Logo Passei Direto
Material
Study with thousands of resources!

Text Material Preview

H12-811_V1.0-ENU HCIA-Datacom V1.0 exam dumps questions are the best
material for you to test all the related Huawei exam topics. By using the
H12-811_V1.0-ENU exam dumps questions and practicing your skills, you can
increase your confidence and chances of passing the H12-811_V1.0-ENU exam.
Features of Dumpsinfo’s products
Instant Download
Free Update in 3 Months
Money back guarantee
PDF and Software
24/7 Customer Support
Besides, Dumpsinfo also provides unlimited access. You can get all
Dumpsinfo files at lowest price.
HCIA-Datacom V1.0 H12-811_V1.0-ENU exam free dumps questions are
available below for you to study. 
Full version: H12-811_V1.0-ENU Exam Dumps Questions
1. In which state does the OSPF protocol confirm the master-slave relationship of the DD message?
A. 2-way
B. Exchange
C. Full
D. ExStart
Answer: D
2. Which of the following is related to the purpose of encapsulation and decapsulation? (Multiple
choice)
A. Shorten the length of the message
B. Encapsulation and decapsulation are important steps to realize different protocol functions
C. Interworking between different networks
 1 / 33
https://www.dumpsinfo.com/unlimited-access/
https://www.dumpsinfo.com/exam/h12-811_v1-0-enu
D. Encapsulation and decapsulation can complete the location of network faults
Answer: BC
3. In the network shown in the figure, which of the following configurations can enable host A to
access the Internet, but host B cannot? (Multiple choice)
A. acl number 2000
rule 5 deny source 100.0.12.0.0.0.0.255
rule 10 permit
#
interface GigabitEthernet0/0/3
traffic-filter outbound acl 2000
#
B. acl number 2000
rule 5 permit source 100.0.13.0.0.0.0.255
rule 10 deny source 100.0.12.0.0.0.0.255
#
interface GigabitEthernet0/0/3
traffic-filter outbound acl 2000
#
C. acl number 2000
rule 5 permit source 100.0.13.0.0.0.0.255
rule 10 deny
 2 / 33
https://www.dumpsinfo.com/
#
interface GigabitEthernet0/0/3
traffic-filter outbound acl 2000
#
D. acl number 2000
rule 5 deny source 100.0.12.0.0.0.0.255
rule 10 permit source 100.0.13.0.0.0.0.255
#
interface GigabitEthernet0/0/3
traffic-filter outbound acl 2000
#
Answer: ABCD
4. In the network shown in the figure below, all links are Ethernet links, and all interfaces of all routers
run the OSPF protocol, how many DRs are elected in the entire network?
A.1
B.2
C.4 _
D.3
Answer: C
5. The data link layer uses PPP encapsulation, and the IP addresses at both ends of the link may not
be in the same network segment.
A. True
B. False
 3 / 33
https://www.dumpsinfo.com/
Answer: A
6. Which message does the DHCP server use to confirm that the host can use the IP address?
A. DHCP ACK
B. DHCP DISCOVER
C. DHCP REQUEST
D.DHCP OFFER
Answer: A
7.What are the conditions for the eSight network management to be able to receive and manage
devices and report alarms? (Multiple choice)
A. The device is managed by the network management
B. Correct trap parameters are configured on the device side
C. The managed device on the network management must be configured with the correct SNMP
protocol and parameters
D. There must be communication between the network management and the device
Answer: ABCD
8. Which of the following IEEE802.11 standards only supports communication in the 2.4GHz
frequency band?
A. 802.11n
B. 802.11g
C. 802.11ax
D. 802.11a
Answer: B
9. The Tos field is used for QoS marking in the IP message, and the first 6 bits of the Tos field are
used to mark the DSCP.
A. True
B. False
Answer: A
10. When accessing across network segments, the source and destination IP will change, but the
source and destination MAC will not change.
A. True
B. False
Answer: B
11. The DHCP request message is sent by broadcast.
A. True
B. False
Answer: B
12. Which of the following commands can be used to check whether OSPR has correctly established
a neighbor relationship?
 4 / 33
https://www.dumpsinfo.com/
A. display ospf interface
B. display ospf peer
C. display ospf neighbor
D. display ospf brief
Answer: B
13.Only one SSID can be bound to one radio frequency of AP.
A. True
B. False
Answer: B
14. By default, the bridge priority of the switch spanning tree is 32768 by default.
A. True
B. False
Answer: A
15. All ports on the root bridge switch are designated ports.
A. True
B. False
Answer: B
16. As shown in the figure below, which of the following statements is correct?
A. Host A can ping host B through
B. Host A and host B can communicate only if the masks of host A and host B are set to be the same
C. The IP address masks of host A and host B are different, so host A and host B cannot
communicate
D. The broadcast addresses of host A and host B are the same
Answer: C
17.Which of the following information will the VRP operating platform use to prompt for incomplete
input commands?
A. Error: Incomplete command found at '^'position
B. False: Wrong parameter found at '^'position
C. Error: Ambiguous command found at '^'position
 5 / 33
https://www.dumpsinfo.com/
D. Error: Too many parameters found at '^'position
Answer: A
18. In the network shown in the figure below, the switch uses the VLANIF interface to connect with
the sub-interface of the router. Which of the following configurations can meet this requirement?
A. interface Vlanif10
ip address 10.0.12.1 255.255.255.0
#
interface GigabitEthernet 0/0/2
port link-type trunk
port trunk pvid 10
port trunk allow-pass vlan 10
#
B. interface Vlanif10
ip address 10.0.12.1 255.255.255.0
#
interface GigabitEthernet 0/0/2
port link-type trunk
port trunk allow-pass vlan 10
#
C. interface Vlanif10
ip address 10.0.12.1 255.255.255.0
#
interface GigabitEthernet 0/0/2
port link-type hybrid
port hybrid untag vlan 10
#
D. interface Vlanif10
ip address 10.0.12.1 255.255.255.0
#
interface GigabitEthernet 0/0/2
port link-type access
port default vlan 10
#
Answer: B
19. Regarding the description of the DHCP address pool, it is confirmed that? (Multiple choice)
A. Configure the address allocation method based on the global address pool, which can respond to
all ports receiving DHCP requests
B. Only when the address allocation method based on the global address pool is configured, can the
IP address range that does not participate in automatic allocation be set
 6 / 33
https://www.dumpsinfo.com/
C. Configuring the interface-based address allocation method will only respond to the DHCP request
of the interface
D. Configure the interface-based address allocation method, which can respond to all ports receiving
DHCP requests
Answer: AC
20. In which view can the administrator modify the device name for the router?
A. Protocol-view
B. User-view
C. System-view
D. Interface-view
Answer: C
21. Which of the following statements about the TTL field in the IP packet header is correct?
A. TTL defines the number of packets the source host can send
B. Every time an IP packet passes through a router, its TTL value will be increased by 1
C. TTL defines the time interval that the source host can send packets
D. Every time an IP packet passes through a router, its TTL value will be reduced by 1
Answer: D
22. Which frequencies does the IEEE 802.11n standard support? (Multiple choice)
A. 6GHz
B. 2.5GHz
C. 2.4GHz
D. 5GHz
Answer: CD
23. Which field in the IPV6 header is similar to the TTL field in the IPV4 header?
A. hop limit
B. Next header
C. Traffic class
D. Version
Answer: A
24. For a switch running the STP protocol, the port can be directly converted to the Disabled state in
any state.
A. True
B. False
Answer: A
25. A gateway must be configured for a host to communicate with other hosts.
A. True
B. False
Answer: B
 7 / 33
https://www.dumpsinfo.com/
26. Regarding the description of the characteristics of a high-availability network, which one is
correct? (Multiple choice)
A. It can recover quickly after a failure
B. Once a failure occurs, the business can onlybe restored through manual intervention
C. will not fail
D. Infrequent failure
Answer: AD
27. According to the different reference information of classification rules, traffic classification can be
divided into? (Multiple choice)
A. Simple flow classification
B. Complex traffic classification
C. On-demand stream classification
D. Traffic Classification
Answer: AB
28. Which of the following commands can be used to view the CPU usage of the router?
A. display cpu-usage
B. display memory
C. display cpu-state
D. display interface
Answer: A
29. LDP neighbor discovery has different implementation mechanisms and regulations. which of the
following description about LDP neighbor discovery is wrong?
A. LDP discovery mechanism includes LDP basic discovery mechanism and LDP extended discovery
mechanism
B. The basic LDP discovery mechanism can automatically discover LDP Peers directly connected to
the same link
C. LDP extended discovery mechanism can discover non-directly connected LDP Peers
D. The LDP discovery mechanism needs to clearly specify the LDP Peer
Answer: D
30. Which of the following versions of SNMP supports the encryption feature?
A. SNMPv3
B. SNMP 2c
C. SNMP 2
D. SNMP 1
Answer: A
31. NAPT distinguishes the IP addresses of different users through the protocol numbers in TCP or
UDP or IP packets.
A. True
B. False
Answer: B
 8 / 33
https://www.dumpsinfo.com/
32. The switch receives a unicast data frame. If the destination MAC of the data frame can be found
in the MAC table, the data frame will definitely be forwarded from the port corresponding to the MAC.
A. True
B. False
Answer: B
33. Regarding the display startup information of the AR2200 router, which statement is wrong about
this information?
A. The system files for the next startup of the device can be modified using the command "startup
system software"
B. The running configuration file is not saved
C. The system file used by the device to start this time is ar2220-v200r003c00spc00.cc
D. The system files cannot be modified when the device starts next time
Answer: D
34. Which statement about the TTL field in the IPv4 header is correct? (Multiple choice)
A. TTL value length is 80bit
B. Every time a packet passes through a Layer 3 device, the TTL value is reduced by 1
C. When there is a loop in the route, the TTL value can be used to prevent the data packet from being
forwarded infinitely
D. The range of TTL value is 0-255
Answer: BCD
35. Which of the following MAC addresses cannot be used as the MAC address of the host network
card? (Multiple choice)
A. 00-02-03-04-05-06
B. 03-04-05-06-07-08
C. 02-03-04-05-06-07
 9 / 33
https://www.dumpsinfo.com/
D. 01-02-03-04-05-06
Answer: BD
36. In the switch MAC address table, which of the following entries will not age?
A. Dynamic MAC address entries
B. Device MAC address entry
C. Static MAC address entry
D. Port MAC address entry
Answer: C
37. Telnetlib is a template that comes with Python to implement the Telnet protocol.
A. True
B. False
Answer: A
38. Which of the following statements about RA and RS packets in IPv6 is correct? (Multiple choice)
A. RS is used to request address prefix information
B. RS is used to reply address prefix information
C. RA is used to reply address prefix information
D. RA is used to request address prefix information
Answer: AC
39. The configuration information of a certain port of the switch is shown in the figure, which of the
following statements is wrong?
#
interface GigabitEthernet0/0/2
port hybrid pvid vlan 100
port hybrid tagged vlan 100
port hybrid untagged vlan 200.
#
A. The port type is Hybrid
B. If the VLAN TAG carried by the data frame is 200, the switch strips the VLAN TAG and sends
C. If the port receives a data frame without VLAN TAG, the switch needs to add VLAN TAG 100
D. If the VLAN TAG carried by the data frame is 100, the switch strips the VLAN TAG and sends
Answer: D
40. On the switch, vlan batch can be used to create vlans in batches to simplify configuration.
A. True
B. False
Answer: A
41. In the network shown in the figure below, host A is not configured with a gateway, and host B has
an ARP cache of the gateway. Which of the following statements is correct? (Multiple choice)
 10 / 33
https://www.dumpsinfo.com/
A. Enable ARP proxy on the router G0/0/1 port, then host A can communicate with host B
B. The data packet sent by host B with the destination IP address 10.0.12.1 can be forwarded to host
A
C. The data packet sent by host A with the destination IP address 11.0.12.1 can be forwarded to host
B
D. Host A and host B cannot communicate bidirectionally
Answer: BD
42. The security policy of WEP mode supports the use of TKIP for data encryption.
A. True
B. False
Answer: B
43. In order to ensure that the same data flow is forwarded on the same physical link, which method
of load sharing does Eth-Trunk use?
A. Flow-based load balancing
B. Packet-Based Load Balancing
C. Load sharing based on application layer information
D. Load sharing based on the incoming interface of data packets
Answer: A
44. Bandwidth determines the rate of data transmission, and the maximum bandwidth of transmission
is determined by the minimum link bandwidth on the transmission path.
A. True
B. False
Answer: A
45. In the alarm management function of eSight, its alarm levels are divided into which of the
following four types?
A. Urgent, Minor, General, Reminder
B. Urgent, Important, Major, Reminder
C. Urgent, important, warning, reminder
D. Urgent, important, minor, reminder
Answer: D
46. As shown in the figure, it can be judged that 00e0-fc99-9999 is a specific host and MAC address
learned by the switch through ARP, and the host has changed its IP address three times.
 11 / 33
https://www.dumpsinfo.com/
A. True
B. False
Answer: B
47. The AAA protocol is a RADIUS protocol.
A. True
B. False
Answer: B
48. As shown in the figure, all four switches are running STP, and various parameters adopt default
values.
If the G0/0/2 port of switch C is blocked and cannot send configuration BPDUs through this port, how
long will it take for the blocked port in the network to enter the forwarding state?
A. About 30 seconds
B. About 50 seconds
C. About 15 seconds
D. About 3 seconds
Answer: B
49. Which of the following commands can be used to query the configuration information of the ospf
protocol of the device?
 12 / 33
https://www.dumpsinfo.com/
A. Enter the command "display this" in the ospf protocol view
B. Display current-configuration
C. Display ospf peer
D. Dis ip routing-table
Answer: A
50.SRGB (segment routing global block) is a set of local labels reserved for the global segment. In
MPLS and IPv6, SRGB is a set of local labels reserved for global labels.
A. True
B. False
Answer: A
51.ACL on AR G3 series routers supports two matching orders, configuration order and automatic
order.
A. True
B. False
Answer: A
52. In the network shown in the figure below, when the OSPF neighbor status is stable, what is the
neighbor status of Router A and Router B?
 13 / 33
https://www.dumpsinfo.com/
A. Full
B. Attempt
C. 2-way
D. Down
Answer: A
53. A company has applied for a class C IP address segment, but it needs to be allocated to 6
subsidiaries. The largest subsidiary has 26 computers. Different subsidiaries must be in different
network segments. Then the network of the largest subsidiary the subnet mask should be set to?
A. 255.255.255.128
B. 255.255.255.192
C. 255.255.255.224
D. 255.255.255.0
Answer: C
54. Which of the following descriptions about spanning tree designated ports is correct?
 14 / 33
https://www.dumpsinfo.com/
A. The port on the root switch must not be a designated port
B. The designated port can forward the configuration BPDU message to the network segment
connected to it
C. Each switch has only one designated port
D. The designated portforwards the configuration BPDU message from this switch to the root switch
Answer: B
55. Among the following options, what is the necessary technology to enable a host with an IP
address of 10.0.0.1 to access the Internet?
A. Static routing
B. Dynamic Routing
C. NAT
D. Route import
Answer: C
56. An AR2200 router needs to restore the initial configuration, which of the following operations are
necessary? (Multiple choice)
A. Reset the saved configuration
B. Clear the current configuration
C. Restart the AR2200 router
D. Re-specify the configuration file loaded at next startup
Answer: AC
57. On the switch, which VLANs can be deleted by using the undo command? (Multiple choice)
A.Vlan 1
B. Vlan 2
C.Vlan 1024
D. Vlan 4094
Answer: BCD
58.The management of users by NAS equipment is based on domains. Each user belongs to a
domain. A domain is a group composed of users belonging to the same domain.
A. True
B. False
Answer: A
59. Which of the following options is wrong? (Multiple choice)
[LSRA] mpls Isr-id 1.1.1.9
[LSRA] mpls
[LSRA] interface vlanif10
[LSRA-Vlanif10] mpls
[LSRA-Vlanif10] quit
[LSRA] static-Lsp ingiess SA to SD destination 4.4.4.9 32 next hop 10.1.1.2 out-label 20
A. The last command is to configure LSRA as the ingress interface LSR, and configure a static LSP
B. After the global mpls is enabled by mpls, there is no need to enable mpls again in the interface
view
C. mpls lsr-id is the ID of the configured LSR, which is the prerequisite for configuring other MPLS
 15 / 33
https://www.dumpsinfo.com/
commands, and is not configured by default.
D. mpls is to enable the mpls function in the system view and interface view, and the Isr-id can only
be configured after enabling mpls
Answer: BD
60. What is the MAC address of the data link layer of each VAP on the AP?
A. SSID
B. BSSID
C. BSS
D.ESS
Answer: B
61. There are two BFD detection modes. In () mode, the local end sends BFD control packets at a
certain sending cycle, and the detection location is the remote end. The remote end detects whether
the local end periodically sends BFD control packets.
Answer: asynchronous
62. Which category does the IPv6 address FE80::2E0:FCFF:FE6F:4F36 belong to?
A. Multicast address
B. Global Unicast Address
C. Link-local address
D. Anycast address
Answer: C
63. When LACP is used for horizontal link aggregation, what is the default system priority of Huawei
switches?
A. 36864
B. 24576
C. 4096
D. 32768
Answer: D
64. Apply the ACL configured in the figure in Telnet, which of the following statements is correct?
 16 / 33
https://www.dumpsinfo.com/
A. The device with IP address 172.16.105.3 can use Telnet service
B. The device with IP address 172.16.105.4 can use Telnet service
C. The device with IP address 172.16.105.5 can use Telnet service
D. The device with IP address 172.16.105.6 can use Telnet service
Answer: D
65. How many bytes is the total length of the VLAN frame format defined by IEEE802.1Q?
A. 4
B. 3
C. 2
D. 1
Answer: A
66. Which of the following types of ACL cannot match network layer information?
A. Basic ACLs
B. Layer 2 ACL
C. User ACLs
D. Advanced ACL
Answer: B
67. The virtual machine is the basis for realizing NFV. Which of the following statements about the
characteristics of virtualization is correct? (Multiple choice)
A. Partitioning: Multiple virtual machines can run concurrently on a single physical network
B. Isolation: Virtual machines on the same physical server are isolated from each other
C. Encapsulation: Virtual machines all share an operating space, and encapsulation is achieved
through namespaces
D. Hardware independence: Virtual machines and hardware decoupling support migration of virtual
 17 / 33
https://www.dumpsinfo.com/
machines between servers
Answer: ABD
68. Which of the following commands to configure the default route is correct?
A. [huawei] ip route-static 0.0.0.0 0.0.0.0 0.0.0.0
B. [huawei] ip route-static 0.0.0.0 255.255.255.255 192.168.1.1
C. [huawei-Serial0] ip route-static 0.0.0.0 0.0.0.0 0.0.0.0
D. [huawei] ip route-static 0.0.0.0 0.0.0.0 192.168.1.1
Answer: D
69. Which statement about the dynamic MAC address table is correct? (Multiple choice)
A. The dynamic MAC entries obtained through learning the source MAC address in the packet will
age out
B. By checking the number of specified dynamic MAC address entries, you can get the number of
users communicating on the interface
C. After the device restarts, the previous dynamic entries will be lost
D. After the device restarts, the previously saved entries will not be lost
Answer: ABC
70. When the switch receives a unicast data frame, it will look up the destination MAC address in the
MAC table. Which of the following statements is wrong?
A. If the MAC address is found, and the port corresponding to the MAC address in the MAC address
table is the port through which the frame enters the switch, the switch will discard the frame.
B. If the WAC address cannot be found, the switch performs a flooding operation.
C. If the MAC address is found, and the port corresponding to the MAC address in the MAC address
table is not the port where the frame enters the switching machine, the switch performs the forwarding
operation.
D. If the MAC address cannot be found, the switch will discard it.
Answer: D
71. As shown in the figure below, all hosts can communicate normally. Which of the following
statements is correct? (Multiple choice)
 18 / 33
https://www.dumpsinfo.com/
A. G0/0/3 of SWB learned 2 mac addresses
B. G0/0/3 of SWA learns a mac address
C. G0/0/3 of SWA learns 2 mac addresses
D. G0/0/3 of SWA learns 3 mac addresses
Answer: AB
72. In the network shown in the figure below, host A is not configured with a gateway, and host B has
an ARP cache of the gateway. Use the command ping 11.0.12.1 on host A. Which of the following
statements is correct?
A. No packets will be sent from host A
B. The destination MAC address of the data sent by host A is MAC-C
C. The destination MAC address of the data frame sent by host A is MAC-B
D. The destination IP address of the data packet sent by host A is 11.0.12.1
Answer: A
73. The only way for the STA to discover the wireless network is through the Beacon frame sent
 19 / 33
https://www.dumpsinfo.com/
externally by the AP.
A. True
B. False
Answer: B
74. The NAT configuration is as follows, which IPs can be translated when accessing the public
network? (Multiple choice)
[RTA] acl 2000
[RTA-acl-basic-2000] rule 5 permit source 192.168.1.0 0.0.0.255
[RTA-acl-basic-2000] rule 10 permit source 192.168.2.0 0.0.0.255
[RTA-acl-basic-2000] quit
[RTA] interface serial1/0/0
[RTA-Serial1/0/0] nat outbound 2000 address-group 1 no-pat *
A. 192.168.1.254
B. 192.168.2.222
C. 198.162.1.222
D.100.1.1.3
Answer: AB
75. As shown in the figure, it is the port status information displayed on a switch running STP.
According to this information, which of the following descriptions is wrong?
MSTID Port Role STP State Protection
0 GigabitEthernet0/0/1 DESI FORWARDING NONE
0 GigabitEthernet0/0/2 DESI FORWARDING NONE
0 GigabitEthernet0/0/3 DESI FORWARDING NONE
0 GigabitEthernet0/0/21 DESI FORWARDING NONE
0 GigabitEthernet0/0/22 DESI FORWARDING NONE
0 GigabitEthernet0/0/23 DESI FORWARDING NONE
A. This switch is the root switch in the network
B. The priority of this switch is 0
C. This network may only contain this switch
D. This switch may be connected to 6 other switches
Answer: B
76. In order to join a wireless network, TA needs to obtain wireless network information first. Which of
the following messages does STA use to actively obtain SSID information?
A. Join
B. Discovery
C. Beacon
D. Probe
Answer: D
77. AP uses which of the following messages to request the software version from AC?
A. VRP System Request
B. Image package Request
C. Image Data Request
D. Software Request
Answer: C
 20 / 33
https://www.dumpsinfo.com/78. As shown in the figure below, which of the following statements is correct?
A. The broadcast addresses of host A and host B are the same
B. Host A can ping host B
C. Host A and host B cannot obtain each other's MAC address
D. The following entry 10.0.12.5 MAC-B exists in the ARP cache of host A
Answer: C
79. Which of the following states does the STP port have a Forward Delay? (Multiple choice)
A. Forwarding-Disabled
B. Learning-Forwarding
C. Disabled-Blocking
D. Blocking-Listening
E. Listening-Learning
Answer: BE
80. The QoS technology usually used for congestion avoidance is?
A. GTS
B. LR
C. Car
D. WRED
Answer: D
81. Apply the following ACL in Telnet:
acl number 2000
rule 5 permit source 172.16.105.2 0
#
Then only the device with IP address 172.16.105.2 is allowed to log in remotely.
A. True
B. False
Answer: A
82. Among the configurations in the following options, which ones belong to the Layer 2 ACL?
 21 / 33
https://www.dumpsinfo.com/
(Multiple choice)
A. rule 25 permit source 192.168.1.1 0.0.0.0
B. rule 10 permit 12-protocol arp
C. rule 25 permit source-mac 0203-0405-0607
D. rule 25 permit vlan-id 100
Answer: BCD
83. Under the VRP interface, using the command delete or delete /unreserved cannot completely
delete the file, and the file must be emptied in the recycle bin to completely delete the file.
A. True
B. False
Answer: B
84. There are multiple routing entries to the same destination network in the routing table. These
routes are called?
A. Multipath Routing
B. Default route
C. Equal-cost routing
D. Suboptimal Routing
Answer: C
85. The MAC address of the existing switch is shown in the figure, which of the following statements
is correct?
 22 / 33
https://www.dumpsinfo.com/
A. When the switch restarts, the MAC address learned by port Eth0/0/2 does not need to be relearned
B. The data frame with source MAC address 5489-9885-18a8 and destination MAC address
5489-989d-1d30 learned from the port is forwarded from Eth0/0/1 port
C. The data frame with source MAC address 5489-9811-0b49 and destination MAC address
5489-989d-1d30 learned from the port is forwarded from Eth0/0/2 port
D. When the switch restarts, the MAC address learned by port Eth0/0/3 needs to be relearned
Answer: B
86. Which field is added to the IPv6 header compared to the IPv4 header?
A. Destination Address
B. Source Address
C. Flow Label
D. Version
Answer: C
87. Which of the following descriptions about the firewall is wrong?
A. A firewall can implement access control between different networks
B. Firewalls can isolate networks with different security levels
C. The firewall can realize user authentication
D. The firewall cannot implement network address translation
Answer: D
88. VRP operating system commands are divided into four levels: access level, monitoring level,
configuration level, and management level.
Which level can run various business configuration and configuration commands but cannot operate
the file system?
A. Configuration level
B. Access level
C. Management level
D. Monitoring level
Answer: A
89. How many types of data flows with different service levels can be marked at most based on MPLS
labels?
A.8
B.2
C.4
D.16
Answer: A
90. Using a traditional landline to make a call is a way of network communication.
A. True
B. False
Answer: B
91. If the Length/Type of an Ethernet data frame = 0x8100, then the payload of this data frame may
 23 / 33
https://www.dumpsinfo.com/
be? (Multiple choice)
A. TCP data segment
B. ICMP message
C. ARP packets
D. UDP data
Answer: ABCD
92. Which of the following interfaces is not an open interface of Huawei network equipment?
A. XML
B. Netconf
C. Json
D. Restconf
Answer: A
93. By default, the root path cost of the root bridge in the STP protocol must be.
A. True
B. False
Answer: A
94. What is the length of the Ethernet-II frame containing the Ethernet header?
A. 40B-1500B
B. 60B-1560B
C. 64B-1500B
D. 64B-1518B
Answer: D
95. When the host moves frequently, which VLAN division method is the most appropriate?
A. Based on port division
B. Based on IP subnetting
C. Based on MAC address division
D. Policy-based partitioning
Answer: C
96. Which of the following is correct about RS and RA in IPv6? (Multiple choice)
A. RA is used to request address prefix information
B. RA is used to reply address prefix information
C. RS is used to request address prefix information
D. RS is used to reply address prefix information
Answer: BC
97. Layer 2 ACL can match source MAC, destination MAC, source ip, destination IP and other
information.
A. True
B. False
Answer: B
 24 / 33
https://www.dumpsinfo.com/
98. As shown in the figure, if the command ping 1.1.1.2 is executed on R1, the data frame received
by LSW1 from VLAN10 of LSW2 is tagged.
A. True
B. False
Answer: A
The multicast address of the requested node corresponding to 809.2001::12:1 is FF02::1:FF12:1.
A. True
B. False
Answer: A
99. According to the command output shown in the figure, which of the following descriptions is
correct? (Multiple choice)
 25 / 33
https://www.dumpsinfo.com/
A. GigabitEthernet0/0/1 allows VLAN1 to pass through
B. GigabitEthernet0/0/1 does not allow VLAN1 to pass through
C. If you want to change GigabitEthernet0/0/1 into an Access port, you first need to use the command
"undo port trunk allow-pass vlan all"
D. If you want to change GigabitEthernet0/0/1 into an Access port, you first need to use the command
"undo port trunk allow-pass vlan 2 to 4094"
Answer: AD
100.VRP supports OSPF multi-process. If no process number is specified when OSPF is enabled, the
default process number is?
A.0
B.1 _
C.10
D.100
Answer: B
101. Among the following options, which one is correct about the description of Agile Controller's
terminal security management features? (Multiple choice)
A. One-click repair reduces terminal management and maintenance costs
B. Only standard software is allowed to be installed to achieve desktop office standardization
C. The way of controlling terminal leakage through access control to ensure that the terminals
entering the network are forced to install the client and meet the security requirements
D. Prohibit the installation of non-standard software to reduce the risk of virus infection
Answer: ABCD
102. The three basic features of the SDN network architecture are?
A. Transfer control separation, centralized control, open interface
B. Transfer control points high, decentralized control, open interface
C. Centralized control, centralized control, open interface
D. Separation of transfer and control, centralized control, closed interface
Answer: A
103. Which command in the VRP system can access the last input command? (Multiple choice)
A. Left cursor
B. Cursor up
C. Ctrl+U
 26 / 33
https://www.dumpsinfo.com/
D. Ctrl+P
Answer: BD
104. Which of the following statements about OSPF neighbor status is correct? (Multiple choice)
A. The sequence number of the DD message is determined in the Exchange state
B. After the router LSDB synchronization is completed, it will be converted to the Full state
C. The OSPF master-slave relationship is formed in the ExStart state
D. In the Exchange state, routers send each other DD packets containing link state information
summaries, describing the contents of the local LSDB
Answer: BCD
105. As shown in the figure, all four switches are running STP, and all parameters adopt the default
value. When the root switch disables the STP function globally, how long will it take for the blocked
port in the network to enter the forwarding state?
A. About 30 seconds
B. About 50 seconds
C. About 15 seconds
 27 / 33
https://www.dumpsinfo.com/
D. About 3 seconds
Answer: B
106. What is the total length of the VLAN frame defined by IEEE802.1Q?
A.1
B.2
C.3
D.4
Answer: D
107. The maximum number of VTY user interfaces determines how many users can log into the
device through Telnet or STelnet at the same time.
A. True
B. False
Answer: A
108.RSTP protocol does not include which of the following port states?
A. Forwarding
B. Learning
C. Discarding
D. Blocking
Answer: D
109. The configuration information of a certain port of the switch is as follows. When this port sends a
data frame carrying which VLAN TAG, should the VLAN TAG be stripped?
#
Interface GigabitEthernet0/0/1
port link-type trunk
port trunk pvid vlan 10
port trunk allow-pass vlan 10 20 30 40
#
A.10
B.20
C.30
D. 40
Answer: A
110. How many more bytes does the MPLS-labeled packet have than the original IP packet?
A. 4
B. 8
C. 16
D. 32
Answer: A
111. There are many types of LDP messages. Which of the following functions can a session
message achieve? (Multiple choice)
 28 / 33
https://www.dumpsinfo.com/
A. Monitor the integrity of the TCP connection of the LDP Session
B. Terminate the unfinished Label Request Message
C. Release label
D. Negotiate parameters during the establishment of LDP Seeion
Answer: AD
112. If the packet matches the ACL and the result is "deny", the packet will be discarded eventually.
A. True
B. False
Answer: B
113. When using the FTP protocol to upgrade the router, which transmission mode should be
selected?
A. Byte pattern
B. Text mode
C. Language model
D. Binary mode
Answer: D
114. The bridge ID of the STP protocol in the switching network is as follows. Which of the following
bridge ID switches will become the root bridge?
A. 4096 00-01-02-03-04-DD
B. 32768 00-01-02-03-04-AA
C. 32768 00-01-02-03-04-BB
D. 32768 00-01-02-03-04-CC
Answer: A
115. When there are redundant links in the switching network, using STP can solve the loop problem
in the switching network.
A. True
B. False
Answer: A
116. In the WLAN network architecture, a terminal device that supports the 802.11 standard is called?
A. Client
B. STA
C. AC
D.AP
Answer: B
117. Which of the following working modes are supported by Huawei enterprise-level APs? (Multiple
choice)
A. Local
B. FIT
C. FAT
D. Cloud
 29 / 33
https://www.dumpsinfo.com/
Answer: BCD
118. The administrator has configured the Router as shown in the figure, so what kind of IP address
can a host connected to the G1/0/0 interface of the router obtain through DHCP?
A. The IP address obtained by the host belongs to the 10.10.10.0/24 network
B. The IP address obtained by the host belongs to the 10.20.20.0/24 network
C. The IP address obtained by the host may belong to the 10.10.10.0/24 network or the 10.20.20.0/24
network
D. The host cannot obtain the address
Answer: A
119.What is the default server port number used by the Telnet protocol?
A.24
B.21
C.23
D.22
Answer: C
120. Which of the following packets are used for IPv6 stateless address auto-configuration? (Multiple
choice)
A. NS
B. RS
C. RA
D. NA
Answer: BC
 30 / 33
https://www.dumpsinfo.com/
121. The requested node multicast address consists of the prefix FF02::1:FF00:0/104 and the last 24
bits of the unicast address.
A. True
B. False
Answer: A
122. The full name of the LER in the MPLS domain is Label Egress Router.
A. True
B. False
Answer: B
123. When a router forwards an IPv6 packet, it needs to look up the routing table according to the
source IP address of the IPv6 packet.
A. True
B. False
Answer: B
124. TFTP is based on the TCP protocol.
A. True
B. False
Answer: B
125. Which of the following commands configures the authentication mode as HWTACAS
authentication?
A. authentication-mode hwtacacs
B. authentication-mode none
C. Authorization-mode hwtacacs
D. Authorization-mode local
Answer: A
126. What is the main function of the DNS protocol?
A. File Transfer
B. Remote access
C. Domain name resolution
D. Mail transfer
Answer: C
127. Which of the following descriptions about static and dynamic routing is wrong?
A. Dynamic routing protocols take up more system resources than static routing
B. After a link failure occurs, static routing can automatically complete network convergence
C. Static routing is easy to configure and easy to manage when it is applied in the enterprise
D. After the administrator deploys the dynamic routing protocol in the enterprise network, later
maintenance and expansion can be more convenient
Answer: B
 31 / 33
https://www.dumpsinfo.com/
128. Which of the following statements is correct?
A. The router works at the network layer
B. The switch works at the physical layer
C. The switch works at the network layer
D. The router works at the physical layer
Answer: A
129. Which of the following stages is not included in the process of PPPoE session establishment and
termination?
A. Discovery phase
B. Data Forwarding Phase
C. Session phase
D. Session termination phase
Answer: B
130. SR (SegmentRouting) defines destination address prefixes/nodes and adjacencies in the
network as segments, and assigns SIDs (SegmentID) to these segments. A forwarding path is
obtained by unordered arrangement (Segment List) of Adjacency SID (adjacent segment) and
Prefix/Node SID (destination address prefix/node segment).
A. True
B. False
Answer: B
131.Which of the following is not included in the VRP system login method?
A. Telnet
B. Netstream
C. SSH
D. web
Answer: B
132. When negotiating in the LCP phase of PPP, what is the content of the negotiation? (Multiple
choice)
A. MTU
B. Authentication protocol
C. Magic word
D.IP address
Answer: ABC
133. The administrator cannot log in to the Huawei router through Telnet, but other administrators can
log in normally, so which of the following items is the possible reason? (Multiple choice)
A. The administrator user account has been disabled
B. The Telnet service of the AR2200 router has been disabled
C. The permission level of the administrator user account has been changed to 0
D. The administrator user account has been deleted
Answer: AD
 32 / 33
https://www.dumpsinfo.com/
Powered by TCPDF (www.tcpdf.org)
 33 / 33
https://www.dumpsinfo.com/
http://www.tcpdf.org