HCIP-Datacom-Core Technology V1.0 Questions and Answers
GRE is a VPN technology that can implement packet transmission over heterogeneous networks. Which of the following statements are true about GRE?
BGP is a distance-vector protocol that implements route reachability between ASs and selects optimal routes. Which of the following statements are true about this protocol?
During routine maintenance, an enterprise administrator runs a command to check VRRP group information. Which of the following statements is false about the command output?
yaml
CopyEdit
Vlanif100 | Virtual Router 1 State: Master
Virtual IP: 10.1.1.100
Master IP: 10.1.1.2
PriorityRun: 120 PriorityConfig: 120
DR: None BDR: None MTU: 0
Preempt: YES Delay Time: 20s
Remain: --
Track: YES Priority Reduced: 20
Auth Type: MD5
BFD-session State: UP
The administrator of an enterprise configuresSNMPv3on a device for communicating with theNMS (Network Management System). After the configuration is complete, thedisplay trapbuffercommand output shows that there are traps in the trap buffer of theinformation center, but theNMS does not receive any of them. Which of the following may cause this problem?
Compress the 2001:0DBB:B8:0000:C030:0000:0000:09A0:CDEF address.___________(if the answer contains letters, capitalize them.)
ACLs are a common matching tool in routing policies. An ACL can be configured on a router to match routes.
The VRID of the VRRP virtual router is 3 and the virtual IP address is 100.1.1.10. What is the virtual MAC address?
On an RSTP network, you can set the STP priority of a switch to specify the switch as the root bridge.
Which of the following values is thedefault STP priorityof a Huawei switch?
On anRSTP network, port roles are optimized to overcome thedisadvantages of STP. Which of the followingport rolesare supported inRSTP?
Which of the following statements are false about VRRP timers?(Select all that apply)
Regarding the route-policy set-cost configuration below, which of the following statements is true?
TheBFD (Bidirectional Forwarding Detection) state machineimplements athree-way handshakefor BFDsession setup or teardown.Which of the following session states are involved in BFD session setup?
In special scenarios, when advertising routes to an IBGP peer, a BGP device needs to set the next hop to its IP address to prevent blackhole routes. Which of the following commands can be run in this case?
The BFD Echo function checks the connectivity of the forwarding link by looping back packets. Which of the following statements are true about this function?
On an enterprise network, the directly connected interfaces of two OSPF routers are on different network segments and have different masks. To establish an OSPF neighbor relationship between the two interfaces, you can change their network types to which of the following?
In BGP, the Origin attribute is used to identify the origin of a route. Which of the following statements are true about the Origin attribute?
An ACL can be used to match routes or data, but cannot be used to match both the IP address prefix length and mask length.
When a BGP device sends an Open message to establish a peer connection, which of the following information is carried?
Without a prior version check, an engineer configures IGMP snooping on a device and the version of IGMP snooping is earlier than the IGMP versions on user hosts. In this case, which of the following situations will occur?
Which of the following methods is usually used by a network administrator to configure a newly purchased device for the first time?
An enterprise network runs OSPF to implement network communication. Which of the following types of LSAs may be generated by an ABR?
BGP is generally applied to complex networks where routes change frequently. Frequent route flapping consumes a large number of bandwidth and CPU resources, and even affects the normal operation of the network. This is an unavoidable problem that cannot be solved in BGP.
When configuring an ACL on a router, you can specify a unique number or name to identify the ACL. Once a named ACL is created, it cannot be modified. You can only delete the named ACL and reconfigure it.
See the network shown in the following figure.
R1 and R2 run IS-IS and establish an adjacency. IS-IS is enabled on Loopback0 of R2 but disabled on Loopback3 of R2. The configurations shown in the figure are performed in the IS-IS process of R2. Which of the following statements are true?
On an IS-IS network, Level-1 routers can access the IS-IS backbone area only through Level-1-2 routers.
AnIP prefix listis a common matching tool in routing policies. When anIP prefix listis configured on a Huawei router, which of the following parameters areoptional?
Route attributes are specific descriptions of routes. BGP route attributes can be classified into four types. Which of the following are well-known discretionary attributes?
A local router runs IS-IS and its command output is shown in the following figure. Which of the following statements is true?
A firewall receives a packet that PC1 sends to PC2. Which of the following statements are true?
VRRP is implemented based on thepriority and preemption functionsof VRRP routers.Which of the following statements is false about the VRRP solution?
Which Of the following IEEE 802.11 standards is also known as Wi-Fi 6?
Access control lists can be classified into which types as follows?
After IPsec is deployed on an enterprise network, services are interrupted. The administrator finds that no data flow triggers IKE negotiation.
Which of the following are possible causes?(Select all that apply)
When deploying BFD, you need to adjust some parameters so that it can better detect the network status. Which of the following statements isfalseabout BFD optimization?
On an STP network, parameters used for role election, such as the root bridge ID, root path cost, and bridge ID, are all fields in BPDUs.
There are various types of VPNs, which can be applied to different layers. Which of the following network layers does SSL VPN belong to?
When two BGP peers support different Hold Time, they will negotiate to support the shortest Hold Time interval they can support.
On an enterprise WLAN where Portal authentication is deployed, an AC functions as an access device and communicates with a Portal server using the Portal protocol. Which of the following statements are true about the Portal protocol?
What is the correct procedure for a VLAN pool to assign terminals to VLANs.
Multiple BGP processes cannot be configured on the same router.
GRE is a VPN encapsulation technology that is widely used to transmit packets across heterogeneous networks. Which of the following statements is false about GRE?
As shown in the figure, VRRP is associated with a BFD session. When a backup device detects a fault through BFD, the backup device immediately assumes the master role after the Master_Down_Timer timer expires.
An OSPF AS-external LSA describes a route to an AS external network. When the field in the LSA is 0.0.0.0, the traffic destined for the external network is sent to the ASBR that imports this external route. (Enter the acronym in uppercase.)
This configuration is part of RTA configuration. Which of the following statements regarding the configuration are true?
[RTA] ospf 100
[RTA-ospf-100]silent-interface GigabitEthernet 1/0/0
An edge port is a new port role added to RSTP to overcome the disadvantages of STP. Which of the following statements is false about this port role?
VRF, also called VPN instance, is a network virtualization technology that helps VPN technology to isolate users. In normal cases, multiple VPN instances can be created on a physical device, and each VPN instance has independent entries. Which of the following resources can be independently owned by a VPN instance?
When multiple access channels are set for the same access requirement, the insecure access channels are not used and secure access channels are selected in normal cases. Which of the following are secure access channels?
Which of the following statements isfalseabout thesession table mechanismon firewalls?
After BGP initiates a TCP connection, the ConnectRetry timer is disabled if the TCP connection is successfully established. If the TCP connection fails to be established, the device tries to reestablish the TCP connection when the ConnectRetry timer expires.
In addition to a route reflector, the confederation is another method that reduces the number of IBGP connections in an AS.
Which of the following statements are true about the confederation technology? (Choose all that apply)
Which of the following statements regarding DR/BDR are false?
When receiving a packet, a Huawei router matches the packet against ACL rules. The default ACL matching order used by the Huawei router is.
Which of the following statements is false?
A router forwards traffic based on a FIB table. Which of the following values of the Flag field in a routing entry indicates that the next hop of the route is the gateway?
ACLs are a common tool for matching routes. ACLs are classified into multiple types based on ACL rule functions. An ACL can be identified by a number, and the number range for each type of ACLs is different. Which of the following type of ACLs are numbered from 4000 to 4999?
On an STP network, the root bridge, root port, and designated port are elected in sequence. The election rules of these ports are different. List the steps for electing the root port in sequence.
An enterprise administrator views the following details about a BGP route during routine O&M:
yaml
CopyEdit
BGP local router ID: 10.1.1.1
Local AS number: 100
Paths: 2 available, 0 best, 0 select
BGP routing table entry information of 192.168.1.1/32:
From: 10.1.1.2 (10.1.1.2)
Route Duration: 00h01m31s
Relay IP Nexthop: 0.0.0.0
Relay IP Out-Interface: --
Original nexthop: 172.16.1.2
AS-path: 200, origin incomplete, MED 0, localpref 100, pref-val 0, internal, pre 255, invalid for IP unreachable
Not advertised to any peer yet
Which of the following statements are true about the BGP route?
By default, some security zones are created when Huawei firewalls are enabled. Which of the following security zones is created by users?
See the following figure. All routers on the network run IS-IS and are in area 49.0001. By referring to the LSDB of R1, the Level-2 DIS is. (Enter the device name, for example, R1.)
On the OSPF network shown in the figure, R1, R2, and R3 run OSPF, and R1 advertises four VPN routes to OSPF. A filter-policy needs to achieve the following goal: R1's and R3's routingtables contain the routes to 192.168.3.0/24, but R2's routing table does not. Which of the following filter-policies cannot meet this requirement?
Which of the following statements regarding OSPF route summarization is false?
Both MQC and PBR can be applied on device interfaces to filter received and sent packets or control packet forwarding paths.
On an OSPF network, the I bit, M bit, and MS bit in the first DD packet sent by a router are all set to 1.
BGP routes have multiple path attributes. When a router advertises a BGP route to its peers, the route carries multiple path attributes. These attributes describe the characteristics of the BGP route and affect route selection in some scenarios. The attribute is Huawei-specific. It is valid only on the local device and is not transmitted to BGP peers. (Enter the attribute name in lowercase as it appears in the command output about the BGP routing table.)
Which of the following messages are sent when BGP establishes peer relationships?
On an IS-IS network, each router can generate LSPs. Which of the following events trigger the generation of a new LSP?
On a WLAN, the HSB service sets up an HSB channel between two devices that back up each other, maintains the channel status, and backs up data. Which of the following can HSB back up in real time?
BFD control packets are encapsulated in UDP packets for transmission. What is the destination port number of multi-hop BFD control packets?
After the administrator of an enterprise deploys a DHCP server, employees complain that their clients cannot obtain IP addresses from the DHCP server. Which of the following may cause this problem?
The Origin attribute is used to define the origin of BGP path information. There are three types of Origin attributes. Which of the following lists the Origin attributes in descending order of priority?
Which of the following statements regarding IGMPv1 and IGMPv2 are true?
Which command is used to configure the VRRP preemption delay?
GRE is a Layer 2 VPN encapsulation technology that encapsulates packets of certain data link layer protocols so that the encapsulated packets can be transmitted over an IP network.
A company has a stack consisting of three switches that are running properly. The master switch restarts due to a fault. Given this, which of the following statements are true?
An enterprise uses Huawei routers to deploy an IS-IS network for network-wide communication. An engineer wants to change the interface cost to control route selection. By default, which of the following values is the maximum cost that can be configured?
On an OSPF network, if a router receives an update of an LSA that exists in the local LSDB, the router updates the LSDB and floods the LSA.
In the OSPF protocol, inter-area route calculation involves only Router LSA, Network LSA, and Summary LSA.
OSPF networks are classified into four types of networks by link layer protocol. Drag the following link layer protocols to the corresponding network types.(Token is reusable)
OSPF networks are classified into broadcast, P2P, P2MP, and NBMA networks. Which of the following types of networks use the default Hello time (30s)?
There are two BFD operating modes. In_______mode, the local end sends BFD Control packets at specified intervals, and the remote end checks whether the local end periodically sends BFD Control packets. (Use lowercase letters.)
After HSB is configured, the HSB channel fails to be established and cannot back up information on the active device to the standby device. What are the possible causes for this HSB function failure?
On a network, each router has a local core routing table and protocol routing tables. A routing entry in the local core routing table has multiple key fields. Which of the following are included?
In BGP, Notification messages are used to request peers to resend routing information after routing policies are changed.
In BGP, the AS_Path attribute records the numbers of all ASs that a route passes through from the local end to the destination in the vector order.
Which of the following statements is false about the attribute change during route transmission?
In BGP, the origin attribute of the routes imported using the import-route command is incomplete.
By default, if no router ID is configured but multiple loopback interface addresses are configured, BGP selects the largest loopback interface address as the router ID.
BGP confederations are widely used because they can reduce the number of IBGP connections in an AS. Which of the following statements is false about confederations?
Which of the following statements regarding the BGP error display of a router is false?
An IP prefix list is a common matching tool used in routing policies. Which of the following cannot be configured as matching conditions in an IP prefix list on a Huawei router?
Which of the following statements regarding the summary automatic command and BGP route summarization is false?
A BGP device receives a route carrying an unknown attribute from a peer but does not know whether other devices need the attribute. In this case, the BGP device retains this attribute when advertising the route to other peers. Which of the following attributes is of this type?
On the network shown in the following figure, the management VLAN is VLAN 10, and the AP isconfigured to obtain an IP address on the network segment 10.1.1.0/24 through DHCP. The AP, AC, and AR function as the DHCP client, DHCP relay agent, and DHCP server, respectively. Which of the following configurations for the DHCP relay agent and DHCP server are correct?
OSPF neighbors have multiple states, such as Down, Init, 2-way, Loading, or Full. In which of the following states do OSPF routers negotiate the master and slave roles?
The figure shows theVRRP status switchover events. Match these events with their sequence numbers.
Which of the following statements regarding BGP route advertisement are false?
A switch runs MSTP. The configuration is shown in the figure. What is the role of this switch in MSTI 1?
Which of the following statements about WLAN roaming are true?
On an RSTP network, if a port receives an RST BPDU and finds that its buffered RST BPDU is superior to the received RST BPDU, the port discards the received RST BPDU without responding.