Text Material Preview
H12-811_V1.0-ENU HCIA-Datacom V1.0 exam dumps questions are the best material for you to test all the related Huawei exam topics. By using the H12-811_V1.0-ENU exam dumps questions and practicing your skills, you can increase your confidence and chances of passing the H12-811_V1.0-ENU exam. Features of Dumpsinfo’s products Instant Download Free Update in 3 Months Money back guarantee PDF and Software 24/7 Customer Support Besides, Dumpsinfo also provides unlimited access. You can get all Dumpsinfo files at lowest price. HCIA-Datacom V1.0 H12-811_V1.0-ENU exam free dumps questions are available below for you to study. Full version: H12-811_V1.0-ENU Exam Dumps Questions 1. In which state does the OSPF protocol confirm the master-slave relationship of the DD message? A. 2-way B. Exchange C. Full D. ExStart Answer: D 2. Which of the following is related to the purpose of encapsulation and decapsulation? (Multiple choice) A. Shorten the length of the message B. Encapsulation and decapsulation are important steps to realize different protocol functions C. Interworking between different networks 1 / 33 https://www.dumpsinfo.com/unlimited-access/ https://www.dumpsinfo.com/exam/h12-811_v1-0-enu D. Encapsulation and decapsulation can complete the location of network faults Answer: BC 3. In the network shown in the figure, which of the following configurations can enable host A to access the Internet, but host B cannot? (Multiple choice) A. acl number 2000 rule 5 deny source 100.0.12.0.0.0.0.255 rule 10 permit # interface GigabitEthernet0/0/3 traffic-filter outbound acl 2000 # B. acl number 2000 rule 5 permit source 100.0.13.0.0.0.0.255 rule 10 deny source 100.0.12.0.0.0.0.255 # interface GigabitEthernet0/0/3 traffic-filter outbound acl 2000 # C. acl number 2000 rule 5 permit source 100.0.13.0.0.0.0.255 rule 10 deny 2 / 33 https://www.dumpsinfo.com/ # interface GigabitEthernet0/0/3 traffic-filter outbound acl 2000 # D. acl number 2000 rule 5 deny source 100.0.12.0.0.0.0.255 rule 10 permit source 100.0.13.0.0.0.0.255 # interface GigabitEthernet0/0/3 traffic-filter outbound acl 2000 # Answer: ABCD 4. In the network shown in the figure below, all links are Ethernet links, and all interfaces of all routers run the OSPF protocol, how many DRs are elected in the entire network? A.1 B.2 C.4 _ D.3 Answer: C 5. The data link layer uses PPP encapsulation, and the IP addresses at both ends of the link may not be in the same network segment. A. True B. False 3 / 33 https://www.dumpsinfo.com/ Answer: A 6. Which message does the DHCP server use to confirm that the host can use the IP address? A. DHCP ACK B. DHCP DISCOVER C. DHCP REQUEST D.DHCP OFFER Answer: A 7.What are the conditions for the eSight network management to be able to receive and manage devices and report alarms? (Multiple choice) A. The device is managed by the network management B. Correct trap parameters are configured on the device side C. The managed device on the network management must be configured with the correct SNMP protocol and parameters D. There must be communication between the network management and the device Answer: ABCD 8. Which of the following IEEE802.11 standards only supports communication in the 2.4GHz frequency band? A. 802.11n B. 802.11g C. 802.11ax D. 802.11a Answer: B 9. The Tos field is used for QoS marking in the IP message, and the first 6 bits of the Tos field are used to mark the DSCP. A. True B. False Answer: A 10. When accessing across network segments, the source and destination IP will change, but the source and destination MAC will not change. A. True B. False Answer: B 11. The DHCP request message is sent by broadcast. A. True B. False Answer: B 12. Which of the following commands can be used to check whether OSPR has correctly established a neighbor relationship? 4 / 33 https://www.dumpsinfo.com/ A. display ospf interface B. display ospf peer C. display ospf neighbor D. display ospf brief Answer: B 13.Only one SSID can be bound to one radio frequency of AP. A. True B. False Answer: B 14. By default, the bridge priority of the switch spanning tree is 32768 by default. A. True B. False Answer: A 15. All ports on the root bridge switch are designated ports. A. True B. False Answer: B 16. As shown in the figure below, which of the following statements is correct? A. Host A can ping host B through B. Host A and host B can communicate only if the masks of host A and host B are set to be the same C. The IP address masks of host A and host B are different, so host A and host B cannot communicate D. The broadcast addresses of host A and host B are the same Answer: C 17.Which of the following information will the VRP operating platform use to prompt for incomplete input commands? A. Error: Incomplete command found at '^'position B. False: Wrong parameter found at '^'position C. Error: Ambiguous command found at '^'position 5 / 33 https://www.dumpsinfo.com/ D. Error: Too many parameters found at '^'position Answer: A 18. In the network shown in the figure below, the switch uses the VLANIF interface to connect with the sub-interface of the router. Which of the following configurations can meet this requirement? A. interface Vlanif10 ip address 10.0.12.1 255.255.255.0 # interface GigabitEthernet 0/0/2 port link-type trunk port trunk pvid 10 port trunk allow-pass vlan 10 # B. interface Vlanif10 ip address 10.0.12.1 255.255.255.0 # interface GigabitEthernet 0/0/2 port link-type trunk port trunk allow-pass vlan 10 # C. interface Vlanif10 ip address 10.0.12.1 255.255.255.0 # interface GigabitEthernet 0/0/2 port link-type hybrid port hybrid untag vlan 10 # D. interface Vlanif10 ip address 10.0.12.1 255.255.255.0 # interface GigabitEthernet 0/0/2 port link-type access port default vlan 10 # Answer: B 19. Regarding the description of the DHCP address pool, it is confirmed that? (Multiple choice) A. Configure the address allocation method based on the global address pool, which can respond to all ports receiving DHCP requests B. Only when the address allocation method based on the global address pool is configured, can the IP address range that does not participate in automatic allocation be set 6 / 33 https://www.dumpsinfo.com/ C. Configuring the interface-based address allocation method will only respond to the DHCP request of the interface D. Configure the interface-based address allocation method, which can respond to all ports receiving DHCP requests Answer: AC 20. In which view can the administrator modify the device name for the router? A. Protocol-view B. User-view C. System-view D. Interface-view Answer: C 21. Which of the following statements about the TTL field in the IP packet header is correct? A. TTL defines the number of packets the source host can send B. Every time an IP packet passes through a router, its TTL value will be increased by 1 C. TTL defines the time interval that the source host can send packets D. Every time an IP packet passes through a router, its TTL value will be reduced by 1 Answer: D 22. Which frequencies does the IEEE 802.11n standard support? (Multiple choice) A. 6GHz B. 2.5GHz C. 2.4GHz D. 5GHz Answer: CD 23. Which field in the IPV6 header is similar to the TTL field in the IPV4 header? A. hop limit B. Next header C. Traffic class D. Version Answer: A 24. For a switch running the STP protocol, the port can be directly converted to the Disabled state in any state. A. True B. False Answer: A 25. A gateway must be configured for a host to communicate with other hosts. A. True B. False Answer: B 7 / 33 https://www.dumpsinfo.com/ 26. Regarding the description of the characteristics of a high-availability network, which one is correct? (Multiple choice) A. It can recover quickly after a failure B. Once a failure occurs, the business can onlybe restored through manual intervention C. will not fail D. Infrequent failure Answer: AD 27. According to the different reference information of classification rules, traffic classification can be divided into? (Multiple choice) A. Simple flow classification B. Complex traffic classification C. On-demand stream classification D. Traffic Classification Answer: AB 28. Which of the following commands can be used to view the CPU usage of the router? A. display cpu-usage B. display memory C. display cpu-state D. display interface Answer: A 29. LDP neighbor discovery has different implementation mechanisms and regulations. which of the following description about LDP neighbor discovery is wrong? A. LDP discovery mechanism includes LDP basic discovery mechanism and LDP extended discovery mechanism B. The basic LDP discovery mechanism can automatically discover LDP Peers directly connected to the same link C. LDP extended discovery mechanism can discover non-directly connected LDP Peers D. The LDP discovery mechanism needs to clearly specify the LDP Peer Answer: D 30. Which of the following versions of SNMP supports the encryption feature? A. SNMPv3 B. SNMP 2c C. SNMP 2 D. SNMP 1 Answer: A 31. NAPT distinguishes the IP addresses of different users through the protocol numbers in TCP or UDP or IP packets. A. True B. False Answer: B 8 / 33 https://www.dumpsinfo.com/ 32. The switch receives a unicast data frame. If the destination MAC of the data frame can be found in the MAC table, the data frame will definitely be forwarded from the port corresponding to the MAC. A. True B. False Answer: B 33. Regarding the display startup information of the AR2200 router, which statement is wrong about this information? A. The system files for the next startup of the device can be modified using the command "startup system software" B. The running configuration file is not saved C. The system file used by the device to start this time is ar2220-v200r003c00spc00.cc D. The system files cannot be modified when the device starts next time Answer: D 34. Which statement about the TTL field in the IPv4 header is correct? (Multiple choice) A. TTL value length is 80bit B. Every time a packet passes through a Layer 3 device, the TTL value is reduced by 1 C. When there is a loop in the route, the TTL value can be used to prevent the data packet from being forwarded infinitely D. The range of TTL value is 0-255 Answer: BCD 35. Which of the following MAC addresses cannot be used as the MAC address of the host network card? (Multiple choice) A. 00-02-03-04-05-06 B. 03-04-05-06-07-08 C. 02-03-04-05-06-07 9 / 33 https://www.dumpsinfo.com/ D. 01-02-03-04-05-06 Answer: BD 36. In the switch MAC address table, which of the following entries will not age? A. Dynamic MAC address entries B. Device MAC address entry C. Static MAC address entry D. Port MAC address entry Answer: C 37. Telnetlib is a template that comes with Python to implement the Telnet protocol. A. True B. False Answer: A 38. Which of the following statements about RA and RS packets in IPv6 is correct? (Multiple choice) A. RS is used to request address prefix information B. RS is used to reply address prefix information C. RA is used to reply address prefix information D. RA is used to request address prefix information Answer: AC 39. The configuration information of a certain port of the switch is shown in the figure, which of the following statements is wrong? # interface GigabitEthernet0/0/2 port hybrid pvid vlan 100 port hybrid tagged vlan 100 port hybrid untagged vlan 200. # A. The port type is Hybrid B. If the VLAN TAG carried by the data frame is 200, the switch strips the VLAN TAG and sends C. If the port receives a data frame without VLAN TAG, the switch needs to add VLAN TAG 100 D. If the VLAN TAG carried by the data frame is 100, the switch strips the VLAN TAG and sends Answer: D 40. On the switch, vlan batch can be used to create vlans in batches to simplify configuration. A. True B. False Answer: A 41. In the network shown in the figure below, host A is not configured with a gateway, and host B has an ARP cache of the gateway. Which of the following statements is correct? (Multiple choice) 10 / 33 https://www.dumpsinfo.com/ A. Enable ARP proxy on the router G0/0/1 port, then host A can communicate with host B B. The data packet sent by host B with the destination IP address 10.0.12.1 can be forwarded to host A C. The data packet sent by host A with the destination IP address 11.0.12.1 can be forwarded to host B D. Host A and host B cannot communicate bidirectionally Answer: BD 42. The security policy of WEP mode supports the use of TKIP for data encryption. A. True B. False Answer: B 43. In order to ensure that the same data flow is forwarded on the same physical link, which method of load sharing does Eth-Trunk use? A. Flow-based load balancing B. Packet-Based Load Balancing C. Load sharing based on application layer information D. Load sharing based on the incoming interface of data packets Answer: A 44. Bandwidth determines the rate of data transmission, and the maximum bandwidth of transmission is determined by the minimum link bandwidth on the transmission path. A. True B. False Answer: A 45. In the alarm management function of eSight, its alarm levels are divided into which of the following four types? A. Urgent, Minor, General, Reminder B. Urgent, Important, Major, Reminder C. Urgent, important, warning, reminder D. Urgent, important, minor, reminder Answer: D 46. As shown in the figure, it can be judged that 00e0-fc99-9999 is a specific host and MAC address learned by the switch through ARP, and the host has changed its IP address three times. 11 / 33 https://www.dumpsinfo.com/ A. True B. False Answer: B 47. The AAA protocol is a RADIUS protocol. A. True B. False Answer: B 48. As shown in the figure, all four switches are running STP, and various parameters adopt default values. If the G0/0/2 port of switch C is blocked and cannot send configuration BPDUs through this port, how long will it take for the blocked port in the network to enter the forwarding state? A. About 30 seconds B. About 50 seconds C. About 15 seconds D. About 3 seconds Answer: B 49. Which of the following commands can be used to query the configuration information of the ospf protocol of the device? 12 / 33 https://www.dumpsinfo.com/ A. Enter the command "display this" in the ospf protocol view B. Display current-configuration C. Display ospf peer D. Dis ip routing-table Answer: A 50.SRGB (segment routing global block) is a set of local labels reserved for the global segment. In MPLS and IPv6, SRGB is a set of local labels reserved for global labels. A. True B. False Answer: A 51.ACL on AR G3 series routers supports two matching orders, configuration order and automatic order. A. True B. False Answer: A 52. In the network shown in the figure below, when the OSPF neighbor status is stable, what is the neighbor status of Router A and Router B? 13 / 33 https://www.dumpsinfo.com/ A. Full B. Attempt C. 2-way D. Down Answer: A 53. A company has applied for a class C IP address segment, but it needs to be allocated to 6 subsidiaries. The largest subsidiary has 26 computers. Different subsidiaries must be in different network segments. Then the network of the largest subsidiary the subnet mask should be set to? A. 255.255.255.128 B. 255.255.255.192 C. 255.255.255.224 D. 255.255.255.0 Answer: C 54. Which of the following descriptions about spanning tree designated ports is correct? 14 / 33 https://www.dumpsinfo.com/ A. The port on the root switch must not be a designated port B. The designated port can forward the configuration BPDU message to the network segment connected to it C. Each switch has only one designated port D. The designated portforwards the configuration BPDU message from this switch to the root switch Answer: B 55. Among the following options, what is the necessary technology to enable a host with an IP address of 10.0.0.1 to access the Internet? A. Static routing B. Dynamic Routing C. NAT D. Route import Answer: C 56. An AR2200 router needs to restore the initial configuration, which of the following operations are necessary? (Multiple choice) A. Reset the saved configuration B. Clear the current configuration C. Restart the AR2200 router D. Re-specify the configuration file loaded at next startup Answer: AC 57. On the switch, which VLANs can be deleted by using the undo command? (Multiple choice) A.Vlan 1 B. Vlan 2 C.Vlan 1024 D. Vlan 4094 Answer: BCD 58.The management of users by NAS equipment is based on domains. Each user belongs to a domain. A domain is a group composed of users belonging to the same domain. A. True B. False Answer: A 59. Which of the following options is wrong? (Multiple choice) [LSRA] mpls Isr-id 1.1.1.9 [LSRA] mpls [LSRA] interface vlanif10 [LSRA-Vlanif10] mpls [LSRA-Vlanif10] quit [LSRA] static-Lsp ingiess SA to SD destination 4.4.4.9 32 next hop 10.1.1.2 out-label 20 A. The last command is to configure LSRA as the ingress interface LSR, and configure a static LSP B. After the global mpls is enabled by mpls, there is no need to enable mpls again in the interface view C. mpls lsr-id is the ID of the configured LSR, which is the prerequisite for configuring other MPLS 15 / 33 https://www.dumpsinfo.com/ commands, and is not configured by default. D. mpls is to enable the mpls function in the system view and interface view, and the Isr-id can only be configured after enabling mpls Answer: BD 60. What is the MAC address of the data link layer of each VAP on the AP? A. SSID B. BSSID C. BSS D.ESS Answer: B 61. There are two BFD detection modes. In () mode, the local end sends BFD control packets at a certain sending cycle, and the detection location is the remote end. The remote end detects whether the local end periodically sends BFD control packets. Answer: asynchronous 62. Which category does the IPv6 address FE80::2E0:FCFF:FE6F:4F36 belong to? A. Multicast address B. Global Unicast Address C. Link-local address D. Anycast address Answer: C 63. When LACP is used for horizontal link aggregation, what is the default system priority of Huawei switches? A. 36864 B. 24576 C. 4096 D. 32768 Answer: D 64. Apply the ACL configured in the figure in Telnet, which of the following statements is correct? 16 / 33 https://www.dumpsinfo.com/ A. The device with IP address 172.16.105.3 can use Telnet service B. The device with IP address 172.16.105.4 can use Telnet service C. The device with IP address 172.16.105.5 can use Telnet service D. The device with IP address 172.16.105.6 can use Telnet service Answer: D 65. How many bytes is the total length of the VLAN frame format defined by IEEE802.1Q? A. 4 B. 3 C. 2 D. 1 Answer: A 66. Which of the following types of ACL cannot match network layer information? A. Basic ACLs B. Layer 2 ACL C. User ACLs D. Advanced ACL Answer: B 67. The virtual machine is the basis for realizing NFV. Which of the following statements about the characteristics of virtualization is correct? (Multiple choice) A. Partitioning: Multiple virtual machines can run concurrently on a single physical network B. Isolation: Virtual machines on the same physical server are isolated from each other C. Encapsulation: Virtual machines all share an operating space, and encapsulation is achieved through namespaces D. Hardware independence: Virtual machines and hardware decoupling support migration of virtual 17 / 33 https://www.dumpsinfo.com/ machines between servers Answer: ABD 68. Which of the following commands to configure the default route is correct? A. [huawei] ip route-static 0.0.0.0 0.0.0.0 0.0.0.0 B. [huawei] ip route-static 0.0.0.0 255.255.255.255 192.168.1.1 C. [huawei-Serial0] ip route-static 0.0.0.0 0.0.0.0 0.0.0.0 D. [huawei] ip route-static 0.0.0.0 0.0.0.0 192.168.1.1 Answer: D 69. Which statement about the dynamic MAC address table is correct? (Multiple choice) A. The dynamic MAC entries obtained through learning the source MAC address in the packet will age out B. By checking the number of specified dynamic MAC address entries, you can get the number of users communicating on the interface C. After the device restarts, the previous dynamic entries will be lost D. After the device restarts, the previously saved entries will not be lost Answer: ABC 70. When the switch receives a unicast data frame, it will look up the destination MAC address in the MAC table. Which of the following statements is wrong? A. If the MAC address is found, and the port corresponding to the MAC address in the MAC address table is the port through which the frame enters the switch, the switch will discard the frame. B. If the WAC address cannot be found, the switch performs a flooding operation. C. If the MAC address is found, and the port corresponding to the MAC address in the MAC address table is not the port where the frame enters the switching machine, the switch performs the forwarding operation. D. If the MAC address cannot be found, the switch will discard it. Answer: D 71. As shown in the figure below, all hosts can communicate normally. Which of the following statements is correct? (Multiple choice) 18 / 33 https://www.dumpsinfo.com/ A. G0/0/3 of SWB learned 2 mac addresses B. G0/0/3 of SWA learns a mac address C. G0/0/3 of SWA learns 2 mac addresses D. G0/0/3 of SWA learns 3 mac addresses Answer: AB 72. In the network shown in the figure below, host A is not configured with a gateway, and host B has an ARP cache of the gateway. Use the command ping 11.0.12.1 on host A. Which of the following statements is correct? A. No packets will be sent from host A B. The destination MAC address of the data sent by host A is MAC-C C. The destination MAC address of the data frame sent by host A is MAC-B D. The destination IP address of the data packet sent by host A is 11.0.12.1 Answer: A 73. The only way for the STA to discover the wireless network is through the Beacon frame sent 19 / 33 https://www.dumpsinfo.com/ externally by the AP. A. True B. False Answer: B 74. The NAT configuration is as follows, which IPs can be translated when accessing the public network? (Multiple choice) [RTA] acl 2000 [RTA-acl-basic-2000] rule 5 permit source 192.168.1.0 0.0.0.255 [RTA-acl-basic-2000] rule 10 permit source 192.168.2.0 0.0.0.255 [RTA-acl-basic-2000] quit [RTA] interface serial1/0/0 [RTA-Serial1/0/0] nat outbound 2000 address-group 1 no-pat * A. 192.168.1.254 B. 192.168.2.222 C. 198.162.1.222 D.100.1.1.3 Answer: AB 75. As shown in the figure, it is the port status information displayed on a switch running STP. According to this information, which of the following descriptions is wrong? MSTID Port Role STP State Protection 0 GigabitEthernet0/0/1 DESI FORWARDING NONE 0 GigabitEthernet0/0/2 DESI FORWARDING NONE 0 GigabitEthernet0/0/3 DESI FORWARDING NONE 0 GigabitEthernet0/0/21 DESI FORWARDING NONE 0 GigabitEthernet0/0/22 DESI FORWARDING NONE 0 GigabitEthernet0/0/23 DESI FORWARDING NONE A. This switch is the root switch in the network B. The priority of this switch is 0 C. This network may only contain this switch D. This switch may be connected to 6 other switches Answer: B 76. In order to join a wireless network, TA needs to obtain wireless network information first. Which of the following messages does STA use to actively obtain SSID information? A. Join B. Discovery C. Beacon D. Probe Answer: D 77. AP uses which of the following messages to request the software version from AC? A. VRP System Request B. Image package Request C. Image Data Request D. Software Request Answer: C 20 / 33 https://www.dumpsinfo.com/78. As shown in the figure below, which of the following statements is correct? A. The broadcast addresses of host A and host B are the same B. Host A can ping host B C. Host A and host B cannot obtain each other's MAC address D. The following entry 10.0.12.5 MAC-B exists in the ARP cache of host A Answer: C 79. Which of the following states does the STP port have a Forward Delay? (Multiple choice) A. Forwarding-Disabled B. Learning-Forwarding C. Disabled-Blocking D. Blocking-Listening E. Listening-Learning Answer: BE 80. The QoS technology usually used for congestion avoidance is? A. GTS B. LR C. Car D. WRED Answer: D 81. Apply the following ACL in Telnet: acl number 2000 rule 5 permit source 172.16.105.2 0 # Then only the device with IP address 172.16.105.2 is allowed to log in remotely. A. True B. False Answer: A 82. Among the configurations in the following options, which ones belong to the Layer 2 ACL? 21 / 33 https://www.dumpsinfo.com/ (Multiple choice) A. rule 25 permit source 192.168.1.1 0.0.0.0 B. rule 10 permit 12-protocol arp C. rule 25 permit source-mac 0203-0405-0607 D. rule 25 permit vlan-id 100 Answer: BCD 83. Under the VRP interface, using the command delete or delete /unreserved cannot completely delete the file, and the file must be emptied in the recycle bin to completely delete the file. A. True B. False Answer: B 84. There are multiple routing entries to the same destination network in the routing table. These routes are called? A. Multipath Routing B. Default route C. Equal-cost routing D. Suboptimal Routing Answer: C 85. The MAC address of the existing switch is shown in the figure, which of the following statements is correct? 22 / 33 https://www.dumpsinfo.com/ A. When the switch restarts, the MAC address learned by port Eth0/0/2 does not need to be relearned B. The data frame with source MAC address 5489-9885-18a8 and destination MAC address 5489-989d-1d30 learned from the port is forwarded from Eth0/0/1 port C. The data frame with source MAC address 5489-9811-0b49 and destination MAC address 5489-989d-1d30 learned from the port is forwarded from Eth0/0/2 port D. When the switch restarts, the MAC address learned by port Eth0/0/3 needs to be relearned Answer: B 86. Which field is added to the IPv6 header compared to the IPv4 header? A. Destination Address B. Source Address C. Flow Label D. Version Answer: C 87. Which of the following descriptions about the firewall is wrong? A. A firewall can implement access control between different networks B. Firewalls can isolate networks with different security levels C. The firewall can realize user authentication D. The firewall cannot implement network address translation Answer: D 88. VRP operating system commands are divided into four levels: access level, monitoring level, configuration level, and management level. Which level can run various business configuration and configuration commands but cannot operate the file system? A. Configuration level B. Access level C. Management level D. Monitoring level Answer: A 89. How many types of data flows with different service levels can be marked at most based on MPLS labels? A.8 B.2 C.4 D.16 Answer: A 90. Using a traditional landline to make a call is a way of network communication. A. True B. False Answer: B 91. If the Length/Type of an Ethernet data frame = 0x8100, then the payload of this data frame may 23 / 33 https://www.dumpsinfo.com/ be? (Multiple choice) A. TCP data segment B. ICMP message C. ARP packets D. UDP data Answer: ABCD 92. Which of the following interfaces is not an open interface of Huawei network equipment? A. XML B. Netconf C. Json D. Restconf Answer: A 93. By default, the root path cost of the root bridge in the STP protocol must be. A. True B. False Answer: A 94. What is the length of the Ethernet-II frame containing the Ethernet header? A. 40B-1500B B. 60B-1560B C. 64B-1500B D. 64B-1518B Answer: D 95. When the host moves frequently, which VLAN division method is the most appropriate? A. Based on port division B. Based on IP subnetting C. Based on MAC address division D. Policy-based partitioning Answer: C 96. Which of the following is correct about RS and RA in IPv6? (Multiple choice) A. RA is used to request address prefix information B. RA is used to reply address prefix information C. RS is used to request address prefix information D. RS is used to reply address prefix information Answer: BC 97. Layer 2 ACL can match source MAC, destination MAC, source ip, destination IP and other information. A. True B. False Answer: B 24 / 33 https://www.dumpsinfo.com/ 98. As shown in the figure, if the command ping 1.1.1.2 is executed on R1, the data frame received by LSW1 from VLAN10 of LSW2 is tagged. A. True B. False Answer: A The multicast address of the requested node corresponding to 809.2001::12:1 is FF02::1:FF12:1. A. True B. False Answer: A 99. According to the command output shown in the figure, which of the following descriptions is correct? (Multiple choice) 25 / 33 https://www.dumpsinfo.com/ A. GigabitEthernet0/0/1 allows VLAN1 to pass through B. GigabitEthernet0/0/1 does not allow VLAN1 to pass through C. If you want to change GigabitEthernet0/0/1 into an Access port, you first need to use the command "undo port trunk allow-pass vlan all" D. If you want to change GigabitEthernet0/0/1 into an Access port, you first need to use the command "undo port trunk allow-pass vlan 2 to 4094" Answer: AD 100.VRP supports OSPF multi-process. If no process number is specified when OSPF is enabled, the default process number is? A.0 B.1 _ C.10 D.100 Answer: B 101. Among the following options, which one is correct about the description of Agile Controller's terminal security management features? (Multiple choice) A. One-click repair reduces terminal management and maintenance costs B. Only standard software is allowed to be installed to achieve desktop office standardization C. The way of controlling terminal leakage through access control to ensure that the terminals entering the network are forced to install the client and meet the security requirements D. Prohibit the installation of non-standard software to reduce the risk of virus infection Answer: ABCD 102. The three basic features of the SDN network architecture are? A. Transfer control separation, centralized control, open interface B. Transfer control points high, decentralized control, open interface C. Centralized control, centralized control, open interface D. Separation of transfer and control, centralized control, closed interface Answer: A 103. Which command in the VRP system can access the last input command? (Multiple choice) A. Left cursor B. Cursor up C. Ctrl+U 26 / 33 https://www.dumpsinfo.com/ D. Ctrl+P Answer: BD 104. Which of the following statements about OSPF neighbor status is correct? (Multiple choice) A. The sequence number of the DD message is determined in the Exchange state B. After the router LSDB synchronization is completed, it will be converted to the Full state C. The OSPF master-slave relationship is formed in the ExStart state D. In the Exchange state, routers send each other DD packets containing link state information summaries, describing the contents of the local LSDB Answer: BCD 105. As shown in the figure, all four switches are running STP, and all parameters adopt the default value. When the root switch disables the STP function globally, how long will it take for the blocked port in the network to enter the forwarding state? A. About 30 seconds B. About 50 seconds C. About 15 seconds 27 / 33 https://www.dumpsinfo.com/ D. About 3 seconds Answer: B 106. What is the total length of the VLAN frame defined by IEEE802.1Q? A.1 B.2 C.3 D.4 Answer: D 107. The maximum number of VTY user interfaces determines how many users can log into the device through Telnet or STelnet at the same time. A. True B. False Answer: A 108.RSTP protocol does not include which of the following port states? A. Forwarding B. Learning C. Discarding D. Blocking Answer: D 109. The configuration information of a certain port of the switch is as follows. When this port sends a data frame carrying which VLAN TAG, should the VLAN TAG be stripped? # Interface GigabitEthernet0/0/1 port link-type trunk port trunk pvid vlan 10 port trunk allow-pass vlan 10 20 30 40 # A.10 B.20 C.30 D. 40 Answer: A 110. How many more bytes does the MPLS-labeled packet have than the original IP packet? A. 4 B. 8 C. 16 D. 32 Answer: A 111. There are many types of LDP messages. Which of the following functions can a session message achieve? (Multiple choice) 28 / 33 https://www.dumpsinfo.com/ A. Monitor the integrity of the TCP connection of the LDP Session B. Terminate the unfinished Label Request Message C. Release label D. Negotiate parameters during the establishment of LDP Seeion Answer: AD 112. If the packet matches the ACL and the result is "deny", the packet will be discarded eventually. A. True B. False Answer: B 113. When using the FTP protocol to upgrade the router, which transmission mode should be selected? A. Byte pattern B. Text mode C. Language model D. Binary mode Answer: D 114. The bridge ID of the STP protocol in the switching network is as follows. Which of the following bridge ID switches will become the root bridge? A. 4096 00-01-02-03-04-DD B. 32768 00-01-02-03-04-AA C. 32768 00-01-02-03-04-BB D. 32768 00-01-02-03-04-CC Answer: A 115. When there are redundant links in the switching network, using STP can solve the loop problem in the switching network. A. True B. False Answer: A 116. In the WLAN network architecture, a terminal device that supports the 802.11 standard is called? A. Client B. STA C. AC D.AP Answer: B 117. Which of the following working modes are supported by Huawei enterprise-level APs? (Multiple choice) A. Local B. FIT C. FAT D. Cloud 29 / 33 https://www.dumpsinfo.com/ Answer: BCD 118. The administrator has configured the Router as shown in the figure, so what kind of IP address can a host connected to the G1/0/0 interface of the router obtain through DHCP? A. The IP address obtained by the host belongs to the 10.10.10.0/24 network B. The IP address obtained by the host belongs to the 10.20.20.0/24 network C. The IP address obtained by the host may belong to the 10.10.10.0/24 network or the 10.20.20.0/24 network D. The host cannot obtain the address Answer: A 119.What is the default server port number used by the Telnet protocol? A.24 B.21 C.23 D.22 Answer: C 120. Which of the following packets are used for IPv6 stateless address auto-configuration? (Multiple choice) A. NS B. RS C. RA D. NA Answer: BC 30 / 33 https://www.dumpsinfo.com/ 121. The requested node multicast address consists of the prefix FF02::1:FF00:0/104 and the last 24 bits of the unicast address. A. True B. False Answer: A 122. The full name of the LER in the MPLS domain is Label Egress Router. A. True B. False Answer: B 123. When a router forwards an IPv6 packet, it needs to look up the routing table according to the source IP address of the IPv6 packet. A. True B. False Answer: B 124. TFTP is based on the TCP protocol. A. True B. False Answer: B 125. Which of the following commands configures the authentication mode as HWTACAS authentication? A. authentication-mode hwtacacs B. authentication-mode none C. Authorization-mode hwtacacs D. Authorization-mode local Answer: A 126. What is the main function of the DNS protocol? A. File Transfer B. Remote access C. Domain name resolution D. Mail transfer Answer: C 127. Which of the following descriptions about static and dynamic routing is wrong? A. Dynamic routing protocols take up more system resources than static routing B. After a link failure occurs, static routing can automatically complete network convergence C. Static routing is easy to configure and easy to manage when it is applied in the enterprise D. After the administrator deploys the dynamic routing protocol in the enterprise network, later maintenance and expansion can be more convenient Answer: B 31 / 33 https://www.dumpsinfo.com/ 128. Which of the following statements is correct? A. The router works at the network layer B. The switch works at the physical layer C. The switch works at the network layer D. The router works at the physical layer Answer: A 129. Which of the following stages is not included in the process of PPPoE session establishment and termination? A. Discovery phase B. Data Forwarding Phase C. Session phase D. Session termination phase Answer: B 130. SR (SegmentRouting) defines destination address prefixes/nodes and adjacencies in the network as segments, and assigns SIDs (SegmentID) to these segments. A forwarding path is obtained by unordered arrangement (Segment List) of Adjacency SID (adjacent segment) and Prefix/Node SID (destination address prefix/node segment). A. True B. False Answer: B 131.Which of the following is not included in the VRP system login method? A. Telnet B. Netstream C. SSH D. web Answer: B 132. When negotiating in the LCP phase of PPP, what is the content of the negotiation? (Multiple choice) A. MTU B. Authentication protocol C. Magic word D.IP address Answer: ABC 133. The administrator cannot log in to the Huawei router through Telnet, but other administrators can log in normally, so which of the following items is the possible reason? (Multiple choice) A. The administrator user account has been disabled B. The Telnet service of the AR2200 router has been disabled C. The permission level of the administrator user account has been changed to 0 D. The administrator user account has been deleted Answer: AD 32 / 33 https://www.dumpsinfo.com/ Powered by TCPDF (www.tcpdf.org) 33 / 33 https://www.dumpsinfo.com/ http://www.tcpdf.org