Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Huawei H12-891_V1.0 Dumps

Page: 1 / 61
Total 610 questions

HCIE-Datacom V1.0 Questions and Answers

Question 1

The router port to which the policy is applied has been idle for about 10 seconds, and there is a huge burst of c1 type coming in an instant, so how many bytes will the packets that are colored green?

Options:

A.

256K bytes

B.

48128 bytes

C.

32K bytes

D.

80128 bytes

Question 2

Regarding the MPLS handling mode of TTL, the following description is correct?

Options:

A.

Pipe mode. When an IP message passes through an MPLS network, the IPTTL minus l at the entry point is mapped to the MPLS TTL field

B.

MPLS tags in the TTL, which mean the same as the TTL domain in the IP header. TTL prevents mpLS networks from creating routing loops

C.

In Unifor mode, when an IP message passes through an MPLS network, the inbound IPTTL is minus 1. The MPLSTTL field is a fixed value

D.

In MMLSVPI, if you need to hide the structure of the MPLS backbone network, you can use the Uniform mode on Ingress for private network messages

Question 3

The command ip as-path-fiter as-path-fiter-number (denylpermit) regular-expression to configure as-path-ilter, in this command , multiple sentences can form an as-path-filter statement, what is the relationship between so many statements?

Options:

A.

Routes match in order When a route matches to a clause, the relationship between

B.

and is no longer matched downwards

C.

or relationships

D.

Routes match in order and routes need to match all sub-directions

Question 4

In broadcast networks, elections to DIS begin only after a neighbor relationship has been established

Options:

A.

True

B.

False

Question 5

A company's two-layer phase network architecture as shown in the figure, when the engineer is configured to find that the business between departments can not communicate, through the command to view the status of the equipment as follows, please determine the possible causes?

as

Options:

A.

The BPDU interval between switches is not configured

B.

The Transition VLAN mapping between the handover machines is not configured to be caused

C.

The Revislon Level configuration is inconsistent between switches

D.

Inconsistent Registry Name configuration between text exchange machines

Question 6

The following about the Router-LSA of OSPFv3 is correct?( Single choice questions).

Options:

A.

The router-LSA data area contains the Link-Local address

B.

The router-LSA data area contains the Interface ID of the neighbor on this side

C.

Similar to OSPFv2, the Option field exists in the header of LSA, not in the data area of Router-LSA

D.

When LS type= Ox0001 in the head of LSA, the data area representing LSA is Router-LSA

Question 7

As shown in the figure, three switches S1, SW, and SN3, where SWI is the root bridge, and link congestion occurs between SI and SW2, SWD cannot receive the configuration BPDU sent by the root bridge, which spanning tree protection mechanism does the administrator need to configure to prevent the problem caused by link congestion?( Single choice questions).

Options:

A.

root protection

B.

PreventS TC-BPDU attacks

C.

BPDU Protection

D.

Loop Protection

Question 8

The switch role in the stacking system does not include ?

A From the switch

B. Candidate Switch

C. Standby Switch

D. Primary Switch

Options:

Question 9

There is an existing router running OSPF connected to Zone 0 and Zone 1 You configured Zone 1 as a stub zone, what classes does LSA that only operates inside Zone 1 include?

Options:

A.

7 ? LSA

B.

1 ? LSA ? 2 ? LSA

C.

I LSA,2 LSA 5 LSA

D.

3 ? LSA ? 4 ? LSA

E.

1 LSA,2 LSA 3 LSA

Question 10

What check frames can IPSG set?

Options:

A.

Out of the interface

B.

MAC address

C.

IP address

D.

VLAN ID

Question 11

There is an As-path-filter.ip as-path-filter 1 permit*(100l400) $, which As-path-filter can match which of the following AS_PATH Attribute?( Confirmed).

Options:

A.

300 4200

B.

1234 1400

C.

3100

D.

100

Question 12

How do IGMPv2 routers maintain cinderband group membership? Multi-select

Options:

A.

The router queries a specific group

B.

The router maintains a timeout timer for each group membership, refreshes the timer if the receiver host is received, and deletes the group membership if the timer times out

C.

The router periodically sends a Query message, and after the receiver host receives the Query message, it reports a Report message

D.

As soon as the leave message is received, the router immediately deletes the group membership

Question 13

When judging the old and new LSA, the serial number parameter and the age parameter are used , and the following two parameters are correct for ?( Multiple choice questions).

A When the router receives two LSAs, where the sequence number is the same and the checksum is the same, the smaller the age, the better

B. When the router receives—The age of the LSA is set to 3600S, the LSA is unavailable

C. If the serial number of the LSA reaches the end value of Ox7FFFFFFF, the current router advertises an LSA with an age of 3600S

D. Both the serial number and age parameters can determine whether the LSA is old or new, and the router prioritizes the sequence to participate in the teaching, and the larger the better

Options:

Question 14

Link state information is isolated by default between different IS-IS processes on the same router.

Options:

A.

TRUE

B.

FALSE

Question 15

In the forwarding table of the switch, a MAC address can correspond to only one outlet at a time

Options:

A.

True

B.

False

Question 16

During isis ' broadcast network database synchronization, is the following statement correct?

as

Options:

A.

R2, as DIS, sends CSNP periodically.

B.

R2 As DIS, Hello time is 3 times that of a normal router . C. R2 as DIS does not receive PSNP nouns for other routes.

C.

RI and R3 maintain database consistency by periodically sending PSNP requests.

Question 17

If you have a Huawei switch running the STP protocol, and now connect the GO/O/17 interface and the GO/O/18 interface of the switch through a cable, then the scenario described below is correct ?( Single choice questions).

Options:

A.

Both the G0/0/17 interface and the GO/0/18 interface enter the Forwarding state

B.

Both the Go/0/17 interface and the G0/0/18 interface enter the Disccarding state

C.

The Go/0/17 interface enters the Blocking state

D.

The GO/0/18 interface will continuously change back and forth between the Listening state and the Learning state

E.

GO/0/18 interface will enter the Disking state

Question 18

Which of the following DNS resource records are legitimate?

Options:

A.

FQDN

B.

NS

C.

PTR

D.

MX

E.

A

Question 19

The RSTP protocol provides a variety of protection functions, such as when the edge port is configured as a protection state, the edge port receives the BPDU packet processing method;

Options:

A.

Directly discard the BPDU packet

B.

Close the port

C.

After parsing the BPDU message, the relevant information is obtained

D.

Forward BPDU packets as required

Question 20

Configuring filter-policy 2000 export in the IS-IS process, the wrong statement about the function of the command is ?

Options:

A.

which needs to be used in conjunction with route ingestion, acts as an external route sender neighbor that only partially introduces.

B.

If you do not configure this command, the device will by default introduce the external routing protocol to the IS-IS route all outgoing

C.

Restricts the external publication of route entries generated by the device itself

D.

This command will filter the link status information released to the outside world

Question 21

D Class IP address range 239000-239255255,What does 255 do? Radio

Options:

A.

SSM multicast address, the multicast address segment is valid for the whole network

B.

Any legitimate multicast traffic and multicast application can adopt this address C. Locally managed multicast address, which is valid only locally

C.

Link-local multicast address, where traffic that uses that address includes network control messages and that address range is only the multicast address segment used by the E. routing protocol

Question 22

A home user has opened a 1Mb/s bandwidth, and in order to improve the user experience, the operator can stabilize 2Mb/s when measuring speed If we use the listening bucket technology to achieve this requirement, which of the following methods is optimal.

Options:

A.

cir 10000 pir 12000

B.

cir 10o00 cbs 12000 pbd 12000

C.

cir 8000 pir 12000

D.

cir 10000 cbs 10000 pbs 12000

Question 23

What parameters can the DHCPv6 server assign to DHCPv6 clients?

Options:

A.

SNTP server address

B.

IPv6 address/prefix

C.

Gateway address

D.

DNS server address

Question 24

A lot of overwave techniques have emerged in the process of replacing the IPV4 addresses used in the network with lP6 addresses. These technologies are divided into two categories, one is IP4IPV6 coexistence technology, the other is PA/IP>6 interoperability technology, which of the following options sleep in IPv4/IPv6 coexistence technology?

Options:

A.

NAT64

B.

IPv6 over IPv4

C.

Dual Stack

D.

ISATAP

Question 25

A campus deploys OSPF to achieve network interoperability, and an engineer configures R2 as shown in the figure, then the following description of the LSA in the OSPF network is wrong

as

Options:

A.

There is no Type3 LsA flooding within Areal

B.

There is no Type3 LSA flooding in Area2

C.

There is Type5 LSA flooding within Areal

D.

Area2 contains Type5 LSA generic adverb

Question 26

Regarding BGP4+, the following statement is correct?

Options:

A.

BGP4+ carries the next hop address of the route through the Network Address of Next Hop in the NLRI properties MP_REACH

B.

BGP4+ carries the next hop address of the IPv6 route through the NEXT_HOP attribute

C.

The NEXT_HOP attribute does not exist in BGP4+

D.

BGP4+ carries the prefix and mask length of the IPv6 route through the NLRI attribute

Question 27

The following statement about the NSSA area is correct (multiple choice).

Options:

A.

In the NSSA area where the OSPF neighbor sends hello packets, the N position 0, E within the option field Position 1

B.

The NSSA zone must automatically generate a default LSA to access the external network

C.

The NSSA zone generates a Category VII LSA to advertise external routing, and the FA address in the Category VII LSA acts to prevent loops

D.

In the OSPF neighbor in the NSSA region sends hello packets, position 1 within the option field , position E

Question 28

The correct statement about the IGMP proxy is ? Multi-select

Options:

A.

The downstream interface of the IGMP proxy device generates multicast relay table items

B.

IGMP proxy can detect the link status with the linkage through the information of the member host joining/leaving the multicast group, and realize the rapid switching of the primary and standby device links

C.

IGMP proxy is typically deployed on devices between hosts that are members of the access device

The

D.

IGMP proxy device cannot send query messages to downstream member hosts in place of the IGMP queryer to maintain group membership

Question 29

If the Interface Sticky MAC function is enabled, what is the number of MAC addresses that the interface learns by default?

Options:

A.

15

B.

10

C.

5

D.

1

Question 30

What is the relationship between CIR, BC and TC? (single select)

Options:

A.

CIR=TC/BC

B.

CIR=BE/TC

C.

TC=CIR/BC

D.

TC=BC/CIR

Question 31

In order to study the working mechanism of the OSPFv3 protocol, a project to build a network topology is as follows, the configuration of R1 and R2 is as follows, please ask the LSA switched between R1 and R2 What are the types?

Options:

A.

network-LSA

B.

Router-LSA

C.

Link-LSA

D.

Inter-area-prefix-LSA

Question 32

Which of the following configurations is the correct OSPFv3 route aggregation configuration:

Options:

A.

[Huawei]ospfv3 1 [Huawei-ospfv3-1J]area 1

[Huawel-ospfv3-1-area-0001]abr-summary fc00:0-0:48 cost 400

B.

[Huawei] interface gigabitethernet 1/0/0

[Huawei-GigabitEthernet1/0/0]asbr-surmary fcO0-0:0:48 cost 20

C.

[Huawei]ospfv3 1 [Huawei-ospfv3-1]asbr-surmary fcO0-0:0::48 3 cost 20 tag 100

D.

[Huawei]ospfv3 1 [Huawei-ospfv3-1]abr-surmary fcO0:0:0:48 cost 400

E.

(Huaweijospf3 1 Huawei-ospfv3-1Jarea 1

Huawei-ospfv3-1-area-0001]asbr-sumary fcO0:0:0: 48 cost 20 tag 100

Question 33

There are many ways to establish a cluster on a box switch, what methods does Huawei frame switch support to establish a cluster?

Options:

A.

Set up via a cluster card on the motherboard

B.

Establish

C.

through the cluster daughter card on the interface board. Establish

D.

through the service interface on the interface board Established by switching the cluster card on the network board

Question 34

The following statement about a cross-domain MPLS VPN is mischaracteristic?

Options:

A.

When the public network tag is LDP only , for cross-domain VPN-optionC scenario 2, a three-layer tag is required in the packet forwarding process.

B.

For the cross-domain VPN-OptionB approach, an MP-eBGP neighbor relationship needs to be established between the two ASBRs.

C.

For the cross-domain VPN-OptionA mode, the route passed between the two ASBRs is a normal IPv4 route.

D.

For the cross-domain VPN-OptionB approach, two ASBR-PEs are interconnected with multiple interfaces (including sub-interfaces), each associated with a VPN, each ASBR PE treats the peer as a CE.

Question 35

XLAN uses BGP EVPN to establish a tunnel, what type of message is used? ( Single choice questions).

Options:

A.

Typel

B.

Type2

C.

Type3

D.

Type4E. Type5

Question 36

As shown in the figure, R1, R2, and R3 run OSPP at the same time and declare their respective ring ports, as described below is the error.

Options:

A.

R2, you can use the filter po y export command to filter R3's loopback route

B.

R2 you can make Ëfilter in Area 0 The import command to filter the loopback route for R3 on

C.

RI can make Ëfilter-policy import filter the loopback route for R3

D.

RI, you can use the Make Ëfilter export command in Area 1 to filter loopback routes for R3

Question 37

The following statement about the security alliance SA in IPSec is incorrect

Options:

A.

SA is uniquely identified by a triple that includes the security parametric reference SPI (Security Parameter Inder), the source IP address, and the security protocol number (AH or ESP)

B.

Use the display ipsec command to view the encryption algorithm used with another IPSec peer, the traffic of interest, and so on.

C.

IPSec only supports encrypting data using symmetric encryption algorithms.

D.

A two-way SA must exist between IPSec peers to establish an IPSec VPN connection

Question 38

Which of the following are single-packet attacks?

Options:

A.

Special control message attacks

B.

Scan Probe Attack

C.

DDos Attack

D.

Malformed Message Attack

Question 39

If you have a LOCAL AREA NETWORK running 8021D Spanning Tree Protocol, the non-root switch does not receive which parameter under the root switch?

Options:

A.

MaxAge

B.

Root cost

C.

Forward delay

D.

Hold time

E.

Hello time

Question 40

The switch SWA and SWB are connected together by 2 Ethernet links, where the switch SWA has the following interface configuration:

as

Options:

A.

Without changing the current configuration, GigabitEthernet1/0/1 and GigabitEthernet1/0/2 can join the same aggregation group

B.

Because of the different VLANs allowed, GigabitEthernet1/0/1 and GigabitEthernet1/0/2 cannot join the same aggregation group

C.

After link clustering is configured on both SWA and SWB, if MSTP is enabled on the switches SWA and SWB Both GigabitEthernetl1/0/1 and GigabitEthernetl/O/2 are the forwarding status of MSTP

D.

Only if the configuration of GigabitEthernet 1/0/2 is changed to match GigabitEthernet 1/0/1 can the two join the same aggregation group

Question 41

The following description of the TTL in the MPLS Header is correct:

Options:

A.

A TTL that acts like an IP header and is used to prevent message loops

B.

To control label distribution

C.

Limit LSR

D.

Control of upstream devices for label distribution

Question 42

Is the following correct statement for the VXLAN message?

Options:

A.

The outer destination IP address is the IP address of the VTEP at the far end of the VXLAN tunnel

B.

The source UDP port number is 4789

C.

The destination UDP port number is 4789

D.

VNI has 24 T bits to distinguish the VIAN segment

Question 43

?? Route ? Policy ??:ip community-filter Ipermit 100: 1 ip as-path-filter 2 permit ^I00$ route-policy test permit node 10 if-match communityfilter 1 if-match as-path-filter 2 apply

as-path 200 Is the above configuration description correct?

Options:

A.

The BGP route matches the above only if the BGP route carries a community attribute value of 100:1 or if the AS PATH is 100 route one policy. The AS-one PATH attribute that matches the route is changed to 200

B.

The BGP route matches the above only if the BGP route carries a community attribute value of 100:1 and the AS-One PATH is 100 route policy? The AS-PATH nature of the matching route is changed to 200

C.

Only if the BGP route carries an AS-PATH of 100, the BGP route matches the route one policy above. The AS-one PATH attribute that matches the route is changed to 200

D.

As long as the BGP route carries a community attribute value of 100:1, the BGP route matches the route-policy above The AS-PATH attribute of the matching route is changed to 200

Question 44

The following statement about the VXLAN gateway is incorrect?( Single choice questions).

Options:

A.

Layer 2 gateway: Used to solve the problem of tenant access to the VXLAN virtual network, and can also be used for subnet communication of the same VXLAN virtual network.

B.

Layer 3 gateway: Used for cross-subnet communication of the VXLAN virtual network and access to external networks.

C.

VXLAN Layer 3 gateways can be divided into centralized gateways and distributed gateways.

D.

Layer 2 gateway and VPN instance binding.

Question 45

Is the following statement about VLAN aggregation correct?

Options:

A.

Sub-VLAN is used to isolate broadcast domains

B.

A Super VLAN can contain one or more Sub-VLANs

C.

The super Sub-VLAN contains a physical interface that can establish a Layer 3 VLANIF interface

D.

Sub-VLAN contains a physical interface that can establish a Layer 3 VLANIF interface

Question 46

The network administrator defines a traffic policing policy as follows:

as

Options:

A.

256K bytes

B.

48128 bytes

C.

32K bytes

D.

80128 bytes

Question 47

What are the wrong statements about OSTPF's Router LSA and Network LSA?

Options:

A.

There must be both Router LSA and Network LSA in the OSPF network

B.

Network LSA carries both topology and routing information

C.

A router running OSPF must produce a Network LSA

D.

A router running OSPF must produce a Router LSA

Question 48

The correct description of the extended features of ISIS is ?

Options:

A.

When the amount of information in the Link State Protocol data packet PDU to be released by ISIS is too large, the ISIS router will generate multiple LSP shards to carry more ISIS information.

B.

ISIS can choose whether to authenticate incoming SNP and LSP packets

C.

If there are other vendors' devices on the network and do not support the LSP sharding function, the sharding expansion mode must be configured as Model-1, otherwise the message will not be recognized by other vendors' devices.

D.

After you enable the LSP shard extension feature of your router, you can use it without restarting the ISIS process.

Question 49

A company network runs the OSPF protocol, an engineer in order to understand the OSPF mechanism in the network to perform packet capture operations, the following ospf message description is correct?

Options:

A.

LSUpdate message is sent only when an adjacency relationship is established

B.

LSUpdate messages synchronize the link state database by sending detailed LSA information

C.

The interface sends Hello packets as soon as it joins the OSPF area

D.

When an LS Update packet is received, the router must send an LSAck to acknowledge

Question 50

Mainstream Layer 2 tunneling technologies include VXLAN TRILL, NVGB and MPLS.

Options:

A.

FALSE

B.

TRUE

Question 51

If a DR needs to be elected between multicast routers running PIM-SM to be responsible for the sending and receiving of source or member multicast data, which one is described correctly below for the DR election rule?

Options:

A.

PIM routers with long interface masks are elected dr.

B.

Compare the DR priority first; With the same priority, you need to compare the interface IP addresses of the PIM routers to elect dr

C.

PIM routers with small IP addresses are elected DR. PIM routers with low D. DR priority values are elected DR.

Question 52

The link quality of a company's network is poor, often failures lead to route oscillation, and even occasionally there are routing loops, in order to prevent the recurrence of these phenomena, the network administrator decided to deploy URPF in the whole network to improve the stability of the network

Options:

A.

True

B.

False

Question 53

The following statement about IPSec VPN is correct

Options:

A.

Brutal mode can support NAT traversal, while main mode does not support NAT traversal.

B.

The two routers establish IPSecVPN in main mode, and from the 5th message (included), the payload's data is often encrypted.

C.

Two routers establish an IPSec VPN in brutal mode, so that the tunnel is built with a minimum of 4 messages interacting between the two devices.

D.

The two routers can establish an OSPF neighbor relationship through the IPSec VPN (19) channel and exchange intranet devices by

Question 54

The following statement about the VPNv4 address is wrongly described as ?

Options:

A.

By default, PE does not perform VPN-target filtering on received VPNv4 routes.

B.

Local PE sets up An Export Target for these routes before releasing VPNv4 routes learned from sites that are directly connected to them to other PEEs attributes, and are published with routes as extended community attributes for BGP.

C.

Carries the RD attribute when BGP publishes both reachable and unreachable VPNv4 routes.

D.

The VPNv4 address has a total of 12 bytes, including an 8-byte route identifier RD (Route Distingulisher) and a 4-byte IPv4 Address prefix.

Question 55

Level-1-2IS transmits Level-2LSP to the Level-1 area if the AT location 1 in Level-2LSP is delivered It means that the Level-1lS in the area can be accessed to the outer area through Level-1-2IlS

Options:

A.

True

B.

False

Question 56

When you troubleshoot a local area network with Huawei equipment deployed, you find that there are a large number of unicast frames with unknown source AC addresses in the local area network . A large number of unknown source MAC addresses single-plug frames can cause the switch the biggest danger is ?

Options:

A.

Memory that occupies the cache ton

B.

Increases the power consumption of the power supply

C.

Consumes a TCAM table entry

D.

Consume the available bandwidth

E.

Consume the MAC address table entry available in the system

Question 57

Huawei's SDN controller using VXLAN technology is fixed?

Options:

A.

Agile Controller-Campus

B.

Agile Controller-WAN

C.

Agile Controller-DCN

Question 58

The following information about MPLS tags describes the error as ?( Single choice questions).

Options:

A.

By default, devices support php features, and the ERAS node that supports PHP assigns a tag value of 3 to the penultimate hop node

B.

When the tag value is 0, the tag must be ejected and the message must be forwarded based on IPv4

C.

The MPLS tag is 4 bytes long and encapsulated between the link layer and the network layer.

D.

If the bottom of the label identifies S=0, it indicates that the label is the bottom label and is directly forwarded to the IP.

Question 59

Two routers, connected together through the serial port, but can not ping between each other , now check the port status as follows: Can the following information determine what the cause is?

as

Options:

A.

Insufficient link bandwidth

B.

The IP addresses on both ends are not on the same network segment

C.

The link layer protocols on both ends are inconsistent

D.

Subnet mask does not match the

Question 60

Which of the following BGP attributes is not required in the Update message for a BGP route?

Options:

A.

WITH

B.

Local-Preference

C.

AS_PATH

D.

Origin

Question 61

The value of OSPF and BFD linkage is ? Radio

Options:

A.

Any change in BFD status is realized by detecting the BFD at the millisecond level, which correlates the OSPF state and realizes the purpose of OSPF rapid sensing link state

B.

Does not affect OSPF neighbor status

C.

BFD packet transmission interval can reach the 100-second level, which is slower than the OSPF induction link state

D.

OSPF's hello send interval is seconds, which is faster than BFD inductive link state

Question 62

What messages can Huawei equipment suppress traffic for?

Options:

A.

Multicast

B.

Known unicast

C.

Broadcast

D.

Unknown unicast

Question 63

In the multi-level RR scenario, the first-level RR will be connected to a large number of second-level R, which may cause the BGP circuit of the first-level RR to overflow from the table Risk of R BGP routing table overflow?( Radio).

Options:

A.

ORF

B.

Route Control C. Route Aggregation

C.

Set the same Cluster-ID

Question 64

MACsec provides users with secure MAC layer data sending and receiving services. Which of the following is not a service available by ACsec?

Options:

A.

User data encryption

B.

Data source authenticity verification

C.

Integrity check

D.

Controllability check

Question 65

What are the common ways to learn routing in BGP? ( Multi-select)

Options:

A.

receives neighbor routing information

B.

Introduce static routes

C.

BGP routing for other AS is introduced

D.

Introduced Direct Route

Question 66

The following statements about the VRRP protocol are correct (multiple choice).

Options:

A.

Both VRRPv2 and VRRPv3 support authentication

B.

VRRPv3 does not support authentication, while VRRPV2 does

C.

VRRPv2 only applies to IPv4 networks, and VRRPv3 only applies to IPv6 networks

D.

The owner of the Master IP address has a VRP priority of 255, and all configurable priorities range from 0 to 254

Question 67

As shown in the figure,

as

RI, R2 establishes an EBGP neighbor and turns on the BFD detection function, the following statement is correct

Options:

A.

Detection time for BFD packets for AR2 800ms

B.

R1 Detection time for BFD packets for 1280ms

C.

R1 Detection time for BFD packets The detection time for BFD packets for 660ms

D.

R2 is 600ms

Question 68

Four routers R1, R2, R3, and R4 run IS, and the I5S router type is noted in the diagram. All four routers have an area address of 49001, and looking at the routing table on R1l shows the following results, the reason why R did not reach the route of 1034344

as

Options:

A.

The routing policy configured on the ARO filters the System-ID of the default route

B.

R2 from conflicting with R3

C.

R and R4 Zone Planning Errors The System-ID of

D.

R2 conflicts with R1

Question 69

In a multicast network, what causes multicast traffic to not forward properly?

Options:

A.

The router does not have an RPF route

B.

PIM is not enabled on the RPF interface

C.

The upstream router will receive the PIM Join message dropped

D.

Multi-router egress network, this router is not DR

Question 70

If you need to use the delault-route importd command if no default route exists in the local IP routing table , a default route is issued to the BGP peer (group).

Options:

A.

True

B.

False

Question 71

Each DD message has a sequence number for data confirmation, and a DD sequence number is 2 bytes long

Options:

A.

True

B.

False

Question 72

The following description of the GVRP interface registration mode in Huawei switches is correct?

Options:

A.

When fixed registration mode is selected, the interface cannot propagate dynamic VLANs

B.

When the normal registration mode is selected, allow the interface to dynamically register and unregister the VLAN. Logout here includes deleting dynamically learned VLANs and VLANs created natively by the administrator

C.

When the interface layer two operating mode must be hybird

D.

GVRP when the register mode with forbidden is selected, there are four types of interface registration mode

Question 73

The most effective way to view device warnings through the CLI is ?

Options:

A.

Display alarm

B.

Display current-configuration

C.

Display interface brief

D.

Display clock

Question 74

Which of the following statements about RADIUS is correct?( Single choice questions).

Options:

A.

MAC authentication does not require a username password, so you cannot use RADIUS to authenticate the user.

B.

RADIUS supports both wired and wireless access modes.

C.

SEPARATION OF RADIUS PROTOCOL AUTHENTICATION, AUTHORIZATION, AND AUDIT.

D.

RADIUS authentication and Portal authentication cannot be used together because the Portal server can typically be used to authenticate users when portal authentication is deployed.

Question 75

The following statement about the OSPFv3 message format is correct?( Multiple select).

Options:

A.

There is no change in the option field of the Hello message

B.

Remove the Authentication, Auth Type fields

C.

Hello messages no longer contain address information, carrying Interface lD

D.

The OSPF version number changed from 2 to 3

Question 76

In the description of the MAC address spoofing attack, the error is ? Radio

Options:

A.

Mac address spoofing attacks cause the switch to learn the wrong mapping of Mac addresses to IP addresses

B.

A MAC address spoofing attack causes the data that the switch is sending to the correct destination to be sent to the attacker

C.

MAC address spoofing attacks primarily exploit the switch Mac address learning mechanism

D.

An attacker can perform a MAC address spoofing attack by sending a forged source Mac address data frame to the switch

Question 77

ISlS protocol In broadcast networks and P2P networks, when the router receives LSP, it needs to use PSNP to confirm and ensure the synchronization of LSDB

Options:

A.

True

B.

False

Question 78

Deploying the ISIS protocol in an IPv6 environment is true in the following statement (radio).

Options:

A.

By default, the DIS priority of broadcast network interfaces at Level-1 and Level-2 is 1 B In broadcast networks, the DIS priority for IPV4 and IPV6 can be set separately

B.

In the same broadcast network. If each router supports both IPV4 and Pv6, the DISC of JPV4 and Pv6 must be the same device

C.

IS-IS sient is configured under the finger port, this interface will not send ISIS packets, but will receive ISIS packet

Question 79

As shown in the figure, the PPP link between R1 and R2 is not in the same network segment, but the R1 and R2 direct connectors can communicate, and the Ethernet link cannot communicate under the same planning, why?

as

as

Options:

A.

The interconnect POS ports of R1 and R2 learn the 24-bit subnet route of each other's direct connection ports through IPCP

B.

The interconnect POS ports of R1 and R2 learn the 32-bit host route for each other's direct connections through IPCP

C.

The interconnect POS port of RI and R2, through LCP learns the MAC address of the opposite termination , does not need to use ARP to request the MAC address

D.

The data packets of the interconnect POS ports of R1 and R2 do not need to encapsulate ethernet headers and do not need to use ARP to request MAC addresses

Question 80

As shown in the figure, an engineer uses four routers to test the interoperability of branch networks, where R1, R2, and R3 in branch 1 deploy OSPF Network interoperability is implemented, and R, R3, R4 in Branch 2 is deployed is-IS to achieve network interoperability. Now that the engineer wants to implement R1 access to R4's loopback address, which of the following actions will meet this requirement?

as

Options:

A.

No configuration is required

B.

Publish default routes only in the OSPF process for R2

C.

In the OSPF process of R2 and the IS-IS process, the default routes are published separately

D.

Publish the default route only in the IS-IS process of R2

Question 81

Which of the following does the digital certificate not contain?

Options:

A.

Digital envelopes

B.

Issued by

C.

Digital signature

D.

Public key information

Question 82

As shown in the figure, all routers run OSPF, which is correct in the following statement:

as

Options:

A.

Both R2 and Zone 0 generate Router LSA

B.

R2 generates Router LSA only in Zone 0

C.

R2 forwards the R1-generated Router LSA to R3

D.

R2 Forwards the R3-generated Router LSA to R1

Question 83

What's wrong about vrrp timers is ?

Options:

A.

MASTER DOWN = (3*ADVER_ INTERVAL) + Skew_ time

B.

Skew Time= (255-Priority)/255

C.

By default, the time period for VRRP advertisement messages is 2 seconds

D.

By default, the VRRP preemption delay is I seconds

Question 84

How do.8021w and 8021D handle BPDUs?( Single choice questions).

Options:

A.

The 8021D bridge only forwards BPDU packets received from the root bridge

B.

8021D bridges do not forward BPDU packets

C.

The 8021w bridge only forwards BPDU packets received from the root bridge

D.

8021w Bridge does not forward BPDU packets

Question 85

Regarding the cross-domain VPN-OptionB scenario, what is the following description incorrect?

Options:

A.

In the process of packet forwarding, the private network LSP of the VPN should be exchanged once on the two ASBRs An EBGP neighbor relationship.

B.

Cross-domain VPN An Option

C.

scheme is not limited by the number of interconnection links between ASBRs

D.

The outer layer label is exchanged between two ASBRs to VPNv4 routes.

Question 86

You expect to deploy multicast video applications on your private, on-premises network. To achieve this, you need to have a private multicast IP address in your network . So which range of IP addresses can be used?( Single choice questions).

Options:

A.

239000-239255255255

B.

241.000-241.255255255

C.

224000-224255255255

D.

240000-254255255255 E. 226000-226255255255

Question 87

Is the following description of the OSPFv3 message correct?

Options:

A.

The interface ID of the sending interface must be included in the A Hello packet

B.

The LSACK message contains LSA header information to confirm the receipt of LSU packets

C.

The LSR message contains the complete LSA header information for requesting an update to the LSA

D.

Hello messages and the Option field for DD messages extends to 24-bit

Question 88

0SPFV2 is running on the IPV4 network IGP: OSPF3 is running in the IPV6 network, OSPF35 OSPFV2 has the same message type. Includes hello messages, DOD messages, LSR messages, LAU messages, and SAX messages about OSPP The following statement is correct?

Options:

A.

The hello packet of OSPFv3 carries the IPV6 address prefix of the router interface

B.

OSPFv3 uses the authentication field of the packet header to complete the packet authentication

C.

OSPFv3 uses the link-local address as the source address for sending packets, which can be forwarded outside the range of the originating link

D.

OSPFv3 sends OSPFv3 packet using the IPV6 multicast addresses FF02::5 and FF02

Question 89

The correct description of configuring BGP4+ is that

Options:

A.

BGP4+ does not support route reflectors.

B.

The next hop of a B. BGP4 route can use the Link-Local address.

C.

BGP4 configures the reflector, the role positioning of the reflector and the client needs to be consistent with the configuration of BGP4

D.

BGP4 specifies p

E.

BGP4+? Router-ID ? BGP4 ? Router-ID—??

Question 90

In order to reduce the number of OSPF routes in certain areas, the OSPf protocol has developed special area functions, and the following description of the characteristics of OSPF special areas is correct

Options:

A.

ASBR-Sunmary-LSA is allowed to be published to the NSSA region

B.

AS-External-LSA is allowed to be published to the Stub region

C.

Any OSPF zone can be configured as a special zone

D.

Zone can be equipped with zhiyi

Question 91

OSPFv3 uses the same route advertisement method as OSPFv2: advertising is done through the network command in the OSPFv3 area view.

Options:

A.

TRUE

B.

False

Page: 1 / 61
Total 610 questions