, and so on.
Features of Dumpsinfo’s products
Instant Download
Free Update in 3 Months
Money back guarantee
PDF and Software
24/7 Customer Support
Besides, Dumpsinfo also provides unlimited access. You can get all Dumpsinfo
files at lowest price.
HCIP-Datacom-Core Technology V1.0 H12-821_V1.0-ENU exam free dumps
questions are available below for you to study. 
Full version: H12-821_V1.0-ENU Exam Dumps Questions
1.L2TP is a virtual private dial-up network VPDN (Virtual Private Dial-up Network) tunnel protocol. It is
a VPN that provides access services for employees on business trips or corporate branches to
remotely access corporate intranet resources in remote office scenarios, and runs on the network
layer of the TCP/IP protocol stack.
A. TRUE
B. FALSE
Answer: B
2. Network administrator A wants to use ACL to match only the four routing entries 1, 3, 5, and 7 in
the figure. How many ACL rules does network administrator A need to configure at least?
1 10.0.1.0/242 10.0.2.0/243 10.0.3.0/244 10.0.4.0/245 10.0.5.0/246 10.0.6.0/247 10.0.7.0/24
A. 2
B. 3
 1 / 37
https://www.dumpsinfo.com/vendors/microsoft/
https://www.dumpsinfo.com/vendors/cisco/
https://www.dumpsinfo.com/vendors/huawei/
https://www.dumpsinfo.com/vendors/ibm/
https://www.dumpsinfo.com/vendors/vmware/
https://www.dumpsinfo.com/vendors/fortinet/
https://www.dumpsinfo.com/unlimited-access/
https://www.dumpsinfo.com/exam/h12-821_v1-0-enu
C. 1
D. 4
Answer: C
3.In the VRP system, which of the following parameters can the Route-Policy match? (Multiple
choice)
A. Access Control List
B. Prefix list
C. Outgoing interface of routing information
D. Routing cost
Answer: ABCD
4.The output information of a certain router is shown in the figure
<R1>display ospf peer
OSPF Process1 with Router ID 10.0.2.2
Neighbors
Area 0.0.0.0interface10.0.12.2 ( GigabitEthernet0/0/0 ) s neighbors
Router ID:10.0.1.1 Address:10.0.12.1
State: Full Mode: Nbr is Slave Priority:1
DR:10.0.12.2 BDR:10.0.12.1MTU:0
Dead timer due in 32sec
Retrans timer interval:5
Neighbor is up for 00:03:30
Authentication Sequence: [o]
Which of the following options are correct? (Multiple choice)
A. Router ID is l0.0.1.1
B. Router ID is 10.0.2.2.
C. The router's connection address is 10.0.12.2.
D. This router is the DR.
Answer: BCD
5. It can be used in a variety of routing protocols. The routing selection tool consisting of if-match and
apply clauses is:
A. route-policy
B. IP-Prefix
C. commnityfilter
D. as-path-filter
Answer: A
6. The routes injected through the Network method in BGP do not necessarily have to be routing
entries that exist in the IP routing table, and this method of injecting routes is more accurate.
A. TRUE
B. FALSE
Answer: B
7. If the two interfaces of the fire protection block are divided into the same area, then the data
packets flowing between the two interfaces do not need to be processed by packet filtering and are
 2 / 37
directly forwarded.
A. TRUE
B. FALSE
Answer: B
8.When the BGP routing protocol is configured on the network, you can see a routing entry by using
commands on the router to view the BGP routing table, but you cannot find the BGP route in the
global routing table of the router. What are the possible reasons? (Multiple choice)
A. The AS-PATH of the BGP route contains its own ASID
B. bgp-rib-only is used on the BGP router
C. There are other routing entries with higher priority in the global routing table
D. The next BGP route is unreachable
Answer: ABCD
9.Regarding the use of the network management system, which of the following options are correct?
(Multiple choice)
A. The network management software has an alarm management function, such as the UP/DOWN
change of the device port, which can be immediately fed back to the network management software
through the TRAP message, so that the network administrator can discover and deal with network
faults in time
B. The network management software has performance management functions. The network
management software can automatically perform routine collection and statistics on the CPU and
memory occupancy of the device, and can assist the network administrator to analyze the network
performance bottleneck
C. The network management software has configuration file management functions, which can
automatically backup, compare, and restore configuration files. Allows network administrators to
automatically back up configuration files in batches
D. The network management can regularly output reports according to user needs, providing
reference for later network optimization
Answer: ABCD
10.Which of the following attack methods are fragmented packet attacks? (Multiple choice)
A. Syndropl attack
B. Huge number of fragment attacks
C. Huge offset attack
D. UDP Floodi attacks
E. Tear Drop: Attack
F. Smurf attack
Answer: BC
11. When dual-link hot standby is configured in a WLAN group, the AP will establish CAPWAP links
with the active AC and the backup AC respectively.
A. TRUE
B. FALSE
Answer: A
12. The router receives two BGP routes containing the following attributes, please select the optimal
 3 / 37
route according to the BGP route selection rules.
A. The optimal route is route M, because its AS_Path is shorter than route N
B. The optimal route is route N, because its MED is smaller than route M
C. The optimal route is route N, because its AS_Path is longer than route N
D. The optimal route is route M, because its MED is larger than route N
Answer: A
13.Which of the following statements about IGMPv2 routers maintaining segment group membership
are correct? (Multiple choice)
A. After receiving the Leave message, the router immediately removes the members of the group
B. The router queries for a specific group
C. The router maintains a timeout timer for each group membership
D. After the router sends a general group query message, all receivers need to respond within the
maximum response time
Answer: BC
14. Which of the following BGP attributes will not be advertised to neighbors along with BGP Update
packets?
A. Next_Hop
B. Preferred-Value
C. Origin
D. AS_Path
Answer: B
15. Similar to 0SPF, the two routers establishing a BGP peer relationship must be directly connected.
A. TRUE
B. FALSE
Answer: B
16.EVPN is a VPN technology that can only provide Layer 2 network interconnection.
A. True
B. False
Answer: B
17. Cutover rollback refers to rolling back the current change to the state before execution.
A. TRLE
B. FALSE
Answer: A
 4 / 37
18.Which of the following descriptions about Policy-Based-Routing and Routing-Policy are correct?
(Multiple choice)
A. The deployment of the routing policy is based on the forwarding plane and will not affect the
routing table entries
B. After the device receives the message, the policy routing will first search for the policy for matching
and forwarding. If the match fails, it will search the routing table for forwarding
C. Routing policies can only be formulated based on source addresses
D. Policy routing can formulate policies based on parameters such as source and destination IP
addresses, protocol types, and packet sizes
Answer: BD
19. The output of a device viewing LSDB is shown in the figure. According to the content analysis in
the figure, what information can we obtain? (Multiple choice)
A. The LSA 10.1.0.4 has survived on this router for 875 seconds
B. Router 4.4.4.4 belongs to Guqian District City
C. Route summarization is not used in the entire OSPF domain
D. Router 1.1.1.1 belongs to the non-backbone area
E. Router 2.2.2.2 is an ASBR, but does not belong to the same area as 4.4.4.4
Answer: ADE
 5/ 37
20. The AS border router can be an internal router R or an ABR, and must belong to the backbone
area.
A. TRUE
B. FALSE
Answer: B
21.A campus deploys OSPF to implement network interworking, and GE0/0/2 of R3 also enables
OSPF. Among them, Area1 is deployed as an NSSA area, and the addresses of each device are
shown in the figure. An engineer configures a static route on R3 to access the loopback interface
address of R4, and imports the static route into the OSPF process. At this time, in the Type5 LSA
received by R1, the forwarding address (FA) is _____. (Note: Please fill in the IP address without
masking)
Answer: 10.1.12.2
22.Which statement about IP address allocation is correct? (Multiple choice)
A. Unless AnyCast is used, the IP address of the entire network must remain unique!
B. The IPv4 address space is divided into three types: ABC
C. When assigning addresses, if the system uses a /24-bit mask length, the network design can be
simplified
D. In order to improve the efficiency of the use of IP addresses, we generally use VLSM to determine
the mask length as needed
Answer: AD
23.As shown in the figure, R1 and R2 form a VRRP backup group 1. By executing the vrrp vrid 1
virtual-ip ( ) command on R1, it can become the owner of the IP address, so that R1 is the Master and
R2 is the Backup.
 6 / 37
Answer: 192.168.1.254
24.There are many differences between data center switches and ordinary campus switches. Which
of the following features are available in data center switches but not supported by campus switches?
(Multiple choice)
A. MSTP
B. TRILL
C. NFV
D. FCOE
E. VXLAN
Answer: BDE
25. Which of the following descriptions about the different classifications of PBR is correct?
A. Interface PBR can modify the IP-Precedence of IP packets
B. Local PBR is invalid for the original message, and only works for the forwarded message
C. The interface PBR is called under the interface, and it takes effect on the outbound packets of the
interface.
D. PBR can be divided into interface PBR, local PBR and routing PBR
Answer: D
26.SSH has negotiated multiple algorithms during the implementation process, so which of the
following algorithm categories are used by SSH? (Multiple choice)
A. The key exchange algorithm used to generate the session key
B. Algorithms for Data Integrity Protection
C. Spanning tree algorithm for preventing communication loops
D. Algorithms used for data encryption
E. Host Public Key Algorithms for Digital Signature and Authentication
F. Shortest Path Algorithm for Determining the Shortest Communication Path
Answer: ABDE
27. In route-policy, what are the BGP attributes that can be used in the apply clause? (Multiple
choice)
A. MED
B. AS-Path
C. Tag
D. Local-Preference
Answer: ABD
28. The port role that cannot be in the forwarding state in RSTP is? (Multiple choice)
A. Alternate Port
B. Designated Port
C. RootPort
D. Backup Port
Answer: AD
 7 / 37
29. Which function does the switch control plane not include?
A. Business processing
B. Routing operation
C. System loading
D. Traffic Statistics
Answer: C
30.In BGP, MED is mainly used to influence BGP route selection between ASs. The smaller the MED
attribute value is, the better the BGP route is. By default, the BGP MED value of Huawei devices is (
). (Please fill in the Arabic numerals)
Answer: 0
31. Which of the following statements about different types of firewalls is wrong?
A. A stateful inspection firewall needs to be configured with security policies for the "go" and "return"
directions of packets
B. Packet filtering firewall for each data packet passing through the firewall, an ACL matching check
is performed
C. Proxy firewall acts as a proxy for business between internal network and external network users
D. The state inspection firewall only checks the security policy for the first packet that does not hit the
session
Answer: A
32. Which of the following descriptions about the OSPF Stub area is wrong?
A. If an area is to be configured as a Stub area, all routers in the area must be configured with Stub
area attributes
B. Virtual connections cannot exist in the stub area
C. ASBRs cannot exist in the stub area, that is, routes outside the autonomous system cannot be
propagated in the stub area
D. The backbone area (Area0) cannot be configured as a stub area
E. The cost of the default route sent to the Stub area cannot be configured
Answer: E
33. Regarding the command description of OSP, which is wrong? (Multiple choice)
A. The difference between OSPF v2 and OSPF V3 interface configuration commands is that OSPF v2
can use the network command, while OSPF v3 can be directly enabled on the interface
B. The stub router command is used to configure the secondary router as a Stub router, and the stub
router can form a neighbor relationship with a non- stub router
C. There is no need to use router-id in OSPF v3 configuration, the configuration method is the same
as OSPF v2
D. The no-summary parameter is configured for the stub area and the totally stub area
Answer: BCD
34. A company often has employees who need to go on business trips, so they often need to
remotely access the company's internal network for office work.
Which of the following technologies can achieve this requirement?
A. ISDN Dial-in
B. IPSec VPN
 8 / 37
C. NPLS VPN
D. SSL VPN
Answer: D
35. Which of the following BGP routing attributes is not a recognized attribute?
A. AS_ PATH
B. Origin
C. MED
D. Local_Pref
Answer: C
36.Which of the following descriptions about RP in PIM-SM are correct? (Multiple choice)
A. Only static RPs can specify which multicast groups the RP provides services for
B. Dynamic election of RP will involve two types of roles C-BSR and C-RP
C. RP is used to process source DR registration information and group member joining requests
D. Not all PIM routers in the network must know the address of the RP
Answer: BC
37. Routers R1 and R2 are directly connected through GigabitEthernet0/0/0 respectively, and try to
establish an OSFP neighbor relationship, but the neighbor relationship has not been successfully
established. The troubleshooting process is shown in the figure.
 9 / 37
 10 / 37
So which of the following operations can make R1 and R2 neighbor management established
normally?
A. [R2] ospf 1 [R2-0spf-1] ara0
[R2-ospf-1-area-0.0.0.0] timer hello 10
B. [R2] interface GigabitEthernet 0/0/0
[R2-GigabitEtherneto/0/0] undo ospf timer hello
C. [Relintertace GigabitEthernet 0/0/0
[R2-GigabitErhernet0/0/0] ospf timer hello 20
D. [R2] ospf 1 [R2-ospf-1] area0
[R2-ospf=1-area-0 , 0.0.0lundotimer hello
Answer: C
38.What are the factors that cause traffic interruption after a network failure? (Multiple choice)
A. Fault Propagation Time
B. Routing Loops
C. Response time to a single device failure (table item update)
D. Fault detection time
Answer: ABCD
39. In IS-IS, setting which of the following flags means that although the LSP will still spread in the
network, the LSP will not be used when calculating the route through the overloaded router?
A. OL
B. Checksum
C. ATT
D. P
 11 / 37
Answer: A
40. When a large number of IP phones and WLAN APs need to be accessed in the network, which
function switch do we generally consider to choose?
A. A switch with STP edge port function
B. A switch with POE function
C. A switch with SACG function
D. A switch with QOS function
Answer: B
41.What problems should an engineer check before the equipment is installed and powered on?
(Multiple choice)
A. Whether the signal cable has been correctly installed and bundled according to the approved
specifications
B. Whether the device is connected according to the planned topology
C. Whether the ground wire has been installed correctly according to thespecification
D. Whether the power cord has been correctly installed according to the specification
Answer: ABCD
42.In PIM-DM, the multicast data will be spread across the network periodically by default ( ) seconds.
The main purpose of the periodic spread is to detect whether there are new members joining the
group. (Please fill in the Arabic numerals)
Answer: 180
43. Which of the following statements about the OSPF protocol is wrong?
A. The OSPF protocol supports area division
B. OSPF supports load balancing for equal-cost routes
C. OSPF packets are encapsulated in IP packets and can be sent in the form of unicast or multicast
D. OSPF is a link state based exterior gateway protocol
Answer: D
44.Which of the following descriptions about the OriginatorID attribute in BGP are correct? (Multiple
choice)
A. OriginatorID is a recognized arbitrary attribute
B. If there are multiple RRs in As, the OriginatorID attribute is created by the first RR
C. When a route is reflected by RR for the first time, RR adds the OriginatorID attribute to this route to
identify the originating router of this route
D. When other BGP Speakers receive this route, they will compare the received OriginatorID with the
local RouterID. If the two IDs are the same, BGPSpeaker will ignore this route and do not process it.
Answer: BC
45. OpenSent
A. 3-1-2-5-4
B. 1-3-5-2-4
C. 3-5-1-2-4
D. 3-1-5-2-4
 12 / 37
Answer: D
46. Which of the following information is carried in the BGP OPEN message? (Multiple choice)
A. Routing attributes
B. BGP Router ID
C. Hold time
D. Local Autonomous System (AS) number
Answer: BCD
47. Regarding the OSPF multi-process description, the error is:
A. Multiple different OSPF processes can run on the same router, and they do not affect each other
and are independent of each other
B. An interface of a router can only belong to one OSPF process
C. The routing interaction between different OSPF processes is equivalent to the routing interaction
between different routing protocols
D. Different OSPF routers establish neighbors, and the process numbers must be the same
Answer: D
48. As shown in the figure, all three switches run the RSTP protocol, so which one of the following
descriptions about the topology convergence process is correct?
A. The upstream link port of SW2 will immediately enter the Forwarding state after receiving the
RSTBPDU with the Proposal bit set from 5W1.
B. When the network is initialized, the ports of all the switches in the figure are designated ports and
are in the Discarding state
C. The edge port of SW3 will immediately enter the Forwarding state after a round of P/A mechanism
D. The device interconnection port of the downstream link quickly enters the Forwarding state through
the P/A mechanism
Answer: B
 13 / 37
49.Which of the following statements about DHCP Server denial of service attacks are correct?
(Multiple choice)
A. DHCP denial of service attacks consume address resources by continuously modifying the
CHADDR field in the DHCP request message
B. DHCP denial of service attacks will quickly exhaust the IP address resources in the DHCP address
pool
C. After the DHCP server address resources are exhausted, it will no longer process and respond to
DHCP request messages.
D. DHCP denial of service attack consumes address pool resources by controlling a large number of
terminals to send address request messages at the same time
Answer: ABC
50.What are the three ways of sending IPV4 packets? (Multiple choice)
A. Anycast _
B. Multicast
C. Unicast
D. broadcasting
Answer: BCD
51. Three elements of the Server map table of the USG series firewall, excluding
A. Destination port number
B. Agreement number
C. Destination IP
D. Source lP
Answer: D
52. Confirm failure
53. When configuring dual-link hot backup, the engineer configures the CAPWAP heartbeat detection
interval to be 20 seconds, and enables the dual-link backup function, then the time when the AP
detects that the primary link times out and performs active-standby switchover?
A. 75 seconds
B. 20 seconds
C. 60 seconds
D. 90 seconds
Answer: C
54. Which of the following option packets belong to OSPF protocol packets? (Multiple choice)
A. Hello
B. LSU
C. LSA
D. LSR
Answer: ABD
55.Trunk ports can allow multiple VLANs to pass through, including VLAN4096.
A. True
B. False
 14 / 37
Answer: B
56. The shortest path from the multicast source to the receiver is called the shortest path tree SPT.
A. TRUE
B. FALSE
Answer: A
57. The configuration of the two routers is shown in the figure, and they can establish OSPF
adjacency.
A. TRUE
B. FALSE
Answer: A
58. The BFD version number supported by the VRP version is:
A. version 3
B. Version 2
C. Version 1
D. Version 4
Answer: C
59. From the topology shown in the figure and the configuration on the interconnection port of the
switch, it can be judged that the data frame tagged with VLAN10 can be forwarded normally between
 15 / 37
the two switches.
A. True
B. False
Answer: B
60. By default, which of the following is the MED attribute value in Huawei equipment BGP?
A. 180
B. 0
C. 100
D. 10
Answer: B
61. To implement the traffic filtering function, you can use traffic-flter or MQC. Compared with traffic-
filter, MQC can be called in more views.
A. True
B. False
Answer: A
62. A switch will join the stack system, so the stack ID is manually configured to be 2 in advance, but
after joining the stack system, the stack system assigns the stack ID to the switch to be 3 , and the
GE0/0/2 interface of the switch is added to the stack system The interface number is GE___ .
Answer: 3/0/2
 16 / 37
63.In the MSTP domain, multiple spanning trees can be generated based on instance calculations,
and each spanning tree is called an MSTI. Which of the following descriptions about MSTI is correct?
(Multiple choice)
A. Each MSTI can share parameters to calculate its own spanning tree
B. The role and status of each port on different MSTIs can be different
C. The spanning tree of each MSTI can have different roots and different topologies
D. The spanning tree parameters of each port on different MSTIs can be different
Answer: BCD
64. In the inter-domain report filtering, which option of the following is in the outbound direction?
A. trust―untrust
B. untrust―dmz
C. trust―local
D. untrust―trust
Answer: A
65. Using the IP prerequisite list shown in the figure for route matching, which of the following routes
can be matched?
ip ip-prefix List1 index 10 permit 192.168.1.0 24 greater-equal 24 less-equal 27
A. 192.168.2.0/24
B. 192.168.3.0/25
C. 192.168.1.0/27
D. 192.168.1.0/23
Answer: C
66. As shown in the figure, the four switches have run the RSTP protocol and completed the
calculation of the spanning tree.
 17 / 37
So, which of the following descriptions about port roles are correct? (Multiple choice)
A. The G0/0/2 port of SW2 is the AP port, and the G0/0/2 port of SW3 is the DP port
B. The G0/0/1 port of SW4 is the AP port, and the G0/0/2 port of SW4 is the RP port
C. The G0/0/2 port of SW2 is the DP port, and the G0/0/2 port of SW3 is the AP port
D. The G0/0/1 port of SW4 is the RP port, and the G0/0/2 port of SW4 is the AP port
Answer: CD
67.There is an existing wireless access controller as a DHCP relay. If the DHCP client cannot
dynamically obtain an IP address, which of the following reasons may be the cause? (Multiple choice)
A. In the global view of the wireless access controller, the DHCP server function is not enabled
B. In the interface view of the wireless access controller, no dhcp select relay is configured
C. In the global view of the wireless access controller, no DHCP server group is bound
D. In the interface view of the wireless access controller, no proxy DHCP server is specifiedAnswer: ABCD
68.Which of the following types of protocols can BGP inject into the BGP routing table through the
import-route command? (Multiple choice)
A. Static routing
B. Direct routing
 18 / 37
C. IS-IS Routing
D. OSPF routing
Answer: ABCD
69. The FIB table is located on the data plane of the router, and each forwarding table entry specifies
information such as the outgoing interface and the next-hop IP address to reach a certain destination.
Which of the following meanings does the B field in FLAG represent?
A. Static routing
B. Black hole routing
C. Available routes
D. Gateway routing
Answer: B
70. In the hardware module of the frame type equipment, which of the following modules provides
high-speed non-blocking data channels and realizes the business exchange function between various
business modules?
A. MPU
B. LPU
C. MPUs and LPUs
D. SFU
Answer: D
71. If the router-id is configured in both the system view and the BGP view, BGP uses the router-id in
the BGP view because the BGP view has a higher priority.
A. True
B. False
Answer: A
72.Which of the following are the advantages of building a campus network using stacking and
clustering technologies? (Multiple choice)
A. Business interruption time is greatly reduced
B. Simplify network management and reduce the complexity of network deployment planning
C. Can effectively reduce network power consumption
D. Prompt utilization of network devices and links
Answer: ABD
73. The following is part of the output information of the router RTD. Which of the following description
of the output information is wrong?
<RID>display igmp-snooping IGMP Snooping Information for VLAN 3
IGMP Snooping is Enabled
IGMP IP Version is Set to default 2
IGMP Query Interval is Set to default 60
IGMP Max Response Interral is Set to default 10
IGMP Robustress is Set o default 2
IGMP Lase Weniber Query Interval is Set to defauit 1
IGMP Router Port Aging Interval is Set to 180s or holdtime in hello
A. The version of the IGMP message that can be processed in VLAN3 is the default value
 19 / 37
B. The display igmp-snooping command is used to view the IGMP Sooping configuration information
on the VLAN
C. The maximum response time of IGMP in VLAN3 is the default value, which is 60 seconds
D. IGMP Snoping of VLAN3 is enabled
Answer: C
74. Which of the following descriptions about OSPF is correct?
A. The DD message does not necessarily carry link state summary information. At this time, the DD
message can be used to negotiate the master-slave relationship
B. The destination address of the Hello packet is 224.0.0.5 and 224.0.0.6
C. Only LS Update and LS Request messages carry complete LSA information
D. After the ospf mtu-enable command, OSPF will check the MTU length in the LSU, if it is
inconsistent with the MTU length in the message sent by itself, the device will remain in the Exchange
state
Answer: A
75. In order to avoid inter-area loops, OSPF regulations do not allow routing information to be
published directly between two non-backbone areas, and only allow routing information to be
published within an area or between a backbone area and a non-backbone area. Therefore, each
area border router (ABR) must be connected to the backbone area.
A. True
B. False
Answer: A
76.Which of the following reasons may cause the failure to establish a BGP neighbor relationship?
(Multiple choice)
A. Neighbor configuration information is wrong
B. IP route unreachable
C. Fiber optic cable break
D. Disable TCP179 port number
Answer: ABCD
77. In the switching network shown in the figure, all switches run the STP protocol. When the topology
is stable, modifying the sending cycle of the configuration BPDU on which of the following switches
can affect the sending cycle of the STD configuration BPDU?
 20 / 37
A. STC
B. SWD
C. SWA
D. SWB
Answer: C
78. Type 4 LSA (ASBR-Summary-LSA) is not allowed to appear in the NSSA area.
A. TRUE
B. FALSE
Answer: A
79. Which of the following is not the main function of NDP?
A. Path MTU Discovery
B. Neighbor Status Tracking
C. Duplicate address detection
D. Address
Answer: A
80. The goal of network management is to realize the monitoring, testing, configuration, analysis,
evaluation and control of network software and hardware, so as to ensure the normal operation of the
network.
A. TURE
B. FLASE
Answer: A
 21 / 37
81. The four routers run IS-IS and have established adjacency. The area numbers and router levels
are marked in the figure. The link between R1 and R2 is a PPP link, and R2 is DIS. Which of the
following statements is correct? (Multiple choice)
A. R2 sends the LSP to R3 and R4 in unicast mode
B. If R1 sends an LSP message, R2 needs to send PSNP for confirmation
C. R3 periodically sends CSNP to help achieve Level-2 LSDB synchronization
Answer: BC
82.Which of the following descriptions about VRRP fast switching is wrong? (Multiple choice)
A. If multiple BFDs are configured to monitor at the same time, each configuration is related to each
other and may affect each other
B. The VRRP backup group monitors common BFD and when the BFD state changes, it will change
the master/standby state by modifying the priority of the backup group. When the monitored BFD
session state recovers, the priority of the router in the backup group will be restored to original value
C. A VRRP backup group cannot monitor Peer BFD, Link BFD and Normal BFD at the same time
D. Use VRRP to monitor the BFD session or EFM function. After the BFD session or EFM session
status changes, the VRRP module will be notified to realize VRRP fast switching
Answer: AC
83. The LAN mapping table is an attribute of the IST domain and is used to describe the mapping
relationship between VLANs and MSTIs. Each VLAN can correspond to multiple ISTIs, and one MST
can correspond to multiple VLANs.
A. TRUE
B. FALSE
Answer: B
84. Which of the following descriptions about MP-BGP is wrong?
A. A router that supports MP-BGP cannot interact with a router that only supports BGP-4
B. MP-BGP can isolate the routing information of different address clusters from each other
C. MP-BGP introduces two new optional non-transition path attributes: MP_REACH_NLRI and
 22 / 37
MP_UNREACH_NLRI
D. MP-BGP can carry multiple network layer protocols
Answer: A
85. The MAC address of a certain PC is 5489-98FB-65D8. The administrator wants this PC to obtain
the specified IP address 192.168.1.11/24 from the DHCP server, so the command configured by the
administrator should be:
A. dhcp static-bind ip-address 192.168.1.11 24 mac-address 5489-98FB-65D8
B. dhcp server static-bind ip-address 192.168.1.11 mac-address 5489-98FB-65D8
C. dhcp server static-bind ip-address 192.168.1.11 255.255.255.0 mac-address 5489-98FB-65D8
D. dhcp static-bind ip-address 192.168.1.11 mac-address 5489-98FB-65D8
Answer: B
86. Which of the following descriptions about the working process of VRRP is wrong?
A. The stabilized Master device will periodically send notification messages
B. In the VRRP backup group, the Master device will be elected first according to the VRRP priority
C. After the original Master device fails, the new Master device will immediately send ARP packets
D. If the Master device fails, the Backup device will immediately switch to the Master device
Answer: D
87. Type 7 LSAs are generally not allowed to be transmitted in the backbone area, but the suppress-
forwarding-address command can be used to allow Type 7 LSAs to be transmitted in Area 0.
A. TRUE
B. FALSE
Answer: B
88. In 0SPF, using the default-route-advertise command will turn the router into an ABR.
A. TRUE
B. FLASE
Answer: B
89. As shown in the figure, PC1 and PC2 are hosts belonging to the same network segment. Which of
the following descriptions about the status of IPv6 neighbors between PC1and PC2 are correct?
(Multiple choice)
A. If the C address information of PC2 can be queried on PC1, the neighbor relationship may be Stale
at this time
B. If the C address information of PC2 can be queried on PC1, then the neighbor relationship at this
 23 / 37
time is set as Reachable
C. There may be five neighbor states between PC1 and PC2, which are Incomplete, Reachable,
Stale, Delay and Probe.
D. If the MAC address information of PC2 can be queried on the PC, the relationship between the
department and the residence may be Probe at this time.
Answer: AC
90. As shown in the figure, SW1 and SW2 have just run RSTP and are now performing spanning tree
calculation.
So, which of the following descriptions about the port synchronization process in the P/A mechanism
are correct? (Multiple choice)
A. After the ports of SW2 are synchronized, all downstream ports enter the Discarding state
B. SW2 receives the RSTBPDU with the Proposal bit set from the root bridge, and starts to put all its
ports into the synchronous state
C. While each port is synchronized, SW2 will return the response RST BPDU with the Agreement bit
set
D. When the downstream port of SW2 is synchronized, the status of the AP port remains unchanged
Answer: BC
91. Among the following encryption algorithms, which one requires the use of two different secret
keys, the public key and the private key?
A. AES
B. RSA
C.DES
 24 / 37
D. 3DES
Answer: B
92.Which of the following techniques can effectively prevent ARP spoofing attacks? (Multiple choice)
A. Strict learning of ARP entries
B. ARP packet rate limit
C. DAI technology
D. ARP entry solidification
Answer: AD
93. The output of a certain router is shown in the figure. According to the information analysis in the
figure, which one of the following descriptions is correct?
A. The reason why there is no DR and BDR in the figure may be that the dr-priority of the peer router
is set to 0
B. If the router's neighbor failure time adopts the default configuration and does not receive the Hello
packet from the other party within 6 seconds shown in the figure, the state will become Down
C. The Hello packet sending interval used by this adjacency is 5 seconds
D. The network type used by the router must not be broadcast
Answer: D
 25 / 37
94.Which of the following characteristics does the IS-IS protocol have? (Multiple choice)
A. Fast convergence when the network fails
B. Suitable for high-volume routing delivery
C. Improve the scalability of the network
D. Can provide a loop-free network
Answer: ABCD
95. On Huawei equipment, which of the following commands can realize the linkage between BFD
and the static default route?
A. ip route-static 0.0.0.0 0.0.0.0 10.0.12.2 track 1
B. ip route-static 0.0.0.0 0.0.0.0 10.0.12.2 track session 1
C. ip route-static 0.0.0.0 0.0.0.0 10.0.12.2 track bfd-session 1
D. ip route-static 0.0.0.0 0.0.0.0 10.0.12.2 bfd-session 1
Answer: C
96.In RSTP, many optional protection functions are set to prevent the Layer 2 network from being
invaded by malicious users.
So which of the following descriptions about TC-BPDU functions are correct? (Multiple choice)
A. By default, the time required for the device to process the maximum number of topology change
packets is Hello Time
B. After this function is enabled, for other TC BPDU packets that exceed the threshold, the device
only processes them once after the timer expires
C. The anti-TC-BPDU attack function can be configured and enabled on all interfaces
D. By default, the maximum number of topology change packets processed by the device within a
specified time is 2
Answer: AB
97. In the MSTP protocol, each MST Instance uses the RSTP algorithm alone to calculate a separate
spanning tree.
A. True
B. False
Answer: A
98. Which of the following descriptions about IPv6 transition technology is correct?
A. The principle of conversion technology is to rewrite the header of IPv6 into the header of IPv4, or
rewrite the header of IPv4 into the header of IPv6. Using tunneling technology, IPv4 can be
encapsulated in the IPv6 tunnel to achieve intercommunication, but the endpoint of the tunnel Need to
support dual stack technology
B. Conversion technology is suitable for communication between pure IPv4 network and pure IPv6
network, which is convenient for network management and auditing
C. IPv4/IPv6 dual-stack technology has hardware requirements for the device, and two network cards
are required to run IPv4/IPv6 respectively
Answer: B
99.The VLAN Pool has two algorithms for assigning VLANs, namely sequential assignment and
HASH assignment.
Which of the following descriptions about these two algorithms are correct? (Multiple choice)
 26 / 37
A. When set to the sequential allocation algorithm, the user may change the IP address when going
online or offline
B. When the HASH allocation algorithm is set, the VLAN will not change when the user goes online or
offline
C. When the HASH allocation algorithm is set, it may cause uneven user division among VLANs
D. When the sequential allocation algorithm is set, VLAN changes may occur when users go online
and offline
Answer: ABCD
100. Which of the following attributes cannot be directly referenced by the apply statement of router-
policy?
A. commmunity
B. origin
C. ip-prefix
D. tag
Answer: C
101. If two Huawei routers establish a BFD session, and the sending interval of AR1 is 30
milliseconds, and the receiving interval is 40 milliseconds; the sending interval of AR2 is 40
milliseconds, and the receiving interval is 30 milliseconds. Which of the following statements about
the post-negotiation time interval is correct?
A. After negotiation, AR1 sends at an interval of 40 milliseconds and receives at an interval of 40
milliseconds
B. After negotiation, AR2 sends at an interval of 30 milliseconds and receives at an interval of 40
milliseconds
C. After negotiation, AR1 sends at an interval of 30 milliseconds and receives at an interval of 30
milliseconds
D. After negotiation, AR2 sends at an interval of 40 milliseconds and receives at an interval of 30
milliseconds
Answer: D
102. Which of the following statements about stacked MAD detection is wrong?
A. When the stacking systems act as agents for each other to perform MAD detection, the two
stacking systems can use the same Domain ID
B. MAD detection methods are divided into direct connection detection and proxy detection
C. MAD proxy detection requires that all stack member Betta proxy devices are connected, and the
connected links are added to an Eth -Tunk
D. MAD direct connection detection can use the full-mesh method through the intermediate device
leaf
Answer: A
103. Through the following display commands, by which of the following you can judge whether the
switch loop failure is caused?
A. [CE02]displaytrapbuffer Pleasecheckthenetworkaccessedtoflappingport
B. [CE02]displaycpu-usage
C. [CE02]displaycpu-defendstatistics
D. [CE02]displayinterfacebriefincludeup
Answer: A
 27 / 37
104. A certain router runs IS-IS. The figure below shows the Hello message sent by the router. Which
of the following statements is correct? (Multiple choice)
A. The System ID of the router is 0050.0600.7008
B. The interface address of the router is 10.6.7.5
C. The area number of the router is 00.0001
D. This router is a LEVEL-1-2 router
Answer: AC
105.In a broadcast network, IS-IS establishes a neighbor relationship through _______ handshakes.
(Arabic numerals)
Answer: 3
106. If roaming is implemented between two APs, the same security policy must be met. The
 28 / 37
forwarding mode and the same () (if English words are involved, please use uppercase)
Answer: SSID
107.Which of the following descriptions about AC roaming groups is wrong? (Multiple choice)
A.The AC in the roaming group needs to deploy a Master Controller
B. AC can act as the roaming group server of multiple roaming groups, and at the same time, it can
join multiple roaming groups
C. The Master Controller must be the AC in the roaming group
D. STAs can roam only between ACs in the same roaming group
Answer: BD
108. Which of the following LSA descriptions about various messages is wrong?
A. DD only contains the summary information of the LSA, which includes LS Type LS ID Advertising
Router and LS Sequence Number
B. The LSACK message contains complete LSA information
C. LS Update message contains complete LSA information
D. LS Request message only has LS Type LS ID and Advertising Router
Answer: B
109. Idle
110. Which of the following IEEE 802.11 standards corresponds to Wi-Fi6?
A. 802.11ac
B. 802.11b
C. 802.11n
D. 802.11ax
Answer: D
111. In the Portal authentication scenario based on MAC priority, when the user successfully
completes Portal authentication and disconnects from the network within a certain period and
reconnects, he can directly access through MAC authentication without entering the username and
password to perform Porta1 authentication again.
A. True
B. False
Answer: A
112. Which of the following tools is used to filter routing information and set routing attributes for
filtered routing information?
A. route-policy
B. as-path-filter
C. policy-based-route
D. IP-prefix
Answer: A
113. Which of the following states represents the established connection between peers in BGP?
A. Open
 29 / 37
B. Established
C. Active
D. Connect
Answer: B
114. If a modular switch only supports the cluster card on the main control board to establish a cluster
connection, it means that the modular switch uses the CSS2 stacking technology.
A. True
B. False
Answer: B
115. Which of the following description of the information contained in the OPEN message in EGP is
wrong?
A. The OPEN message contains the local AS number information
B. VERSION information is included in the OPEN message
C. The OPEN message contains the Hold time message
D. The OPEN message only contains the BGP message header
Answer: D
116. As shown in the figure, there is part of the information output by the current ATE of the router. In
the following description of this part of information, which one is wrong?
 30 / 37
A. The display pin p-info command is used to view the RP information corresponding to the multicast
group
B. The RP address is 2.2.2.2
C. The group address is 225.0.0.0
D. The priority of RP is 0
Answer: C
117.IGMP Snooping mainly solves the problem of:
A. Legality of IGMP Report messages
B. There are many receiver hosts on the network segment, and the router will receive many IGMP
Report messages.
C. Solve the problem of broadcasting multicast data packets on Layer 2 devices, and use them to
manage and control the forwarding of multicast data packets
D. The receiver host only supports the IGMPv2 protocol, but the SSM multicast model is used in the
network
Answer: C
118. A certain router runs IS-IS and its output information is shown in the figure. Which of the
following statements is correct? (Multiple choice)
A. The S4/0/0 interface of this router has established the neighbor relationship of Level1-1 and
Level-2 at the same time
B. The S4/0/0 interface of this router only establishes the neighbor relationship of Level1-1
C. The GE0/0/0 interface of this router has established the neighbor relationship of Level1-1 and
Level1-2 at the same time
D. The GE0/0/0 interface of this router only establishes the neighbor relationship of Level1-1
Answer: AC
119.Which of the following descriptions about the packet authentication method in IS-IS are correct?
(Multiple choice)
A. Plaintext authentication is to directly add the password to the message, which is very low in
security.
B. Keychain authenticates the password list that changes over time to further enhance the security of
the network
C. IS-IS carries authentication information in the form of TLV, and the authentication TLV type is 2
D. MD5 authentication can add the configured password to the message after performing the MD5
 31 / 37
algorithm, which improves the security of the password
Answer: ABD
120. Which of the following OSP F messages carries
master-slave relationship information?
A. LSA Update message
B. LSA Request message
C. D. D message
D. Hello message
Answer: C
121. What are the key components of building an IP wide-area bearer network solution together with
Huawei NetEngine intelligent routers?
A. iMaster NCE-Fabric
B. iMaster NCE-IP
C. iMaster NCE-Campus
D. iMaster NCE-WAN
Answer: D
122. Among the routing policy tools commonly used in BGP, the one that can be used to match a
specific AS_path is:
A. filter-policy
B. ip-prefix
C. ip as-path-filer
D. community-filter
Answer: C
123. The prefix list (IP-Prefix List) can match the IP address prefix length and mask length at the
same time because it has three parameters: less-equal-value, mask-length and greater-equal-value,
so which of the following can correctly describe the relationship between these three parameters?
A. less-equal-value<=mask-length<=greater-equal-value<=32
B. mask-length<=greater-equal-value<=less-equal-value<=32
C. mask-length<=less-equal-value<=greater-equal-value<=32
D. greater-equal-value<=less-equal-value<=mask-length<=32
Answer: B
124. Two routers R1 and R2 are directly connected and want to establish an OSPF adjacency
relationship. R1 uses MD5 port authentication, and R2 uses MD5 area authentication. If the
passwords are the same, the two devices can establish an OSPF adjacency relationship.
A. TRUE
B. FALSE
Answer: A
125. Which of the following parameters does the configuration BPDU message of the STP protocol
not contain?
A. Port ID
 32 / 37
B. VLAN ID
C. Bridge ID
D. Root ID
Answer: B
126.Which of the following descriptions about the four forwarding models of WLAN roaming traffic are
correct? (Multiple choice)
A. The difference between direct forwarding in Layer 3 roaming and tunnel forwarding in Layer 3
roaming is whether the packet needs to be returned to the HAP
B. There is no difference between direct forwarding in layer 2 roaming and tunnel forwarding in layer
2 roaming, both are forwarded directly in the local network of FAP or FAC
C. During the forwarding of the Layer 3 roaming tunnel, if the STA wants to access the atomic
network, it needs to return the message to the HAP
D. The difference between Layer 2 roaming forwarding and Layer 3 roaming forwarding is whether
the subnet before and after STA roaming is the same subnet
Answer: ACD
127. In the state detection firewall, when the state detection mechanism is enabled, when the second
message (SHN+ACK) of the three-way handshake reaches the firewall, if there is no corresponding
session table on the firewall, then which of the following statement is correct?
A. If the firewall security policy allows the packet to pass through, create a session table
B. By default, after the status function is turned off, and the allow policy is configured, it can pass
C. The message must pass through the firewall and establish a session table
D. If the firewall security policy allows the packet to pass through, the packet can pass through the
firewall
Answer: B
128.Which of the following steps or actions are step-by-step in a structured network troubleshooting
process? (Multiple choice)
A. Contingency plans
B. Rollback preparation
C. Temporary environment construction
D. Information filtering
Answer: AB
129.Which of the following descriptions about BGP, OSPF, IS-IS, and RIP is correct?
A. The port number used by the BGP neighbor relationship based on the UDP session is 179
B. RIP runs on the basis of UDP sessions, and the port number used is 520
C. IS-IS runs onthe basis of the IP protocol, using the protocol number 89
D. OSPF runs on the basis of the IP protocol and uses the protocol number 88
Answer: B
130.Different types of LSAs have different functions. Which of the following LSAs can only be spread
within a single area? (Multiple choice)
A. Network Summary LSA
B. Router LSA
C. Network LSA
 33 / 37
D. AS-External-LSA
Answer: BC
131. The IPv6 address 2001:FC1A:8BAD:0112:0000:1200:0001/64 is abbreviated to
2001:FC1A:8BAD:112:0:1200::1/64.
A. TRUE
B. FALSE
Answer: B
132. The Stub area and Totally Stub area of OSPF solve the problem caused by maintaining an
excessively large LSDB in the end area, but they are not the best solution for some specific
scenarios.
A. TRUE
B. FALSE
Answer: A
133. Which of the following characteristics meet the following conditions. A BCP router may not
support these attributes, but it will still receive such attributes and pass them on to other peers.
(Multiple choice)
A. Commmnity
B. Ageregator
C. Multi_Exit_Disc
D. Local_Pref
Answer: AB
134. In different scenarios, RSTP provides different protection functions. Which of the following
statement is wrong?
A. After the BPDU protection function is enabled on the switching device, if the edge port receives
RST BPDU, the edge port will be set as a non-edge port, and the spanning tree calculation will be
performed again
B. After the anti-TC-BPDU message attack function is enabled, the number of times the switching
device processes TC BPDU messages within a unit time is configurable
C. The designated port with the root protection function enabled, its port role can only remain as the
designated port
D. The designated port with root protection enabled, when the port receives a better RSTBPDU, the
port will enter the Discarding state and no longer forward packets. If the port does not receive a better
RST BPDU for a period, it will automatically return to the normal Forwarding state
Answer: A
135. Which of the following descriptions about 0SPF Stub area and Totally Stub area is wrong?
A. The E-bit bit in the Hello message sent by the routers in the Stub area is 0, and they will process
the data packet with the E-bit 1
B. The Totally Stub area does not allow S external routes to propagate in the area, nor does it allow
inter-area routes to propagate in the area
C. Access to other areas between the Totally Stub area is achieved through the default route
delivered by 8 photos in this area
D. A default route will be generated in the Stub area to ensure that the Stub area can reach the
 34 / 37
outside of the AS
Answer: A
136.As shown in the figure, a return summary route 10.0.0.0/24 is configured on the border route
RT1, the next hop points to RT2, and a default route to the external network is configured at the same
time. At this time, a routing black hole will appear. Which of the following statements are correct about
the routing black hole? (Multiple choice)
[Extranet]--AR1--AR2----SW1-PC1/PC2 (10.1.1.1-2/24)
A. Precise routing summary can avoid routing black holes
B. Configuring black hole routing can solve the routing black hole problem
C. If a terminal in the network sends a data packet to a network segment that does not appear on the
internal network, a loop will occur
D. Routing black holes have no impact on the network and can not be dealt with
Answer: ABC
137. Which of the following descriptions about the Keepalive message in BGP is wrong?
A. Keepalive messages are mainly used to maintain the connection between BGP peers
B. The Keepalive message contains only one BGP data header
C. By default, the Keepalive interval is 180 seconds
D. Keepalive messages are periodically sent between two BGP neighbors
Answer: C
138.Regarding boundary security optimization, which of the following options are correct? (Multiple
choice)
A. The purpose is to prevent/reduce external cyber attacks and harm
B. The optimization location is usually at the network boundary
C. Optimization methods include attack prevention technology, packet filtering technology, hardware
firewall, etc.
D. The purpose is to achieve user security access control
Answer: ABC
139. In order to adapt to
the application of the data center, what new features have been developed by
the switch?(Multiple choice)
A. MSTP
B. TRILL
C. NFV
D. FCOE
Answer: BCD
140. Regarding the description of the Hello message in PIM-SM, the error is:
A. The routers periodically use Hello messages to keep in touch
B. In the PIM-SM network, the newly started multicast router needs to use Hello messages to
discover neighbors and maintain neighbor relationships
C. Hello packets are sent to the multicast address 224.0.0.5
D. Elect DR in multi-router network segment through Hello message
Answer: C
 35 / 37
141. The four routers run lS-IS and have established adjacency. The area code and the level of the
router are marked in the figure. Which of the following statements is correct?
A. The LSP of R4 does not exist in the LSDB of router R1
B. The LSP of R3 does not exist in the LSDB of the R2 router
C. The LSP of R4 does not exist in the LSDB of R3 router
D. The LSP of R4 does not exist in the LSDB of the R2 router
Answer: A
142.In OSPF, the AS boundary router can be Internal Router or ABR, but it must belong to the
backbone area.
A. TRUE
B. FALSE
Answer: B
143. In PIM-SM, the wrong description about RP is:
A. The initial multicast streams of all groups in the shared tree are forwarded to the receivers through
the RP
B. One RP can provide multiple multicast services at the same time, and one multicast group can
correspond to multiple RPs
C. RP can be responsible for the forwarding of several or all multicast groups, and there can be one
RP in the network
D. All the members of the group and the multicast sources that send multicast data to the group
converge to the only RP
Answer: B
144.ACL can be divided into which of the following categories? (Multiple choice)
A. User-defined ACL
B. Basic ACLs
C. Layer 2 ACL
D. Advanced ACLs
Answer: ABCD
145. As shown in the figure, the IS-IS neighbor relationship is established between the two routers.
Which of the following description about the process of establishing the neighbor relationship is
correct? (Multiple choice)
 36 / 37
A. In this broadcast network, R1 and R2 use a three-way handshake to establish an adjacency
relationship
B. In the broadcast network, the DIS needs to be elected. After the adjacency relationship is
established, the router will wait for the interval between two Hello messages before electing the DIS.
C. R2 marks the adjacency state as Initial after receiving the IIH message sent by R1. Then, R2
replies to R1 with Level-1LANIIH, which identifies R1 as the adjacency of R2
D. In Down state, R1 unicast sends Level-1LANIIH, and the adjacency list in this message is empty
Answer: ABC
146. The output information of a router is below, which is correct about this information?
A. The MED value of the route to the destination network 5.1.1.0/24 is 50
B. The MED value of the route to the destination network 1.1.1.0/24 is 100
C. The next hop of the route to the target network 5.1.1.0/24 is 1.1.1.1, and the route is optimal
D. The next hop of the route to the target network 1.1.1.0/24 is 1.1.1.1, and the route is optimal
Answer: C
147. If you want to realize communication between different protocols, you can only use the method
of routing import.
A. TRUE
B. FALSE
Answer: B
 37 / 37

Continue navegando