Baixe o app para aproveitar ainda mais
Prévia do material em texto
H12-811_V1.0-ENU Exam Name: HCIA-Datacom V1.0 Full version: 882 Q&As Full version of H12-811_V1.0-ENU Dumps Share some H12-811_V1.0-ENU exam dumps below. 1. On Huawei routers, by default, the value of the internal routing priority of the OSPF protocol is? A.20 B.10 1 / 40 https://www.certqueen.com/H12-811_V1.0-ENU.html C.30 D.1 Answer: B 2. BFD can implement link status detection at the ms (millisecond) level. A. True B. False Answer: A 3. Which message does the DHCP server use to confirm that the host can use the IP address? A. DHCP ACK B. DHCP DISCOVER C. DHCP REQUEST D.DHCP OFFER Answer: A 4. What is the total length of the VLAN frame defined by IEEE802.1Q? A.1 B.2 C.3 D.4 Answer: D 5. The administrator cannot log in to the Huawei router through Telnet, but other administrators can log in normally, so which of the following items is the possible reason? (Multiple choice) A. The administrator user account has been disabled B. The Telnet service of the AR2200 router has been disabled C. The permission level of the administrator user account has been changed to 0 D. The administrator user account has been deleted Answer: AD 6. NFV (Network Functional Virtualization), network function virtualization, realizes the deployment of network applications in a software-based manner. A. True B. False Answer: A 2 / 40 7. If the administrator wants to completely delete the old device configuration file <config.zip>, which of the following command is correct? A. reset config.zip B. delete /unreserved config.zip C. clear config.zip D. delete /force config.zip Answer: B 8. If the network composed of switches does not enable STP, there must be a layer 2 loop. A. True B. False Answer: B 9. What mechanisms can VRRP be combined with to monitor the connectivity of the uplink? (Multiple choice) A. Interface track B. BFD C. NQA D. Ip-link Answer: ABCD 10. When data is accessed, when accessing different network segments, the destination MAC on the source host encapsulates the MAC address of the gateway. A. True B. False Answer: A 11. In the eSight subnet, which resources can be managed are described correctly? (Multiple choice) A. Equipment B. Subnet C. link D. Other subnets cannot be nested under the subnet Answer: ABC 3 / 40 12. On Huawei equipment, if AAA authentication is used for authorization, when the remote server does not respond, authorization can be performed from the network equipment side. A. True B. False Answer: A 13. What is the MAC address of the data link layer that identifies the VAP on the AP in the WLAN? A. BSS B. BSSID C. SSID D.ESS Answer: B 14. When the host accesses the web server of the server, the value of the network layer protocol field is 6. A. True B. False Answer: A 15. Which of the following statements about the usage scenarios of the DHCP protocol is correct? A. After the DHCP continues to receive the DHCP request or response message, it will directly forward the message format without modifying the message format. B. Multiple DHCP servers are not allowed in the network C. DCHP client and DHCP server must be connected to the same switch D. If the DHCP client and the DHCP server are not in the same network segment, the DHCP message needs to be forwarded through the DHCP relay Answer: D 16. BFD is only a general fast detection technology, which can realize the fast switching function by itself, and it does not need to be used together with other fast switching technologies. A. True B. False Answer: B 4 / 40 17. In the network shown in the figure, which of the following configurations can enable host A to access the Internet, but host B cannot? (Multiple choice) A. acl number 2000 rule 5 deny source 100.0.12.0.0.0.0.255 rule 10 permit # interface GigabitEthernet0/0/3 traffic-filter outbound acl 2000 # B. acl number 2000 rule 5 permit source 100.0.13.0.0.0.0.255 rule 10 deny source 100.0.12.0.0.0.0.255 # interface GigabitEthernet0/0/3 5 / 40 traffic-filter outbound acl 2000 # C. acl number 2000 rule 5 permit source 100.0.13.0.0.0.0.255 rule 10 deny # interface GigabitEthernet0/0/3 traffic-filter outbound acl 2000 # D. acl number 2000 rule 5 deny source 100.0.12.0.0.0.0.255 rule 10 permit source 100.0.13.0.0.0.0.255 # interface GigabitEthernet0/0/3 traffic-filter outbound acl 2000 # Answer: ABCD 18. which of the following service priority description in DSCP is correct? A. AF has priority over EH B. The packet loss rate of AF11 is higher than that of AF12 C. CS has the highest priority D. AF11 priority is higher than AF4 Answer: C 19. The configuration information of the switch G0/0/1 port is shown in the figure, which VLAN data frame does not carry the VLAN TAG when the switch forwards? # interface GigabitEthernet0/0/1 port link-type trunk port trunk pvid vlan 10 port trunk allow-pass vlan 10 20 30 40 # A.10 B.30 C.20 6 / 40 D. 40 Answer: A 20. Which of the following parameters should be considered when electing the root port in STP? (Multiple choice) A. The mac address of the port B. Port priority C. Port slot number, such as G0/0/1 D. Duplex mode of the port E. The cost of the port reaching the root switch Answer: BCE 21. Which of the following IPv4 addresses cannot be used by a host to directly access the Internet? A.50.1.1.1 B.10.1.1.1 C.100.1.1.1 D. 200.1.1.1 Answer: B 22. The login timeout time in the VRP system can only be set under the VTY interface. A. True B. False Answer: B 23. What is the full name of VRP? A. Versatile Redundancy Platform B. Versatile Routing Protocol C. Virtual Routing Platform D. Versatile Routing Platform Answer: D 24. When configuring OSPF on a router, what must be manually configured? (Multiple choice) A. Specify the network type of each OSPF-enabled interface B. Create an OSPF area C. Create an OSPF process 7 / 40 D. Configure Router ID Answer: BC 25. When using Telnet to log in to the router, which authentication methods can be selected? (Multiple choice) A. password authentication B. AAA Local Authentication C. Not certified D. MD5 ciphertext authentication Answer: ABC 26. The port numbers used in the control tunnel and data tunnel transmission of CAPWAP are the same. A. True B. False Answer: B 27. In the network shown in the figure below, when the OSPF neighbor status is stable, what is the neighbor status of Router B and Router C? 8 / 40 A. Full B. 2-way C. Attempt D. Down Answer: B 28. The network structure and OSPF partitions are shown in the figure. Except for RTA in the figure, routers RTB, RTC and RTD are all ABR routers. 9 / 40 A. True B. False Answer: B 29. As shown in the figure, if the command ping 1.1.1.2 is executed on R1, the data frame received by LSW1 from VLAN10 of LSW2 is tagged. 10 / 40 A. True B. False Answer: A The multicast address of the requested node corresponding to 809.2001::12:1 is FF02::1:FF12:1. A. True B. False Answer: A 30. SR (Segment Routing), as a new tunnel technology replacing MPLS, has attracted more and more attention. Many users hope to introduce SR technology to simplify network deployment and management and reduce CAPEX (Capital Expenditure). SR, as the current mainstream tunnel technology, is widely used in bearer networks. A. True B. False 11 / 40 Answer: B 31. Which of the following IPv4 addresses are Class A addresses? (Multiple choice) A. 100.1.1.1 B.172.16.1.1 C.192.168.1.1 D. 127.0.0.1 Answer: AD 32. Regarding the control plane of the device, which of the following statements is correct? (Multiple choice) A. The control plane providesdevice monitoring capabilities. B. The controller plane is responsible for generating the IP routing table. C. The control plane is responsible for directing data forwarding. D. The control plane is responsible for the interaction of routing protocols between devices. Answer: BD 33. Which of the following agreements is the PPP agreement composed of? (Multiple choice) A. NCP B. Authentication protocol C.LCP D. PPPOE Answer: ABC 34. How many bits are the total length of the interface identifier of the link-local unicast address? A. 64bit B. 32bit C.96bit D. 48bit Answer: A 35. In the RSTP protocol, when the root port fails, () will quickly switch to a new root port and immediately enter the forwarding state? A. Forwarding port B. Alternate port 12 / 40 C. Backup port D. Edge port Answer: B 36. VRP supports OSPF multi-process. If no process number is specified when OSPF is enabled, the default process number is? A.0 B.1 _ C.10 D.100 Answer: B 37. If there is no security policy configured in the inter-zone of the firewall, or when searching for security policies, all the security policies are not hit, then which of the following default packet filtering action of the inter-zone is executed by default? A. Only part of the passage is allowed B. Refusal to pass C. Escalate to Administrator D. Different applications have different default actions Answer: B 38. The last option field (option) of IPv4 is optional information with variable length. The maximum length of this field is? A. 10B B. 40B C.60B D. 20B Answer: B 39. If the Ethernet data frame Length/type=0x0806, which of the following statements is correct? (Multiple choice) A. The destination MAC address of this data frame may be FFFF-FFFF-FFFF B. The source MAC address of this data frame must not be FFFF-FFFF-FFFF C. This data frame is an IEEE 802.3 frame D. This data frame is an Ethernet II frame Answer: BD 13 / 40 40. What is the MAC address of the data link layer of each VAP on the AP? A. SSID B. BSSID C. BSS D.ESS Answer: B 41. Which of the following descriptions about switches is wrong? A. Switches generally work at the data link layer B. The switch can complete the exchange of data frames C. The switch can provide network access services for terminal equipment (PC, server) D. The switch is generally used as the egress device of the network Answer: D 42. What advantages does the OSPF protocol have? (Multiple choice) A. Division of Support Regions B. OSPF supports load balancing for equal-cost routes C. OSPF supports packet authentication D. OSPF supports typeless inter-domain routing (CIDR) Answer: ABCD 43. As shown in the figure, it is the port status information displayed on a switch running STP. According to this information, which of the following descriptions is wrong? MSTID Port Role STP State Protection 0 GigabitEthernet0/0/1 DESI FORWARDING NONE 0 GigabitEthernet0/0/2 DESI FORWARDING NONE 0 GigabitEthernet0/0/3 DESI FORWARDING NONE 0 GigabitEthernet0/0/21 DESI FORWARDING NONE 0 GigabitEthernet0/0/22 DESI FORWARDING NONE 0 GigabitEthernet0/0/23 DESI FORWARDING NONE A. This switch is the root switch in the network B. The priority of this switch is 0 C. This network may only contain this switch D. This switch may be connected to 6 other switches Answer: B 14 / 40 44. In the MPLS network, the switch will assign labels. Which of the following description of the label assignment method is correct? A. The downstream LSR can decide to assign the label to a specific FEC, and then notify the upstream LSR B. Downstream on demand DoD (downstream on demand) means that for a specific FEC, the LSR does not need to obtain a label request message from the upstream to perform label allocation and distribution. C. The downstream autonomous label allocation method means that for a specific FEC, the LSR performs label allocation and distribution after obtaining the label request message. D. The label publishing methods used by the upstream LSR and the downstream LSR with label distribution adjacency can be the same Answer: A 45. How many bits are specified in the bridge priority in the spanning tree protocol? A.16 B.8 C.2 D.4 Answer: A 46. By default, what is the period for sending OSPF protocol HELLO messages on the broadcast network? A. 10s B. 30s C. 20s D. 40s Answer: A 47. In an OSPF broadcast network, which routers will a DRother router exchange link state information with? (Multiple choice) A. BDR B. All OSPF neighbors C. DR Other D.DR Answer: AD 15 / 40 48. On the switch, vlan batch can be used to create vlans in batches to simplify configuration. A. True B. False Answer: A 49. The data link layer uses PPP encapsulation, and the IP addresses at both ends of the link may not be in the same network segment. A. True B. False Answer: A 50. The broadcast address of the network segment 192.168.1.0/25 is 192.168.1.128. A. True B. False Answer: B 51. During the online process of FIT, the software version will be downloaded on the AC. A. True B. False Answer: B 52. SR (SegmentRouting) defines destination address prefixes/nodes and adjacencies in the network as segments, and assigns SIDs (SegmentID) to these segments. A forwarding path is obtained by unordered arrangement (Segment List) of Adjacency SID (adjacent segment) and Prefix/Node SID (destination address prefix/node segment). A. True B. False Answer: B 53. The administrator plans to implement route backup by configuring static floating routes, so what is the correct way to implement it? A. The administrator only needs to configure two static routes B. The administrator needs to configure different metric values for the active static route and the backup static route C. The administrator needs to configure different protocol priority values for the active static 16 / 40 route and the backup static route D. The administrator needs to configure different TAGs for the active static route and the backup static route Answer: C 54. In order to join a wireless network, TA needs to obtain wireless network information first. Which of the following messages does STA use to actively obtain SSID information? A. Join B. Discovery C. Beacon D. Probe Answer: D 55. Which of the following statements about ASPF and Server-map is correct? (Multiple choice) A. ASPF checks the application layer protocol information and monitors the application layer protocol status of the connection B. ASPF dynamically generates ACL to determine whether the packet passes through the firewall C. Configure NAT Server to generate a static Server-map D. The Server-map table uses five-tuples to represent a session Answer: AC 56. In WLAN, it is used to receive wireless networks. What distinguishes different wireless networks? A. AP Name B. BSSID C. SSID D. VAP Answer: C 57. Which of the following descriptions of OSPF is correct? (Multiple choice) A. The number of the backbone area cannot be 2 B. Area numbers from 0.0.0.0-255.255.255.255 C. All networks should be declared in area 0 D. Before configuring an OSPF area, an IP address must be configured for the loopback port of the router 17 / 40 Answer: AB 58. The DHCP request message is sent by broadcast. A. True B. False Answer: B 59. Based on ACL rules, which of the following types can ACL be divided into? (Multiple choice) A. Basic ACLs B. User ACLs C. Advanced ACLs D. Layer 2 ACL Answer: ABCD 60. Ethernet frames are processed and forwarded in the form of VLAN TAG inside the switch. A. True B. False Answer: A 61. The login timeout function in VRP can only be set under the VTY interface. A. True B. False Answer: B 62. The source VTEP encapsulates the ARP broadcast sent by the source VM into a multicast packet and sendsit to the L3 network 63. Which of the following IPv6 addresses is a link-local address? A. FC00::2E0:FCFF:FEEF:FEC B. FE80::2E0:FCFF:FEEF:FEC C. 2000::2E0:FCFF:FEEF:FEC D. FF02::2E0:FCFF:FEEF:FEC Answer: B 64. The configuration of the country code will affect the frequency used for actual transmission and the maximum transmission power. A. True 18 / 40 B. False Answer: A 65. In the network shown in the figure, which of the following descriptions is correct? (Multiple choice) A. The network between RTA and SWC is the same collision domain B. The network between SWA and SWB is the same broadcast domain C. The network between SWA and SWC is the same collision domain D. The network between SWA and SWC is the same broadcast domain Answer: CD 66. The MPLS label header is encapsulated between the data link layer header and the network layer header of the message. A. True B. False Answer: A 67. Which of the following IPv6 addresses is a global unicast address? A. 2001::12:1 B. FE80::2E0:FCFF:FEEF:FEC 19 / 40 C. FF02::2E0:FCFF:FEEF:FEC D. FF02::1 Answer: A 68. Which of the following belongs to the transfer process of MPLS VPN routing? (Multiple choice) A. Routing exchange between CE and PE B. The process of assigning public network labels C. The process of injecting VRF routes into MP-BGP D. The process of injecting MP-BGP routes into VRF Answer: ABCD 69. Two authentication domains "Area 1" and "Area2" are configured on a router acting as an authentication server. If a user authenticates with the correct user name "huawei" and password "hello", the user will be assigned to which authentication domain? A. Authentication domain "default_admin domain" B. Authentication domain "default domain" C. Authentication domain "Area1" D. Authentication domain "Area2" Answer: B 70. How many bits are there in the VLAN ID in the VLAN frame format defined by IEEE802.1Q? A. 6 B. 10 C. 12 D. 8 Answer: C 71. In the OSI reference model, what can complete end-to-end error detection and flow control is? A. Data link layer B. Network layer C. Physical layer D. Transport layer Answer: D 20 / 40 72. Referring to the configuration of one-arm routing in the figure below, it can be judged that even if the ARP proxy is not enabled on the sub-interface of R1, the administrative department and the financial department can communicate with each other. A. True B. False Answer: B 73. Which of the following IEEE802.11 standards only supports communication in the 2.4GHz frequency band? A. 802.11n B. 802.11g C. 802.11ax D. 802.11a Answer: B 74. A certain device has been configured with TeInet configuration. The login address of the device is 10.1.1.10, the Telnet user name is admin, and the password is Huawei@123. What is the correct way to log in to this device using telnetlib? A. telnetlib.Telnet (10.1.1.0, admin) B. telnetlib.Telnet (10.1.1.0, 23, admin, Huawei@123) 21 / 40 C. telnetlib.Telnet (10.1.1.0) D. telnetlib.Telnet (10.1.1.0, admin, Huawei@123) Answer: C 75. The network shown in the figure below, which of the following statements is correct? (Multiple choice) 22 / 40 A. Host A and host C can ping through B. All hosts can ping each other 23 / 40 C. Host B and host C can ping through D. Host A and host B cannot ping through Answer: ACD 76. On the command line interface of the Huawei AR router, the save command is used to save the current system time. A. True B. False Answer: B 77. Must all interfaces of routers running OSPF belong to the same area. A. True B. False Answer: B 78. On serial interfaces, static routing can be configured by specifying the next-hop address or outgoing interface. A. True B. False Answer: A 79. For a switch running the STP protocol, the port in the Learning state needs to wait for the forwarding delay before it can be transformed into the Forwarding state. A. True B. False Answer: A 80. The broadcast address of 200.200.200.200/30 is? A. 200.200.200.203 B. 200.200.200.200 C. 200.200.200.255 D. 200.200.200.252 Answer: A 81. As shown in the figure, there is a web server in the private network that needs to provide HTTP services to users on the public network. Therefore, the network administrator needs to 24 / 40 configure NAT on the gateway router RTA to meet the requirements. Which of the following configurations can meet the requirements? A. [RTA-GigabitEthernet0/0/1] nat server protocol tcp global 202.10.10.1 www inside 192.168.1.1 8080 B. [RTA-Serial1/0/1] nat server protocol tcp global 202.10.10.1 www inside 192.168.1.1 8080 C. [RTA-GigabitEthernet0/0/1] nat server protocol tcp global 192.168.1.1 www inside 202.10.10.1 8080 D. [RTA-Serial1/0/1] nat server protocol tcp global 192.168.1.1 www inside 202.10.10.1 8080 Answer: B 82. Which of the following does not include the advantages of Wi-Fi6 over Wi-Fi5? A. Higher consumption B. Higher number of access terminals per AP C. Lower transmission delay D. Higher bandwidth Answer: A 83. Which of the following addresses cannot be used as the IPv4 address of the host? A. Class C address B. Class A address C. Class B address D. Class D address Answer: D 84. How many bits is the total length of the IPV6 address? A.64 B.96 C.128 25 / 40 D.32 Answer: C 85. The function of telnet.read_very_eager in Telnetlib is to read data non-blockingly. Usually needs to be used together with the time module. A. True B. False Answer: A 86. After the destination VTEP receives the multicast packet, it learns the mapping relationship between the source VM and the VTEP, and forwards the multicast packet to the local VM 87. An error occurred when the client accessed the FTP server. It was found that there is no problem with the connectivity between the server and the client. Which of the following server ports may be blocked to cause the problem? (Multiple choice) A. 21 B. 20 C. 50649 D. 80 Answer: AB 88. The administrator finds that the two routers stay in the 2-way state when establishing OSPF neighbor relations. Which of the following description is correct? A. These two routers are DR Other routers in the broadcast network B. The router is configured with a wrong Router ID C. The router is configured with the same process D. The routers are configured with the same area ID Answer: A 89. According to the command output shown in the figure, which of the following descriptions is correct? (Multiple choice) 26 / 40 A. GigabitEthernet0/0/1 allows VLAN1 to pass through B. GigabitEthernet0/0/1 does not allow VLAN1 to pass through C. If you want to change GigabitEthernet0/0/1 into an Access port, you first need to use the command "undo port trunk allow-pass vlan all" D. If you want to change GigabitEthernet0/0/1 into an Access port, you first need to use the command "undo port trunk allow-pass vlan 2 to 4094" Answer: AD 90. What are the advantages of PQ+WFQ? (Multiple choice) A. Messages with different priorities cannot be treated differently B. It can ensure that low-latency services can be dispatched in time C. Implement bandwidth allocation by weight D. Realize the needs of flexible classification of messages according to user-defined Answer: BC 91. Only one SSID can be bound to one radio frequency of AP. A. True B. False Answer: B 92. Which one is correct about the configuration description on this switch? (Multiple choice) [Quidway] dhcp enable [Quidway] interface Vlanif 100 [Quidway-Vlanifl00] dhcp select relay [Quidway-Vlanifl00] dhcp relay server-select dhcpgroup1 A. By default, the DHCP service must be enabled when configuring the DHCP server and DHCP delay B. The VLAN IF100 interface will relay the received DHCP message tothe external DHCP 27 / 40 Server C. Specify the DHCP server group as DHCP group for VLAN IF100 interface D. First, you need to create a DHCP server group and add a DHCP server to the server group E. By default, DHCP group1 will automatically add DHCP servers in the network Answer: ABCD 93. By default, the root path cost of the root bridge in the STP protocol must be. A. True B. False Answer: A 94. The role of the collaboration layer in the SDN architecture is to complete service deployment based on user intentions. OpenStack belongs to the business collaboration layer. A. True B. False Answer: A 95. The subnet mask of a network segment 150.25.0.0 is 255.255.224.0, then () is a valid host address in this network segment? (Multiple choice) A. 150.15.3.30 B. 150.25.0.0 C.150.25.2.24 D. 150.25.1.255 Answer: CD 96. Which of the following statements about the ACL matching mechanism is correct? (Multiple choice) Which of the following statements about the ACL matching mechanism is correct? A. If the ACL does not exist, the ACL matching result is returned: no match B. If the last rule packet is still not matched, the ACL matching result will be returned: no match C. By default, the search starts from the rule with the smallest number in the ACL. Once a rule is matched, the search for subsequent rules is stopped. D. No matter whether the result of the packet matching ACL is "mismatch", "permit" or "deny", whether the packet is finally allowed or denied is actually determined by each business module that applies the ACL Answer: ABCD 28 / 40 97. Which message does the OSPF protocol use to confirm the received LSU message? A. LSU B. LSACK C.LSR D. LSA Answer: B 98. The requested node multicast address consists of the prefix FF02::1:FF00:0/104 and the last 24 bits of the unicast address. A. True B. False Answer: A 99. Which of the following statements is correct? A. The router works at the network layer B. The switch works at the physical layer C. The switch works at the network layer D. The router works at the physical layer Answer: A 100. By default, the bridge priority of the switch spanning tree is 32768 by default. A. True B. False Answer: A 101. As shown in the figure, two hosts communicate between VLANs through single-arm routing. When the G0/0/1.2 sub-interface of RTA receives the data frame sent by host B to host A, which of the following operations will RTA perform? 29 / 40 A. RTA forwards the data directly through the G0/0/1.1 sub-interface B. After RIA deletes VLAN tag 20, it is sent out by G0/0/1.1 interface C. RTA will discard the data frame D. RTA first deletes the VLAN tag 20, then adds the VLAN tag 10, and then sends it out through the G0/0/1.1 interface Answer: D 102. VLSM can expand any IP network segment, including class D addresses. A. True B. False Answer: B 103. What modes does device link aggregation support? (Multiple choice) A. Manual load sharing mode B. Manual active/standby mode C. Blend Mode D.LACP mode 30 / 40 Answer: AD 104. Which of the following versions of SNMP supports the encryption feature? A. SNMPv3 B. SNMP 2c C. SNMP 2 D. SNMP 1 Answer: A 105. In the STP protocol, the Message Age in the configuration BPDU sent by the root bridge is 0. A. True B. False Answer: A 106. Which of the following SNMP messages is sent by the Agent on the managed device to the NMS? A. Response B. Get-Request C. Set-Request D. Get-Next-Request Answer: A 107. RSTP protocol does not include which of the following port states? A. Forwarding B. Learning C. Discarding D. Blocking Answer: D 108. A Layer 2 Ethernet switch generates MAC address table entries based on the () of the Ethernet frame received by the port? A. Destination MAC address B. Destination IP address C. Source IP address D. Source MAC address 31 / 40 Answer: D 109. The Radius information configuration of the router is as follows, which of the following statements is correct? (Multiple choice) radius-server template Huawei radius-server shared-key cipher Huawei radius-server authentication 200.0.12.1 1812 radius-server accounting 200.0.12.1 1813 radius-attribute nas-ip 200.0.12.2 # A. The source IP address of the router sending the Radius packet is 200.0.12.2 B. The IP address of the authorization server is 200.0.12.1 C. The IP address of the authentication server is 200.0.12.1 D. The IP address of the billing server is 200.0.12.1 Answer: ACD 110. A company applies for a class C IP address segment, which needs to be evenly distributed to 8 subsidiaries. The largest subsidiary has 14 computers. Different subsidiaries must be in different network segments. The subnet mask should be set to? A. 255.255.255.192 B. 255.255.255.240 C. 255.255.255.0 D. 255.255.255.128 Answer: B 111. Routers in the backbone area have complete link state information for all other areas. A. True B. False Answer: B 112. In the network shown in the figure below, the switch uses the VLANIF interface to connect with the sub-interface of the router. Which of the following configurations can meet this requirement? 32 / 40 A. interface Vlanif10 ip address 10.0.12.1 255.255.255.0 # interface GigabitEthernet 0/0/2 port link-type trunk port trunk pvid 10 port trunk allow-pass vlan 10 # B. interface Vlanif10 ip address 10.0.12.1 255.255.255.0 # interface GigabitEthernet 0/0/2 port link-type trunk port trunk allow-pass vlan 10 # C. interface Vlanif10 ip address 10.0.12.1 255.255.255.0 # interface GigabitEthernet 0/0/2 port link-type hybrid port hybrid untag vlan 10 # D. interface Vlanif10 ip address 10.0.12.1 255.255.255.0 # interface GigabitEthernet 0/0/2 port link-type access port default vlan 10 # Answer: B 33 / 40 113. The function of telnet.read.all() in telnetlib is to read all the data until EOF. If the echo does not return EOF, it will be blocked consistently. A. True B. False Answer: B 114. AAA does not contain which of the following? A. Authorization B. Accounting C. Authentication D. Audit Answer: D 115. MIB (management information base) is a virtual database that only exists on the NMS. A. True B. False Answer: B 116. By default, it takes at least 30 seconds for the port state in the STP protocol to change from Disabled to Forwarding state. A. True B. False Answer: A 117. The configuration information of an interface of a router is as follows, which VLAN data packet can this port receive? # interface GigabitEthernet0/0/2.30 dot1q termination vid 100 ip address 10.0.21.1 255.255.255.0 arp broadcast enable # A. 100 B.20 C.30 34 / 40 D.1 Answer: A 118. After the switch running the RSTP protocol receives the BPDU with the TC set, it clears the MAC addresses learned by all ports. A. True B. False Answer: B 119. What are the advantages of using the Dynamic Host Configuration Protocol DHCP to assign IP addresses? (Multiple choice) A. IP address reuse can be realized B. The workload is heavy and difficult to manage C. If the configuration information changes (such as DNS), only the administrator needs to modify it on the DHCP server to facilitate unified management D. Avoid IP address conflicts Answer: CD 120. An ACL rule is as follows: Which of the following IP addresses can be matched by the permit rule rule 5 permit ip source 10.0.2.0 0.0.254.255? (Multiple choice) A.7.1.2.1 B.9.1.1.1 C.8.2.2.1 D.6.1.3.1 Answer: BD 121. Which of the following analysis about ICMP messages is correct? (Multiple choice) A. ICMP packets are encapsulated in IP packets without transport layer encapsulation B. ICMP packets cannot be used to detect the MTU in the path C. ICMP messages can record time, including original time, receivingtime, and sending time D. The ICMP protocol does not support the redirection function E. ICMP messages include ICMP error messages, control messages, request/response messages, and refresh messages Answer: AC 122. Which of the following is correct about RS and RA in IPv6? (Multiple choice) 35 / 40 A. RA is used to request address prefix information B. RA is used to reply address prefix information C. RS is used to request address prefix information D. RS is used to reply address prefix information Answer: BC 123. The Tracert diagnostic tool records the () of each ICMP TTL timeout message, so as to provide the user with the IP address through which the message reaches the destination? A. Destination port B. Destination IP address C. Source port D. Source IP address Answer: D 124. Which of the following characteristics does the default VLAN in a Layer 2 Ethernet switch have? (Multiple choice) A. The default VLAN cannot be deleted manually B. By default, all ports of the switch are member ports of the default VLAN C. A default VLAN must be created before a port can be assigned to it D. The IP address configured on the switch will only be applied to the member ports of the default VLAN Answer: AB 125. A switch receives a unicast data frame with a VLAN tag, but finds that the destination MAC address of the data frame cannot be found in its MAC address table, then the switch's processing behavior for the data frame is? A. The switch will broadcast the data frame to all ports B. The switch will broadcast this data frame to all Access ports C. The switch will discard the data frame D. The switch will broadcast the data frame to all ports (except the receiving port) belonging to the VLAN where the data frame is located Answer: D 126. In the network shown in the figure below, when the OSPF neighbor status is stable, what is the neighbor status of Router A and Router B? 36 / 40 A. Full B. Attempt C. 2-way D. Down Answer: A 127. As shown in the figure, which statement is correct about the VLAN configuration on the Huawei switch? (Multiple choice) 37 / 40 A. Client3 belongs to VLAN30, and the command to divide VLAN on the switch is correct B. Client1 belongs to VLAN10, and the command to divide VLAN on the switch is correct C. Client4 belongs to VLAN40, and the command to divide VLAN on the switch is correct D. Client2 belongs to VLAN 20, and the commands assigned by the switch based on the MAC address are correct Answer: BD 128. The transport layer protocol has UDP and TCP, but UDP is more reliable than TCP. A. True B. False Answer: B 129. In the VRP operating system, how to enter the view of OSPF area 0? (Multiple choice) A. [Huawei-ospf-1] area 0.0.0.0 B. [Huawei] ospf area 0 38 / 40 C. [Huawei-ospf-1] area 0 enable D. [Huawei-ospf-1] area 0 Answer: AD 130. Which statement about ARP packets is wrong? A. ARP request message is sent by broadcast B. ARP packets cannot be forwarded to other broadcast domains C. The ARP reply message is sent by the unicast party D. Any link layer protocol needs ARP protocol assistance Answer: D 131. During the establishment of a CAPWAP tunnel, after the AC receives the Join Request message sent by the AP, the AC will check the validity of the AP. Which of the following options are the authentication methods supported by the AC? (Multiple choice) A. SN certification B. Password authentication C. MAC authentication D. Not certified Answer: ACD 132. What is the processing behavior of the switch receiving the data frame? (Multiple choice) A. Forward B. Flooding c. discard D. Re-forward from the receiving port Answer: ABC 133. What are the advantages of stacking and clustering technologies? (Multiple choice) A. How long is the number of extended ports? B. Link aggregation across physical devices can be deployed C. Troubleshoot communication failures D. Simplify configuration management and manage one logical device Answer: ABD 39 / 40 More Hot Exams are available. 350-401 ENCOR Exam Dumps 350-801 CLCOR Exam Dumps 200-301 CCNA Exam Dumps Powered by TCPDF (www.tcpdf.org) 40 / 40 https://www.certqueen.com/promotion.asp https://www.certqueen.com/350-401.html https://www.certqueen.com/350-801.html https://www.certqueen.com/200-301.html http://www.tcpdf.org
Compartilhar