Buscar

H12-811_V1 0-ENU Huawei Actual Questions

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes
Você viu 3, do total de 40 páginas

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes
Você viu 6, do total de 40 páginas

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes
Você viu 9, do total de 40 páginas

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Prévia do material em texto

H12-811_V1.0-ENU
Exam Name: HCIA-Datacom V1.0
Full version: 882 Q&As
Full version of H12-811_V1.0-ENU Dumps
Share some H12-811_V1.0-ENU exam dumps
below.
1. On Huawei routers, by default, the value of the internal routing priority of the OSPF protocol
is?
A.20
B.10
 1 / 40
https://www.certqueen.com/H12-811_V1.0-ENU.html
C.30
D.1
Answer: B
2. BFD can implement link status detection at the ms (millisecond) level.
A. True
B. False
Answer: A
3. Which message does the DHCP server use to confirm that the host can use the IP address?
A. DHCP ACK
B. DHCP DISCOVER
C. DHCP REQUEST
D.DHCP OFFER
Answer: A
4. What is the total length of the VLAN frame defined by IEEE802.1Q?
A.1
B.2
C.3
D.4
Answer: D
5. The administrator cannot log in to the Huawei router through Telnet, but other administrators
can log in normally, so which of the following items is the possible reason? (Multiple choice)
A. The administrator user account has been disabled
B. The Telnet service of the AR2200 router has been disabled
C. The permission level of the administrator user account has been changed to 0
D. The administrator user account has been deleted
Answer: AD
6. NFV (Network Functional Virtualization), network function virtualization, realizes the
deployment of network applications in a software-based manner.
A. True
B. False
Answer: A
 2 / 40
7. If the administrator wants to completely delete the old device configuration file <config.zip>,
which of the following command is correct?
A. reset config.zip
B. delete /unreserved config.zip
C. clear config.zip
D. delete /force config.zip
Answer: B
8. If the network composed of switches does not enable STP, there must be a layer 2 loop.
A. True
B. False
Answer: B
9. What mechanisms can VRRP be combined with to monitor the connectivity of the uplink?
(Multiple choice)
A. Interface track
B. BFD
C. NQA
D. Ip-link
Answer: ABCD
10. When data is accessed, when accessing different network segments, the destination MAC
on the source host encapsulates the MAC address of the gateway.
A. True
B. False
Answer: A
11. In the eSight subnet, which resources can be managed are described correctly? (Multiple
choice)
A. Equipment
B. Subnet
C. link
D. Other subnets cannot be nested under the subnet
Answer: ABC
 3 / 40
12. On Huawei equipment, if AAA authentication is used for authorization, when the remote
server does not respond, authorization can be performed from the network equipment side.
A. True
B. False
Answer: A
13. What is the MAC address of the data link layer that identifies the VAP on the AP in the
WLAN?
A. BSS
B. BSSID
C. SSID
D.ESS
Answer: B
14. When the host accesses the web server of the server, the value of the network layer
protocol field is 6.
A. True
B. False
Answer: A
15. Which of the following statements about the usage scenarios of the DHCP protocol is
correct?
A. After the DHCP continues to receive the DHCP request or response message, it will directly
forward the message format without modifying the message format.
B. Multiple DHCP servers are not allowed in the network
C. DCHP client and DHCP server must be connected to the same switch
D. If the DHCP client and the DHCP server are not in the same network segment, the DHCP
message needs to be forwarded through the DHCP relay
Answer: D
16. BFD is only a general fast detection technology, which can realize the fast switching
function by itself, and it does not need to be used together with other fast switching
technologies.
A. True
B. False
Answer: B
 4 / 40
17. In the network shown in the figure, which of the following configurations can enable host A
to access the Internet, but host B cannot? (Multiple choice)
A. acl number 2000
rule 5 deny source 100.0.12.0.0.0.0.255
rule 10 permit
#
interface GigabitEthernet0/0/3
traffic-filter outbound acl 2000
#
B. acl number 2000
rule 5 permit source 100.0.13.0.0.0.0.255
rule 10 deny source 100.0.12.0.0.0.0.255
#
interface GigabitEthernet0/0/3
 5 / 40
traffic-filter outbound acl 2000
#
C. acl number 2000
rule 5 permit source 100.0.13.0.0.0.0.255
rule 10 deny
#
interface GigabitEthernet0/0/3
traffic-filter outbound acl 2000
#
D. acl number 2000
rule 5 deny source 100.0.12.0.0.0.0.255
rule 10 permit source 100.0.13.0.0.0.0.255
#
interface GigabitEthernet0/0/3
traffic-filter outbound acl 2000
#
Answer: ABCD
18. which of the following service priority description in DSCP is correct?
A. AF has priority over EH
B. The packet loss rate of AF11 is higher than that of AF12
C. CS has the highest priority
D. AF11 priority is higher than AF4
Answer: C
19. The configuration information of the switch G0/0/1 port is shown in the figure, which VLAN
data frame does not carry the VLAN TAG when the switch forwards?
#
interface GigabitEthernet0/0/1
port link-type trunk
port trunk pvid vlan 10
port trunk allow-pass vlan 10 20 30 40
#
A.10
B.30
C.20
 6 / 40
D. 40
Answer: A
20. Which of the following parameters should be considered when electing the root port in STP?
(Multiple choice)
A. The mac address of the port
B. Port priority
C. Port slot number, such as G0/0/1
D. Duplex mode of the port
E. The cost of the port reaching the root switch
Answer: BCE
21. Which of the following IPv4 addresses cannot be used by a host to directly access the
Internet?
A.50.1.1.1
B.10.1.1.1
C.100.1.1.1
D. 200.1.1.1
Answer: B
22. The login timeout time in the VRP system can only be set under the VTY interface.
A. True
B. False
Answer: B
23. What is the full name of VRP?
A. Versatile Redundancy Platform
B. Versatile Routing Protocol
C. Virtual Routing Platform
D. Versatile Routing Platform
Answer: D
24. When configuring OSPF on a router, what must be manually configured? (Multiple choice)
A. Specify the network type of each OSPF-enabled interface
B. Create an OSPF area
C. Create an OSPF process
 7 / 40
D. Configure Router ID
Answer: BC
25. When using Telnet to log in to the router, which authentication methods can be selected?
(Multiple choice)
A. password authentication
B. AAA Local Authentication
C. Not certified
D. MD5 ciphertext authentication
Answer: ABC
26. The port numbers used in the control tunnel and data tunnel transmission of CAPWAP are
the same.
A. True
B. False
Answer: B
27. In the network shown in the figure below, when the OSPF neighbor status is stable, what is
the neighbor status of Router B and Router C?
 8 / 40
A. Full
B. 2-way
C. Attempt
D. Down
Answer: B
28. The network structure and OSPF partitions are shown in the figure. Except for RTA in the
figure, routers RTB, RTC and RTD are all ABR routers.
 9 / 40
A. True
B. False
Answer: B
29. As shown in the figure, if the command ping 1.1.1.2 is executed on R1, the data frame
received by LSW1 from VLAN10 of LSW2 is tagged.
 10 / 40
A. True
B. False
Answer: A
The multicast address of the requested node corresponding to 809.2001::12:1 is
FF02::1:FF12:1.
A. True
B. False
Answer: A
30. SR (Segment Routing), as a new tunnel technology replacing MPLS, has attracted more
and more attention. Many users hope to introduce SR technology to simplify network
deployment and management and reduce CAPEX (Capital Expenditure). SR, as the current
mainstream tunnel technology, is widely used in bearer networks.
A. True
B. False
 11 / 40
Answer: B
31. Which of the following IPv4 addresses are Class A addresses? (Multiple choice)
A. 100.1.1.1
B.172.16.1.1
C.192.168.1.1
D. 127.0.0.1
Answer: AD
32. Regarding the control plane of the device, which of the following statements is correct?
(Multiple choice)
A. The control plane providesdevice monitoring capabilities.
B. The controller plane is responsible for generating the IP routing table.
C. The control plane is responsible for directing data forwarding.
D. The control plane is responsible for the interaction of routing protocols between devices.
Answer: BD
33. Which of the following agreements is the PPP agreement composed of? (Multiple choice)
A. NCP
B. Authentication protocol
C.LCP
D. PPPOE
Answer: ABC
34. How many bits are the total length of the interface identifier of the link-local unicast
address?
A. 64bit
B. 32bit
C.96bit
D. 48bit
Answer: A
35. In the RSTP protocol, when the root port fails, () will quickly switch to a new root port and
immediately enter the forwarding state?
A. Forwarding port
B. Alternate port
 12 / 40
C. Backup port
D. Edge port
Answer: B
36. VRP supports OSPF multi-process. If no process number is specified when OSPF is
enabled, the default process number is?
A.0
B.1 _
C.10
D.100
Answer: B
37. If there is no security policy configured in the inter-zone of the firewall, or when searching for
security policies, all the security policies are not hit, then which of the following default packet
filtering action of the inter-zone is executed by default?
A. Only part of the passage is allowed
B. Refusal to pass
C. Escalate to Administrator
D. Different applications have different default actions
Answer: B
38. The last option field (option) of IPv4 is optional information with variable length. The
maximum length of this field is?
A. 10B
B. 40B
C.60B
D. 20B
Answer: B
39. If the Ethernet data frame Length/type=0x0806, which of the following statements is correct?
(Multiple choice)
A. The destination MAC address of this data frame may be FFFF-FFFF-FFFF
B. The source MAC address of this data frame must not be FFFF-FFFF-FFFF
C. This data frame is an IEEE 802.3 frame
D. This data frame is an Ethernet II frame
Answer: BD
 13 / 40
40. What is the MAC address of the data link layer of each VAP on the AP?
A. SSID
B. BSSID
C. BSS
D.ESS
Answer: B
41. Which of the following descriptions about switches is wrong?
A. Switches generally work at the data link layer
B. The switch can complete the exchange of data frames
C. The switch can provide network access services for terminal equipment (PC, server)
D. The switch is generally used as the egress device of the network
Answer: D
42. What advantages does the OSPF protocol have? (Multiple choice)
A. Division of Support Regions
B. OSPF supports load balancing for equal-cost routes
C. OSPF supports packet authentication
D. OSPF supports typeless inter-domain routing (CIDR)
Answer: ABCD
43. As shown in the figure, it is the port status information displayed on a switch running STP.
According to this information, which of the following descriptions is wrong?
MSTID Port Role STP State Protection
0 GigabitEthernet0/0/1 DESI FORWARDING NONE
0 GigabitEthernet0/0/2 DESI FORWARDING NONE
0 GigabitEthernet0/0/3 DESI FORWARDING NONE
0 GigabitEthernet0/0/21 DESI FORWARDING NONE
0 GigabitEthernet0/0/22 DESI FORWARDING NONE
0 GigabitEthernet0/0/23 DESI FORWARDING NONE
A. This switch is the root switch in the network
B. The priority of this switch is 0
C. This network may only contain this switch
D. This switch may be connected to 6 other switches
Answer: B
 14 / 40
44. In the MPLS network, the switch will assign labels. Which of the following description of the
label assignment method is correct?
A. The downstream LSR can decide to assign the label to a specific FEC, and then notify the
upstream LSR
B. Downstream on demand DoD (downstream on demand) means that for a specific FEC, the
LSR does not need to obtain a label request message from the upstream to perform label
allocation and distribution.
C. The downstream autonomous label allocation method means that for a specific FEC, the
LSR performs label allocation and distribution after obtaining the label request message.
D. The label publishing methods used by the upstream LSR and the downstream LSR with label
distribution adjacency can be the same
Answer: A
45. How many bits are specified in the bridge priority in the spanning tree protocol?
A.16
B.8
C.2
D.4
Answer: A
46. By default, what is the period for sending OSPF protocol HELLO messages on the
broadcast network?
A. 10s
B. 30s
C. 20s
D. 40s
Answer: A
47. In an OSPF broadcast network, which routers will a DRother router exchange link state
information with? (Multiple choice)
A. BDR
B. All OSPF neighbors
C. DR Other
D.DR
Answer: AD
 15 / 40
48. On the switch, vlan batch can be used to create vlans in batches to simplify configuration.
A. True
B. False
Answer: A
49. The data link layer uses PPP encapsulation, and the IP addresses at both ends of the link
may not be in the same network segment.
A. True
B. False
Answer: A
50. The broadcast address of the network segment 192.168.1.0/25 is 192.168.1.128.
A. True
B. False
Answer: B
51. During the online process of FIT, the software version will be downloaded on the AC.
A. True
B. False
Answer: B
52. SR (SegmentRouting) defines destination address prefixes/nodes and adjacencies in the
network as segments, and assigns SIDs (SegmentID) to these segments. A forwarding path is
obtained by unordered arrangement (Segment List) of Adjacency SID (adjacent segment) and
Prefix/Node SID (destination address prefix/node segment).
A. True
B. False
Answer: B
53. The administrator plans to implement route backup by configuring static floating routes, so
what is the correct way to implement it?
A. The administrator only needs to configure two static routes
B. The administrator needs to configure different metric values for the active static route and the
backup static route
C. The administrator needs to configure different protocol priority values for the active static
 16 / 40
route and the backup static route
D. The administrator needs to configure different TAGs for the active static route and the
backup static route
Answer: C
54. In order to join a wireless network, TA needs to obtain wireless network information first.
Which of the following messages does STA use to actively obtain SSID information?
A. Join
B. Discovery
C. Beacon
D. Probe
Answer: D
55. Which of the following statements about ASPF and Server-map is correct? (Multiple choice)
A. ASPF checks the application layer protocol information and monitors the application layer
protocol status of the connection
B. ASPF dynamically generates ACL to determine whether the packet passes through the
firewall
C. Configure NAT Server to generate a static Server-map
D. The Server-map table uses five-tuples to represent a session
Answer: AC
56. In WLAN, it is used to receive wireless networks. What distinguishes different wireless
networks?
A. AP Name
B. BSSID
C. SSID
D. VAP
Answer: C
57. Which of the following descriptions of OSPF is correct? (Multiple choice)
A. The number of the backbone area cannot be 2
B. Area numbers from 0.0.0.0-255.255.255.255
C. All networks should be declared in area 0
D. Before configuring an OSPF area, an IP address must be configured for the loopback port of
the router
 17 / 40
Answer: AB
58. The DHCP request message is sent by broadcast.
A. True
B. False
Answer: B
59. Based on ACL rules, which of the following types can ACL be divided into? (Multiple choice)
A. Basic ACLs
B. User ACLs
C. Advanced ACLs
D. Layer 2 ACL
Answer: ABCD
60. Ethernet frames are processed and forwarded in the form of VLAN TAG inside the switch.
A. True
B. False
Answer: A
61. The login timeout function in VRP can only be set under the VTY interface.
A. True
B. False
Answer: B
62. The source VTEP encapsulates the ARP broadcast sent by the source VM into a multicast
packet and sendsit to the L3 network
63. Which of the following IPv6 addresses is a link-local address?
A. FC00::2E0:FCFF:FEEF:FEC
B. FE80::2E0:FCFF:FEEF:FEC
C. 2000::2E0:FCFF:FEEF:FEC
D. FF02::2E0:FCFF:FEEF:FEC
Answer: B
64. The configuration of the country code will affect the frequency used for actual transmission
and the maximum transmission power.
A. True
 18 / 40
B. False
Answer: A
65. In the network shown in the figure, which of the following descriptions is correct? (Multiple
choice)
A. The network between RTA and SWC is the same collision domain
B. The network between SWA and SWB is the same broadcast domain
C. The network between SWA and SWC is the same collision domain
D. The network between SWA and SWC is the same broadcast domain
Answer: CD
66. The MPLS label header is encapsulated between the data link layer header and the network
layer header of the message.
A. True
B. False
Answer: A
67. Which of the following IPv6 addresses is a global unicast address?
A. 2001::12:1
B. FE80::2E0:FCFF:FEEF:FEC
 19 / 40
C. FF02::2E0:FCFF:FEEF:FEC
D. FF02::1
Answer: A
68. Which of the following belongs to the transfer process of MPLS VPN routing? (Multiple
choice)
A. Routing exchange between CE and PE
B. The process of assigning public network labels
C. The process of injecting VRF routes into MP-BGP
D. The process of injecting MP-BGP routes into VRF
Answer: ABCD
69. Two authentication domains "Area 1" and "Area2" are configured on a router acting as an
authentication server. If a user authenticates with the correct user name "huawei" and password
"hello", the user will be assigned to which authentication domain?
A. Authentication domain "default_admin domain"
B. Authentication domain "default domain"
C. Authentication domain "Area1"
D. Authentication domain "Area2"
Answer: B
70. How many bits are there in the VLAN ID in the VLAN frame format defined by IEEE802.1Q?
A. 6
B. 10
C. 12
D. 8
Answer: C
71. In the OSI reference model, what can complete end-to-end error detection and flow control
is?
A. Data link layer
B. Network layer
C. Physical layer
D. Transport layer
Answer: D
 20 / 40
72. Referring to the configuration of one-arm routing in the figure below, it can be judged that
even if the ARP proxy is not enabled on the sub-interface of R1, the administrative department
and the financial department can communicate with each other.
A. True
B. False
Answer: B
73. Which of the following IEEE802.11 standards only supports communication in the 2.4GHz
frequency band?
A. 802.11n
B. 802.11g
C. 802.11ax
D. 802.11a
Answer: B
74. A certain device has been configured with TeInet configuration. The login address of the
device is 10.1.1.10, the Telnet user name is admin, and the password is Huawei@123.
What is the correct way to log in to this device using telnetlib?
A. telnetlib.Telnet (10.1.1.0, admin)
B. telnetlib.Telnet (10.1.1.0, 23, admin, Huawei@123)
 21 / 40
C. telnetlib.Telnet (10.1.1.0)
D. telnetlib.Telnet (10.1.1.0, admin, Huawei@123)
Answer: C
75. The network shown in the figure below, which of the following statements is correct?
(Multiple choice)
 22 / 40
A. Host A and host C can ping through
B. All hosts can ping each other
 23 / 40
C. Host B and host C can ping through
D. Host A and host B cannot ping through
Answer: ACD
76. On the command line interface of the Huawei AR router, the save command is used to save
the current system time.
A. True
B. False
Answer: B
77. Must all interfaces of routers running OSPF belong to the same area.
A. True
B. False
Answer: B
78. On serial interfaces, static routing can be configured by specifying the next-hop address or
outgoing interface.
A. True
B. False
Answer: A
79. For a switch running the STP protocol, the port in the Learning state needs to wait for the
forwarding delay before it can be transformed into the Forwarding state.
A. True
B. False
Answer: A
80. The broadcast address of 200.200.200.200/30 is?
A. 200.200.200.203
B. 200.200.200.200
C. 200.200.200.255
D. 200.200.200.252
Answer: A
81. As shown in the figure, there is a web server in the private network that needs to provide
HTTP services to users on the public network. Therefore, the network administrator needs to
 24 / 40
configure NAT on the gateway router RTA to meet the requirements. Which of the following
configurations can meet the requirements?
A. [RTA-GigabitEthernet0/0/1] nat server protocol tcp global 202.10.10.1 www inside
192.168.1.1 8080
B. [RTA-Serial1/0/1] nat server protocol tcp global 202.10.10.1 www inside 192.168.1.1 8080
C. [RTA-GigabitEthernet0/0/1] nat server protocol tcp global 192.168.1.1 www inside
202.10.10.1 8080
D. [RTA-Serial1/0/1] nat server protocol tcp global 192.168.1.1 www inside 202.10.10.1 8080
Answer: B
82. Which of the following does not include the advantages of Wi-Fi6 over Wi-Fi5?
A. Higher consumption
B. Higher number of access terminals per AP
C. Lower transmission delay
D. Higher bandwidth
Answer: A
83. Which of the following addresses cannot be used as the IPv4 address of the host?
A. Class C address
B. Class A address
C. Class B address
D. Class D address
Answer: D
84. How many bits is the total length of the IPV6 address?
A.64
B.96
C.128
 25 / 40
D.32
Answer: C
85. The function of telnet.read_very_eager in Telnetlib is to read data non-blockingly. Usually
needs to be used together with the time module.
A. True
B. False
Answer: A
86. After the destination VTEP receives the multicast packet, it learns the mapping relationship
between the source VM and the VTEP, and forwards the multicast packet to the local VM
87. An error occurred when the client accessed the FTP server. It was found that there is no
problem with the connectivity between the server and the client. Which of the following server
ports may be blocked to cause the problem? (Multiple choice)
A. 21
B. 20
C. 50649
D. 80
Answer: AB
88. The administrator finds that the two routers stay in the 2-way state when establishing OSPF
neighbor relations. Which of the following description is correct?
A. These two routers are DR Other routers in the broadcast network
B. The router is configured with a wrong Router ID
C. The router is configured with the same process
D. The routers are configured with the same area ID
Answer: A
89. According to the command output shown in the figure, which of the following descriptions is
correct? (Multiple choice)
 26 / 40
A. GigabitEthernet0/0/1 allows VLAN1 to pass through
B. GigabitEthernet0/0/1 does not allow VLAN1 to pass through
C. If you want to change GigabitEthernet0/0/1 into an Access port, you first need to use the
command "undo port trunk allow-pass vlan all"
D. If you want to change GigabitEthernet0/0/1 into an Access port, you first need to use the
command "undo port trunk allow-pass vlan 2 to 4094"
Answer: AD
90. What are the advantages of PQ+WFQ? (Multiple choice)
A. Messages with different priorities cannot be treated differently
B. It can ensure that low-latency services can be dispatched in time
C. Implement bandwidth allocation by weight
D. Realize the needs of flexible classification of messages according to user-defined
Answer: BC
91. Only one SSID can be bound to one radio frequency of AP.
A. True
B. False
Answer: B
92. Which one is correct about the configuration description on this switch? (Multiple choice)
[Quidway] dhcp enable
[Quidway] interface Vlanif 100
[Quidway-Vlanifl00] dhcp select relay
[Quidway-Vlanifl00] dhcp relay server-select dhcpgroup1
A. By default, the DHCP service must be enabled when configuring the DHCP server and
DHCP delay
B. The VLAN IF100 interface will relay the received DHCP message tothe external DHCP
 27 / 40
Server
C. Specify the DHCP server group as DHCP group for VLAN IF100 interface
D. First, you need to create a DHCP server group and add a DHCP server to the server group
E. By default, DHCP group1 will automatically add DHCP servers in the network
Answer: ABCD
93. By default, the root path cost of the root bridge in the STP protocol must be.
A. True
B. False
Answer: A
94. The role of the collaboration layer in the SDN architecture is to complete service deployment
based on user intentions. OpenStack belongs to the business collaboration layer.
A. True
B. False
Answer: A
95. The subnet mask of a network segment 150.25.0.0 is 255.255.224.0, then () is a valid host
address in this network segment? (Multiple choice)
A. 150.15.3.30
B. 150.25.0.0
C.150.25.2.24
D. 150.25.1.255
Answer: CD
96. Which of the following statements about the ACL matching mechanism is correct? (Multiple
choice)
Which of the following statements about the ACL matching mechanism is correct?
A. If the ACL does not exist, the ACL matching result is returned: no match
B. If the last rule packet is still not matched, the ACL matching result will be returned: no match
C. By default, the search starts from the rule with the smallest number in the ACL. Once a rule
is matched, the search for subsequent rules is stopped.
D. No matter whether the result of the packet matching ACL is "mismatch", "permit" or "deny",
whether the packet is finally allowed or denied is actually determined by each business module
that applies the ACL
Answer: ABCD
 28 / 40
97. Which message does the OSPF protocol use to confirm the received LSU message?
A. LSU
B. LSACK
C.LSR
D. LSA
Answer: B
98. The requested node multicast address consists of the prefix FF02::1:FF00:0/104 and the
last 24 bits of the unicast address.
A. True
B. False
Answer: A
99. Which of the following statements is correct?
A. The router works at the network layer
B. The switch works at the physical layer
C. The switch works at the network layer
D. The router works at the physical layer
Answer: A
100. By default, the bridge priority of the switch spanning tree is 32768 by default.
A. True
B. False
Answer: A
101. As shown in the figure, two hosts communicate between VLANs through single-arm
routing. When the G0/0/1.2 sub-interface of RTA receives the data frame sent by host B to host
A, which of the following operations will RTA perform?
 29 / 40
A. RTA forwards the data directly through the G0/0/1.1 sub-interface
B. After RIA deletes VLAN tag 20, it is sent out by G0/0/1.1 interface
C. RTA will discard the data frame
D. RTA first deletes the VLAN tag 20, then adds the VLAN tag 10, and then sends it out through
the G0/0/1.1 interface
Answer: D
102. VLSM can expand any IP network segment, including class D addresses.
A. True
B. False
Answer: B
103. What modes does device link aggregation support? (Multiple choice)
A. Manual load sharing mode
B. Manual active/standby mode
C. Blend Mode
D.LACP mode
 30 / 40
Answer: AD
104. Which of the following versions of SNMP supports the encryption feature?
A. SNMPv3
B. SNMP 2c
C. SNMP 2
D. SNMP 1
Answer: A
105. In the STP protocol, the Message Age in the configuration BPDU sent by the root bridge is
0.
A. True
B. False
Answer: A
106. Which of the following SNMP messages is sent by the Agent on the managed device to the
NMS?
A. Response
B. Get-Request
C. Set-Request
D. Get-Next-Request
Answer: A
107. RSTP protocol does not include which of the following port states?
A. Forwarding
B. Learning
C. Discarding
D. Blocking
Answer: D
108. A Layer 2 Ethernet switch generates MAC address table entries based on the () of the
Ethernet frame received by the port?
A. Destination MAC address
B. Destination IP address
C. Source IP address
D. Source MAC address
 31 / 40
Answer: D
109. The Radius information configuration of the router is as follows, which of the following
statements is correct? (Multiple choice)
radius-server template Huawei
radius-server shared-key cipher Huawei
radius-server authentication 200.0.12.1 1812
radius-server accounting 200.0.12.1 1813
radius-attribute nas-ip 200.0.12.2
#
A. The source IP address of the router sending the Radius packet is 200.0.12.2
B. The IP address of the authorization server is 200.0.12.1
C. The IP address of the authentication server is 200.0.12.1
D. The IP address of the billing server is 200.0.12.1
Answer: ACD
110. A company applies for a class C IP address segment, which needs to be evenly distributed
to 8 subsidiaries. The largest subsidiary has 14 computers. Different subsidiaries must be in
different network segments. The subnet mask should be set to?
A. 255.255.255.192
B. 255.255.255.240
C. 255.255.255.0
D. 255.255.255.128
Answer: B
111. Routers in the backbone area have complete link state information for all other areas.
A. True
B. False
Answer: B
112. In the network shown in the figure below, the switch uses the VLANIF interface to connect
with the sub-interface of the router. Which of the following configurations can meet this
requirement?
 32 / 40
A. interface Vlanif10
ip address 10.0.12.1 255.255.255.0
#
interface GigabitEthernet 0/0/2
port link-type trunk
port trunk pvid 10
port trunk allow-pass vlan 10
#
B. interface Vlanif10
ip address 10.0.12.1 255.255.255.0
#
interface GigabitEthernet 0/0/2
port link-type trunk
port trunk allow-pass vlan 10
#
C. interface Vlanif10
ip address 10.0.12.1 255.255.255.0
#
interface GigabitEthernet 0/0/2
port link-type hybrid
port hybrid untag vlan 10
#
D. interface Vlanif10
ip address 10.0.12.1 255.255.255.0
#
interface GigabitEthernet 0/0/2
port link-type access
port default vlan 10
#
Answer: B
 33 / 40
113. The function of telnet.read.all() in telnetlib is to read all the data until EOF. If the echo does
not return EOF, it will be blocked consistently.
A. True
B. False
Answer: B
114. AAA does not contain which of the following?
A. Authorization
B. Accounting
C. Authentication
D. Audit
Answer: D
115. MIB (management information base) is a virtual database that only exists on the NMS.
A. True
B. False
Answer: B
116. By default, it takes at least 30 seconds for the port state in the STP protocol to change
from Disabled to Forwarding state.
A. True
B. False
Answer: A
117. The configuration information of an interface of a router is as follows, which VLAN data
packet can this port receive?
#
interface GigabitEthernet0/0/2.30
dot1q termination vid 100
ip address 10.0.21.1 255.255.255.0
arp broadcast enable
#
A. 100
B.20
C.30
 34 / 40
D.1
Answer: A
118. After the switch running the RSTP protocol receives the BPDU with the TC set, it clears the
MAC addresses learned by all ports.
A. True
B. False
Answer: B
119. What are the advantages of using the Dynamic Host Configuration Protocol DHCP to
assign IP addresses? (Multiple choice)
A. IP address reuse can be realized
B. The workload is heavy and difficult to manage
C. If the configuration information changes (such as DNS), only the administrator needs to
modify it on the DHCP server to facilitate unified management
D. Avoid IP address conflicts
Answer: CD
120. An ACL rule is as follows: Which of the following IP addresses can be matched by the
permit rule rule 5 permit ip source 10.0.2.0 0.0.254.255? (Multiple choice)
A.7.1.2.1
B.9.1.1.1
C.8.2.2.1
D.6.1.3.1
Answer: BD
121. Which of the following analysis about ICMP messages is correct? (Multiple choice)
A. ICMP packets are encapsulated in IP packets without transport layer encapsulation
B. ICMP packets cannot be used to detect the MTU in the path
C. ICMP messages can record time, including original time, receivingtime, and sending time
D. The ICMP protocol does not support the redirection function
E. ICMP messages include ICMP error messages, control messages, request/response
messages, and refresh messages
Answer: AC
122. Which of the following is correct about RS and RA in IPv6? (Multiple choice)
 35 / 40
A. RA is used to request address prefix information
B. RA is used to reply address prefix information
C. RS is used to request address prefix information
D. RS is used to reply address prefix information
Answer: BC
123. The Tracert diagnostic tool records the () of each ICMP TTL timeout message, so as to
provide the user with the IP address through which the message reaches the destination?
A. Destination port
B. Destination IP address
C. Source port
D. Source IP address
Answer: D
124. Which of the following characteristics does the default VLAN in a Layer 2 Ethernet switch
have? (Multiple choice)
A. The default VLAN cannot be deleted manually
B. By default, all ports of the switch are member ports of the default VLAN
C. A default VLAN must be created before a port can be assigned to it
D. The IP address configured on the switch will only be applied to the member ports of the
default VLAN
Answer: AB
125. A switch receives a unicast data frame with a VLAN tag, but finds that the destination MAC
address of the data frame cannot be found in its MAC address table, then the switch's
processing behavior for the data frame is?
A. The switch will broadcast the data frame to all ports
B. The switch will broadcast this data frame to all Access ports
C. The switch will discard the data frame
D. The switch will broadcast the data frame to all ports (except the receiving port) belonging to
the VLAN where the data frame is located
Answer: D
126. In the network shown in the figure below, when the OSPF neighbor status is stable, what is
the neighbor status of Router A and Router B?
 36 / 40
A. Full
B. Attempt
C. 2-way
D. Down
Answer: A
127. As shown in the figure, which statement is correct about the VLAN configuration on the
Huawei switch? (Multiple choice)
 37 / 40
A. Client3 belongs to VLAN30, and the command to divide VLAN on the switch is correct
B. Client1 belongs to VLAN10, and the command to divide VLAN on the switch is correct
C. Client4 belongs to VLAN40, and the command to divide VLAN on the switch is correct
D. Client2 belongs to VLAN 20, and the commands assigned by the switch based on the MAC
address are correct
Answer: BD
128. The transport layer protocol has UDP and TCP, but UDP is more reliable than TCP.
A. True
B. False
Answer: B
129. In the VRP operating system, how to enter the view of OSPF area 0? (Multiple choice)
A. [Huawei-ospf-1] area 0.0.0.0
B. [Huawei] ospf area 0
 38 / 40
C. [Huawei-ospf-1] area 0 enable
D. [Huawei-ospf-1] area 0
Answer: AD
130. Which statement about ARP packets is wrong?
A. ARP request message is sent by broadcast
B. ARP packets cannot be forwarded to other broadcast domains
C. The ARP reply message is sent by the unicast party
D. Any link layer protocol needs ARP protocol assistance
Answer: D
131. During the establishment of a CAPWAP tunnel, after the AC receives the Join Request
message sent by the AP, the AC will check the validity of the AP. Which of the following options
are the authentication methods supported by the AC? (Multiple choice)
A. SN certification
B. Password authentication
C. MAC authentication
D. Not certified
Answer: ACD
132. What is the processing behavior of the switch receiving the data frame? (Multiple choice)
A. Forward
B. Flooding
c. discard
D. Re-forward from the receiving port
Answer: ABC
133. What are the advantages of stacking and clustering technologies? (Multiple choice)
A. How long is the number of extended ports?
B. Link aggregation across physical devices can be deployed
C. Troubleshoot communication failures
D. Simplify configuration management and manage one logical device
Answer: ABD
 39 / 40
 
More Hot Exams are available.
350-401 ENCOR Exam Dumps
350-801 CLCOR Exam Dumps
200-301 CCNA Exam Dumps
Powered by TCPDF (www.tcpdf.org)
 40 / 40
https://www.certqueen.com/promotion.asp
https://www.certqueen.com/350-401.html
https://www.certqueen.com/350-801.html
https://www.certqueen.com/200-301.html
http://www.tcpdf.org

Continue navegando